Skip to main content
Top

2012 | OriginalPaper | Chapter

18. Bioterrorism Knowledge Mapping

Author : Hsinchun Chen

Published in: Dark Web

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Biomedical research used for defense purposes may also be applied to biological weapons development. To mitigate risk, the US Government has attempted to monitor and regulate biomedical research labs, especially those that study bioterrorism agents/diseases. However, monitoring worldwide biomedical researchers and their work is still an issue. In this chapter, we developed an integrated approach to mapping worldwide bioterrorism research literature. Our objectives are to identify the researchers who have expertise in the bioterrorism agents/diseases research domain, the major institutions and countries where these researchers reside, and the emerging topics and trends in bioterrorism agents/diseases research. By utilizing knowledge mapping techniques, we analyzed the productivity status, collaboration status, and emerging topics in the bioterrorism domain. The analysis results provide insights into the research status of bioterrorism agents/diseases and thus allow a more comprehensive view of bioterrorism researchers and ongoing work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Andrews, K. “Visualizing cyberspace: Information visualization in the Harmony Internet browser,” Proceedings of IEEE Symposium on Information Visualization (InfoVis’95), pp. 97–104, 1995. Andrews, K. “Visualizing cyberspace: Information visualization in the Harmony Internet browser,” Proceedings of IEEE Symposium on Information Visualization (InfoVis’95), pp. 97–104, 1995.
go back to reference Biosafety in Microbiological and Biomedical Laboratories, Washington: U. S. Government Printing Office, Ed. 5th., 2007. Biosafety in Microbiological and Biomedical Laboratories, Washington: U. S. Government Printing Office, Ed. 5th., 2007.
go back to reference Bruijn, B. and Martin, J. “Literature mining in molecular biology,” Proceedings of the EFMI Workshop on Natural Language Processing in Biomedical Applications, Nicosia, Cyprus, March 8–9, pp. 1–5, 2002. Bruijn, B. and Martin, J. “Literature mining in molecular biology,” Proceedings of the EFMI Workshop on Natural Language Processing in Biomedical Applications, Nicosia, Cyprus, March 8–9, pp. 1–5, 2002.
go back to reference Burt, R. S. “Positions in networks,” Social Forces, vol. 55, no. 1, pp. 93–122, 1976.CrossRef Burt, R. S. “Positions in networks,” Social Forces, vol. 55, no. 1, pp. 93–122, 1976.CrossRef
go back to reference Card, S.K., Robertson, G.G., and York, W. “The WebBook and the WebForager: An information workspace for the World Wide Web,” Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI’96), pp. 111–117, 1996. Card, S.K., Robertson, G.G., and York, W. “The WebBook and the WebForager: An information workspace for the World Wide Web,” Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI’96), pp. 111–117, 1996.
go back to reference Chen, H. and Roco, M. Mapping Nanotechnology Innovations and Knowledge: Global and Longitudinal Patent and Literature Analysis. Springer, 2009. Chen, H. and Roco, M. Mapping Nanotechnology Innovations and Knowledge: Global and Longitudinal Patent and Literature Analysis. Springer, 2009.
go back to reference Chen, H., Schuffels, C., and Orwig, R. “Internet categorization and search: A self-organizing approach,” Journal of Visual Communication and Image Representation, vol. 7, no. 1, pp. 88–102, 1996.CrossRef Chen, H., Schuffels, C., and Orwig, R. “Internet categorization and search: A self-organizing approach,” Journal of Visual Communication and Image Representation, vol. 7, no. 1, pp. 88–102, 1996.CrossRef
go back to reference Chinchor, N. “MUC-7 test scores introduction,” In Proceedings of the Seventh Message Understanding Conference, 1998. Chinchor, N. “MUC-7 test scores introduction,” In Proceedings of the Seventh Message Understanding Conference, 1998.
go back to reference Cohen, A.M. and Hersh, W. R., “A survey of current work in biomedical text mining,” Briefings in Bioinformatics, vol. 6, no. 1, pp. 57–71, 2005.CrossRef Cohen, A.M. and Hersh, W. R., “A survey of current work in biomedical text mining,” Briefings in Bioinformatics, vol. 6, no. 1, pp. 57–71, 2005.CrossRef
