TY - JOUR
T1 - Intelligence and security informatics for homeland security
T2 - Information, communication, and transportation
AU - Chen, Hsinchun
AU - Wang, Fei Yue
AU - Zeng, Daniel
N1 - Funding Information:
Manuscript received December 1, 2003; revised July 16, 2004 and July 31, 2004. This work was supported in part by the National Science Foundation under Grants EIA-9983304, EIA-0326348, and KDD 9983304; by the Department of Homeland Security and Corporation for National Research Initiatives (CNRI) under the “Border Safe” initiative; by the Outstanding Young Scientist Research Program under Grant 60125310; by the Key Project on Networked Systems under Grant 60334020; by the National Natural Science Foundation; by a 973 Project under Grant 2002CB312200 from the Ministry of Science and Technology; by a Shandong 863 Project under Grant 030335 from Shandong Provincial Government; and by Grant #ORP-0303 for open research projects from the Key Laboratory of Complex Systems and Intelligence Science, Chinese Academy of Sciences, China. The Associate Editor for this paper was S. Tang.
Funding Information:
Many existing computer and information systems techniques need to be re-examined and adapted for homeland-security applications. New insights from this unique domain could result in significant breakthroughs in data mining, visualization, knowledge management, and information security techniques and systems. For example, social network analysis technologies and methodologies could be adopted to help the intelligence community to detect planned future attacks and to uncover and understand Bin Laden’s terrorist networks. Visual data-mining techniques, such as association rules and multidimensional information visualization, could be used to identify criminal relationships. Record linkage and string comparator algorithms could be useful for criminal identity-deception detection. Practical and novel information technologies, techniques, methods, practices, and systems that can contribute to knowledge in this important emerging field are critically needed, including but not limited to areas such as • information sharing and system interoperability; • knowledge discovery and knowledge management; • criminal data mining, social network analysis, and event detection; • multimedia and multilingual intelligence and security in-formation analysis; • Web-based intelligence monitoring and analysis; • deception detection systems; • intrusion detection systems and information awareness; • cybercrime detection and analysis; • agents and collaborative systems for intelligence sharing; • crime and intelligence visualization; • bioterrorism tracking, alerting, and analysis; • major disaster prevention, detection, and management (in-cluding related intelligent transportation systems applica-tions and route planning). Academic meetings have begun to emerge to encourage research and discussions among previous disparate research and practitioner communities in ISI-related areas. The symposium series on Intelligence and Security Informatics (http://ecom.arizona.edu/ISI) is such an example. The proceedings of these symposia and several special issues on ISI in academic journals also provide snapshots of the current state of the art in ISI research [3]–[6]. ISI-related research also is the focus of several federal programs, including the Knowledge Discovery and Dissemination Program, jointly managed by the National Science Foundation (NSF) and the Intelligence Technology Innovation Center, and the Information Technology Research program/National and Homeland Security priority area, funded by the NSF.
PY - 2004/12
Y1 - 2004/12
N2 - Intelligence and security informatics (ISI) is an emerging field of study aimed at developing advanced information technologies, systems, algorithms, and databases for national- and homeland-security-related applications, through an integrated technological, organizational, and policy-based approach. This paper summarizes the broad application and policy context for this emerging field. Three detailed case studies are presented to illustrate several key ISI research areas, including cross-jurisdiction information sharing; terrorism information collection, analysis, and visualization; and "smart-border" and bioterrorism applications. A specific emphasis of this paper is to note various homeland-security-related applications that have direct relevance to transportation researchers and to advocate security informatics studies that tightly integrate transportation research and information technologies.
AB - Intelligence and security informatics (ISI) is an emerging field of study aimed at developing advanced information technologies, systems, algorithms, and databases for national- and homeland-security-related applications, through an integrated technological, organizational, and policy-based approach. This paper summarizes the broad application and policy context for this emerging field. Three detailed case studies are presented to illustrate several key ISI research areas, including cross-jurisdiction information sharing; terrorism information collection, analysis, and visualization; and "smart-border" and bioterrorism applications. A specific emphasis of this paper is to note various homeland-security-related applications that have direct relevance to transportation researchers and to advocate security informatics studies that tightly integrate transportation research and information technologies.
KW - Border and transportation security
KW - Homeland security
KW - Infectious disease informatics
KW - Intelligence and security informatics
UR - http://www.scopus.com/inward/record.url?scp=10644280105&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=10644280105&partnerID=8YFLogxK
U2 - 10.1109/TITS.2004.837824
DO - 10.1109/TITS.2004.837824
M3 - Article
AN - SCOPUS:10644280105
SN - 1524-9050
VL - 5
SP - 329
EP - 341
JO - IEEE Transactions on Intelligent Transportation Systems
JF - IEEE Transactions on Intelligent Transportation Systems
IS - 4
ER -