TY - BOOK AU - Chen,Hsinchun AU - Miranda,Richard AU - Zeng,Daniel D. AU - Demchak,Chris AU - Schroeder,Jenny AU - Madhusudan,Therani ED - SpringerLink (Online service) TI - Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2–3, 2003 Proceedings T2 - Lecture Notes in Computer Science, SN - 9783540448532 AV - QA76.76.A65 U1 - 005.7 23 PY - 2003/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg KW - Computer science KW - Computer Communication Networks KW - Database management KW - Information storage and retrieval systems KW - Information systems KW - Artificial intelligence KW - Computers KW - Law and legislation KW - Computer Science KW - Information Systems Applications (incl.Internet) KW - Database Management KW - Information Storage and Retrieval KW - Artificial Intelligence (incl. Robotics) KW - Legal Aspects of Computing N1 - Full Papers -- Using Support Vector Machines for Terrorism Information Extraction -- Criminal Incident Data Association Using the OLAP Technology -- Names: A New Frontier in Text Mining -- Web-Based Intelligence Reports System -- Authorship Analysis in Cybercrime Investigation -- Behavior Profiling of Email -- Detecting Deception through Linguistic Analysis -- A Longitudinal Analysis of Language Behavior of Deception in E-mail -- Evacuation Planning: A Capacity Constrained Routing Approach -- Locating Hidden Groups in Communication Networks Using Hidden Markov Models -- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department -- Decision Based Spatial Analysis of Crime -- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis -- A Spatio Temporal Visualizer for Law Enforcement -- Tracking Hidden Groups Using Communications -- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study -- “Atrium” — A Knowledge Model for Modern Security Forces in the Information and Terrorism Age -- Untangling Criminal Networks: A Case Study -- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework -- Collaborative Workflow Management for Interagency Crime Analysis -- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement -- Active Database Systems for Monitoring and Surveillance -- Integrated “Mixed” Networks Security Monitoring — A Proposed Framework -- Bioterrorism Surveillance with Real-Time Data Warehousing -- Short Papers -- Privacy Sensitive Distributed Data Mining from Multi-party Data -- ProGenIE: Biographical Descriptions for Intelligence Analysis -- Scalable Knowledge Extraction from Legacy Sources with SEEK -- “TalkPrinting”: Improving Speaker Recognition by Modeling Stylistic Features -- Emergent Semantics from Users’ Browsing Paths -- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection -- Training Professionals to Detect Deception -- An E-mail Monitoring System for Detecting Outflow of Confidential Documents -- Intelligence and Security Informatics: An Information Economics Perspective -- An International Perspective on Fighting Cybercrime -- Extended Abstracts for Posters -- Hiding Traversal of Tree Structured Data from Untrusted Data Stores -- Criminal Record Matching Based on the Vector Space Model -- Database Support for Exploring Criminal Networks -- Hiding Data and Code Security for Application Hosting Infrastructure -- Secure Information Sharing and Information Retrieval Infrastructure with GridIR -- Semantic Hacking and Intelligence and Security Informatics N2 - Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems UR - http://dx.doi.org/10.1007/3-540-44853-5 ER -