Terrorism Informatics

Knowledge Management and Data Mining for Homeland Security

  • Hsinchun Chen
  • Edna Reid
  • Joshua Sinai
  • Andrew Silke
  • Boaz Ganor

Part of the Integrated Series In Information Systems book series (ISIS, volume 18)

Table of contents

  1. Front Matter
    Pages i-xlii
  2. Methodological Issues in Terrorism Research

    1. Edna Reid, Hsinchun Chen
      Pages 3-26
    2. Andrew Silke
      Pages 27-50
    3. John Horgan
      Pages 73-99
    4. Mihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best
      Pages 115-139
    5. James O. Ellis III
      Pages 141-155
    6. Horacio R. Trujillo, Brian A. Jackson
      Pages 175-196
    7. Stephen E. Fienberg
      Pages 197-218
  3. Terrorism Informatics to Support Prevention, Detection, and Response

    1. Hsinchun Chen, Jialun Qin, Edna Reid, Yilu Zhou, Marc Sageman
      Pages 221-235
    2. Hsinchun Chen, Jialun Qin, Edna Reid, Yilu Zhou
      Pages 237-266
    3. Arab Salem, Edna Reid, Hsinchun Chen
      Pages 267-284
    4. Ahmed Abbasi, Hsinchun Chen
      Pages 285-307
    5. Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Maggy Anastasia Suryanto, Rohan Kumar Gunaratna
      Pages 309-346
    6. Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider et al.
      Pages 365-384
    7. Xiaohua Hu, Xiaodan Zhang, Daniel Wu, Xiaohua Zhou, Peter Rumm
      Pages 385-406
    8. Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy
      Pages 407-424
    9. Thomas O. Meservy, Matthew L. Jensen, W. John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr
      Pages 495-516
    10. Naveen Ashish, Ronald Eguchi, Rajesh Hegde, Charles Huyck, Dmitri Kalashnikov, Sharad Mehrotra et al.
      Pages 517-544
  4. Back Matter
    Pages 545-558

About this book


Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and these methods are involved in the collection of huge amounts of information from varied and multiple sources and of many types in numerous languages. Information fusion and information technology analysis techniques—which include data mining, data integration, language translation technologies, and image and video processing—play central roles in the prevention, detection, and remediation of terrorism.


Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art in the terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches. Featuring contributions by leading researchers and practitioners, illustrative case studies, and applications of terrorism informatics techniques, the book will be an essential resource for scientists, security professionals, counterterrorism experts, and policy makers.


Content Information Technology (IT) Internet Mapping Policy Web computer science data mining information knowledge management learning organization privacy search engine marketing (SEM) service-oriented computing

Editors and affiliations

  • Hsinchun Chen
    • 1
  • Edna Reid
    • 2
  • Joshua Sinai
    • 3
  • Andrew Silke
    • 4
  • Boaz Ganor
    • 5
  1. 1.University of ArizonaTucsonUSA
  2. 2.Clarion UniversityClarionUSA
  3. 3.The Analysis CorporationMcLeanUSA
  4. 4.University of East LondonUK
  5. 5.Lauder School of Government & DiplomacyIsrael

Bibliographic information