Data mining, semantic web and advanced information technologies for fighting terrorism

S. Ahsan, A. Shah
{"title":"Data mining, semantic web and advanced information technologies for fighting terrorism","authors":"S. Ahsan, A. Shah","doi":"10.1109/ISBAST.2008.4547644","DOIUrl":null,"url":null,"abstract":"Terrorism has emerged as an immediate and most potent threat to the free world in the post September 11, 2001 years, because of its real and potential damage to the infrastructure, economy and people. In response to this thereat, developed and developing countries, such as USA and Pakistan, have emerged as front line states in the fight against terrorism with the following objectives; i) prevent future terrorist attacks, ii) reduce the nations vulnerability, and iii) minimize the damage and recovery from attacks that occur. In order to achieve these objectives we require new approaches to intelligence and information gathering and its analysis through the use of information technology. In this paper we attempt to identify, i) the areas where IT can contribute in accomplishing these three strategic security objectives ii) the unique IT problems and challenges in counter terrorism applications where such applications are being used and developed such as in USA, and, iii) lessons learned for developing countries such as Pakistan, so that an IT counter terrorism infra structure can be established with minimum cost in terms of time and money. We have also tried to highlight the role Information Technology and Internet have to play in counter terrorism by developing and using advanced information technologies such as data mining and semantic Web. The challenges posed are discussed and initiatives to be taken are also suggested.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"147 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Biometrics and Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISBAST.2008.4547644","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

Terrorism has emerged as an immediate and most potent threat to the free world in the post September 11, 2001 years, because of its real and potential damage to the infrastructure, economy and people. In response to this thereat, developed and developing countries, such as USA and Pakistan, have emerged as front line states in the fight against terrorism with the following objectives; i) prevent future terrorist attacks, ii) reduce the nations vulnerability, and iii) minimize the damage and recovery from attacks that occur. In order to achieve these objectives we require new approaches to intelligence and information gathering and its analysis through the use of information technology. In this paper we attempt to identify, i) the areas where IT can contribute in accomplishing these three strategic security objectives ii) the unique IT problems and challenges in counter terrorism applications where such applications are being used and developed such as in USA, and, iii) lessons learned for developing countries such as Pakistan, so that an IT counter terrorism infra structure can be established with minimum cost in terms of time and money. We have also tried to highlight the role Information Technology and Internet have to play in counter terrorism by developing and using advanced information technologies such as data mining and semantic Web. The challenges posed are discussed and initiatives to be taken are also suggested.
打击恐怖主义的数据挖掘、语义网和先进信息技术
在2001年9月11日之后的几年里,恐怖主义已经成为对自由世界最直接和最有力的威胁,因为它对基础设施、经济和人民造成了实际和潜在的破坏。为此,发达国家和发展中国家,如美国和巴基斯坦,已成为打击恐怖主义的前线国家,其目标如下:1)防止未来的恐怖袭击,2)减少国家的脆弱性,3)最大限度地减少袭击造成的损失和恢复。为了实现这些目标,我们需要通过使用信息技术来收集和分析情报和信息的新方法。在本文中,我们试图确定,i) IT可以为实现这三个战略安全目标做出贡献的领域ii)反恐应用中独特的IT问题和挑战,这些应用正在使用和开发,如在美国,以及iii)为巴基斯坦等发展中国家吸取的经验教训,以便在时间和金钱方面以最小的成本建立IT反恐基础设施。我们还试图通过开发和使用先进的信息技术,如数据挖掘和语义网,来强调信息技术和互联网在反恐中所扮演的角色。讨论了所面临的挑战,并提出了应采取的主动行动。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信