IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v13y2011i1d10.1007_s10796-010-9293-6.html
   My bibliography  Save this article

Introduction to special issue on terrorism informatics

Author

Listed:
  • Hsinchun Chen

    (University of Arizona)

  • Yilu Zhou

    (George Washington University)

  • Edna F. Reid
  • Catherine A. Larson

    (University of Arizona)

Abstract

No abstract is available for this item.

Suggested Citation

  • Hsinchun Chen & Yilu Zhou & Edna F. Reid & Catherine A. Larson, 2011. "Introduction to special issue on terrorism informatics," Information Systems Frontiers, Springer, vol. 13(1), pages 1-3, March.
  • Handle: RePEc:spr:infosf:v:13:y:2011:i:1:d:10.1007_s10796-010-9293-6
    DOI: 10.1007/s10796-010-9293-6
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-010-9293-6
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-010-9293-6?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. David B. Skillicorn, 2011. "Computational approaches to suspicion in adversarial settings," Information Systems Frontiers, Springer, vol. 13(1), pages 21-31, March.
    2. Jialun Qin & Yilu Zhou & Hsinchun Chen, 2011. "A multi-region empirical study on the internet presence of global extremist organizations," Information Systems Frontiers, Springer, vol. 13(1), pages 75-88, March.
    3. Stephen C. Hayne & Lucy J. Troup & Sara A. McComb, 2011. "“Where’s Farah?”: Knowledge silos and information fusion by distributed collaborating teams," Information Systems Frontiers, Springer, vol. 13(1), pages 89-100, March.
    4. Nancy C. Roberts, 2011. "Tracking and disrupting dark networks: Challenges of data collection and analysis," Information Systems Frontiers, Springer, vol. 13(1), pages 5-19, March.
    5. Marc Cheong & Vincent C. S. Lee, 2011. "A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter," Information Systems Frontiers, Springer, vol. 13(1), pages 45-59, March.
    6. Onook Oh & Manish Agrawal & H. Raghav Rao, 2011. "Information control and terrorism: Tracking the Mumbai terrorist attack through twitter," Information Systems Frontiers, Springer, vol. 13(1), pages 33-43, March.
    7. Daniel Zeng & Donghua Wei & Michael Chau & Feiyue Wang, 2011. "Domain-specific Chinese word segmentation using suffix tree and mutual information," Information Systems Frontiers, Springer, vol. 13(1), pages 115-125, March.
    8. Sheryl Prentice & Paul J. Taylor & Paul Rayson & Andrew Hoskins & Ben O’Loughlin, 2011. "Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict," Information Systems Frontiers, Springer, vol. 13(1), pages 61-73, March.
    9. Jiexun Li & G. Alan Wang & Hsinchun Chen, 2011. "Identity matching using personal and social identity features," Information Systems Frontiers, Springer, vol. 13(1), pages 101-113, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. N. Martín & L. Pardo & K. Zografos, 2019. "On divergence tests for composite hypotheses under composite likelihood," Statistical Papers, Springer, vol. 60(6), pages 1883-1919, December.
    2. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    3. R. Ramesh & H. Raghav Rao, 2011. "Editorial," Information Systems Frontiers, Springer, vol. 13(4), pages 451-452, September.
    4. Yanxin Wang & Jian Li & Xi Zhao & Gengzhong Feng & Xin (Robert) Luo, 2020. "Using Mobile Phone Data for Emergency Management: a Systematic Literature Review," Information Systems Frontiers, Springer, vol. 22(6), pages 1539-1559, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    2. Yanxin Wang & Jian Li & Xi Zhao & Gengzhong Feng & Xin (Robert) Luo, 2020. "Using Mobile Phone Data for Emergency Management: a Systematic Literature Review," Information Systems Frontiers, Springer, vol. 22(6), pages 1539-1559, December.
    3. Ahmed Aleroud & Aryya Gangopadhyay, 2018. "Multimode co-clustering for analyzing terrorist networks," Information Systems Frontiers, Springer, vol. 20(5), pages 1053-1074, October.
