Skip to main content

2012 | OriginalPaper | Buchkapitel

18. Bioterrorism Knowledge Mapping

verfasst von : Hsinchun Chen

Erschienen in: Dark Web

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Biomedical research used for defense purposes may also be applied to biological weapons development. To mitigate risk, the US Government has attempted to monitor and regulate biomedical research labs, especially those that study bioterrorism agents/diseases. However, monitoring worldwide biomedical researchers and their work is still an issue. In this chapter, we developed an integrated approach to mapping worldwide bioterrorism research literature. Our objectives are to identify the researchers who have expertise in the bioterrorism agents/diseases research domain, the major institutions and countries where these researchers reside, and the emerging topics and trends in bioterrorism agents/diseases research. By utilizing knowledge mapping techniques, we analyzed the productivity status, collaboration status, and emerging topics in the bioterrorism domain. The analysis results provide insights into the research status of bioterrorism agents/diseases and thus allow a more comprehensive view of bioterrorism researchers and ongoing work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Andrews, K. “Visualizing cyberspace: Information visualization in the Harmony Internet browser,” Proceedings of IEEE Symposium on Information Visualization (InfoVis’95), pp. 97–104, 1995. Andrews, K. “Visualizing cyberspace: Information visualization in the Harmony Internet browser,” Proceedings of IEEE Symposium on Information Visualization (InfoVis’95), pp. 97–104, 1995.
Zurück zum Zitat Biosafety in Microbiological and Biomedical Laboratories, Washington: U. S. Government Printing Office, Ed. 5th., 2007. Biosafety in Microbiological and Biomedical Laboratories, Washington: U. S. Government Printing Office, Ed. 5th., 2007.
Zurück zum Zitat Bruijn, B. and Martin, J. “Literature mining in molecular biology,” Proceedings of the EFMI Workshop on Natural Language Processing in Biomedical Applications, Nicosia, Cyprus, March 8–9, pp. 1–5, 2002. Bruijn, B. and Martin, J. “Literature mining in molecular biology,” Proceedings of the EFMI Workshop on Natural Language Processing in Biomedical Applications, Nicosia, Cyprus, March 8–9, pp. 1–5, 2002.
Zurück zum Zitat Burt, R. S. “Positions in networks,” Social Forces, vol. 55, no. 1, pp. 93–122, 1976.CrossRef Burt, R. S. “Positions in networks,” Social Forces, vol. 55, no. 1, pp. 93–122, 1976.CrossRef
Zurück zum Zitat Card, S.K., Robertson, G.G., and York, W. “The WebBook and the WebForager: An information workspace for the World Wide Web,” Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI’96), pp. 111–117, 1996. Card, S.K., Robertson, G.G., and York, W. “The WebBook and the WebForager: An information workspace for the World Wide Web,” Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI’96), pp. 111–117, 1996.
Zurück zum Zitat Chen, H. and Roco, M. Mapping Nanotechnology Innovations and Knowledge: Global and Longitudinal Patent and Literature Analysis. Springer, 2009. Chen, H. and Roco, M. Mapping Nanotechnology Innovations and Knowledge: Global and Longitudinal Patent and Literature Analysis. Springer, 2009.
Zurück zum Zitat Chen, H., Schuffels, C., and Orwig, R. “Internet categorization and search: A self-organizing approach,” Journal of Visual Communication and Image Representation, vol. 7, no. 1, pp. 88–102, 1996.CrossRef Chen, H., Schuffels, C., and Orwig, R. “Internet categorization and search: A self-organizing approach,” Journal of Visual Communication and Image Representation, vol. 7, no. 1, pp. 88–102, 1996.CrossRef
Zurück zum Zitat Chinchor, N. “MUC-7 test scores introduction,” In Proceedings of the Seventh Message Understanding Conference, 1998. Chinchor, N. “MUC-7 test scores introduction,” In Proceedings of the Seventh Message Understanding Conference, 1998.
Zurück zum Zitat Cohen, A.M. and Hersh, W. R., “A survey of current work in biomedical text mining,” Briefings in Bioinformatics, vol. 6, no. 1, pp. 57–71, 2005.CrossRef Cohen, A.M. and Hersh, W. R., “A survey of current work in biomedical text mining,” Briefings in Bioinformatics, vol. 6, no. 1, pp. 57–71, 2005.CrossRef
