Intelligence and Security Informatics

First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2–3, 2003 Proceedings

ISBN: 978-3-540-40189-6 (Print) 978-3-540-44853-2 (Online)

Table of contents (40 chapters)

previous Page of 2
  1. Full Papers

    1. Visualization

      1. No Access

        Book Chapter

        Pages 168-180

        CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis

      2. No Access

        Book Chapter

        Pages 181-194

        A Spatio Temporal Visualizer for Law Enforcement

      3. No Access

        Book Chapter

        Pages 195-208

        Tracking Hidden Groups Using Communications

      Knowledge Management and Adoption

      1. No Access

        Book Chapter

        Pages 209-222

        Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study

      2. No Access

        Book Chapter

        Pages 223-231

        “Atrium” — A Knowledge Model for Modern Security Forces in the Information and Terrorism Age

      3. No Access

        Book Chapter

        Pages 232-248

        Untangling Criminal Networks: A Case Study

      Collaborative Systems and Methodologies

      1. No Access

        Book Chapter

        Pages 249-265

        Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework

      2. No Access

        Book Chapter

        Pages 266-280

        Collaborative Workflow Management for Interagency Crime Analysis

      Data Management and Mining

      1. No Access

        Book Chapter

        Pages 1-12

        Using Support Vector Machines for Terrorism Information Extraction

      2. No Access

        Book Chapter

        Pages 13-26

        Criminal Incident Data Association Using the OLAP Technology

      3. No Access

        Book Chapter

        Pages 27-38

        Names: A New Frontier in Text Mining

      4. No Access

        Book Chapter

        Pages 39-58

        Web-Based Intelligence Reports System

      5. No Access

        Book Chapter

        Pages 59-73

        Authorship Analysis in Cybercrime Investigation

      Deception Detection

      1. No Access

        Book Chapter

        Pages 74-90

        Behavior Profiling of Email

      2. No Access

        Book Chapter

        Pages 91-101

        Detecting Deception through Linguistic Analysis

      3. No Access

        Book Chapter

        Pages 102-110

        A Longitudinal Analysis of Language Behavior of Deception in E-mail

      Analytical Techniques

      1. No Access

        Book Chapter

        Pages 111-125

        Evacuation Planning: A Capacity Constrained Routing Approach

      2. No Access

        Book Chapter

        Pages 126-137

        Locating Hidden Groups in Communication Networks Using Hidden Markov Models

      3. No Access

        Book Chapter

        Pages 138-152

        Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department

      4. No Access

        Book Chapter

        Pages 153-167

        Decision Based Spatial Analysis of Crime

previous Page of 2