1School of Economy and Management, Hubei University of Technology, Wuhan 430064, China 2School of Management, Wuhan University of Technology, Wuhan 430072, China
[Objective] This paper reviews the studies of online anti-terrorism in China and then identifies their limitations as well as future research trends. [Coverage] We retrieved 60 Chinese journal articles and books from CNKI, Wanfang, Web of Science, ScienceDirect and Engineering Village databases, which were published after 2002 and had the topic of “Online Anti-terrorism”. [Methods] We examined the Chinese literature from the perspectives of anti-terrorism data analysis, public opinion dissemination, as well as early warning and crisis response mechanisms. [Results] Most of the Chinese online anti-terrorism research collected terrorism data and then analyzed terrorism- related remarks and public opinion. However, the big data processing and non-textual data analysis techniques adopted by these studies were not sufficient. Meanwhile, the online anti-terrorism laws and education need to be improved. [Limitations] We only collected the target literature from scholarly journals and books, and should have more data from the real world counter-terrorism cases. [Conclusions] Online anti-terrorism research in China is still developing, which requires coordinated support from technology, management and regulation sections to promote its advancement and integration with the big data.
黄炜,余辉,李岳峰. 国内网络反恐研究的现状、问题和展望*[J]. 现代图书情报技术, 2016, 32(11): 1-10.
Huang Wei,Yu Hui,Li Yuefeng. Review of Online Anti-terrorism Research in China. New Technology of Library and Information Service, 2016, 32(11): 1-10.
(Zhang Ting, Wang Shacheng.Study on the Intelligence Network Model of Public Security’s Border Counterterrorism Based on Social Network[J]. Journal of Intelligence, 2014, 33(6): 17-21.)
[2]
Pollit M.Cyber Terrorism [C]. In: Procceedings of the 20th National Infomation Systems Security Conference. 1997.
(Li Benxian, Jiang Chengjun, Fang Jinqing.Network Science’s Challenges and Opportunities in Counter-Terrorism Research[J]. Complex Systems and Complexity Science, 2014, 11(1): 60-66.)
(Ye Huijue. Terrorism Experts Robert Peiper: The Fight Against Terrorism Requires Tactical and Strategic Balance [N]. 21st Century Business Herald, 2014-07-03(002).)
[6]
李鸥. 网络反恐及对策[J]. 江西警察学院学报, 2006(3): 92-95.
[6]
(Li Ou.Comment on Counter Cyber-terrorism and Its Control Method[J]. Journal of Jiangxi Police Institute, 2006(3): 92-95.)
[7]
Sageman M.Understanding Terror Networks [M]. University of Pennsylvania Press, 2004: 132-137.
[8]
Chaudhuri S, Dayal U.An Overview of Data Warehousing and OLAP Technology[J]. ACM SIGMOD Record, 1997, 26(1): 65-74.
[9]
Appelt D E.Introduction to Information Extraction[J]. AI Communications, 1999, 12(3): 161-172.
[10]
Conlon S J, Abrahams A S, Simmons L L.Terrorism Information Extraction from Online Reports[J]. Journal of Computer Information Systems, 2015, 55(3): 20-28.
(Xu Fajian, Wang Hongwei, Yang Jie.Application Research on Vertical Search Technique Used in the Information Analytic System of Anti-terrorism in Internet[J]. Journal of Fujian Police College, 2010(2): 11-15.)
[12]
Dugan L F L. Introducing the Global Terrorism Database[J]. Terrorism & Political Violence, 2007, 19(2): 181-204.
[13]
Lafree G.The Global Terrorism Database: Accomplishments and Challenges [J]. Perspectives on Terrorism, 2010, 4(1). .
[14]
秦殿启. 论泛在信息社会的人际情报网络[J]. 情报杂志, 2013, 32(7): 24-27.
[14]
(Qin Dianqi.On Human Intelligence Network in Ubiquitous Information Society[J]. Journal of Intelligence, 2013 , 32(7): 24-27.)
[15]
林聚任. 社会网络分析: 理论、方法与应用[M]. 北京: 北京师范大学出版社, 2009.
