Intelligence and Security Informatics

First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2–3, 2003 Proceedings

  • Hsinchun Chen
  • Richard Miranda
  • Daniel D. Zeng
  • Chris Demchak
  • Jenny Schroeder
  • Therani Madhusudan
Conference proceedings ISI 2003

DOI: 10.1007/3-540-44853-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2665)

Table of contents (40 papers)

  1. Front Matter
    Pages I-XIV
  2. Full Papers

    1. Data Management and Mining

      1. Using Support Vector Machines for Terrorism Information Extraction
        Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam
        Pages 1-12
      2. Criminal Incident Data Association Using the OLAP Technology
        Song Lin, Donald E. Brown
        Pages 13-26
      3. Names: A New Frontier in Text Mining
        Frankie Patman, Paul Thompson
        Pages 27-38
      4. Web-Based Intelligence Reports System
        Alexander Dolotov, Mary Strickler
        Pages 39-58
      5. Authorship Analysis in Cybercrime Investigation
        Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
        Pages 59-73
    2. Deception Detection

      1. Behavior Profiling of Email
        Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
        Pages 74-90
      2. Detecting Deception through Linguistic Analysis
        Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr
        Pages 91-101
      3. A Longitudinal Analysis of Language Behavior of Deception in E-mail
        Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell
        Pages 102-110
    3. Analytical Techniques

      1. Evacuation Planning: A Capacity Constrained Routing Approach
        Qingsong Lu, Yan Huang, Shashi Shekhar
        Pages 111-125
      2. Locating Hidden Groups in Communication Networks Using Hidden Markov Models
        Malik Magdon-Ismail, Mark Goldberg, William Wallace, David Siebecker
        Pages 126-137
      3. Decision Based Spatial Analysis of Crime
        Yifei Xue, Donald E. Brown
        Pages 153-167
    4. Visualization

      1. CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis
        Jennifer Schroeder, Jennifer Xu, Hsinchun Chen
        Pages 168-180
      2. A Spatio Temporal Visualizer for Law Enforcement
        Ty Buetow, Luis Chaboya, Christopher O’Toole, Tom Cushna, Damien Daspit, Tim Petersen et al.
        Pages 181-194
      3. Tracking Hidden Groups Using Communications
        Sudarshan S. Chawathe
        Pages 195-208
    5. Knowledge Management and Adoption

    6. Collaborative Systems and Methodologies

      1. Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework
        T. S. Raghu, R. Ramesh, Andrew B. Whinston
        Pages 249-265

About these proceedings


Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.


collaborative computing crime analysis data mining deception detection information security intelligence intelligence services knowledge management monitor monitoring national security network security security informatics surveillance visualization

Editors and affiliations

  • Hsinchun Chen
    • 1
  • Richard Miranda
    • 2
  • Daniel D. Zeng
    • 1
  • Chris Demchak
    • 3
  • Jenny Schroeder
    • 2
  • Therani Madhusudan
    • 1
  1. 1.Department of Management Information SystemsUniversity of ArizonaTucsonUSA
  2. 2.Tucson Police DepartmentTucsonUSA
  3. 3.School of Public Administration and PolicyUniversity of ArizonaTucsonUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40189-6
  • Online ISBN 978-3-540-44853-2
  • Series Print ISSN 0302-9743