Please wait a minute...
Advanced Search
现代图书情报技术  2016, Vol. 32 Issue (11): 1-10     https://doi.org/10.11925/infotech.1003-3513.2016.11.01
  综述评介 本期目录 | 过刊浏览 | 高级检索 |
国内网络反恐研究的现状、问题和展望*
黄炜1,2(),余辉1,李岳峰1
1湖北工业大学经济与管理学院 武汉 430064
2武汉理工大学管理学院 武汉 430072
Review of Online Anti-terrorism Research in China
Huang Wei1,2(),Yu Hui1,Li Yuefeng1
1School of Economy and Management, Hubei University of Technology, Wuhan 430064, China
2School of Management, Wuhan University of Technology, Wuhan 430072, China
全文: PDF (657 KB)   HTML ( 57
输出: BibTeX | EndNote (RIS)      
摘要 

目的】总结国内网络反恐研究的现状, 发现不足并提出未来应对方向。【文献范围】以“网络反恐”为主题在中国知网、万方数据、Web of Science、ScienceDirect、Engineering Village数据库中选取自2002年以来的期刊、图书文献共60篇。【方法】通过文献统计分析方法, 分别从反恐数据分析、舆论传播、预警与处置三个方面分析网络反恐问题。【结果】国内网络反恐研究的现状是以恐怖数据的收集和分析为基础, 通过涉恐言论、舆情分析实现网络反恐, 存在反恐大数据分析能力不足、非文本数据匹配技术不成熟、网络反恐相关法律和教育需进一步完善的问题。【局限】文献资料来源以学术期刊和图书为主, 对于实际反恐中资料的收集不够充分。【结论】网络反恐的相关研究还处于发展阶段, 需要从技术、管理和法规等多方面协调共同开展, 相关的宣传和执行力度均应加强, 特别要加快与大数据技术的整合。

服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
黄炜
余辉
李岳峰
关键词 网络反恐网络舆情反恐预警网络结构    
Abstract

[Objective] This paper reviews the studies of online anti-terrorism in China and then identifies their limitations as well as future research trends. [Coverage] We retrieved 60 Chinese journal articles and books from CNKI, Wanfang, Web of Science, ScienceDirect and Engineering Village databases, which were published after 2002 and had the topic of “Online Anti-terrorism”. [Methods] We examined the Chinese literature from the perspectives of anti-terrorism data analysis, public opinion dissemination, as well as early warning and crisis response mechanisms. [Results] Most of the Chinese online anti-terrorism research collected terrorism data and then analyzed terrorism- related remarks and public opinion. However, the big data processing and non-textual data analysis techniques adopted by these studies were not sufficient. Meanwhile, the online anti-terrorism laws and education need to be improved. [Limitations] We only collected the target literature from scholarly journals and books, and should have more data from the real world counter-terrorism cases. [Conclusions] Online anti-terrorism research in China is still developing, which requires coordinated support from technology, management and regulation sections to promote its advancement and integration with the big data.

