Skip to main content

2012 | OriginalPaper | Buchkapitel

5. Link and Content Analysis

verfasst von : Hsinchun Chen

Erschienen in: Dark Web

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

While the Web has become a worldwide platform for communication, terrorists share their ideology and communicate with members on the “Dark Web” – the dark side of the Web used by terrorists. Currently, the problems of information overload and the difficulty of obtaining a comprehensive picture of terrorist activities hinder effective and efficient analysis of terrorist information on the Web. To improve understanding of terrorist activities, we have developed a novel methodology for collecting and analyzing Dark Web information. The methodology incorporates information collection, analysis, and visualization techniques, and exploits various Web information sources. We applied it to collecting and analyzing information of 39 jihad Web sites and developed visualization of their site contents, relationships, and activity levels. An expert evaluation showed that the methodology is very useful and promising, having a high potential to assist in investigation and understanding of terrorist activities by producing results that could potentially help guide both policy making and intelligence research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Blakemore, B. (2004, November 23). Web posting may provide insight into Iraq insurgency. ABC News. Blakemore, B. (2004, November 23). Web posting may provide insight into Iraq insurgency. ABC News.
Zurück zum Zitat Carley, K. M., Lee, J.-S., and Krackhardt, D. (2001). Destabilizing Networks. Connections. Carley, K. M., Lee, J.-S., and Krackhardt, D. (2001). Destabilizing Networks. Connections.
Zurück zum Zitat Chambers, J., Cleveland, W., Kleiner, B., and Tukey, P. (1983). Graphical Methods for Data Analysis: Wadsworth. Chambers, J., Cleveland, W., Kleiner, B., and Tukey, P. (1983). Graphical Methods for Data Analysis: Wadsworth.
Zurück zum Zitat Chen, H. (2005). Introduction to the special topic issue: Intelligence and security informatics. Journal of the American Society for Information Science and Technology, 56(3), 217–220.MathSciNetCrossRef Chen, H. (2005). Introduction to the special topic issue: Intelligence and security informatics. Journal of the American Society for Information Science and Technology, 56(3), 217–220.MathSciNetCrossRef
Zurück zum Zitat Chen, H. and Chau, M. (2004). Web mining: machine learning for web applications. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (ARIST), (Vol. 38, pp. 289–329). Medford, NJ: Information Today, Inc. Chen, H. and Chau, M. (2004). Web mining: machine learning for web applications. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (ARIST), (Vol. 38, pp. 289–329). Medford, NJ: Information Today, Inc.
Zurück zum Zitat Chen, H., Fan, H., Chau, M., and Zeng, D. (2001). MetaSpider: meta-searching and categorization on the web. Journal of the American Society for Information Science and Technology, 52(13), 1134–1147.CrossRef Chen, H., Fan, H., Chau, M., and Zeng, D. (2001). MetaSpider: meta-searching and categorization on the web. Journal of the American Society for Information Science and Technology, 52(13), 1134–1147.CrossRef
Zurück zum Zitat Chen, H., Schuffels, C., and Orwig, R. (1996). Internet categorization and search: a self-organizing approach. Journal of Visual Communication and Image Representation, 7(1), 88–102.CrossRef Chen, H., Schuffels, C., and Orwig, R. (1996). Internet categorization and search: a self-organizing approach. Journal of Visual Communication and Image Representation, 7(1), 88–102.CrossRef
Zurück zum Zitat Chung, W. (2007). Visualizing E-Business stakeholders on the web: a methodology and experimental results. International Journal of Electronic Business, (forthcoming). Chung, W. (2007). Visualizing E-Business stakeholders on the web: a methodology and experimental results. International Journal of Electronic Business, (forthcoming).
Zurück zum Zitat Chung, W., Chen, H., Chaboya, L. G., O’Toole, C., and Atabakhsh, H. (2005). Evaluating event visualization: a usability study of COPLINK Spatio-Temporal Visualizer. International Journal of Human-Computer Studies, 62(1), 127–157.CrossRef Chung, W., Chen, H., Chaboya, L. G., O’Toole, C., and Atabakhsh, H. (2005). Evaluating event visualization: a usability study of COPLINK Spatio-Temporal Visualizer. International Journal of Human-Computer Studies, 62(1), 127–157.CrossRef
