Skip to main navigation Skip to search Skip to main content

Security informatics and terrorism: patrolling the Web

  • Cecilia S Gal (Editor)
  • , Paul B Kantor (Editor)
  • , Bracha Shapira (Editor)

    Research output: Book/ReportBookpeer-review

    Abstract

    Social and Technical Problems of Detecting and Controlling Terrorists' Use of the World Wide Web.
    his work is intended to be of interest to counter-terrorism experts and professionals, to academic researchers in information systems, computer science, political science and public policy, and to graduate students in these areas. The goal of this book is to highlight several aspects of patrolling the Web that were raised and discussed by experts from different disciplines. The book includes academic studies from related technical fields, namely, computer science and information technology, the strategic point of view as presented by intelligence experts, and finally the practical point of view by experts from related industry describing lessons learned from practical efforts to tackle these problems. This volume is organized into four major parts: definition and analysis of the subject, data-mining techniques for terrorism informatics, other theoretical methods to detect terrorists on the Web, and practical relevant industrial experience on patrolling the Web.
    Original languageEnglish
    PublisherIOS Press
    Number of pages260
    ISBN (Electronic)9781607503200
    ISBN (Print)9781586038489
    StatePublished - May 2008

    Publication series

    NameNATO science for peace and security series. D, Information and communication security
    PublisherIOS Press
    Volume15
    ISSN (Print)1874-6268
    ISSN (Electronic)1879-8292

    UN SDGs

    This output contributes to the following UN Sustainable Development Goals (SDGs)

    1. SDG 16 - Peace, Justice and Strong Institutions
      SDG 16 Peace, Justice and Strong Institutions

    Fingerprint

    Dive into the research topics of 'Security informatics and terrorism: patrolling the Web'. Together they form a unique fingerprint.

    Cite this