Abstract is missing.
- Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong MovementYi-Da Chen, Ahmed Abbasi, Hsinchun Chen. 1-23 [doi]
- Patterns of Word Use for Deception in TestimonyDavid B. Skillicorn, Ayron Little. 25-39 [doi]
- Information Integration for Terrorist or Criminal Social NetworksChristopher C. Yang, Xuning Tang. 41-57 [doi]
- k-Closest Pairs Queries in Crime DatabasesShaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen, Michael Chau, Jian Hu. 59-75 [doi]
- What-If Emergency Response Through Higher Order Voronoi DiagramsIckjai Lee, Reece Pershouse, Peter Phillips, Kyungmi Lee, Christopher Torpelund-Bruin. 77-95 [doi]
- Identity Management ArchitectureUwe Glässer, Mona Vajihollahi. 97-116 [doi]
- A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection SystemsYi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu. 117-133 [doi]
- ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration FederationStanley Y. W. Su, Howard W. Beck, Xuelian Xiao, Jeff DePree, Seema Degwekar, Chen Zhou, Minsoo Lee, Carla S. Thomas, Andrew Coggeshall, Richard Bostock. 135-153 [doi]
- Duplicate Work Reduction in Business Continuity and Risk Management ProcessesShi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen. 155-170 [doi]