Zurück zum Zitat Chung, W., Chen, H., and Nunamaker, J. F. (2005). A visual framework for knowledge discovery on the web: an empirical study on business intelligence exploration. Journal of Management Information Systems, 21(4), 57–84.CrossRef Chung, W., Chen, H., and Nunamaker, J. F. (2005). A visual framework for knowledge discovery on the web: an empirical study on business intelligence exploration. Journal of Management Information Systems, 21(4), 57–84.CrossRef
Zurück zum Zitat Chung, W., Zhang, Y., Huang, Z., Wang, G., Ong, T.-H., and Chen, H. (2004). Internet searching and browsing in a multilingual world: an experiment on the Chinese Business Intelligence Portal (CBizPort). Journal of the American Society for Information Science and Technology, 55(9), 818–831.CrossRef Chung, W., Zhang, Y., Huang, Z., Wang, G., Ong, T.-H., and Chen, H. (2004). Internet searching and browsing in a multilingual world: an experiment on the Chinese Business Intelligence Portal (CBizPort). Journal of the American Society for Information Science and Technology, 55(9), 818–831.CrossRef
Zurück zum Zitat Department of State. (2003). Patterns of Global Terrorism 2002: The United States Government. Department of State. (2003). Patterns of Global Terrorism 2002: The United States Government.
Zurück zum Zitat Eom, S. B. and Farris, R. S. (1996). The contributions of organizational science to the development of decision support systems research subspecialties. Journal of the American Society for Information Science, 47(12), 941–952.CrossRef Eom, S. B. and Farris, R. S. (1996). The contributions of organizational science to the development of decision support systems research subspecialties. Journal of the American Society for Information Science, 47(12), 941–952.CrossRef
Zurück zum Zitat Etzioni, O. (1996). The World-Wide Web: quagmire or gold mine? Communications of the ACM, 39(11), 65–68.CrossRef Etzioni, O. (1996). The World-Wide Web: quagmire or gold mine? Communications of the ACM, 39(11), 65–68.CrossRef
Zurück zum Zitat Gellman, B. (2002, June 27). Cyber-attacks by Al Qaeda feared. Washington Post. Gellman, B. (2002, June 27). Cyber-attacks by Al Qaeda feared. Washington Post.
Zurück zum Zitat He, Y., and Hui, S. C. (2002). Mining a web citation database for author co-citation analysis. Information Processing and Management, 38(4), 491–508.CrossRefMATH He, Y., and Hui, S. C. (2002). Mining a web citation database for author co-citation analysis. Information Processing and Management, 38(4), 491–508.CrossRefMATH
Zurück zum Zitat Kealy, W. A. (2001). Knowledge maps and their use in computer-based collaborative learning. Journal of Educational Computing Research, 25(4), 325–349.CrossRef Kealy, W. A. (2001). Knowledge maps and their use in computer-based collaborative learning. Journal of Educational Computing Research, 25(4), 325–349.CrossRef
Zurück zum Zitat Kelley, J. (2002). Militants Wire Web With Links to Jihad. USA Today. Kelley, J. (2002). Militants Wire Web With Links to Jihad. USA Today.
Zurück zum Zitat Krebs, V. E. (2001). Mapping network of terrorist cells. Connections, 24(3), 43–52. Krebs, V. E. (2001). Mapping network of terrorist cells. Connections, 24(3), 43–52.
Zurück zum Zitat La Porte, T. M., Jong, M. d., and Demchak, C. C. (1999). Public Organizations on the World Wide Web: Empirical Correlates of Administrative Openness. Paper presented at the Proceedings of the 5th National Public Management Research Conference, College Station, TX. La Porte, T. M., Jong, M. d., and Demchak, C. C. (1999). Public Organizations on the World Wide Web: Empirical Correlates of Administrative Openness. Paper presented at the Proceedings of the 5th National Public Management Research Conference, College Station, TX.
Zurück zum Zitat Last, M., Markov, A., and Kandel, A. (2006). Multi-Lingual Detection of Terrorist Content on the Web. Paper presented at the Proceedings of the PAKDD’06 International Workshop on Intelligence and Security Informatics, Singapore.CrossRef Last, M., Markov, A., and Kandel, A. (2006). Multi-Lingual Detection of Terrorist Content on the Web. Paper presented at the Proceedings of the PAKDD’06 International Workshop on Intelligence and Security Informatics, Singapore.CrossRef
