期刊文献+

大数据在反恐情报工作中的应用研究 被引量:44

Application of Big Data in Counter-terrorism Intelligence
下载PDF
导出
摘要 大数据在反恐情报中具有重要的地位与作用。利用定性分析方法,对大数据在反恐情报中的应用进行了研究。从数据源、疫情发布、情报综合分析能力三个方面论证了大数据在反恐情报的作用。提出了应用大数据对恐怖分子的作案行动进行追踪,预测与监测恐怖组织的活动、可视化分析等方面的内容。通过研究,为大数据在反恐情报中的应用理清思路,以期对反恐情报的建设提供一定的理论支撑,维护我国的国家安全与社会稳定,为预防与打击恐怖主义活动提供一定的理论与实践指导。 Big Data has an important position and role in counter-terrorism intelligence. In this paper, we use qualitative methods to ana-lyze big data applications in counter-terrorism intelligence. The analysis goes around with three aspects of the data source, the epidemic information release and the comprehensive analysis ability of intelligence, and discovers the role that big data plays in counter-terrorism in-telligence. We present applications of big data in tracking the perpetrating activities of terrorists, forecasting and monitoring the activities of terrorist organizations, and visualization analysis and as on. This research can help clarify ideas concerning the big data applications in counter-terrorism intelligence, provide theoretical support for the anti-terrorism intelligence development, and guide the activities of safe-guarding national security and social stability.
出处 《情报杂志》 CSSCI 北大核心 2014年第12期1-5,共5页 Journal of Intelligence
基金 国家社会科学基金资助"反恐维稳背景下边疆地区维稳战略研究"(编号:14Bzz028) 中国博士后基金"大数据时代的反恐情报分析方法与技术研究"(编号:2014M562573)
关键词 大数据 反恐情报 技术路线 Big data counter-terrorism intelligence technical route
  • 相关文献

参考文献17

  • 1Arquilla J, Ronfeldt D F. Networks and Netwars: the Future of Terror, Crime and Military [ R]. Santa Monica, California:RAND, 2001:20-24.
  • 2Krebs V. Mapping Networks of Terrorist Cells [ J ]. Connec- tions, 2001, 24(3) :43-52.
  • 3李本先,李孟军,孙多勇,迟妍.绘制“东突”恐怖主义网络[J].情报学报,2013,32(2):171-189. 被引量:11
  • 4李本先,梅建明,张薇,江成俊.对反恐情报体系构建中几个问题的思考[J].情报杂志,2014,33(4):1-5. 被引量:63
  • 5Chen H, Denning D, Roberts N, et al. The Dark Web Forum Portal: from Multi-lingual to Video [ C ]. Intelligence and Secur- ity Informatics, International Conference on IEEE, 2011:7-14.
  • 6Correa C D, Ma K L. Visualizing Social Networks[ M]. Social Network Data Analytics. , Springer US, 2011 : 307-326.
  • 7Mika P. Flink: Semantic Web Technology for the Extraction and Analysis of Social Networks. Web Semantics: Science [ J ]. Services and Agents on the World Wide Web, 2005, 3(2) : 211 -223.
  • 8Kolda T, Brown D, Corones J, et al. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery[ R]. DHS Workshop on Data Sciences. 2004.
  • 9张磊,陈贞翔,杨波.社交网络用户的人格分析与预测[J].计算机学报,2014,37(8):1877-1894. 被引量:36
  • 10於志文,於志勇,周兴社.社会感知计算:概念、问题及其研究进展[J].计算机学报,2012,35(1):16-26. 被引量:44

二级参考文献312

  • 1郑斌.英国保安局重点突出反恐情报保障[J].情报杂志,2005,24(3):135-136. 被引量:9
  • 2王渤.公开途径反恐情报的搜集[J].法学杂志,2006,27(6):71-73. 被引量:16
  • 3梅建明.反恐情报与危机管理[M].北京:群众出版社,2007.
  • 4Lazer D, Pentland A et al. Computational social science. Science, 2009, 323(5915):721-723.
  • 5Mitchell T M. Mining our reality. Science, 2009, 326 (5960): 1644-1645.
  • 6Dinev T, Hart P. Internet privacy concerns and social aware ness as determinants of intention to transact. International Journal of Electronic Commerce, 2005, 10(2) : 7-29.
  • 7Cs6ii M. Social Awareness Skills for Children. London: Jessica Kingsley Publishers, 2001.
  • 8Bodker S, Christiansen E. Computer support for social awareness in flexible work. Computer Supported Cooperation Work, 2006, 15(1): 1-28.
  • 9Vitriá J. Beyond the user: A review of socially aware compu- ting//Proceeding of the 2007 Conference on Artificial intelli- gence Research and Development. Amsterdam, The Nether- lands, 2007:6-8.
  • 10Caselles A, Francois C, Metcal{ G, Ossimitz G, Stallinger F. Awareness and social systems//Chroust G, Hofer C eds. Social Systems and the Future. Vienna, Austria: Austria Computer Society Press, 2000:31-42.

共引文献2541

同被引文献471

引证文献44

二级引证文献232

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部