Skip to main content
Top

2012 | OriginalPaper | Chapter

2. Intelligence and Security Informatics (ISI): Research Framework

Author : Hsinchun Chen

Published in: Dark Web

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we review the computational research framework that is adopted by the Dark Web research. We first present the security research context, followed by description of a data mining framework for Intelligence and Security Informatics research.
The tragic events of September 11 and the following anthrax contamination of letters caused drastic effects on many aspects of society. Academics in the fields of natural sciences, computational science, information science, social sciences, engineering, medicine, and many others have been called upon to help enhance the government’s ability to fight terrorism and other crimes. Six critical mission areas have been identified where information technology can contribute, as suggested in the “National Strategy for Homeland Security” report, including: intelligence and warning, border and transportation security, domestic counterterrorism, protecting critical infrastructure, defending against catastrophic terrorism, and emergency preparedness and responses. Facing the critical missions of national security and various data and technical challenges, we believe there is a pressing need to develop the science of “Intelligence and Security Informatics” (ISI).
To address the data and technical challenges facing ISI, we present a research framework with a primary focus on KDD (Knowledge Discovery from Databases) technologies. The framework is discussed in the context of crime types and security implications. Selected data mining techniques, including information sharing and collaboration, association mining, classification and clustering, text mining, spatial and temporal mining, and criminal network analysis, are believed to be critical to criminal and intelligence analyses and investigations. In addition to the technical discussions, this chapter also discusses caveats for data mining and important civil liberties considerations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Chen, H. (2006). Intelligence and Security Informatics for International Security: Information Sharing and Data Mining, Springer. Chen, H. (2006). Intelligence and Security Informatics for International Security: Information Sharing and Data Mining, Springer.
go back to reference Chen, H., Fuller, S. S., Friedman, C., and Hersh, W. (Eds.) (2005). Medical Informatics: Knowledge Management and Data Mining in Biomedicine. Berlin: Springer. Chen, H., Fuller, S. S., Friedman, C., and Hersh, W. (Eds.) (2005). Medical Informatics: Knowledge Management and Data Mining in Biomedicine. Berlin: Springer.
go back to reference Cook, J. S. and Cook, L. L. (2003). Social, ethical and legal issues of data mining. In J. Wang (Ed.), Data Mining: Opportunities and Challenges (pp. 395–420). Hershey, PA: Idea Group Publishing.CrossRef Cook, J. S. and Cook, L. L. (2003). Social, ethical and legal issues of data mining. In J. Wang (Ed.), Data Mining: Opportunities and Challenges (pp. 395–420). Hershey, PA: Idea Group Publishing.CrossRef
go back to reference Fayyad, U. M. and Uthurusamy, R. (2002). Evolving data mining into solutions for insights. Communications of the ACM, 45(8), 28–31.CrossRef Fayyad, U. M. and Uthurusamy, R. (2002). Evolving data mining into solutions for insights. Communications of the ACM, 45(8), 28–31.CrossRef
go back to reference National Research Council. (2002). Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. Washington, DC: National Academy Press. National Research Council. (2002). Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. Washington, DC: National Academy Press.
go back to reference O’Harrow, R. (2005). No Place to Hide. New York: Free Press. O’Harrow, R. (2005). No Place to Hide. New York: Free Press.
go back to reference Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security. Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security.
go back to reference Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.CrossRef Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.CrossRef
go back to reference Shortliffe, E. H. and Blois, M. S. (2000). The computer meets medicine and biology: Emergence of a discipline. In K. J. Hannah and M. J. Ball (Eds.), Health Informatics (pp. 1–40). New York: Springer-Verlag. Shortliffe, E. H. and Blois, M. S. (2000). The computer meets medicine and biology: Emergence of a discipline. In K. J. Hannah and M. J. Ball (Eds.), Health Informatics (pp. 1–40). New York: Springer-Verlag.
go back to reference Strickland, L. S., Baldwin, D. A., and Justsen, M. (2005). Domestic security surveillance and civil liberties. In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), Volume 39. Medford, New Jersey: Information Today, Inc. Strickland, L. S., Baldwin, D. A., and Justsen, M. (2005). Domestic security surveillance and civil liberties. In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), Volume 39. Medford, New Jersey: Information Today, Inc.
go back to reference Wang, G., Chen, H., and Atabakhsh, H. (2004a). Automatically detecting deceptive criminal identities. Communications of the ACM, 47(3), 71–76.CrossRef Wang, G., Chen, H., and Atabakhsh, H. (2004a). Automatically detecting deceptive criminal ­identities. Communications of the ACM, 47(3), 71–76.CrossRef
Metadata
Title
Intelligence and Security Informatics (ISI): Research Framework
Author
Hsinchun Chen
Copyright Year
2012
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1557-2_2

Premium Partner