Zurück zum Zitat Marshall, B., McDonald, D., Chen, H., and Chung, W. (2004). EBizPort: collecting and analyzing business intelligence information. Journal of the American Society for Information and Science and Technology, 55(10), 873–891.CrossRef Marshall, B., McDonald, D., Chen, H., and Chung, W. (2004). EBizPort: collecting and analyzing business intelligence information. Journal of the American Society for Information and Science and Technology, 55(10), 873–891.CrossRef
Zurück zum Zitat Mladenic, D. (1998). Turning Yahoo into an Automatic Web Page Classifier. Paper presented at the Proceedings of the 13th European Conference on Artificial Intelligence, Brighton, UK. Mladenic, D. (1998). Turning Yahoo into an Automatic Web Page Classifier. Paper presented at the Proceedings of the 13th European Conference on Artificial Intelligence, Brighton, UK.
Zurück zum Zitat Nasukawa, T. and Nagano, T. (2001). Text analysis and knowledge mining system. IBM Systems Journal, 40(4), 967–984.CrossRef Nasukawa, T. and Nagano, T. (2001). Text analysis and knowledge mining system. IBM Systems Journal, 40(4), 967–984.CrossRef
Zurück zum Zitat Newman, M. (2004, May 11). Video appears to show beheading of American civilian. The New York Times. Newman, M. (2004, May 11). Video appears to show beheading of American civilian. The New York Times.
Zurück zum Zitat Popp, R., Armour, T., Senator, T., and Numrych, K. (2004). Countering terrorism through information technology. Communications of the ACM, 47(3), 36–43.CrossRef Popp, R., Armour, T., Senator, T., and Numrych, K. (2004). Countering terrorism through information technology. Communications of the ACM, 47(3), 36–43.CrossRef
Zurück zum Zitat Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.CrossRef Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.CrossRef
Zurück zum Zitat Strickland, L. S. and Hunt, L. E. (2005). Technology, security, and individual privacy: new tools, new threats, and new public perceptions. Journal of the American Society for Information Science and Technology, 56(3), 221–234.CrossRef Strickland, L. S. and Hunt, L. E. (2005). Technology, security, and individual privacy: new tools, new threats, and new public perceptions. Journal of the American Society for Information Science and Technology, 56(3), 221–234.CrossRef
Zurück zum Zitat Technical Analysis Group. (2004). Examining the cyber capabilities of Islamic terrorist groups. Hanover, NH: Institute for Security Technology Studies at Dartmouth College. Technical Analysis Group. (2004). Examining the cyber capabilities of Islamic terrorist groups. Hanover, NH: Institute for Security Technology Studies at Dartmouth College.
Zurück zum Zitat Thomas, T. L. (2003, Spring). Al Qaeda and the Internet: the danger of cyberplanning. Parameters, 112–123. Thomas, T. L. (2003, Spring). Al Qaeda and the Internet: the danger of cyberplanning. Parameters, 112–123.
Zurück zum Zitat Trybula, W. J. (1999). Text mining. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (Vol. 34, pp. 385–419). Medford, NJ: Information Today, Inc. Trybula, W. J. (1999). Text mining. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (Vol. 34, pp. 385–419). Medford, NJ: Information Today, Inc.
Zurück zum Zitat Xu, J. and Chen, H. (2005). Criminal network analysis and visualization. Communications of the ACM, 48(6), 100–107.CrossRef Xu, J. and Chen, H. (2005). Criminal network analysis and visualization. Communications of the ACM, 48(6), 100–107.CrossRef
Zurück zum Zitat Young, F. W. (1987). Multidimensional Scaling: History, Theory, and Applications. Hillsdale, NJ, USA: Lawrence Erlbaum Associates, Publishers. Young, F. W. (1987). Multidimensional Scaling: History, Theory, and Applications. Hillsdale, NJ, USA: Lawrence Erlbaum Associates, Publishers.
Zurück zum Zitat Zhu, B. and Chen, H. (2005). Chapter 4: Information Visualization. In B. Cronin (Ed.), Annual Review of Information Science and Technology (Vol. 39, pp. 139–177).CrossRef Zhu, B. and Chen, H. (2005). Chapter 4: Information Visualization. In B. Cronin (Ed.), Annual Review of Information Science and Technology (Vol. 39, pp. 139–177).CrossRef
Metadaten
Titel
Link and Content Analysis
verfasst von
Hsinchun Chen
Copyright-Jahr
2012
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1557-2_5

Premium Partner