Since September 11th, the multidisciplinary field of terrorism informatics has experienced tremendous growth, and research communities as well as local, state, and national governments are facing increasingly more complex and challenging issues. The challenges facing the intelligence and national security communities worldwide include accurately and efficiently monitoring, analyzing, predicting and preventing terrorist activities. The development and use of advanced information technologies, including methodologies, models and algorithms, infrastructure, systems, and tools for national/international and homeland security related applications have provided promising new directions for study. Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications (Chen et al. 2008). It is a highly interdisciplinary and comprehensive field. The wide variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy, and these methods are involved in the collection of huge amounts of many types of multi-lingual information from varied and multiple sources. Information fusion and information technology analysis techniques, which include data mining, data integration, language translation technologies, and image and video processing, play central roles in the prevention, detection, and remediation of terrorism. The purpose of this special issue is to bring together international researchers, engineers, policy makers, and practitioners working on terrorism informatics as well as related fields such as the organizational and social sciences. We have accepted nine papers that report research in terrorism informatics. They study a variety of topics from terrorist social networks to terrorist Website sophistication, from online forum to Twitter, and from English content to Chinese content. They represent a good mix of multiple disciplines and look at terrorism informatics from different perspectives. The first two papers provide comprehensive reviews of the field, demand, techniques and trends. These papers provide guidelines as what are the interests and challenges in this community. “Tracking and Disrupting Dark Networks: Challenges of Data Collection and Analysis” by Roberts (Roberts 2011) provide challenges of data collection and analysis from within the intelligence community. Various relevant government agencies, their research interests and their ongoing projects on terrorism information collection and analysis are introduced. “Computational Approaches to Suspicion in Adversarial Settings” by Skillicorn 2011 provides a computational framework for adversarial data analysis in the context of crime and terrorism investigations. The author reviewed and discussed three major components including adversary-based data collection and characteristics, the detection techniques that identify suspicious individuals, and the network-based association techniques that find individuals related to a known suspicious individual. The next four papers focus on web content analysis with the last one also addresses web structure analysis to reveal sophistication level of terrorist websites. Two of them look at a new and promising data source: Twitter. “Information Control H. Chen Management Information Systems, University of Arizona, Tucson, AZ, USA
Read full abstract