Skip to main content

2012 | OriginalPaper | Buchkapitel

2. Intelligence and Security Informatics (ISI): Research Framework

verfasst von : Hsinchun Chen

Erschienen in: Dark Web

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we review the computational research framework that is adopted by the Dark Web research. We first present the security research context, followed by description of a data mining framework for Intelligence and Security Informatics research.
The tragic events of September 11 and the following anthrax contamination of letters caused drastic effects on many aspects of society. Academics in the fields of natural sciences, computational science, information science, social sciences, engineering, medicine, and many others have been called upon to help enhance the government’s ability to fight terrorism and other crimes. Six critical mission areas have been identified where information technology can contribute, as suggested in the “National Strategy for Homeland Security” report, including: intelligence and warning, border and transportation security, domestic counterterrorism, protecting critical infrastructure, defending against catastrophic terrorism, and emergency preparedness and responses. Facing the critical missions of national security and various data and technical challenges, we believe there is a pressing need to develop the science of “Intelligence and Security Informatics” (ISI).
To address the data and technical challenges facing ISI, we present a research framework with a primary focus on KDD (Knowledge Discovery from Databases) technologies. The framework is discussed in the context of crime types and security implications. Selected data mining techniques, including information sharing and collaboration, association mining, classification and clustering, text mining, spatial and temporal mining, and criminal network analysis, are believed to be critical to criminal and intelligence analyses and investigations. In addition to the technical discussions, this chapter also discusses caveats for data mining and important civil liberties considerations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Chen, H. (2006). Intelligence and Security Informatics for International Security: Information Sharing and Data Mining, Springer. Chen, H. (2006). Intelligence and Security Informatics for International Security: Information Sharing and Data Mining, Springer.
Zurück zum Zitat Chen, H., Fuller, S. S., Friedman, C., and Hersh, W. (Eds.) (2005). Medical Informatics: Knowledge Management and Data Mining in Biomedicine. Berlin: Springer. Chen, H., Fuller, S. S., Friedman, C., and Hersh, W. (Eds.) (2005). Medical Informatics: Knowledge Management and Data Mining in Biomedicine. Berlin: Springer.
Zurück zum Zitat Cook, J. S. and Cook, L. L. (2003). Social, ethical and legal issues of data mining. In J. Wang (Ed.), Data Mining: Opportunities and Challenges (pp. 395–420). Hershey, PA: Idea Group Publishing.CrossRef Cook, J. S. and Cook, L. L. (2003). Social, ethical and legal issues of data mining. In J. Wang (Ed.), Data Mining: Opportunities and Challenges (pp. 395–420). Hershey, PA: Idea Group Publishing.CrossRef
Zurück zum Zitat Fayyad, U. M. and Uthurusamy, R. (2002). Evolving data mining into solutions for insights. Communications of the ACM, 45(8), 28–31.CrossRef Fayyad, U. M. and Uthurusamy, R. (2002). Evolving data mining into solutions for insights. Communications of the ACM, 45(8), 28–31.CrossRef
Zurück zum Zitat National Research Council. (2002). Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. Washington, DC: National Academy Press. National Research Council. (2002). Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. Washington, DC: National Academy Press.
Zurück zum Zitat O’Harrow, R. (2005). No Place to Hide. New York: Free Press. O’Harrow, R. (2005). No Place to Hide. New York: Free Press.
Zurück zum Zitat Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security. Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security.
Zurück zum Zitat Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.CrossRef Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.CrossRef
Zurück zum Zitat Shortliffe, E. H. and Blois, M. S. (2000). The computer meets medicine and biology: Emergence of a discipline. In K. J. Hannah and M. J. Ball (Eds.), Health Informatics (pp. 1–40). New York: Springer-Verlag. Shortliffe, E. H. and Blois, M. S. (2000). The computer meets medicine and biology: Emergence of a discipline. In K. J. Hannah and M. J. Ball (Eds.), Health Informatics (pp. 1–40). New York: Springer-Verlag.
Zurück zum Zitat Strickland, L. S., Baldwin, D. A., and Justsen, M. (2005). Domestic security surveillance and civil liberties. In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), Volume 39. Medford, New Jersey: Information Today, Inc. Strickland, L. S., Baldwin, D. A., and Justsen, M. (2005). Domestic security surveillance and civil liberties. In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), Volume 39. Medford, New Jersey: Information Today, Inc.
Zurück zum Zitat Wang, G., Chen, H., and Atabakhsh, H. (2004a). Automatically detecting deceptive criminal identities. Communications of the ACM, 47(3), 71–76.CrossRef Wang, G., Chen, H., and Atabakhsh, H. (2004a). Automatically detecting deceptive criminal ­identities. Communications of the ACM, 47(3), 71–76.CrossRef
Metadaten
Titel
Intelligence and Security Informatics (ISI): Research Framework
verfasst von
Hsinchun Chen
Copyright-Jahr
2012
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1557-2_2

Premium Partner