Journal: Information Systems Frontiers

Volume 13, Issue 1

1 -- 3Hsinchun Chen, Yilu Zhou, Edna Reid, Catherine A. Larson. Introduction to special issue on terrorism informatics
21 -- 31David B. Skillicorn. Computational approaches to suspicion in adversarial settings
33 -- 43Onook Oh, Manish Agrawal, H. Raghav Rao. Information control and terrorism: Tracking the Mumbai terrorist attack through twitter
45 -- 59Marc Cheong, Vincent C. S. Lee. A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter
61 -- 73Sheryl Prentice, Paul J. Taylor, Paul Rayson, Andrew Hoskins, Ben O Loughlin. Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict
75 -- 88Jialun Qin, Yilu Zhou, Hsinchun Chen. A multi-region empirical study on the internet presence of global extremist organizations
89 -- 100Stephen C. Hayne, Lucy J. Troup, Sara A. McComb. Where s Farah? : Knowledge silos and information fusion by distributed collaborating teams
101 -- 113Jiexun Li, G. Alan Wang, Hsinchun Chen. Identity matching using personal and social identity features
115 -- 125Daniel Zeng, Donghua Wei, Michael Chau, Fei-Yue Wang. Domain-specific Chinese word segmentation using suffix tree and mutual information
127 -- 137Jung-Wook Choi, Dong-Ik Oh. Tag-only aging-counter localization for the R-LIM2 system
139 -- 151Rong Liu, Akhil Kumar. Leveraging information sharing to configure supply chains