© 2003

Intelligence and Security Informatics

First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2–3, 2003 Proceedings

  • Hsinchun Chen
  • Richard Miranda
  • Daniel D. Zeng
  • Chris Demchak
  • Jenny Schroeder
  • Therani Madhusudan
Conference proceedings ISI 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2665)

Table of contents

  1. Full Papers

    1. Collaborative Systems and Methodologies

      1. J. Leon Zhao, Henry H. Bi, Hsinchun Chen
        Pages 266-280
      2. Daniel Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau et al.
        Pages 281-295
    2. Monitoring and Surveillance

      1. William T. Scherer, Leah L. Spradley, Marc H. Evans
        Pages 308-321
      2. Donald J. Berndt, Alan R. Hevner, James Studnicki
        Pages 322-335
  2. Short Papers

    1. Data Management and Mining

      1. Hillol Kargupta, Kun Liu, Jessica Ryan
        Pages 336-342
      2. Pablo A. Duboue, Kathleen R. McKeown, Vasileios Hatzivassiloglou
        Pages 343-345
      3. Joachim Hammer, William O’Brien, Mark Schmalz
        Pages 346-349
      4. Sachin Kajarekar, Kemal Sönmez, Luciana Ferrer, Venkata Gadde, Anand Venkataraman, Elizabeth Shriberg et al.
        Pages 350-354
      5. D. V. Sreenath, W. I. Grosky, F. Fotouhi
        Pages 355-357
    2. Deception Detection

      1. Jinwei Cao, Janna M. Crews, Ming Lin, Judee Burgoon, Jay F. Nunamaker
        Pages 358-365
      2. Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr.
        Pages 366-370
    3. Methodologies and Applications

      1. Lihui Lin, Xianjun Geng, Andrew B. Whinston
        Pages 375-378
      2. Weiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou
        Pages 379-384
  3. Extended Abstracts for Posters

    1. Data Management and Mining

      1. Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng
        Pages 386-386
      2. M. N. Smith, P. J. H. King
        Pages 387-387
      3. Ping Lin, K. Selçuk Candan, Rida Bazzi, Zhichao Liu
        Pages 388-388
    2. Security Informatics

About these proceedings


Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.


collaborative computing crime analysis data mining deception detection information security intelligence intelligence services knowledge management monitor monitoring national security network security security informatics surveillance visualization

Editors and affiliations

  • Hsinchun Chen
    • 1
  • Richard Miranda
    • 2
  • Daniel D. Zeng
    • 1
  • Chris Demchak
    • 3
  • Jenny Schroeder
    • 2
  • Therani Madhusudan
    • 1
  1. 1.Department of Management Information SystemsUniversity of ArizonaTucsonUSA
  2. 2.Tucson Police DepartmentTucsonUSA
  3. 3.School of Public Administration and PolicyUniversity of ArizonaTucsonUSA

Bibliographic information