KNOWLEDGE MANAGEMENT PROCESSES, TOOLS AND TECHNIQUES FOR COUNTERTERRORISM

Uffe Kock Wiil, Nasrullah Memon, Jolanta Gniadek

Abstract

Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorist attacks. Theory from the knowledge management field plays an important role in dealing with terrorist information. Knowledge management processes, tools, and techniques can help intelligence analysts in various ways when trying to make sense of the vast amount of data being collected. This paper presents the latest research on the CrimeFighter toolbox for counterterrorism. CrimeFighter provides advanced mathematical models and software tools to assist intelligence analysts in harvesting, filtering, storing, managing, analyzing, structuring, mining, interpreting, and visualizing terrorist information.

References

  1. Adam, P., and Shneiderman, B. 2006. Balancing Systematic and Flexible Exploration of Social Networks. IEEE Transactions on Visualization and Computer Graphics, 12(5), 693-700.
  2. Alam, M. B. 2003: Perceptions of Japanese Students on Terrorism. Strategic Analysis, Vol. 27, No. 2, 279-291
  3. Atzenbeck, C., Hicks, D. L., and Memon, N. 2009. Supporting Reasoning and Communication for Intelligence Officers. Accepted for the International Journal of Networking and Virtual Organizations (IJNVO). Inderscience Publishers.
  4. Bennell, C., and Corey, S. 2007. Geographic profiling of terrorist attacks. In Criminal profiling: international theory, research and practice, pp. 189-203. Humana Press.
  5. Canter, D. V., and Hammond, L. 2007. Prioritizing burglars: Comparing the Effectiveness of Geographic profiling methods. Police Pract. Res. 8, 371-384.
  6. Carpenter, M. A., and Stajkovic, A. D. 2006. Social network theory and methods as tools for helping business confront global terrorism: Capturing the case and contingencies presented by dark social networks. Corporate strategies under international terrorism and adversity. Edward Elgar Publishing.
  7. Chau, M., and Xu, J. 2008. Using Web Mining and Social Network Analysis to Study the Emergence of Cyber Communities in Blogs. In Terrorism Informatics. Knowledge Management and Data Mining for Homeland Security, pp. 473-494. Springer.
  8. Chen, H., Reid, E., Sinai, J., Silke, A., and Ganor, B. (eds.). 2008. Terrorism Informatics. Knowledge Management and Data Mining for Homeland Security. Springer.
  9. Dasho, E., and Puszczewicz, R. 2009. Tools and Techniques for Counterterrorism: Web Mining and Social Network Analysis in Blogs. Project report. University of Southern Denmark.
  10. Devlin, K., and Lorden, G. 2007. The Numbers Behind NUMB3RS: Solving Crime with Mathematics. Plume.
  11. Engelbart, D. C. 1962. Augmenting human intellect: A conceptual framework, Summary Report AFOSR3233, Standford Research Institute.
  12. Gloor, P. A., and Zhao, Y. 2006. Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis. Information Visualization. IV 2006, pp. 130- 135
  13. Henriksen, K., and Sørensen, M. 2009. Design and Implementation of a Focused Web Crawler for use in Web Harvesting for Counterterrorism Planning Purposes. Project report. University of Southern Denmark.
  14. Heer, J., and Boyd, D. 2005. Vizster: Visualizing Online Social Networks. In Proc. of the IEEE Symposium on Information Visualization (InfoVis 2005).
  15. Hornung, T., Simon, K., and Lausen, G. 2006. Information Gathering in a Dynamic World. Principles and Practice of Semantic Web Reasoning. LNCS 4187, pp. 237-241. Springer.
  16. Knudsen, M. 2009. Dynamic Web Harvesting Using RSS Feeds. Project report. University of Southern Denmark.
  17. Krebs, V. 2002. Mapping networks of terrorist cells. Connections, 24, 45-52.
  18. Maciejewski R., Hafen, R., Rudolph, S., Tebbetts, G., Cleveland, W.S., Grannis, S. J., Ebert, D. S., 2009. Generating Synthetic Syndromic-Surveillance Data for Evaluating Visual - Analytics Techniques, IEEE Computer Graphics and Applications, 29, 3, 18-28.
  19. Memon N. 2007. Investigative Data Mining: Mathematical Models of Analyzing, Visualizing and Destabilizing Terrorist Networks. Ph.D. Dissertation, Aalborg University, Denmark.
  20. Memon, N., Wiil, U. K., Alhajj, R., Atzenbeck, C., and Harkiolakis, N. 2009. Harvesting Covert Networks: The Case Study of the iMiner Database. Accepted for the International Journal of Networking and Virtual Organizations (IJNVO). Inderscience Publishers.
  21. Mena, J. 2003. Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann.
  22. Petersen, R. R., and Wiil, U. K. 2008. ASAP: A Planning Tool for Agile Software Development. In Proc. of the ACM Hypertext Conference, pp. 27-32. ACM Press.
  23. Raine, N. E., Rossmo, D. K., and Comber, S. C. 2009. Geographic profiling applied to testing models of bumble-bee foraging. In J. R. Soc. Interface 6, 307- 319.
  24. Rossmo, D. K., and Velarde, L. 2008. Geographic profiling analysis: principles, methods, and applications. In Crime mapping case studies: practice and research, pp. 35-43. Wiley.
  25. Shipman, F. M., Hsieh, H, Maloor, P., and Moore, J. M. 2001. The Visual Knowledge Builder: A Second Generation Spatial Hypertext, In Proc. of the ACM Hypertext Conference, pp. 113-122. ACM Press.
  26. Shkapenyuk,V., and Suel, T. 2002. Design and Implementation of a High-Performance Distributed Web Crawler. In Proceedings of .18th International Conference on Data Engineering, (San Jose, CA, February), pp. 357-368. IEEE Computer Society.
  27. Stasko, J., Gorg, C., Liu, Z., and Singhal, K. 2007. Jigsaw: Supporting Investigative Analysis through Interactive Visualization. In Proc. of the IEEE Symposium on Visual Analytics Science and Technology, pp. 131- 138.
  28. Thomas, J., and Cook, K. 2006. A Visual Analytics Agenda. IEEE Computer Graphics and Applications 26(1), 10-13.
  29. Xu, J., and Chen, H. 2005. CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems 23(2), 201-226
  30. Yan, P., Chen, H., and Zeng, D. 2007. Syndromic Surveillance Systems: Public Health and Bio-defence. Annual Review of Information Science and Technology (ARIST), 41, 425-495
Download


