{"title":"Data mining, semantic web and advanced information technologies for fighting terrorism","authors":"S. Ahsan, A. Shah","doi":"10.1109/ISBAST.2008.4547644","DOIUrl":null,"url":null,"abstract":"Terrorism has emerged as an immediate and most potent threat to the free world in the post September 11, 2001 years, because of its real and potential damage to the infrastructure, economy and people. In response to this thereat, developed and developing countries, such as USA and Pakistan, have emerged as front line states in the fight against terrorism with the following objectives; i) prevent future terrorist attacks, ii) reduce the nations vulnerability, and iii) minimize the damage and recovery from attacks that occur. In order to achieve these objectives we require new approaches to intelligence and information gathering and its analysis through the use of information technology. In this paper we attempt to identify, i) the areas where IT can contribute in accomplishing these three strategic security objectives ii) the unique IT problems and challenges in counter terrorism applications where such applications are being used and developed such as in USA, and, iii) lessons learned for developing countries such as Pakistan, so that an IT counter terrorism infra structure can be established with minimum cost in terms of time and money. We have also tried to highlight the role Information Technology and Internet have to play in counter terrorism by developing and using advanced information technologies such as data mining and semantic Web. The challenges posed are discussed and initiatives to be taken are also suggested.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"147 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Biometrics and Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISBAST.2008.4547644","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Terrorism has emerged as an immediate and most potent threat to the free world in the post September 11, 2001 years, because of its real and potential damage to the infrastructure, economy and people. In response to this thereat, developed and developing countries, such as USA and Pakistan, have emerged as front line states in the fight against terrorism with the following objectives; i) prevent future terrorist attacks, ii) reduce the nations vulnerability, and iii) minimize the damage and recovery from attacks that occur. In order to achieve these objectives we require new approaches to intelligence and information gathering and its analysis through the use of information technology. In this paper we attempt to identify, i) the areas where IT can contribute in accomplishing these three strategic security objectives ii) the unique IT problems and challenges in counter terrorism applications where such applications are being used and developed such as in USA, and, iii) lessons learned for developing countries such as Pakistan, so that an IT counter terrorism infra structure can be established with minimum cost in terms of time and money. We have also tried to highlight the role Information Technology and Internet have to play in counter terrorism by developing and using advanced information technologies such as data mining and semantic Web. The challenges posed are discussed and initiatives to be taken are also suggested.