    4. Jengchung Victor Chen & I-Han Lu & David C. Yen & Andree E. Widjaja, 2017. "Factors affecting the performance of internal control task team in high-tech firms," Information Systems Frontiers, Springer, vol. 19(4), pages 787-802, August.
    5. Aaron W. Baur, 0. "Harnessing the social web to enhance insights into people’s opinions in business, government and public administration," Information Systems Frontiers, Springer, vol. 0, pages 1-21.
    6. Aaron W. Baur, 2017. "Harnessing the social web to enhance insights into people’s opinions in business, government and public administration," Information Systems Frontiers, Springer, vol. 19(2), pages 231-251, April.
    7. Jengchung Victor Chen & I-Han Lu & David C. Yen & Andree E. Widjaja, 0. "Factors affecting the performance of internal control task team in high-tech firms," Information Systems Frontiers, Springer, vol. 0, pages 1-16.
    8. Fang Liu & Dongming Xu, 2018. "Social Roles and Consequences in Using Social Media in Disasters: a Structurational Perspective," Information Systems Frontiers, Springer, vol. 20(4), pages 693-711, August.
    9. Ahmed Aleroud & Aryya Gangopadhyay, 0. "Multimode co-clustering for analyzing terrorist networks," Information Systems Frontiers, Springer, vol. 0, pages 1-22.
    10. Shabir Hussain & Farrukh Shahzad & Adam Saud, 2021. "Analyzing the State of Digital Information Warfare Between India and Pakistan on Twittersphere," SAGE Open, , vol. 11(3), pages 21582440211, July.
    11. Bairong Wang & Jun Zhuang, 2018. "Rumor response, debunking response, and decision makings of misinformed Twitter users during disasters," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 93(3), pages 1145-1162, September.
    12. Avinash Samuel & Dilip Kumar Sharma, 2018. "A Novel Framework for Sentiment and Emoticon-Based Clustering and Indexing of Tweets," Journal of Information & Knowledge Management (JIKM), World Scientific Publishing Co. Pte. Ltd., vol. 17(02), pages 1-18, June.
    13. Reimer, Thomas, 2023. "Environmental factors to maximize social media engagement: A comprehensive framework," Journal of Retailing and Consumer Services, Elsevier, vol. 75(C).
    14. Li, Lifang & Zhang, Qingpeng & Tian, Jun & Wang, Haolin, 2018. "Characterizing information propagation patterns in emergencies: A case study with Yiliang Earthquake," International Journal of Information Management, Elsevier, vol. 38(1), pages 34-41.
    15. M. Elshendy & A. Fronzetti Colladon & E. Battistoni & P. A. Gloor, 2021. "Using four different online media sources to forecast the crude oil price," Papers 2105.09154, arXiv.org.
    16. Brian A Jackson & David R Frelinger & Jennifer Kavanagh & Brett A Wallace, 2021. "Adaptation by intelligent adversaries to defensive measures: framing adaptation options and demonstrating assessment of attacker preferences using proxy intelligence data," The Journal of Defense Modeling and Simulation, , vol. 18(2), pages 61-85, April.
    17. Yogesh K. Dwivedi & Gerald Kelly & Marijn Janssen & Nripendra P. Rana & Emma L. Slade & Marc Clement, 2018. "Social Media: The Good, the Bad, and the Ugly," Information Systems Frontiers, Springer, vol. 20(3), pages 419-423, June.
    18. Fry, John & Binner, Jane M., 2016. "Elementary modelling and behavioural analysis for emergency evacuations using social media," European Journal of Operational Research, Elsevier, vol. 249(3), pages 1014-1023.
    19. Irina Wedel & Michael Palk & Stefan Voß, 2022. "A Bilingual Comparison of Sentiment and Topics for a Product Event on Twitter," Information Systems Frontiers, Springer, vol. 24(5), pages 1635-1646, October.
    20. Goldstone, Jack A. (Голдстоун, Джек) & Korotaev, Andrey (Коротаев, Андрей) & Zinkina, Yulia (Зинькина, Юлия), 2015. "Political Demography of the World Economy: Tropical Africa [Политическая Демография Мировой Экономики: Страны Тропической Африки]," Published Papers mn45, Russian Presidential Academy of National Economy and Public Administration.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:13:y:2011:i:1:d:10.1007_s10796-010-9293-6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.