Paper Citation


in Harvard Style

Wiil U., Memon N. and Gniadek J. (2009). KNOWLEDGE MANAGEMENT PROCESSES, TOOLS AND TECHNIQUES FOR COUNTERTERRORISM . In Proceedings of the International Conference on Knowledge Management and Information Sharing - Volume 1: KMIS, (IC3K 2009) ISBN 978-989-674-013-9, pages 29-36. DOI: 10.5220/0002291900290036


in Bibtex Style

@conference{kmis09,
author={Uffe Kock Wiil and Nasrullah Memon and Jolanta Gniadek},
title={KNOWLEDGE MANAGEMENT PROCESSES, TOOLS AND TECHNIQUES FOR COUNTERTERRORISM},
booktitle={Proceedings of the International Conference on Knowledge Management and Information Sharing - Volume 1: KMIS, (IC3K 2009)},
year={2009},
pages={29-36},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002291900290036},
isbn={978-989-674-013-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Knowledge Management and Information Sharing - Volume 1: KMIS, (IC3K 2009)
TI - KNOWLEDGE MANAGEMENT PROCESSES, TOOLS AND TECHNIQUES FOR COUNTERTERRORISM
SN - 978-989-674-013-9
AU - Wiil U.
AU - Memon N.
AU - Gniadek J.
PY - 2009
SP - 29
EP - 36
DO - 10.5220/0002291900290036