-
1
-
-
33744926852
-
Jihad Online: Islamic Terrorists and the Internet, retrieved
-
March 26, from http://_online.pdf
-
Anti-Defamation League. (2002). Jihad Online: Islamic Terrorists and the Internet, retrieved March 26, 2008 from http://www.adl.org/internet/ jihad_online.pdf.
-
(2002)
-
-
League, A.-D.1
-
2
-
-
85068337433
-
Web posting may provide insight into Iraq insurgency
-
November 23, retrieved March 26, 2008 from
-
Blakemore, B. (November 23, 2004). Web posting may provide insight into Iraq insurgency. ABC News, retrieved March 26, 2008 from http://abcnews.go.com/ WNT/story?id=277421.
-
(2004)
ABC News
-
-
Blakemore, B.1
-
3
-
-
45849118857
-
-
Carley, Kathleen M. Ju-Sung Lee and David Krackhardt, 2001, Destabilizing Networks, Connections, 24(3): 31-34.
-
Carley, Kathleen M. Ju-Sung Lee and David Krackhardt, 2001, Destabilizing Networks, Connections, 24(3): 31-34.
-
-
-
-
4
-
-
0003780340
-
Graphical methods for data analysis
-
Boston, MA
-
Chambers, J., Cleveland, W., Kleiner, B., & Tukey, P. (1983). Graphical methods for data analysis. Wadsworth International Group (Belmont, CA) and Duxbury Press (Boston, MA).
-
(1983)
Wadsworth International Group (Belmont, CA) and Duxbury Press
-
-
Chambers, J.1
Cleveland, W.2
Kleiner, B.3
Tukey, P.4
-
5
-
-
13844256457
-
Introduction to the special topic issue: Intelligence and security informatics
-
Chen, H. (2005). Introduction to the special topic issue: Intelligence and security informatics. Journal of the American Society for Information Science and Technology, 56(3), 217-220.
-
(2005)
Journal of the American Society for Information Science and Technology
, vol.56
, Issue.3
, pp. 217-220
-
-
Chen, H.1
-
6
-
-
33747561646
-
Web mining: Machine learning for Web applications
-
M. E. Williams Ed, Medford, NJ: Information Today, Inc
-
Chen, H., & Chau, M. (2004). Web mining: Machine learning for Web applications. In M. E. Williams (Ed.), Annual review of information science and technology (Vol. 38, pp. 289-329). Medford, NJ: Information Today, Inc.
-
(2004)
Annual review of information science and technology
, vol.38
, pp. 289-329
-
-
Chen, H.1
Chau, M.2
-
7
-
-
0035498531
-
MetaSpider: Meta-searching and categorization on the Web
-
Chen, H., Fan, H., Chau, M., & Zeng, D. (2001). MetaSpider: Meta-searching and categorization on the Web. Journal of the American Society for Information Science and Technology, 52(13), 1134-1147.
-
(2001)
Journal of the American Society for Information Science and Technology
, vol.52
, Issue.13
, pp. 1134-1147
-
-
Chen, H.1
Fan, H.2
Chau, M.3
Zeng, D.4
-
8
-
-
0030104572
-
Internet categorization and search: A self-organizing approach
-
Chen, H., Schuffels. C., & Orwig, R. (1996). Internet categorization and search: A self-organizing approach. Journal of Visual Communication and Image Representation, 7(1), 88-102.
-
(1996)
Journal of Visual Communication and Image Representation
, vol.7
, Issue.1
, pp. 88-102
-
-
Chen, H.1
Schuffels, C.2
Orwig, R.3
-
9
-
-
45849087851
-
Visualizing E-Business Stakeholders on the Web: A Methodology and Experimental Results
-
Chung, W. (2008). Visualizing E-Business Stakeholders on the Web: A Methodology and Experimental Results. International Journal of Electronic Business, 6(1), 2008, 25-46.