Zurück zum Zitat Eick, S.G., Steffen, J.L., and Sumner, E.E. “Seesoft: A tool for visualizing line-oriented software,” IEEE Transactions on Software Engineering, vol. 18, no. 11, pp. 11–18, 1992.CrossRef Eick, S.G., Steffen, J.L., and Sumner, E.E. “Seesoft: A tool for visualizing line-oriented software,” IEEE Transactions on Software Engineering, vol. 18, no. 11, pp. 11–18, 1992.CrossRef
Zurück zum Zitat Hearst, M. “TileBars: Visualization of term distribution information in full text information access,” Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 59–66, 1995. Hearst, M. “TileBars: Visualization of term distribution information in full text information access,” Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 59–66, 1995.
Zurück zum Zitat Hu, X., Yoo, I., Rumm, P., and Atwood, M. “Mining candidate viruses as potential bio-terrorism weapons from biomedical literature,” in 2005 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Atlanta, Georgia, 2005. Hu, X., Yoo, I., Rumm, P., and Atwood, M. “Mining candidate viruses as potential bio-terrorism weapons from biomedical literature,” in 2005 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Atlanta, Georgia, 2005.
Zurück zum Zitat Hu, X., Zhang, X., Yoo, I., Atwood, M. and Rumm, P. “A text mining approach for identifying candidate viruses as potential bio-terrorism weapons,” GESTS International Transaction on Compute Science and Engineering, vol. 9, no. 1, pp. 109–120, 2005. Hu, X., Zhang, X., Yoo, I., Atwood, M. and Rumm, P. “A text mining approach for identifying candidate viruses as potential bio-terrorism weapons,” GESTS International Transaction on Compute Science and Engineering, vol. 9, no. 1, pp. 109–120, 2005.
Zurück zum Zitat Hu, X., Zhang, X., Wu, D., Zhou, X., and Rumm, P. “Text mining the biomedical literature for identification of potential virus/bacterium as bioterrorism weapons,” in Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, Ed. H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor, Springer, 2006. Hu, X., Zhang, X., Wu, D., Zhou, X., and Rumm, P. “Text mining the biomedical literature for identification of potential virus/bacterium as bioterrorism weapons,” in Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, Ed. H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor, Springer, 2006.
Zurück zum Zitat Huang, Z., Chung, W., and Chen, H. “Graph model for E-commerce recommender systems,” Journal of the Amercian Society for Information Science and Technology (JASIST), vol. 55, no. 3, pp. 259–274, 2004.CrossRef Huang, Z., Chung, W., and Chen, H. “Graph model for E-commerce recommender systems,” Journal of the Amercian Society for Information Science and Technology (JASIST), vol. 55, no. 3, pp. 259–274, 2004.CrossRef
Zurück zum Zitat Kennedy, L.W. and Lum, C.M. Developing a Foundation for Policy Relevant Terrorism Research in Criminology. New Brunswick, Rutgers University, 2003. Kennedy, L.W. and Lum, C.M. Developing a Foundation for Policy Relevant Terrorism Research in Criminology. New Brunswick, Rutgers University, 2003.
Zurück zum Zitat Kohane, I. S. “The contributions of biomedical informatics to the fight against bioterrorism,” Biomedical Informatics and Bioterrorism, 2002. 9: p. 116–119. Kohane, I. S. “The contributions of biomedical informatics to the fight against bioterrorism,” Biomedical Informatics and Bioterrorism, 2002. 9: p. 116–119.
Zurück zum Zitat Kohonen, T., Kaski, S., Lagus, K., Salojärvi, J., Honkela, J., Paatero, V., and Saarela, A. “Self organization of a massive document collection,” IEEE Transactions On Neural Networks, vol. 1, no. 3, pp. 574–585, 2000.CrossRef Kohonen, T., Kaski, S., Lagus, K., Salojärvi, J., Honkela, J., Paatero, V., and Saarela, A. “Self organization of a massive document collection,” IEEE Transactions On Neural Networks, vol. 1, no. 3, pp. 574–585, 2000.CrossRef
Zurück zum Zitat Lane, H.C., LaMontagne, J., and Fauci, A.S. “Bioterrorism: A clear and present danger,” Nature Medicine, vol. 7, no. 12, pp. 1271–1273, 2001.CrossRef Lane, H.C., LaMontagne, J., and Fauci, A.S. “Bioterrorism: A clear and present danger,” Nature Medicine, vol. 7, no. 12, pp. 1271–1273, 2001.CrossRef
