Abstract
Analyzing terrorist activities are crucial not only for the sake of safety but also for the growth of any country. But handling and identifying the terror activity is a big challenge nowadays, where Internet-based services already captured the world, which helps them spreading rumors and fake news for terrifying normal citizen as well as motivating them for wrong goals. Here in this paper, we discussed some means for collecting the data from Webs and trying to analysis to find out such kinds of sources of terrifying entities; for doing this, we have used some techniques like case study, usage data, surveys, interviews, focus groups, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gundabathula, V.T., Vaidhehi, V.: An efficient modelling of terrorist groups in India using machine learning algorithms. Indian J. Sci. Technol. 11(15) (2018)
Goteng, G.L., Tao, X.: Cloud computing intelligent data-driven model: connecting the dots to combat global terrorism. In: 2016 IEEE International Congress on Big Data (BigData Congress), San Francisco, pp. 446–453 (2016)
Talreja, D., Nagaraj, J., Varsha, N.J., Mahesh, K.: Terrorism analytics: learning to predict the perpetrator. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, pp. 1723–1726 (2017). https://doi.org/10.1109/icacci.2017.8126092
Mahmood, T., Rohail, K.: Analyzing terrorist events in Pakistan to support counter-terrorism-Events, methods and targets. In: 2012 International Conference on 2012 Robotics and Artificial Intelligence (ICRAI), pp. 157–164
Corner, E., Gill, P., Mason, O.: Mental health disorders and the terrorist: a research note probing selection effects and disorder prevalence. Stud. Confl. Terrorism 39(6), 560–568 (2016)
Gutfraind, A.: Understanding terrorist organizations with a dynamic model. In: Mathematical Methods in Counterterrorism 2009, pp. 107–125. Springer, Vienna
Chung, W., Tang, W.: Building a web collection for online surveillance of US domestic terrorism. In: 2012 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 195–195. IEEE (2012)
Perliger, A., Pedahzur, A.: Social network analysis in the study of terrorism and political violence. Polit. Sci. Polit. 44(1), 45–50 (2011)
Crenshaw, M.: Current research on terrorism: the academic perspective. Stud. Confl. Terrorism 15(1), 1–11 (1992)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)
Horgan, J.: From profiles to pathways and roots to routes: perspectives from psychology on radicalization into terrorism. Ann. Am. Acad. Polit. Soc. Sci. 618(1), 80–94 (2008)
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press (1994)
Mishra, N., Swagatika, S., Singh, D.: An intelligent framework for analysing terrorism actions using cloud. In: Patnaik, S., Ip, A., Tavana, M., Jain, V. (eds.) New Paradigm in Decision Science and Management. Advances in Intelligent Systems and Computing, vol. 1005. Springer, Singapore (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Swagatika, S., Panda, B., Singh, D., Tripathy, A. (2021). Data Analysis and Prediction of Terror Component Using Web Services. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds) Intelligent and Cloud Computing. Smart Innovation, Systems and Technologies, vol 153. Springer, Singapore. https://doi.org/10.1007/978-981-15-6202-0_4
Download citation
DOI: https://doi.org/10.1007/978-981-15-6202-0_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-6201-3
Online ISBN: 978-981-15-6202-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)