-
(2008)
International Journal of Electronic Business
, vol.6
, Issue.1
, pp. 25-46
-
-
Chung, W.1
-
10
-
-
10644268659
-
Evaluating event visualization: A usability study of COPLINK Spatio-Temporal Visualizer
-
Chung, W., Chen, H., Chaboya, L.G., O'Toole, C., & Atabakhsh, H. (2005). Evaluating event visualization: A usability study of COPLINK Spatio-Temporal Visualizer. International Journal of Human-Computer Studies. 62(1), 127-157.
-
(2005)
International Journal of Human-Computer Studies
, vol.62
, Issue.1
, pp. 127-157
-
-
Chung, W.1
Chen, H.2
Chaboya, L.G.3
O'Toole, C.4
Atabakhsh, H.5
-
11
-
-
21044443622
-
A visual framework for knowledge discovery on the Web: An empirical study on business intelligence exploration
-
Chung, W., Chen, H., & Nunamaker, J.F. (2005). A visual framework for knowledge discovery on the Web: An empirical study on business intelligence exploration. Journal of Management Information Systems, 21(4), 57-84.
-
(2005)
Journal of Management Information Systems
, vol.21
, Issue.4
, pp. 57-84
-
-
Chung, W.1
Chen, H.2
Nunamaker, J.F.3
-
12
-
-
3042644962
-
Internet searching and browsing in a multilingual world: An experiment on the Chinese business intelligence portal (CBizPort)
-
Chung, W., Zhang, Y. Huang. Z., Wang, G., Ong, T.-H., & Chen, H. (2004). Internet searching and browsing in a multilingual world: An experiment on the Chinese business intelligence portal (CBizPort). Journal of the American Society for Information Science and Technology, 55(9), 818-831.
-
(2004)
Journal of the American Society for Information Science and Technology
, vol.55
, Issue.9
, pp. 818-831
-
-
Chung, W.1
Zhang, Y.2
Huang, Z.3
Wang, G.4
Ong, T.-H.5
Chen, H.6
-
13
-
-
0141766680
-
-
The United States Government, retrieved March 26, 2008 from
-
Department of State. (2003). Patterns of Global Terrorism 2002: The United States Government, retrieved March 26, 2008 from http://www.state.gov/s/ ct/rls/crt/2002/.
-
(2003)
Patterns of Global Terrorism 2002
-
-
-
14
-
-
45849129212
-
-
Encyclopedia Britannica Online. (2007). Jihad. Retrieved March 26, 2008 from http://www.britannica.com/ebc/article-9368558, Britannica Concise Encyclopedia.
-
Encyclopedia Britannica Online. (2007). Jihad. Retrieved March 26, 2008 from http://www.britannica.com/ebc/article-9368558, Britannica Concise Encyclopedia.
-
-
-
-
15
-
-
0030401739
-
The contributions of organizational science to the development of decision support systems research subspecialties
-
Eom, S.B., & Farris, R.S. (1996). The contributions of organizational science to the development of decision support systems research subspecialties. Journal of the American Society for Information Science, 47(12), 941-952.
-
(1996)
Journal of the American Society for Information Science
, vol.47
, Issue.12
, pp. 941-952
-
-
Eom, S.B.1
Farris, R.S.2
-
16
-
-
0030288690
-
The World Wide Web: Quagmire or gold mine?
-
Etzioni, O. (1996). The World Wide Web: Quagmire or gold mine? Communications of the ACM, 39(11), 65-68.
-
(1996)
Communications of the ACM
, vol.39
, Issue.11
, pp. 65-68
-
-
Etzioni, O.1
-
17
-
-
0011016060
-
Cyber-attacks by Al Qaeda feared
-
June 27, retrieved March 26, 2008 from
-
Gellman, B. (June 27, 2002). Cyber-attacks by Al Qaeda feared. Washington Post, page A01, retrieved March 26, 2008 from http://www.washingtonpost.com/ ac2/wp-dyn/A50765-2002Jun26.
-
(2002)
Washington Post
-
-
Gellman, B.1
-
18
-
-
0036643003
-
Mining a Web citation database for author co-citation analysis
-
He, Y., & Hui, S.C. (2002). Mining a Web citation database for author co-citation analysis. Information Processing and Management, 38(4), 491-508.
