Skip to main content
  • Conference proceedings
  • © 2003

Intelligence and Security Informatics

First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2665)

Conference series link(s): ISI: International Conference on Intelligence and Security Informatics

Conference proceedings info: ISI 2003.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (40 papers)

  1. Full Papers

    1. Collaborative Systems and Methodologies

      1. Collaborative Workflow Management for Interagency Crime Analysis
        • J. Leon Zhao, Henry H. Bi, Hsinchun Chen
        Pages 266-280
      2. COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
        • Daniel Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau et al.
        Pages 281-295
    2. Monitoring and Surveillance

      1. Integrated “Mixed” Networks Security Monitoring — A Proposed Framework
        • William T. Scherer, Leah L. Spradley, Marc H. Evans
        Pages 308-321
      2. Bioterrorism Surveillance with Real-Time Data Warehousing
        • Donald J. Berndt, Alan R. Hevner, James Studnicki
        Pages 322-335
  2. Short Papers

    1. Data Management and Mining

      1. Privacy Sensitive Distributed Data Mining from Multi-party Data
        • Hillol Kargupta, Kun Liu, Jessica Ryan
        Pages 336-342
      2. Scalable Knowledge Extraction from Legacy Sources with SEEK
        • Joachim Hammer, William O’Brien, Mark Schmalz
        Pages 346-349
      3. “TalkPrinting”: Improving Speaker Recognition by Modeling Stylistic Features
        • Sachin Kajarekar, Kemal Sönmez, Luciana Ferrer, Venkata Gadde, Anand Venkataraman, Elizabeth Shriberg et al.
        Pages 350-354
      4. Emergent Semantics from Users’ Browsing Paths
        • D. V. Sreenath, W. I. Grosky, F. Fotouhi
        Pages 355-357
    2. Deception Detection

      1. Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection
        • Jinwei Cao, Janna M. Crews, Ming Lin, Judee Burgoon, Jay F. Nunamaker
        Pages 358-365
      2. Training Professionals to Detect Deception
        • Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr.
        Pages 366-370
    3. Methodologies and Applications

      1. Intelligence and Security Informatics: An Information Economics Perspective
        • Lihui Lin, Xianjun Geng, Andrew B. Whinston
        Pages 375-378
      2. An International Perspective on Fighting Cybercrime
        • Weiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou
        Pages 379-384
  3. Extended Abstracts for Posters

    1. Data Management and Mining

      1. Criminal Record Matching Based on the Vector Space Model
        • Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng
        Pages 386-386
      2. Database Support for Exploring Criminal Networks
        • M. N. Smith, P. J. H. King
        Pages 387-387
      3. Hiding Data and Code Security for Application Hosting Infrastructure
        • Ping Lin, K. Selçuk Candan, Rida Bazzi, Zhichao Liu
        Pages 388-388
    2. Security Informatics

Other Volumes

  1. Intelligence and Security Informatics

About this book

Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.

Editors and Affiliations

  • Department of Management Information Systems, University of Arizona, Tucson, USA

    Hsinchun Chen, Daniel D. Zeng, Therani Madhusudan

  • Tucson Police Department, Tucson, USA

    Richard Miranda, Jenny Schroeder

  • School of Public Administration and Policy, University of Arizona, Tucson, USA

    Chris Demchak

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access