Intelligence and Security Informatics

First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2–3, 2003 Proceedings

  • Hsinchun Chen
  • Richard Miranda
  • Daniel D. Zeng
  • Chris Demchak
  • Jenny Schroeder
  • Therani Madhusudan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2665)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Full Papers

    1. Data Management and Mining

      1. Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam
        Pages 1-12
      2. Song Lin, Donald E. Brown
        Pages 13-26
      3. Frankie Patman, Paul Thompson
        Pages 27-38
      4. Alexander Dolotov, Mary Strickler
        Pages 39-58
      5. Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
        Pages 59-73
    2. Deception Detection

      1. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
        Pages 74-90
      2. Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr
        Pages 91-101
      3. Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell
        Pages 102-110
    3. Analytical Techniques

      1. Qingsong Lu, Yan Huang, Shashi Shekhar
        Pages 111-125
      2. Malik Magdon-Ismail, Mark Goldberg, William Wallace, David Siebecker
        Pages 126-137
      3. Yifei Xue, Donald E. Brown
        Pages 153-167
    4. Visualization

      1. Jennifer Schroeder, Jennifer Xu, Hsinchun Chen
        Pages 168-180
      2. Ty Buetow, Luis Chaboya, Christopher O’Toole, Tom Cushna, Damien Daspit, Tim Petersen et al.
        Pages 181-194
      3. Sudarshan S. Chawathe
        Pages 195-208
    5. Knowledge Management and Adoption

    6. Collaborative Systems and Methodologies

      1. T. S. Raghu, R. Ramesh, Andrew B. Whinston
        Pages 249-265

About these proceedings

Introduction

Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.

Keywords

collaborative computing crime analysis data mining deception detection information security intelligence intelligence services knowledge management monitor monitoring national security network security security informatics surveillance visualization

Editors and affiliations

  • Hsinchun Chen
    • 1
  • Richard Miranda
    • 2
  • Daniel D. Zeng
    • 1
  • Chris Demchak
    • 3
  • Jenny Schroeder
    • 2
  • Therani Madhusudan
    • 1
  1. 1.Department of Management Information SystemsUniversity of ArizonaTucsonUSA
  2. 2.Tucson Police DepartmentTucsonUSA
  3. 3.School of Public Administration and PolicyUniversity of ArizonaTucsonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-44853-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40189-6
  • Online ISBN 978-3-540-44853-2
  • Series Print ISSN 0302-9743