-
(2002)
Information Processing and Management
, vol.38
, Issue.4
, pp. 491-508
-
-
He, Y.1
Hui, S.C.2
-
19
-
-
0035655608
-
Knowledge maps and their use in computer-based collaborative learning
-
Kealy, W.A. (2001). Knowledge maps and their use in computer-based collaborative learning. Journal of Educational Computing Research, 25(4), 325-349.
-
(2001)
Journal of Educational Computing Research
, vol.25
, Issue.4
, pp. 325-349
-
-
Kealy, W.A.1
-
20
-
-
34547250715
-
-
July 10, USA Today, retrieved March 26, 2008 from
-
Kelley, J. (July 10, 2002). Militants Wire Web With Links to Jihad. USA Today, retrieved March 26, 2008 from http://www.usatoday.com/news/world/2002/07/ 10/web-terror-cover.htm.
-
(2002)
Militants Wire Web With Links to Jihad
-
-
Kelley, J.1
-
21
-
-
0038401985
-
Mapping network of terrorist cells
-
Krebs, V.E. (2001). Mapping network of terrorist cells. Connections, 24(3), 43-52.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 43-52
-
-
Krebs, V.E.1
-
22
-
-
79955046342
-
Public Organizations on the World Wide Web: Empirical Correlates of Administrative Openness
-
Paper presented at the, College Station, TX
-
La Porte, T. M., Jong, M. d., & Demchak, C. C. (1999). Public Organizations on the World Wide Web: Empirical Correlates of Administrative Openness. Paper presented at the Proceedings of the 5th National Public Management Research conference, College Station, TX.
-
(1999)
Proceedings of the 5th National Public Management Research conference
-
-
La Porte, T.M.1
Jong, M.D.2
Demchak, C.C.3
-
23
-
-
33745780530
-
Multi-Lingual Detection of Terrorist Content on the Web
-
Paper presented at the, Singapore, Springer, Berlin, Heidelberg, pp
-
Last, M., Markov, A., & Kandel, A. (2006). Multi-Lingual Detection of Terrorist Content on the Web. Paper presented at the Proceedings of the PAKDD'06 International Workshop on Intelligence and Security Informatics, Singapore, Springer, Berlin / Heidelberg, pp. 16-30.
-
(2006)
Proceedings of the PAKDD'06 International Workshop on Intelligence and Security Informatics
, pp. 16-30
-
-
Last, M.1
Markov, A.2
Kandel, A.3
-
24
-
-
3843139336
-
EBizPort: Collecting and analyzing business intelligence information
-
Marshall, B., McDonald, D., Chen, H., & Chung, W. (2004). EBizPort: collecting and analyzing business intelligence information. Journal of the American Society for Information and Science and Technology, 55(10), 873-891.
-
(2004)
Journal of the American Society for Information and Science and Technology
, vol.55
, Issue.10
, pp. 873-891
-
-
Marshall, B.1
McDonald, D.2
Chen, H.3
Chung, W.4
-
25
-
-
45849084417
-
-
Middle East Media Research Institute, Retrieved March 2004, retrieved March 26, 2008 from
-
Middle East Media Research Institute. (2004). Jihad and Terrorism Studies Project. Retrieved March 2004, retrieved March 26, 2008 from http://www.memri.org/jihad.html.
-
(2004)
Jihad and Terrorism Studies Project
-
-
-
27
-
-
0035217671
-
Text analysis and knowledge mining system
-
Nasukawa, T., & Nagano, T. (2001). Text analysis and knowledge mining system. IBM Systems Journal, 40(4), 967-984.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.4
, pp. 967-984
-
-
Nasukawa, T.1
Nagano, T.2
-
28
-
-
85037336663
-
Video appears to show beheading of American civilian
-
May 11
-
Newman, M. (2004, May 11). Video appears to show beheading of American civilian. The New York Times.
