Skip to main content

Data Analysis and Prediction of Terror Component Using Web Services

  • Conference paper
  • First Online:
Intelligent and Cloud Computing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 153))

  • 960 Accesses

Abstract

Analyzing terrorist activities are crucial not only for the sake of safety but also for the growth of any country. But handling and identifying the terror activity is a big challenge nowadays, where Internet-based services already captured the world, which helps them spreading rumors and fake news for terrifying normal citizen as well as motivating them for wrong goals. Here in this paper, we discussed some means for collecting the data from Webs and trying to analysis to find out such kinds of sources of terrifying entities; for doing this, we have used some techniques like case study, usage data, surveys, interviews, focus groups, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gundabathula, V.T., Vaidhehi, V.: An efficient modelling of terrorist groups in India using machine learning algorithms. Indian J. Sci. Technol. 11(15) (2018)

    Google Scholar 

  2. Goteng, G.L., Tao, X.: Cloud computing intelligent data-driven model: connecting the dots to combat global terrorism. In: 2016 IEEE International Congress on Big Data (BigData Congress), San Francisco, pp. 446–453 (2016)

    Google Scholar 

  3. Talreja, D., Nagaraj, J., Varsha, N.J., Mahesh, K.: Terrorism analytics: learning to predict the perpetrator. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, pp. 1723–1726 (2017). https://doi.org/10.1109/icacci.2017.8126092

  4. Mahmood, T., Rohail, K.: Analyzing terrorist events in Pakistan to support counter-terrorism-Events, methods and targets. In: 2012 International Conference on 2012 Robotics and Artificial Intelligence (ICRAI), pp. 157–164

    Google Scholar 

  5. Corner, E., Gill, P., Mason, O.: Mental health disorders and the terrorist: a research note probing selection effects and disorder prevalence. Stud. Confl. Terrorism 39(6), 560–568 (2016)

    Article  Google Scholar 

  6. Gutfraind, A.: Understanding terrorist organizations with a dynamic model. In: Mathematical Methods in Counterterrorism 2009, pp. 107–125. Springer, Vienna

    Google Scholar 

  7. Chung, W., Tang, W.: Building a web collection for online surveillance of US domestic terrorism. In: 2012 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 195–195. IEEE (2012)

    Google Scholar 

  8. Perliger, A., Pedahzur, A.: Social network analysis in the study of terrorism and political violence. Polit. Sci. Polit. 44(1), 45–50 (2011)

    Google Scholar 

  9. Crenshaw, M.: Current research on terrorism: the academic perspective. Stud. Confl. Terrorism 15(1), 1–11 (1992)

    Article  Google Scholar 

  10. Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)

    Google Scholar 

  11. Horgan, J.: From profiles to pathways and roots to routes: perspectives from psychology on radicalization into terrorism. Ann. Am. Acad. Polit. Soc. Sci. 618(1), 80–94 (2008)

    Article  Google Scholar 

  12. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press (1994)

    Google Scholar 

  13. Mishra, N., Swagatika, S., Singh, D.: An intelligent framework for analysing terrorism actions using cloud. In: Patnaik, S., Ip, A., Tavana, M., Jain, V. (eds.) New Paradigm in Decision Science and Management. Advances in Intelligent Systems and Computing, vol. 1005. Springer, Singapore (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shrabanee Swagatika .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Swagatika, S., Panda, B., Singh, D., Tripathy, A. (2021). Data Analysis and Prediction of Terror Component Using Web Services. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds) Intelligent and Cloud Computing. Smart Innovation, Systems and Technologies, vol 153. Springer, Singapore. https://doi.org/10.1007/978-981-15-6202-0_4

Download citation

Publish with us

Policies and ethics