|
|
Showing 1 - 4 of
4 matches in All Departments
Terrorism is one of the serious threats to international peace and
security that we face in this decade. No nation can consider itself
immune from the dangers it poses, and no society can remain
disengaged from the efforts to combat it. The termcounterterrorism
refers to the techniques, strategies, and tactics used in the ?ght
against terrorism. Counterterrorism efforts involve many segments
of so- ety, especially governmental agencies including the police,
military, and intelligence agencies (both domestic and
international). The goal of counterterrorism efforts is to not only
detect and prevent potential future acts but also to assist in the
response to events that have already occurred. A terrorist cell
usually forms very quietly and then grows in a pattern - sp- ning
international borders, oceans, and hemispheres. Surprising to many,
an eff- tive "weapon," just as quiet - mathematics - can serve as a
powerful tool to combat terrorism, providing the ability to connect
the dots and reveal the organizational pattern of something so
sinister. The events of 9/11 instantly changed perceptions of the
wordsterrorist andn- work, especially in the United States. The
international community was confronted with the need to tackle a
threat which was not con?ned to a discreet physical - cation. This
is a particular challenge to the standard instruments for
projecting the legal authority of states and their power to uphold
public safety. As demonstrated by the events of the 9/11 attack, we
know that terrorist attacks can happen anywhere.
Important aspects of social networking analysis are covered in this
work by combining experimental and theoretical research. A specific
focus is devoted to emerging trends and the industry needs
associated with utilizing data mining techniques. Some of the
techniques covered include data mining advances in the discovery
and analysis of communities, in the personalization of solitary
activities (like searches) and social activities (like discovering
potential friends), in the analysis of user behavior in open fora
(like conventional sites, blogs and fora) and in commercial
platforms (like e-auctions), and in the associated security and
privacy-preservation challenges; as well as social network
modeling, scalable, customizable social network infrastructure
construction, and the identification and discovery of dynamic
growth and evolution patterns using machine learning approaches or
multi-agent based simulation. These topics will be of interest to
practitioners and researchers alike in this dynamic and growing
field.
Terrorism is one of the serious threats to international peace and
security that we face in this decade. No nation can consider itself
immune from the dangers it poses, and no society can remain
disengaged from the efforts to combat it. The termcounterterrorism
refers to the techniques, strategies, and tactics used in the ?ght
against terrorism. Counterterrorism efforts involve many segments
of so- ety, especially governmental agencies including the police,
military, and intelligence agencies (both domestic and
international). The goal of counterterrorism efforts is to not only
detect and prevent potential future acts but also to assist in the
response to events that have already occurred. A terrorist cell
usually forms very quietly and then grows in a pattern - sp- ning
international borders, oceans, and hemispheres. Surprising to many,
an eff- tive "weapon", just as quiet - mathematics - can serve as a
powerful tool to combat terrorism, providing the ability to connect
the dots and reveal the organizational pattern of something so
sinister. The events of 9/11 instantly changed perceptions of the
wordsterrorist andn- work, especially in the United States. The
international community was confronted with the need to tackle a
threat which was not con?ned to a discreet physical - cation. This
is a particular challenge to the standard instruments for
projecting the legal authority of states and their power to uphold
public safety. As demonstrated by the events of the 9/11 attack, we
know that terrorist attacks can happen anywhere.
Driven by counter-terrorism efforts, marketing analysis and an
explosion in online social networking in recent years, data mining
has moved to the forefront of information science. This proposed
Special Issue on Data Mining for Social Network Data will present a
broad range of recent studies in social networking analysis. It
will focus on emerging trends and needs in discovery and analysis
of communities, solitary and social activities, activities in open
for a and commercial sites as well. It will also look at network
modeling, infrastructure construction, dynamic growth and evolution
pattern discovery using machine learning approaches and multi-agent
based simulations. Editors are three rising stars in world of data
mining, knowledge discovery, social network analysis, and
information infrastructures, and are anchored by Springer
author/editor Hsinchun Chen (Terrorism Informatics; Medical
Informatics; Digital Government), who is one of the most prominent
intelligence analysis and data mining experts in the world.
|
|