Abstract
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Cookbook” teaching how to make weapons, home made bombs, and poisons, keeps re-appearing in various places. Some websites teach how to break into computer networks to steal passwords and credit card information. Law enforcement, security experts, and public watchdogs started to locate, monitor, and act when such malevolent content surfaces on the Internet. Since the resources of law enforcement are limited, it may take some time before potentially malevolent content is located, enough for it to disseminate and cause harm. The only practical way for searching the content of the Internet, available for law enforcement, security experts, and public watchdogs is by using a search engine, such as Google, AOL, MSN, etc. We have suggested and empirically evaluated an alternative technology (automated question answering or QA) capable of locating potentially malevolent online content. We have implemented a proof-of-concept prototype that is capable of finding web pages that provide the answers to given questions (e.g. “How to build a pipe bomb?”). Using students as subjects in a controlled experiment, we have empirically established that our QA prototype finds web pages that are more likely to provide answers to given questions than simple keyword search using Google. This suggests that QA technology can be a good replacement or an addition to the traditional keyword searching for the task of locating malevolent online content and, possibly, for a more general task of interactive online information exploration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brin, S., Page, L.: The Anatomy of a Large Scale Hypertextual Web Search Engine. Stanford technical report. Stanford Database Group Publication Server (1998), http://dbpubs.stanford.edu:8090/pub/showDoc.Fulltext?lang=en&doc=1998-8&format=pdf&compression=
Dumais, S., Banko, M., Brill, E., Lin, J., Ng, A.: Web Question Answering: Is More Always Better? In: Proceedings of ACM Conference on Information Retrieval. ACM, New York (2002)
Lyman, P., Varian, H.R.: How Much Information?, School of Information Management and Systems, at the University of California at Berkeley (2000), [WWW] http://www.sims.berkeley.edu/research/projects/how-much-info/ (February 2005)
National Science Foundation. NSF Announces $30 Million Program in Cyber Trust. NSF Web site (2003), [WWW], http://www.nsf.gov/od/lpa/news/03/pr03133.htm (February 2004)
Roussinov, D., Chen, H.: Information navigation on the web by clustering and summarizing query results. Information Processing and Management 37(6), 789–816 (2001)
Roussinov, D., Robles-Flores, J.A.: Web Question Answering: Technology and Business Applications. In: Proceedings of the Tenth AMCIS, NY, USA, August 6-8, pp. 3248–3254 (2004)
Swartz, J.: Hackers hijack federal computers. USA Today (2004), http://www.usatoday.com/tech/news/computersecurity/2004-08-30-cyber-crime_x.htm
Turetken, O., Sharda, R.: Development of A Fisheye-Based Information Search Processing Aid (FISPA) For Managing Information Overload In The Web Environment. Decision Support Systems 37(3), 415–434 (2004)
Verton, D., Verton, D.: Black Ice: The Invisible Threat of Cyber-Terrorism. McGraw-Hill Osborne Media, Emeryville (2003)
Voorhees, E., Buckland, L. (eds.): Proceedings of the Twelfth Text REtrieval Conference TREC, Gaithersburg, Maryland, USA, NIST, November 18-21 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roussinov, D., Robles-Flores, J.A. (2005). How Question Answering Technology Helps to Locate Malevolent Online Content. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_37
Download citation
DOI: https://doi.org/10.1007/11427995_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)