A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan

  • Jau-Hwang Wang
  • Tianjun Fu
  • Hong-Ming Lin
  • Hsinchun Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)


This paper examines the “Gray Web Forums” in Taiwan. We study their characteristics and develop an analysis framework for assisting investigations on forum communities. Based on the statistical data collected from online forums, we found that the relationship between a posting and its responses is highly correlated to the forum nature. In addition, hot threads extracted based on the proposed metric can be used to assist analysts in identifying illegal or inappropriate contents. Furthermore, members’ roles and activities in a virtual community can be identified by member level analysis.


Virtual Community Online Forum Internet Forum Crime Investigation Bulletin Board System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wang, J.H.: Cyber Forensics – Issues and Approaches, book chapter in book: Managing Cyber Threats: Issues, Approaches and Challenge. In: Kumar, et al. (eds.). Kluwer Academic Publishers, Dordrecht (2005)Google Scholar
  2. 2.
    Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth Heinemann, Butterworth (2003)Google Scholar
  3. 3.
    Zhou, Y., Reid, E., Qin, J., Lai, G., Chen, H.: U.S. Domestic Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems, Special Issue on Artificial Intelligence for National and Homeland Security 20(5), 44–51 (2005)Google Scholar
  4. 4.
    Chen, H.: The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the Dark Web and Terrorism Research Resources. Presented at the Sandia National Laboratories, August 14 (2003)Google Scholar
  5. 5.
    Elison, W.: Netwar: Studying Rebels on the Internet. The Social Studies 91, 127–131 (2000)CrossRefGoogle Scholar
  6. 6.
    Tsfati, Y., Weimann, G.: Terror on the Internet, Studies in Conflict & Terrorism 25, 317-332 (2002),
  7. 7.
    Weimann, G.: How Modern Terrorism Uses the Internet, Special Report 116, U.S. Institute of Peace (2004),
  8. 8.
    Wang, J.H., et al.: A study of Automatic Search System on Cyber Crimes. Research Report to Telecommunication Bureau, Ministry of Traffic and Communication, Taiwan (1999)Google Scholar
  9. 9.
    Dringus, L.P., Ellis, T.: Using Data Mining as a Strategy for Assessing Asynchronous Discussion Forums. Computer & Education 45, 141–160 (2004)CrossRefGoogle Scholar
  10. 10.
  11. 11.
    Bock, W.: Christmas, Communities, and CyberspaceGoogle Scholar
  12. 12.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jau-Hwang Wang
    • 1
  • Tianjun Fu
    • 2
  • Hong-Ming Lin
    • 1
  • Hsinchun Chen
    • 2
  1. 1.Department of Information ManagementCentral Police UniversityTao-YuanTaiwan, ROC
  2. 2.Department of Management Information SystemsThe University of ArizonaTucsonUSA

Personalised recommendations