Skip to main content

How Question Answering Technology Helps to Locate Malevolent Online Content

  • Conference paper
Intelligence and Security Informatics (ISI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

  • 4020 Accesses

Abstract

The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Cookbook” teaching how to make weapons, home made bombs, and poisons, keeps re-appearing in various places. Some websites teach how to break into computer networks to steal passwords and credit card information. Law enforcement, security experts, and public watchdogs started to locate, monitor, and act when such malevolent content surfaces on the Internet. Since the resources of law enforcement are limited, it may take some time before potentially malevolent content is located, enough for it to disseminate and cause harm. The only practical way for searching the content of the Internet, available for law enforcement, security experts, and public watchdogs is by using a search engine, such as Google, AOL, MSN, etc. We have suggested and empirically evaluated an alternative technology (automated question answering or QA) capable of locating potentially malevolent online content. We have implemented a proof-of-concept prototype that is capable of finding web pages that provide the answers to given questions (e.g. “How to build a pipe bomb?”). Using students as subjects in a controlled experiment, we have empirically established that our QA prototype finds web pages that are more likely to provide answers to given questions than simple keyword search using Google. This suggests that QA technology can be a good replacement or an addition to the traditional keyword searching for the task of locating malevolent online content and, possibly, for a more general task of interactive online information exploration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brin, S., Page, L.: The Anatomy of a Large Scale Hypertextual Web Search Engine. Stanford technical report. Stanford Database Group Publication Server (1998), http://dbpubs.stanford.edu:8090/pub/showDoc.Fulltext?lang=en&doc=1998-8&format=pdf&compression=

  2. Dumais, S., Banko, M., Brill, E., Lin, J., Ng, A.: Web Question Answering: Is More Always Better? In: Proceedings of ACM Conference on Information Retrieval. ACM, New York (2002)

    Google Scholar 

  3. Lyman, P., Varian, H.R.: How Much Information?, School of Information Management and Systems, at the University of California at Berkeley (2000), [WWW] http://www.sims.berkeley.edu/research/projects/how-much-info/ (February 2005)

  4. National Science Foundation. NSF Announces $30 Million Program in Cyber Trust. NSF Web site (2003), [WWW], http://www.nsf.gov/od/lpa/news/03/pr03133.htm (February 2004)

  5. Roussinov, D., Chen, H.: Information navigation on the web by clustering and summarizing query results. Information Processing and Management 37(6), 789–816 (2001)

    Article  MATH  Google Scholar 

  6. Roussinov, D., Robles-Flores, J.A.: Web Question Answering: Technology and Business Applications. In: Proceedings of the Tenth AMCIS, NY, USA, August 6-8, pp. 3248–3254 (2004)

    Google Scholar 

  7. Swartz, J.: Hackers hijack federal computers. USA Today (2004), http://www.usatoday.com/tech/news/computersecurity/2004-08-30-cyber-crime_x.htm

  8. Turetken, O., Sharda, R.: Development of A Fisheye-Based Information Search Processing Aid (FISPA) For Managing Information Overload In The Web Environment. Decision Support Systems 37(3), 415–434 (2004)

    Article  Google Scholar 

  9. Verton, D., Verton, D.: Black Ice: The Invisible Threat of Cyber-Terrorism. McGraw-Hill Osborne Media, Emeryville (2003)

    Google Scholar 

  10. Voorhees, E., Buckland, L. (eds.): Proceedings of the Twelfth Text REtrieval Conference TREC, Gaithersburg, Maryland, USA, NIST, November 18-21 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roussinov, D., Robles-Flores, J.A. (2005). How Question Answering Technology Helps to Locate Malevolent Online Content. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_37

Download citation

  • DOI: https://doi.org/10.1007/11427995_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics