Skip to main content

Exploring the Human Fabric through an Analyst’s Eyes

  • Conference paper
Book cover Advances in Social Computing (SBP 2010)

Abstract

The nature and type of conflicts drastically changed in the last half of the twentieth century. Wars are no longer limited to the field; they are supplemented with guerrilla warfare and other asymmetric warfare tactics including domestic terrorism. Domestic terrorism has demonstrated a need for improved homeland security capabilities. Establishing and maintaining the understanding of the key players and the underlying social networks is essential to combating asynchronous warfare tactics. Herein, we identify the key challenges addressed by our Collection/Exploitation Decision System (CEDS) that assist analysts in maintaining an up-to-date understanding of dynamic human networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Belov, N., Gerken, P.: Mixed Initiative Soft Fusion Data Associate. In: Twelfth International Conference on Information Fusion, pp. 1897–1902 (2009)

    Google Scholar 

  2. Regli, S.H., Tremoulet, P.D.: IDEAS: Interaction Design and Engineering for Advanced Systems. American Psychological Association, Division 21, A New Collaborative Frontier: Innovative Approaches and Applications, Fairfax, VA (2007)

    Google Scholar 

  3. Orr, M., Hastie, H., Miksch, D., Flanders, J., Corrad, C.: Capturing Critical Information Using the Wearable Intelligent Reporting Environment (WIRE). U.S. Dept. of Homeland Security, Science and Technology Directorate, Boston, MA (2005)

    Google Scholar 

  4. Craven, P., Orr, M., Hastie, H.: WIRE: A Wearable Spoken Language Understanding System for the Military. In: Human Language Technology Conference (HLT) North American Chapter of the Association for Computational Linguistics (NAACL) Workshop, Rochester, NY (2007)

    Google Scholar 

  5. Belov, N., Martin, M.K., Patti, J., Reminga, J., Pawlowski, A., Carley, K.M.: Dynamic Networks: Rapid Assessment of Changing Scenarios. In: Second International Workshop on Social Computing, Behavior Modeling, and Prediction, Phoenix, AZ (2009)

    Google Scholar 

  6. Pentland, A.: Reality Mining of Mobile Communications: Toward a New Deal on Data. In: Behavior Modeling, and Prediction, Phoenix, AZ (2009)

    Google Scholar 

  7. Waltz, T.: Understanding the Human Terrain by Fusion of Social and Geospatial Data 3(4), 9–11 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Belov, N. et al. (2010). Exploring the Human Fabric through an Analyst’s Eyes. In: Chai, SK., Salerno, J.J., Mabry, P.L. (eds) Advances in Social Computing. SBP 2010. Lecture Notes in Computer Science, vol 6007. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12079-4_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12079-4_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12078-7

  • Online ISBN: 978-3-642-12079-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics