Terrorism Informatics: Knowledge Management And Data Mining For Homeland Security

Read Complete Research Material



Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security

By

Table of Contents

CHAPTER O1: INTRODUCTION6

Introduction6

Rationale for Research7

Research Background10

Aims and Objectives of the Research14

Aims of the Study14

Objectives of the Study15

Obstacles in Conducting Research on Terrorism15

Significance of Research16

Ethical Considerations17

Chapter Summary18

CHAPTER 02: LITERATURE REVIEW20

Introduction20

Discussion20

Terrorism Informatics21

Data Minning and Knowledge Management22

Knowledge Management and Data Mining23

Techniques Used for Data Mining24

Challenges and Trends in Data Mining25

Data Mining and Knowledge Management in United States25

Variegated Problems in Terrorism Databases26

Problems Faced in Terrorism Research27

Problems in Terrorism Databases28

Various Approaches of Terrorism Databases30

Approaches of Web Mining31

Approach of Web Mining in the Perspective of Jihad on Web32

Analysis of Content of the Videos32

Homeland Security and Terrorism34

NATO Intervention on Global Terrorism35

Approaches Useful To Homeland Security39

Chapter Summary39

CHAPTER 03: METHODOLOGY41

Introduction41

Research Method41

Research Design42

Data Collection43

Sampling44

Recording Data45

Pre Test46

Post Test46

Data Analysis and Interpretations47

Measuring Perception of Terrorism Informatics49

Validity and Reliability49

Ethical Concerns50

Summary51

CHAPTER 04: ANALYSIS AND DISCUSSION52

Introduction52

Interview Analysis53

Link Analysis54

Content Analysis57

Privacy Preserving Data Mining (PPDM) Approach59

Conclusion60

CHAPTER 05: CONCLUSION62

Introduction62

Conclusion62

Recent Active Terrorist Impact on Security and Information Systems63

Cyber Terrorism65

Terrorist Organizations67

The Activity of Terrorists67

The Destruction of the Network of Terrorist Cells69

Deprivation of Terrorist Bases in the Form of Public Support70

Conducting Military Operations and Repression70

The Use of Modern Information Technology71

Insecurity of Information in the Context of a Nation71

Chapter Summary73

References74

CHAPTER O1: INTRODUCTION

Introduction

This first chapter of introduction can be considered as the nub of the whole research paper. This chapter provides introduction about the research. This chapter acts as the road map for the whole research. This chapter entails what the research is going to be all about. It is this chapter where the concrete purpose and objectives of the research are iterated explicitly. This chapter first of all provides a brief introduction about the topic of the research. After introducing the topic the background or the roots are discussed from where the topic of the research is derived. The purpose of describing the background and to undertake discussion about the roots of the topic is to develop complete grasp and understanding about the research topic. After that the most imperative part of the paper comes that is the description of the aims and objectives of the research. In this section of aims and objectives, the purpose of the research is mentioned. It is this section of research paper on the basis of which this chapter can be considered as the road map of the entire research. The section of aims and objectives is referred to as the road map of the research because by providing the aims and objectives this section provides provide a direction to the process of research.

Besides discussing the above imperative points there are some other issues are also mentioned in this chapter such as the different obstacles that may come in the way of research. These are the factors that can impede the researcher to fully explore and completely accomplish the goals of the research. Ethical considerations are also listed down in this chapter. One of the intriguing factors that is defined in this chapter is about the significance of the study. Every research that is conducted is aimed to provide certain advantages which in turn ...
Related Ads