2007
DOI: 10.1016/j.ijhcs.2006.08.006
|View full text |Cite
|
Sign up to set email alerts
|

Mapping the contemporary terrorism research domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 48 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…Clustering algorithms prominently used in co-citation analysis has proved very useful in revealing research streams in some discipline [20-23]. Here, we carried out empirical co-citation analysis to map the network of highly-cited papers about JCV.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Clustering algorithms prominently used in co-citation analysis has proved very useful in revealing research streams in some discipline [20-23]. Here, we carried out empirical co-citation analysis to map the network of highly-cited papers about JCV.…”
Section: Discussionmentioning
confidence: 99%
“…Methodologically, the cluster techniques include text segmentation, summary extraction, feature selection, term association, cluster generation, topic identification, and information mapping [ 19 ]. Clustering algorithms prominently used in co-citation analysis has proved very useful in revealing research streams in some discipline [ 20 - 23 ]. Here, we carried out empirical co-citation analysis to map the network of highly-cited papers about JCV.…”
Section: Discussionmentioning
confidence: 99%
“…Despite contentious debates about the definition of terrorism (Cooper, 2001;Moghaddam, 2005;Reid and Chen, 2007), there is overall consensus that imparting messages through orchestrated violence is a central feature (Tsfati and Weimann, 2002). In addition, the extreme and often radical nature of messages communicated online by terrorist groups and supporters of terrorist ideologies lends itself to the use of such terminology.…”
Section: Introductionmentioning
confidence: 99%
“…Visualization provides a rapid and succinct method to communicate complex social relationships. Recent research on development of tools for visual analysis of network relationships is driven by the availability of powerful personal computers; large repositories of electronic resources from which social networks can be built; and demands from areas such as detection of terrorist-related activities (Carley et al 2007;Reid and Chen 2007), law enforcement (Zhu et al 2010), and forensics (Hadjidj et al 2009). Unlike earlier, static representations of social networks, modern visualization tools allow users to determine interactively relations between members of a social network (Yang et al 2008).…”
Section: Visual Identification Of Social Networkmentioning
confidence: 99%