ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
103
views
0
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
935
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Terrorism Informatics
other
Editor(s):
Hsinchun Chen
,
Edna Reid
,
Joshua Sinai
,
Andrew Silke
,
Boaz Ganor
Publication date
(Print):
2008
Publisher:
Springer US
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Special Issue: Social Pedagogy and Anti-Extremism/Anti-Terrorism
Author and book information
Book
ISBN (Print):
978-0-387-71612-1
ISBN (Electronic):
978-0-387-71613-8
Publication date (Print):
2008
DOI:
10.1007/978-0-387-71613-8
SO-VID:
e5fd00a7-8320-4d27-8303-3ebcfe1056f1
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Domain Mapping of Contemporary Terrorism Research
pp. 27
Research on Terrorism
pp. 51
Who Are the Key Figures in ‘Terrorism Studies’?
pp. 73
Interviewing Terrorists
pp. 101
Resolving a Terrorist Insurgency by Addressing Its Root Causes
pp. 115
A Quantitative Analysis of ‘Root Causes of Conflict’
pp. 141
Countering Terrorism with Knowledge
pp. 157
Toward a Target-specific Method of Threat Assessment
pp. 175
Identifying and Exploiting Group Learning Patterns for Counterterrorism
pp. 197
Homeland Insecurity
pp. 221
Case Study of Jihad on the Web
pp. 237
Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System
pp. 267
Content Analysis of Jihadi Extremist Groups' Videos
pp. 285
Analysis of Affect Intensities in Extremist Group Forums
pp. 309
Document Selection for Extracting Entity and Relationship Instances of Terrorist Events
pp. 347
Data Distortion Methods and Metrics in a Terrorist Analysis System
pp. 365
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)
pp. 385
Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons
pp. 407
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
pp. 425
Individual and Collective Analysis of Anomalies in Message Traffic
pp. 451
Addressing Insider Threat through Cost-Sensitive Document Classification
pp. 473
Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs
pp. 495
Automatic Extraction of Deceptive Behavioral Cues from Video
pp. 517
Situational Awareness Technologies for Disaster Response
Similar content
935
Machine Learning for Health Informatics
Authors:
Andreas Holzinger
Public health informatics: the importance of Covid-19 dashboard in KSA for sharing and visualizing health information
Authors:
Meningococcus genome informatics platform: a system for analyzing multilocus sequence typing data
Authors:
Lee S. Katz
,
Chris Bolen
,
Brian Harcourt
…
See all similar
Cited by
4
Big Data, Big Problems: Emerging Issues in the Ethics of Data Science and Journalism
Authors:
Hannah Shtein
,
Joshua Fairfield
Sharing, knowledge management and big data: A partial genealogy of the data scientist
Authors:
Robert Gehl
In Internet’s Way
Authors:
Raphael Cohen-Almagor
See all cited by