Canter, D. V., and Hammond, L. 2007. Prioritizing
burglars: Comparing the Effectiveness of Geographic
profiling methods. Police Pract. Res. 8, 371–384.
Carpenter, M. A., and Stajkovic, A. D. 2006. Social
network theory and methods as tools for helping
business confront global terrorism: Capturing the case
and contingencies presented by dark social networks.
Corporate strategies under international terrorism and
adversity. Edward Elgar Publishing.
Chau, M., and Xu, J. 2008. Using Web Mining and Social
Network Analysis to Study the Emergence of Cyber
Communities in Blogs. In Terrorism Informatics.
Knowledge Management and Data Mining for
Homeland Security, pp. 473-494. Springer.
Chen, H., Reid, E., Sinai, J., Silke, A., and Ganor, B.
(eds.). 2008. Terrorism Informatics. Knowledge
Management and Data Mining for Homeland Security.
Springer.
Dasho, E., and Puszczewicz, R. 2009. Tools and
Techniques for Counterterrorism: Web Mining and
Social Network Analysis in Blogs. Project report.
University of Southern Denmark.
Devlin, K., and Lorden, G. 2007. The Numbers Behind
NUMB3RS: Solving Crime with Mathematics. Plume.
Engelbart, D. C. 1962. Augmenting human intellect: A
conceptual framework, Summary Report AFOSR-
3233, Standford Research Institute.
Gloor, P. A., and Zhao, Y. 2006. Analyzing Actors and
Their Discussion Topics by Semantic Social Network
Analysis. Information Visualization. IV 2006, pp. 130-
135
Henriksen, K., and Sørensen, M. 2009. Design and
Implementation of a Focused Web Crawler for use in
Web Harvesting for Counterterrorism Planning
Purposes. Project report. University of Southern
Denmark.
Heer, J., and Boyd, D. 2005. Vizster: Visualizing Online
Social Networks. In Proc. of the IEEE Symposium on
Information Visualization (InfoVis 2005).
Hornung, T., Simon, K., and Lausen, G. 2006. Information
Gathering in a Dynamic World. Principles and
Practice of Semantic Web Reasoning. LNCS 4187, pp.
237–241. Springer.
Knudsen, M. 2009. Dynamic Web Harvesting Using RSS
Feeds. Project report. University of Southern
Denmark.
Krebs, V. 2002. Mapping networks of terrorist cells.
Connections, 24, 45–52.
Maciejewski R., Hafen, R., Rudolph, S., Tebbetts, G.,
Cleveland, W.S., Grannis, S. J., Ebert, D. S., 2009.
Generating Synthetic Syndromic-Surveillance Data for
Evaluating Visual - Analytics Techniques, IEEE
Computer Graphics and Applications, 29, 3, 18-28.
Memon N. 2007. Investigative Data Mining: Mathematical
Models of Analyzing, Visualizing and Destabilizing
Terrorist Networks. Ph.D. Dissertation, Aalborg
University, Denmark.
Memon, N., Wiil, U. K., Alhajj, R., Atzenbeck, C., and
Harkiolakis, N. 2009. Harvesting Covert Networks:
The Case Study of the iMiner Database. Accepted for
the International Journal of Networking and Virtual
Organizations (IJNVO). Inderscience Publishers.
Mena, J. 2003. Investigative Data Mining for Security and
Criminal Detection. Butterworth-Heinemann.
Petersen, R. R., and Wiil, U. K. 2008. ASAP: A Planning
Tool for Agile Software Development. In Proc. of the
ACM Hypertext Conference, pp. 27-32. ACM Press.
Raine, N. E., Rossmo, D. K., and Comber, S. C. 2009.
Geographic profiling applied to testing models of
bumble-bee foraging. In J. R. Soc. Interface 6, 307-
319.
Rossmo, D. K., and Velarde, L. 2008. Geographic
profiling analysis: principles, methods, and
applications. In Crime mapping case studies: practice
and research, pp. 35–43. Wiley.
Shipman, F. M., Hsieh, H, Maloor, P., and Moore, J. M.
2001. The Visual Knowledge Builder: A Second
Generation Spatial Hypertext, In Proc. of the ACM
Hypertext Conference, pp. 113-122. ACM Press.
Shkapenyuk,V., and Suel, T. 2002. Design and
Implementation of a High-Performance Distributed
Web Crawler. In Proceedings of .18th International
Conference on Data Engineering, (San Jose, CA,
February), pp. 357-368. IEEE Computer Society.
Stasko, J., Gorg, C., Liu, Z., and Singhal, K. 2007. Jigsaw:
Supporting Investigative Analysis through Interactive
Visualization. In Proc. of the IEEE Symposium on
Visual Analytics Science and Technology, pp. 131–
138.
Thomas, J., and Cook, K. 2006. A Visual Analytics
Agenda. IEEE Computer Graphics and Applications
26(1), 10–13.
Xu, J., and Chen, H. 2005. CrimeNet Explorer: A
Framework for Criminal Network Knowledge
Discovery. ACM Transactions on Information
Systems 23(2), 201–226
Yan, P., Chen, H., and Zeng, D. 2007. Syndromic
Surveillance Systems: Public Health and Bio-defence.
Annual Review of Information Science and
Technology (ARIST), 41, 425-495
KMIS 2009 - International Conference on Knowledge Management and Information Sharing
36