首页> 外文会议>International Symposium on Biometrics and Security Technologies >Data Mining, Semantic Web and Advanced Information Technologies for fighting terrorism
【24h】

Data Mining, Semantic Web and Advanced Information Technologies for fighting terrorism

机译:用于战斗恐怖主义的数据挖掘,语义网络和先进信息技术

获取原文

摘要

Terrorism has emerged as an immediate and most potent threat to the free world in the post September 11,2001 years, because of its real and potential damage to the infrastructure, economy and people. In response to this thereat, developed and developing countries, such as USA and Pakistan, have emerged as front line states in the fight against terrorism with the following objectives; i) prevent future terrorist attacks, ii) reduce the nations vulnerability, and iii) minimize the damage and recovery from attacks that occur. In order to achieve these objectives we require new approaches to intelligence and information gathering and its analysis through the use of information technology. In this paper we attempt to identify, i) the areas where IT can contribute in accomplishing these three strategic security objectives ii) the unique IT problems and challenges in counter terrorism applications where such applications are being used and developed such as in USA, and, iii) lessons learned for developing countries such as Pakistan, so that an IT counter terrorism infra structure can be established with minimum cost in terms of time and money. We have also tried to highlight the role Information Technology and Internet have to play in counter terrorism by developing and using advanced information technologies such as Data Mining and Semantic Web. The challenges posed are discussed and initiatives to be taken are also suggested.
机译:由于其基础设施,经济和人民的真实和潜在损害,恐怖主义被出现为对9月11日末的自由世界的直接和最有效的威胁。为应对这一目标,美国和巴基斯坦等发达国家和发展中国家已经出现在抗击恐怖主义中的前线状态,以违反恐怖主义; i)防止未来的恐怖袭击,ii)减少国家脆弱性,并且III)最大限度地减少发生的攻击损坏和恢复。为了实现这些目标,我们需要通过使用信息技术来实现智能和信息收集的新方法及其分析。在本文中,我们试图识别,i)在实现这三个战略安全目标II的情况下,它可以贡献II)反恐怖主义应用中的独特IT问题和挑战,这些应用程序正在使用和开发在美国,以及iii)为巴基斯坦等发展中国家汲取的经验教训,以便在时间和金钱方面可以以最低成本建立IT反恐恐怖主义结构。我们还试图通过开发和使用数据挖掘和语义网络等先进的信息技术来突出职位信息技术和互联网必须在反恐中发挥对抗恐怖主义。讨论了所带来的挑战,并提出了待采取的举措。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号