[15]
(Lin Juren.Social Network Analysis: Theory, Methods and Applications [M]. Beijing: Beijing Normal University Publishing House, 2009.)
Penzar D, Srblinovic A.About Modeling of Complex Networks with Appiication to Terrorist Group Modeling[J]. Inter-Disciplinary Description of Complex Systems, 2005, 3(1): 35-43.
[18]
Estrada E.The Structure of Complex Networks [M]. Oxford University Press, 2012.
[19]
Roberts N, Everton S F.Strategies for Combating Dark Networks[J]. Journal of Social Structure, 2009, 12(2): 1-32.
[20]
Everton S F, Cunningham D.Terrorist Network Adaptation to a Changing Environment [A].// Crime and Networks[M]. Routledge, 2013.
[21]
Krebs V.Mapping Networks of Terrorist Cells[J]. Connections, 2001, 24(3): 43-52.
[22]
Freeman L C.Centrality in Social Networks: I. Conceptual Clarification[J]. Social Networks, 1979, 1(3): 215-239.
[23]
McCulloh I, Carley K M. Longitudinal Dynamic Network Analysis: Using the Over Time Viewer Feature in ORA[R]. Social Science Electronic Publishing, 2009.
[24]
Arquilla J, Ronfeldt D F.Networks and Netwars: The Future of Terror, Crime, and Militancy[M]. Santa Monica, California: RAND Corporation, 2001.
(Zhang Hai, Sun Duoyong.Stuty on the Terrorist Covert Networks from the Perpective of Social Network Analysis[J]. Journal of Safety and Environment, 2011, 11(3): 259-264.)
[26]
Martino F, Spoto A.Social Network Analysis: A Brief Theoretical Review and Further Perspectives in the Study of Information Technology[J]. Psychology Journal, 2006(1): 53-86.
(Li Benxian, Li Mengjun, Sun Duoyong, et al.A Brief Review of Applications of Social Networks Analysis Against Terrorism[J]. Complex Systems and Complexity Science, 2012, 9(2): 84-93.)
[28]
Silke A.Holy Warriors: Exploring the Psychological Processes of Jihadi Radicalization[J]. European Journal of Criminology, 2008, 5(1): 99-123.
[29]
Manrique P, Cao Z, Gabriel A, et al.Women’s Connectivity in Extreme Networks[J]. Science Advances, 2016, 2(6): e1501742.
[30]
Bohannon J.How to Attack the Islamic State Online[J]. Science, 2016, 352(6292): 1380.
[31]
Cohen D K.Female Combatants and the Perpetration of Violence: Wartime Rape in the Sierra Leone Civil War[J]. World Politics, 2013, 65(3): 383-415.
[32]
Bohannon J. News Investigating Networks: The Dark Side [J]. Science, 2009, 325(5939): 4l0-411.
[33]
Weiss M, H. asan H. ISIS: Inside the Army of Terror[M]. Regan Arts, 2015.
(Zou Dongsheng, Ding Keyin.Involvement of Mobile Internet Era May Network Public Opinion and Counter-Terrorism Strategy[J]. Gansu Social Sciences, 2015(2): 195-198.)
(Ding Hongjun, Chen Dejun.ISIS’s Cyber Terrorism Acticity Impacts on China’s Counter-terrorism and the Countermeasures[J]. China Public Security: Academy Edition, 2015(2): 95-97.)
(Yang Yong, Yang Xiaoping.Research on the Challenges and Countermeasures of the Network Communication in Xinjiang Under the Anti-Terrorism Situation[J]. Journal of Karamay, 2014, 4(6): 26-31.)
[37]
Conway M, Mcinerney L.What’s Love Got to Do with It? Framing ‘JihadJane’ in the US Press [J]. Media War & Conflict, 2012, 5(5): 6-21.
[38]
叶战备. 江苏网络群体性事件的舆情疏导[J]. 唯实, 2016(4): 66-67.