Zurück zum Zitat Lorrain, F. and White, H.S. “Structural equivalence of individuals in social networks,” Journal of Mathematical Sociology, vol. 1, pp. 49–80, 1971.CrossRef Lorrain, F. and White, H.S. “Structural equivalence of individuals in social networks,” Journal of Mathematical Sociology, vol. 1, pp. 49–80, 1971.CrossRef
Zurück zum Zitat Merari, A. “Academic research and government policy on terrorism,” Terrorism and Political Violence, vol. 3, no. 1, pp. 88–102, 1991.CrossRef Merari, A. “Academic research and government policy on terrorism,” Terrorism and Political Violence, vol. 3, no. 1, pp. 88–102, 1991.CrossRef
Zurück zum Zitat Reid, E. and Chen, H. “Mapping the contemporary terrorism research domain,” International Journal of Human-Computer Studies, vol. 65, pp. 42–56, 2007.CrossRef Reid, E. and Chen, H. “Mapping the contemporary terrorism research domain,” International Journal of Human-Computer Studies, vol. 65, pp. 42–56, 2007.CrossRef
Zurück zum Zitat Reid, E. Analysis of Terrorism Literature: a Bibliometric and Content Analysis Study. Dissertation, USC. School of Library and Information Management, University of Southern California, Los Angeles, 1983. Reid, E. Analysis of Terrorism Literature: a Bibliometric and Content Analysis Study. Dissertation, USC. School of Library and Information Management, University of Southern California, Los Angeles, 1983.
Zurück zum Zitat Reid, E. “Evolution of a body of knowledge: an analysis of terrorism research,” Information Processing and Management, vol. 33, no. 1, pp. 91–106, 1997.CrossRef Reid, E. “Evolution of a body of knowledge: an analysis of terrorism research,” Information Processing and Management, vol. 33, no. 1, pp. 91–106, 1997.CrossRef
Zurück zum Zitat Shneiderman, B. “The eyes have it: A task by data type taxonomy for information visualizations,” In Proceedings of the IEEE Symposium on Visual Languages, Washington: IEEE Computer Society Press, 1996. Shneiderman, B. “The eyes have it: A task by data type taxonomy for information visualizations,” In Proceedings of the IEEE Symposium on Visual Languages, Washington: IEEE Computer Society Press, 1996.
Zurück zum Zitat Silke, A., “Devil you know: Continuing problems with terrorism research,” Terrorism and Political Violence, vol. 13, no. 4, pp. 1–14, 2001.CrossRef Silke, A., “Devil you know: Continuing problems with terrorism research,” Terrorism and Political Violence, vol. 13, no. 4, pp. 1–14, 2001.CrossRef
Zurück zum Zitat Swanson, D.R. “Fish oil, Raynauds syndrome, and undiscovered public knowledge,” Perspectives in Biology and Medicine, vol. 30, no. 1, pp. 7–18, 1986.CrossRef Swanson, D.R. “Fish oil, Raynauds syndrome, and undiscovered public knowledge,” Perspectives in Biology and Medicine, vol. 30, no. 1, pp. 7–18, 1986.CrossRef
Zurück zum Zitat United States Centers for Disease Control. Possession, use, and transfer of select agents and toxins– Reconstructed replication competent forms of the 1918 Pandemic Influenza Virus containing any portion of the coding regions of all eight gene segments. Interim Final Rule. Federal Register 70(202): 61047–61049, Oct. 20, 2005. United States Centers for Disease Control. Possession, use, and transfer of select agents and toxins– Reconstructed replication competent forms of the 1918 Pandemic Influenza Virus containing any portion of the coding regions of all eight gene segments. Interim Final Rule. Federal Register 70(202): 61047–61049, Oct. 20, 2005.
Zurück zum Zitat Wasserman, S. and Faust, K. Social Networks Analysis: Methods and Applications. Cambridge: Cambridge University Press, 1994.CrossRefMATH Wasserman, S. and Faust, K. Social Networks Analysis: Methods and Applications. Cambridge: Cambridge University Press, 1994.CrossRefMATH
Zurück zum Zitat Zhu, B. and Chen, H. “Information visualization,” Annual Review of Information Science and Technology (ARIST), vol. 39, pp. 139–178, 2005.CrossRef Zhu, B. and Chen, H. “Information visualization,” Annual Review of Information Science and Technology (ARIST), vol. 39, pp. 139–178, 2005.CrossRef
Metadaten
Titel
Bioterrorism Knowledge Mapping
verfasst von
Hsinchun Chen
Copyright-Jahr
2012
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1557-2_18

Premium Partner