Event-Driven Document Selection for Terrorism Information Extraction

  • Zhen Sun
  • Ee-Peng Lim
  • Kuiyu Chang
  • Teng-Kwee Ong
  • Rohan Kumar Gunaratna
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3495)


In this paper, we examine the task of extracting information about terrorism related events hidden in a large document collection. The task assumes that a terrorism related event can be described by a set of entity and relation instances. To reduce the amount of time and efforts in extracting these event related instances, one should ideally perform the task on the relevant documents only. We have therefore proposed some document selection strategies based on information extraction (IE) patterns. Each strategy attempts to select one document at a time such that the gain of event related instance information is maximized. Our IE-based document selection strategies assume that some IE patterns are given to extract event instances. We conducted some experiments for one terrorism related event. Experiments have shown that our proposed IE based document selection strategies work well in the extraction task for news collections of various size.


Information extraction document selection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Finn, A., Kushmerick, N.: Active learning selection strategies for information extraction. In: Proceedings of ATEM (2003)Google Scholar
  2. 2.
    Soderland, S., Fisher, D., Aseltine, J., Lehnert, W.: Crystal: Inducing a conceptual dictionary. In: Proceedings of the 14th IJCAI (1995)Google Scholar
  3. 3.
    Fellbaum, C.: Wordnet: An electronic lexical database. MIT Press, Cambridge (1998)zbMATHGoogle Scholar
  4. 4.
    Maynard, D., Tablan, V., Ursu, C., Cunningham, H., Wilks, Y.: Named entity recognition from diverse text types. In: Proceedings of Natural Language Processing 2001 Conference (2001)Google Scholar
  5. 5.
    Huffman, S.: Learning information extraction patterns from examples. In: Proceedings of IJCAI 1995 Workshop on new approaches to learning for natural language processing (1995)Google Scholar
  6. 6.
    Riloff, E.: Automatically constructing a dictionary form information extraction tasks. In: Proceedings of the 11th National Conference on Artificial Intenlligence (1993)Google Scholar
  7. 7.
    Riloff, E.: Automatically generating extraction patterns from untagged text. In: Proceedings of the 13th National Conference on Artificial Intenlligence (1996)Google Scholar
  8. 8.
    Riloff, E., Jones, R.: Learning dictionaries for information extraction by multi-level bootstrapping. In: Proceedings of the 16th National Conference on Artificial Intenlligence (1999)Google Scholar
  9. 9.
    Thelen, M., Riloff, E.: A bootstrapping method for learning semantic lexicons using extraction pattern contexts. In: Proceedings of the 2002 Conference on Empirical Methods in Natural Language Processing (2002)Google Scholar
  10. 10.
    Agichtein, E., Gravano, L.: Snowball: Extracting relations from large plain-text collections. In: Proceedings of the Fifth ACM International Conference on Digital Libraries (2000)Google Scholar
  11. 11.
    Allan, J., Papka, R., Lavrenko, V.: On-line new event detection and tracking. In: Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval (1998)Google Scholar
  12. 12.
    Kumaran, G., Allan, J.: Text classification and named entities for new event detection. In: Proceedings of the 27th annual international conference on Research and development in information retrieval (2004)Google Scholar
  13. 13.
    Wei, C.P., Lee, Y.H.: Event detection from online news documents for supporting environmental scanning. Decis. Support Syst. 36, 385–401 (2004)CrossRefGoogle Scholar
  14. 14.
    Michael, C., Xu, J., Chen, H.: Extracting Meaningful Entities from Police Narrative Reports. In: Proceedings of the National Conference for Digital Government Research (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Zhen Sun
    • 1
  • Ee-Peng Lim
    • 1
  • Kuiyu Chang
    • 1
  • Teng-Kwee Ong
    • 2
  • Rohan Kumar Gunaratna
    • 2
  1. 1.Centre for Advanced Information Systems, School of Computer EngineeringNanyang Technological UniversitySingaporeSingapore
  2. 2.International Center for Political Violence and Terrorism Research, Institute of Defence and Strategic StudiesNanyang Technological UniversitySingaporeSingapore

Personalised recommendations