-
(2004)
The New York Times
-
-
Newman, M.1
-
29
-
-
4243116398
-
Countering terrorism through information technology
-
Popp, R., Armour, T., Senator, T., & Numrych, K. (2004). Countering terrorism through information technology. Communications of the ACM, 47(3), 36-43.
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
, pp. 36-43
-
-
Popp, R.1
Armour, T.2
Senator, T.3
Numrych, K.4
-
30
-
-
45849139490
-
-
Project for the Research of Islamist Movements, retrieved March 26, 2008 from
-
Project for the Research of Islamist Movements. (2004). PRISM, 2004, retrieved March 26, 2008 from http://www.e-prism.org.
-
(2004)
PRISM
, pp. 2004
-
-
-
31
-
-
84903667395
-
-
Philadelphia, PA: University of Pennsylvania Press
-
Sageman, M. (2004). Understanding terror networks. Philadelphia, PA: University of Pennsylvania Press.
-
(2004)
Understanding terror networks
-
-
Sageman, M.1
-
32
-
-
13844272147
-
Technology, security, and individual privacy: New tools, new threats, and new public perceptions
-
Strickland, L.S., & Hunt, L.E. (2005). Technology, security, and individual privacy: New tools, new threats, and new public perceptions. Journal of the American Society for Information Science and Technology, 56(3), 221-234.
-
(2005)
Journal of the American Society for Information Science and Technology
, vol.56
, Issue.3
, pp. 221-234
-
-
Strickland, L.S.1
Hunt, L.E.2
-
33
-
-
24944576133
-
-
Technical Analysis Group, Hanover, NH: Institute for Security Technology Studies at Dartmouth College
-
Technical Analysis Group. (2004). Examining the cyber capabilities of Islamic terrorist groups. Hanover, NH: Institute for Security Technology Studies at Dartmouth College.
-
(2004)
Examining the cyber capabilities of Islamic terrorist groups
-
-
-
34
-
-
85048941387
-
Al Qaeda and the Internet: The danger of cyberplanning
-
Spring
-
Thomas, T.L. (2003, Spring). Al Qaeda and the Internet: The danger of cyberplanning. Parameters, 112-123.
-
(2003)
Parameters
, pp. 112-123
-
-
Thomas, T.L.1
-
35
-
-
0033474337
-
Text mining
-
M.E. Williams Ed, Medford, NJ: Information Today, Inc
-
Trybula, W.J. (1999). Text mining. In M.E. Williams (Ed.), Annual review of information science and technology (Vol. 34, pp. 385-419). Medford, NJ: Information Today, Inc.
-
(1999)
Annual review of information science and technology
, vol.34
, pp. 385-419
-
-
Trybula, W.J.1
-
36
-
-
85023972678
-
retrieved March 26, 2008 from http://www.terrorism.com/, Terror on the Internet
-
Tsfati, Y., & Weimann, G. (2002). retrieved March 26, 2008 from http://www.terrorism.com/, Terror on the Internet. Studies in Conflict & Terrorism, 25, 317-332.
-
(2002)
Studies in Conflict & Terrorism
, vol.25
, pp. 317-332
-
-
Tsfati, Y.1
Weimann, G.2
-
37
-
-
20344376408
-
Criminal network analysis and visualization
-
Xu, J., & Chen, H. (2005). Criminal network analysis and visualization. Communications of the ACM, 48(6), 100-107.
-
(2005)
Communications of the ACM
, vol.48
, Issue.6
, pp. 100-107
-
-
Xu, J.1
Chen, H.2
-
39
-
-
10044285723
-
-
Zhu, B., & Chen, H. (2005). Chapter 4: Information Visualization. In B. Cronin (Ed.), Annual Review of Information Science and Technology (39, pp. 139-177). Medford, NJ: Information Today, Inc.
-
Zhu, B., & Chen, H. (2005). Chapter 4: Information Visualization. In B. Cronin (Ed.), Annual Review of Information Science and Technology (Vol. 39, pp. 139-177). Medford, NJ: Information Today, Inc.
-
-
-
|