[38]
(Ye Zhanbei.Jiangsu Network Group Events of Public Opinion Counseling[J]. Reality Only, 2016(4): 66-67.)
(Jin Miao.International Anti-terrorism and Mass Media from the Perspective of Power Field[J]. Journal of PLA Nanjing Institute of Politics, 2012, 28(6): 94-98.)
(Wu Zhaomei, Liu Chong.Thoughts on the Improvement of the Anti-Terrorism Early Warning System in China[J]. Journal of Wuhan Public Security Cadre’s College, 2011, 25(3): 24-26.)
(Cai Huali, Liu Lu, Li Hong.Rule Reasoning-based Occurring Place Recognition for Unexpected Event[J]. Journal of the China Society for Scientific and Technical Information, 2011, 30(2): 219-224.)
[42]
O’Brien S P. Crisis Early Warning and Decision Support: Contemporary Approaches and Thoughts on Future Research[J]. International Studies Review, 2010, 12(1): 87-104.
[43]
Berrick C A.Computer-Assisted Passenger Prescreening System Faces Significant Implementation Challenges [R]. United States General Accounting Office, 2004.
(Wang Feiyue, Qiu Xiaogang, Zeng Dajun, et al.A Computational Experimental Platform for Emergency Response Based on Parallel Systems[J]. Complex Systems and Complexity Science, 2010, 7(4): 1-10.)
(Fan Mingming, Xiao Huan, Tao Xiangjun.A Comparative Analysis on the U. S. and Russia’s Terrorism Early Warning System[J]. Journal of Intelligence, 2014, 33(12): 6-9.)
[47]
Whittaker A G, Smith F C, Mckune A E.The National Security Policy Process: The National Security Council and Interagency System [R]. National Security Council, 2008.
(Li Benxian, Mei Jianming, Li mengjun. China’s Counter-Terrorism Intelligence and Early Warning System Framework Design[J]. Journal of Chinese People’s Public Security University, 2012, 28(4): 117-125.)
[49]
刘慧娟. 国外民航反恐预警系统[J]. 中国民用航空, 2013(6): 61-62.
[49]
(Liu Huijuan.Comparative Analysis of Anti-terrorism Alert Systems for Civil Aviation in Western Countries[J]. China Civil Aviation, 2013(6): 61-62.)
(Jia Zhicheng.Research and Implementation of Ad Hoc Network Based on the Remote Monitoring and Control System of Counter Terrorism[J]. Automation & Instrumentation, 2014(3): 108-112.)
[51]
Guo H.A Method of Life Signal Identification Based on BP Neural Network [C]. In: Proceedings of the 4th International Congress on Image and Signal Processing. 2011.
(Lin Xi, Yao Leye.Analysis on Current Situation and Issues of China’s Intelligence Work in Emergency Management[J]. Library and Information Service, 2014, 58(23): 12-18.)
(Qin Weiyi, Tang Shaohui, Li Shuangming, et al.Emergency Response Analysis of Guangzhou “5·6” Railway Station Terrorist Violent Attack[J]. Chinese Journal of Injury Repair and Wound Healing: Electronic Edition, 2015, 10(3): 37-40.)
[55]
Fuse A, Yokota H.Lessons Learned from the Japan Earthquake and Tsunami, 2011[J]. Journal of Nippon Medical School, 2012, 79(4): 312-315.
[56]
Jones D.Semantic Attacks — A New Wave of Cyber Terrorism[M]. NTA Monitor, 2002.
[57]
Pounder C.Anti-terrorism Legislation: The Impact on The Processing of Data[J]. Computers & Security, 2002, 21(3): 240-245.
(Pi Yong.Research on Cyber-Terrorism in China and the Related Criminal Law——Comment on the Provisions in the Draft of 9th Amendment of Penal Code and the Draft of Anti-terrorism Law[J]. Journal of Political Science and Law, 2015(1): 68-79.)
(Li Benxian, Mei Jianming.The Hot Issues and Future Direction of China’s Anti-terrorism Research[J]. Journal of People’s Public Security University of China: Social Sciences Edition, 2015, 31(3): 1-9.)