go back to reference Eick, S.G., Steffen, J.L., and Sumner, E.E. “Seesoft: A tool for visualizing line-oriented software,” IEEE Transactions on Software Engineering, vol. 18, no. 11, pp. 11–18, 1992.CrossRef Eick, S.G., Steffen, J.L., and Sumner, E.E. “Seesoft: A tool for visualizing line-oriented software,” IEEE Transactions on Software Engineering, vol. 18, no. 11, pp. 11–18, 1992.CrossRef
go back to reference Hearst, M. “TileBars: Visualization of term distribution information in full text information access,” Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 59–66, 1995. Hearst, M. “TileBars: Visualization of term distribution information in full text information access,” Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 59–66, 1995.
go back to reference Hu, X., Yoo, I., Rumm, P., and Atwood, M. “Mining candidate viruses as potential bio-terrorism weapons from biomedical literature,” in 2005 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Atlanta, Georgia, 2005. Hu, X., Yoo, I., Rumm, P., and Atwood, M. “Mining candidate viruses as potential bio-terrorism weapons from biomedical literature,” in 2005 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Atlanta, Georgia, 2005.
go back to reference Hu, X., Zhang, X., Yoo, I., Atwood, M. and Rumm, P. “A text mining approach for identifying candidate viruses as potential bio-terrorism weapons,” GESTS International Transaction on Compute Science and Engineering, vol. 9, no. 1, pp. 109–120, 2005. Hu, X., Zhang, X., Yoo, I., Atwood, M. and Rumm, P. “A text mining approach for identifying candidate viruses as potential bio-terrorism weapons,” GESTS International Transaction on Compute Science and Engineering, vol. 9, no. 1, pp. 109–120, 2005.
go back to reference Hu, X., Zhang, X., Wu, D., Zhou, X., and Rumm, P. “Text mining the biomedical literature for identification of potential virus/bacterium as bioterrorism weapons,” in Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, Ed. H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor, Springer, 2006. Hu, X., Zhang, X., Wu, D., Zhou, X., and Rumm, P. “Text mining the biomedical literature for identification of potential virus/bacterium as bioterrorism weapons,” in Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, Ed. H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor, Springer, 2006.
go back to reference Huang, Z., Chung, W., and Chen, H. “Graph model for E-commerce recommender systems,” Journal of the Amercian Society for Information Science and Technology (JASIST), vol. 55, no. 3, pp. 259–274, 2004.CrossRef Huang, Z., Chung, W., and Chen, H. “Graph model for E-commerce recommender systems,” Journal of the Amercian Society for Information Science and Technology (JASIST), vol. 55, no. 3, pp. 259–274, 2004.CrossRef
go back to reference Kennedy, L.W. and Lum, C.M. Developing a Foundation for Policy Relevant Terrorism Research in Criminology. New Brunswick, Rutgers University, 2003. Kennedy, L.W. and Lum, C.M. Developing a Foundation for Policy Relevant Terrorism Research in Criminology. New Brunswick, Rutgers University, 2003.
go back to reference Kohane, I. S. “The contributions of biomedical informatics to the fight against bioterrorism,” Biomedical Informatics and Bioterrorism, 2002. 9: p. 116–119. Kohane, I. S. “The contributions of biomedical informatics to the fight against bioterrorism,” Biomedical Informatics and Bioterrorism, 2002. 9: p. 116–119.
go back to reference Kohonen, T., Kaski, S., Lagus, K., Salojärvi, J., Honkela, J., Paatero, V., and Saarela, A. “Self organization of a massive document collection,” IEEE Transactions On Neural Networks, vol. 1, no. 3, pp. 574–585, 2000.CrossRef Kohonen, T., Kaski, S., Lagus, K., Salojärvi, J., Honkela, J., Paatero, V., and Saarela, A. “Self organization of a massive document collection,” IEEE Transactions On Neural Networks, vol. 1, no. 3, pp. 574–585, 2000.CrossRef
go back to reference Lane, H.C., LaMontagne, J., and Fauci, A.S. “Bioterrorism: A clear and present danger,” Nature Medicine, vol. 7, no. 12, pp. 1271–1273, 2001.CrossRef Lane, H.C., LaMontagne, J., and Fauci, A.S. “Bioterrorism: A clear and present danger,” Nature Medicine, vol. 7, no. 12, pp. 1271–1273, 2001.CrossRef
