[Objective] This paper reviews the studies of online anti-terrorism in China and then identifies their limitations as well as future research trends. [Coverage] We retrieved 60 Chinese journal articles and books from CNKI, Wanfang, Web of Science, ScienceDirect and Engineering Village databases, which were published after 2002 and had the topic of “Online Anti-terrorism”. [Methods] We examined the Chinese literature from the perspectives of anti-terrorism data analysis, public opinion dissemination, as well as early warning and crisis response mechanisms. [Results] Most of the Chinese online anti-terrorism research collected terrorism data and then analyzed terrorism- related remarks and public opinion. However, the big data processing and non-textual data analysis techniques adopted by these studies were not sufficient. Meanwhile, the online anti-terrorism laws and education need to be improved. [Limitations] We only collected the target literature from scholarly journals and books, and should have more data from the real world counter-terrorism cases. [Conclusions] Online anti-terrorism research in China is still developing, which requires coordinated support from technology, management and regulation sections to promote its advancement and integration with the big data.
黄炜,余辉,李岳峰. 国内网络反恐研究的现状、问题和展望*[J]. 现代图书情报技术, 2016, 32(11): 1-10.
Huang Wei,Yu Hui,Li Yuefeng. Review of Online Anti-terrorism Research in China. New Technology of Library and Information Service, DOI：10.11925/infotech.1003-3513.2016.11.01.
(Xu Fajian, Wang Hongwei, Yang Jie.Application Research on Vertical Search Technique Used in the Information Analytic System of Anti-terrorism in Internet[J]. Journal of Fujian Police College, 2010(2): 11-15.)
Dugan L F L. Introducing the Global Terrorism Database[J]. Terrorism & Political Violence, 2007, 19(2): 181-204.
Lafree G.The Global Terrorism Database: Accomplishments and Challenges [J]. Perspectives on Terrorism, 2010, 4(1). .
秦殿启. 论泛在信息社会的人际情报网络[J]. 情报杂志, 2013, 32(7): 24-27.
(Qin Dianqi.On Human Intelligence Network in Ubiquitous Information Society[J]. Journal of Intelligence, 2013 , 32(7): 24-27.)
林聚任. 社会网络分析: 理论、方法与应用[M]. 北京: 北京师范大学出版社, 2009.
(Lin Juren.Social Network Analysis: Theory, Methods and Applications [M]. Beijing: Beijing Normal University Publishing House, 2009.)
(Li Benxian, Mei Jianming, Li mengjun. China’s Counter-Terrorism Intelligence and Early Warning System Framework Design[J]. Journal of Chinese People’s Public Security University, 2012, 28(4): 117-125.)
刘慧娟. 国外民航反恐预警系统[J]. 中国民用航空, 2013(6): 61-62.
(Liu Huijuan.Comparative Analysis of Anti-terrorism Alert Systems for Civil Aviation in Western Countries[J]. China Civil Aviation, 2013(6): 61-62.)
(Qin Weiyi, Tang Shaohui, Li Shuangming, et al.Emergency Response Analysis of Guangzhou “5·6” Railway Station Terrorist Violent Attack[J]. Chinese Journal of Injury Repair and Wound Healing: Electronic Edition, 2015, 10(3): 37-40.)
Fuse A, Yokota H.Lessons Learned from the Japan Earthquake and Tsunami, 2011[J]. Journal of Nippon Medical School, 2012, 79(4): 312-315.
Jones D.Semantic Attacks — A New Wave of Cyber Terrorism[M]. NTA Monitor, 2002.
Pounder C.Anti-terrorism Legislation: The Impact on The Processing of Data[J]. Computers & Security, 2002, 21(3): 240-245.
(Pi Yong.Research on Cyber-Terrorism in China and the Related Criminal Law——Comment on the Provisions in the Draft of 9th Amendment of Penal Code and the Draft of Anti-terrorism Law[J]. Journal of Political Science and Law, 2015(1): 68-79.)
(Li Benxian, Mei Jianming.The Hot Issues and Future Direction of China’s Anti-terrorism Research[J]. Journal of People’s Public Security University of China: Social Sciences Edition, 2015, 31(3): 1-9.)