SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Chen H, Chung W, Qin J, Reid E, Sageman M, Weimann G. J. Am. Soc. Inf. Sci. Technol. 2008; 59(8): 1347-1359.

Copyright

(Copyright © 2008, American Society for Information Science and Technology, Publisher John Wiley and Sons)

DOI

10.1002/asi.20838

PMID

unavailable

Abstract

While the Web has become a worldwide platform for communication, terrorists share their ideology and communicate with members on the “Dark Web”—the reverse side of the Web used by terrorists. Currently, the problems of information overload and difficulty to obtain a comprehensive picture of terrorist activities hinder effective and efficient analysis of terrorist information on the Web. To improve understanding of terrorist activities, we have developed a novel methodology for collecting and analyzing Dark Web information. The methodology incorporates information collection, analysis, and visualization techniques, and exploits various Web information sources. We applied it to collecting and analyzing information of 39 Jihad Web sites and developed visualization of their site contents, relationships, and activity levels. An expert evaluation showed that the methodology is very useful and promising, having a high potential to assist in investigation and understanding of terrorist activities by producing results that could potentially help guide both policymaking and intelligence research.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print