go back to reference Lorrain, F. and White, H.S. “Structural equivalence of individuals in social networks,” Journal of Mathematical Sociology, vol. 1, pp. 49–80, 1971.CrossRef Lorrain, F. and White, H.S. “Structural equivalence of individuals in social networks,” Journal of Mathematical Sociology, vol. 1, pp. 49–80, 1971.CrossRef
go back to reference Merari, A. “Academic research and government policy on terrorism,” Terrorism and Political Violence, vol. 3, no. 1, pp. 88–102, 1991.CrossRef Merari, A. “Academic research and government policy on terrorism,” Terrorism and Political Violence, vol. 3, no. 1, pp. 88–102, 1991.CrossRef
go back to reference Reid, E. and Chen, H. “Mapping the contemporary terrorism research domain,” International Journal of Human-Computer Studies, vol. 65, pp. 42–56, 2007.CrossRef Reid, E. and Chen, H. “Mapping the contemporary terrorism research domain,” International Journal of Human-Computer Studies, vol. 65, pp. 42–56, 2007.CrossRef
go back to reference Reid, E. Analysis of Terrorism Literature: a Bibliometric and Content Analysis Study. Dissertation, USC. School of Library and Information Management, University of Southern California, Los Angeles, 1983. Reid, E. Analysis of Terrorism Literature: a Bibliometric and Content Analysis Study. Dissertation, USC. School of Library and Information Management, University of Southern California, Los Angeles, 1983.
go back to reference Reid, E. “Evolution of a body of knowledge: an analysis of terrorism research,” Information Processing and Management, vol. 33, no. 1, pp. 91–106, 1997.CrossRef Reid, E. “Evolution of a body of knowledge: an analysis of terrorism research,” Information Processing and Management, vol. 33, no. 1, pp. 91–106, 1997.CrossRef
go back to reference Shneiderman, B. “The eyes have it: A task by data type taxonomy for information visualizations,” In Proceedings of the IEEE Symposium on Visual Languages, Washington: IEEE Computer Society Press, 1996. Shneiderman, B. “The eyes have it: A task by data type taxonomy for information visualizations,” In Proceedings of the IEEE Symposium on Visual Languages, Washington: IEEE Computer Society Press, 1996.
go back to reference Silke, A., “Devil you know: Continuing problems with terrorism research,” Terrorism and Political Violence, vol. 13, no. 4, pp. 1–14, 2001.CrossRef Silke, A., “Devil you know: Continuing problems with terrorism research,” Terrorism and Political Violence, vol. 13, no. 4, pp. 1–14, 2001.CrossRef
go back to reference Swanson, D.R. “Fish oil, Raynauds syndrome, and undiscovered public knowledge,” Perspectives in Biology and Medicine, vol. 30, no. 1, pp. 7–18, 1986.CrossRef Swanson, D.R. “Fish oil, Raynauds syndrome, and undiscovered public knowledge,” Perspectives in Biology and Medicine, vol. 30, no. 1, pp. 7–18, 1986.CrossRef
go back to reference United States Centers for Disease Control. Possession, use, and transfer of select agents and toxins– Reconstructed replication competent forms of the 1918 Pandemic Influenza Virus containing any portion of the coding regions of all eight gene segments. Interim Final Rule. Federal Register 70(202): 61047–61049, Oct. 20, 2005. United States Centers for Disease Control. Possession, use, and transfer of select agents and toxins– Reconstructed replication competent forms of the 1918 Pandemic Influenza Virus containing any portion of the coding regions of all eight gene segments. Interim Final Rule. Federal Register 70(202): 61047–61049, Oct. 20, 2005.
go back to reference Wasserman, S. and Faust, K. Social Networks Analysis: Methods and Applications. Cambridge: Cambridge University Press, 1994.CrossRefMATH Wasserman, S. and Faust, K. Social Networks Analysis: Methods and Applications. Cambridge: Cambridge University Press, 1994.CrossRefMATH
go back to reference Zhu, B. and Chen, H. “Information visualization,” Annual Review of Information Science and Technology (ARIST), vol. 39, pp. 139–178, 2005.CrossRef Zhu, B. and Chen, H. “Information visualization,” Annual Review of Information Science and Technology (ARIST), vol. 39, pp. 139–178, 2005.CrossRef
Metadata
Title
Bioterrorism Knowledge Mapping
Author
Hsinchun Chen
Copyright Year
2012
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1557-2_18

Premium Partner