Uncovering the Dark Web: A case study of Jihad on the web

被引:76
作者
Chen, Hsinchun [1 ]
Chung, Wingyan [2 ]
Qin, Jialun [3 ]
Reid, Edna [4 ]
Sageman, Marc [5 ]
Weimann, Gabriel [6 ]
机构
[1] Univ Arizona, Dept Management Informat Syst, Artificial Intelligence Lab, Tucson, AZ 85721 USA
[2] Santa Clara Univ, Dept Operat & Management Informat Syst, Leavey Sch Business, Santa Clara, CA 95053 USA
[3] Univ Massachusetts, Coll Management, Dept Management, Lowell, MA 01854 USA
[4] Clarion Univ Pennsylvania, Dept Lib Sci, Clarion, PA 16214 USA
[5] Univ Penn, Solomon Asch Ctr Study Ethnopolit Conflict, Philadelphia, PA 19104 USA
[6] Univ Haifa, Dept Commun, IL-31905 Haifa, Israel
来源
JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY | 2008年 / 59卷 / 08期
关键词
D O I
10.1002/asi.20838
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While the Web has become a worldwide platform for communication, terrorists share their ideology and communicate with members on the "Dark Web"-the reverse side of the Web used by terrorists. Currently, the problems of information overload and difficulty to obtain a comprehensive picture of terrorist activities hinder effective and efficient analysis of terrorist information on the Web. To improve understanding of terrorist activities, we have developed a novel methodology for collecting and analyzing Dark Web information. The methodology incorporates information collection, analysis, and visualization techniques, and exploits various Web information sources. We applied it to collecting and analyzing information of 39 Jihad Web sites and developed visualization of their site contents, relationships, and activity levels. An expert evaluation showed that the methodology is very useful and promising, having a high potential to assist in investigation and understanding of terrorist activities by producing results that could potentially help guide both policymaking and intelligence research.
引用
收藏
页码:1347 / 1359
页数:13
相关论文
共 40 条
[1]  
[Anonymous], 2002, Washington Post
[2]  
[Anonymous], 2001, CONNECTIONS
[3]  
*ANT LEAG, 2002, JIH ONL ISL TERR INT
[4]  
Blakemore B, 2004, ABC NEWS 1123
[5]  
Chambers J., 1983, GRAPHICAL METHODS DA
[6]   Introduction to the special topic issue: Intelligence and security informatics [J].
Chen, H .
JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2005, 56 (03) :217-220
[7]  
CHEN H, 2000, J AM SOC INFORM SCI, V52, P1134
[8]   Web mining: Machine learning for Web applications [J].
Chen, HC ;
Chau, M .
ANNUAL REVIEW OF INFORMATION SCIENCE AND TECHNOLOGY, 2004, 38 :289-329
[9]   Internet categorization and search: A self-organizing approach [J].
Chen, HC ;
Schuffels, C ;
Orwig, R .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 1996, 7 (01) :88-102
[10]   A visual framework for knowledge discovery on the Web: An empirical study of business intelligence exploration [J].
Chung, W ;
Chen, H ;
Nunamaker, JF .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2005, 21 (04) :57-84