Key wordsOnline anti-terrorism    Internet public opinion    Anti-terrorism warning    Network structure
收稿日期: 2016-06-21      出版日期: 2016-12-20
基金资助:*本文系国家自然科学基金项目“微博环境下实时主动感知网络舆情事件的多核方法研究”(项目编号: 71303075)和国家自然科学基金项目“大数据环境下基于特征本体学习的无监督文本分类方法研究”(项目编号: 71571064)的研究成果之一
引用本文:   
黄炜,余辉,李岳峰. 国内网络反恐研究的现状、问题和展望*[J]. 现代图书情报技术, 2016, 32(11): 1-10.
Huang Wei,Yu Hui,Li Yuefeng. Review of Online Anti-terrorism Research in China. New Technology of Library and Information Service, 2016, 32(11): 1-10.
链接本文:  
https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/10.11925/infotech.1003-3513.2016.11.01      或      https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/Y2016/V32/I11/1
[1] 张婷, 王沙骋. 基于人际网络的公安边防反恐情报网络模式研究[J]. 情报杂志, 2014, 33(6): 17-21.
[1] (Zhang Ting, Wang Shacheng.Study on the Intelligence Network Model of Public Security’s Border Counterterrorism Based on Social Network[J]. Journal of Intelligence, 2014, 33(6): 17-21.)
[2] Pollit M.Cyber Terrorism [C]. In: Procceedings of the 20th National Infomation Systems Security Conference. 1997.
[3] 李本先, 江成俊, 方锦清. 网络科学在反恐研究中面临的挑战和机遇[J]. 复杂系统与复杂性科学, 2014, 11(1): 60-66.
[3] (Li Benxian, Jiang Chengjun, Fang Jinqing.Network Science’s Challenges and Opportunities in Counter-Terrorism Research[J]. Complex Systems and Complexity Science, 2014, 11(1): 60-66.)
[4] 樊彦芳. 利用型网络恐怖犯罪是当前网络反恐重点[N]. 中国社会科学报, 2012-09-03 (A08).
[4] (Fan Yanfang. The Use of Terror Crime Network is the Focus of the Current Anti-Terrorism Network [N]. Social Sciences in China, 2012-09-03(A08).)
[5] 叶慧珏. 反恐专家罗伯特·佩普: 打击恐怖主义需要战略与战术上的平衡[N]. 21世纪经济报道, 2014-07-03(002).
[5] (Ye Huijue. Terrorism Experts Robert Peiper: The Fight Against Terrorism Requires Tactical and Strategic Balance [N]. 21st Century Business Herald, 2014-07-03(002).)
[6] 李鸥. 网络反恐及对策[J]. 江西警察学院学报, 2006(3): 92-95.
[6] (Li Ou.Comment on Counter Cyber-terrorism and Its Control Method[J]. Journal of Jiangxi Police Institute, 2006(3): 92-95.)
[7] Sageman M.Understanding Terror Networks [M]. University of Pennsylvania Press, 2004: 132-137.
[8] Chaudhuri S, Dayal U.An Overview of Data Warehousing and OLAP Technology[J]. ACM SIGMOD Record, 1997, 26(1): 65-74.
[9] Appelt D E.Introduction to Information Extraction[J]. AI Communications, 1999, 12(3): 161-172.
[10] Conlon S J, Abrahams A S, Simmons L L.Terrorism Information Extraction from Online Reports[J]. Journal of Computer Information Systems, 2015, 55(3): 20-28.
[11] 许发见, 汪宏伟, 杨杰. 垂直搜索在网络反恐信息分析系统中的应用研究[J]. 福建警察学院学报, 2010(2): 11-15.
[11] (Xu Fajian, Wang Hongwei, Yang Jie.Application Research on Vertical Search Technique Used in the Information Analytic System of Anti-terrorism in Internet[J]. Journal of Fujian Police College, 2010(2): 11-15.)
[12] Dugan L F L. Introducing the Global Terrorism Database[J]. Terrorism & Political Violence, 2007, 19(2): 181-204.
[13] Lafree G.The Global Terrorism Database: Accomplishments and Challenges [J]. Perspectives on Terrorism, 2010, 4(1). .
[14] 秦殿启. 论泛在信息社会的人际情报网络[J]. 情报杂志, 2013, 32(7): 24-27.
[14] (Qin Dianqi.On Human Intelligence Network in Ubiquitous Information Society[J]. Journal of Intelligence, 2013 , 32(7): 24-27.)
[15] 林聚任. 社会网络分析: 理论、方法与应用[M]. 北京: 北京师范大学出版社, 2009.
[15] (Lin Juren.Social Network Analysis: Theory, Methods and Applications [M]. Beijing: Beijing Normal University Publishing House, 2009.)
[16] 罗家德. 社会网分析讲义[M]. 北京: 社会科学文献出版社, 2010.
[16] (Luo Jiade.Social Network Analysis Notes [M]. Beijing: Social Sciences Academic Press, 2010.)
[17] Penzar D, Srblinovic A.About Modeling of Complex Networks with Appiication to Terrorist Group Modeling[J]. Inter-Disciplinary Description of Complex Systems, 2005, 3(1): 35-43.
[18] Estrada E.The Structure of Complex Networks [M]. Oxford University Press, 2012.
[19] Roberts N, Everton S F.Strategies for Combating Dark Networks[J]. Journal of Social Structure, 2009, 12(2): 1-32.
[20] Everton S F, Cunningham D.Terrorist Network Adaptation to a Changing Environment [A].// Crime and Networks[M]. Routledge, 2013.
[21] Krebs V.Mapping Networks of Terrorist Cells[J]. Connections, 2001, 24(3): 43-52.
[22] Freeman L C.Centrality in Social Networks: I. Conceptual Clarification[J]. Social Networks, 1979, 1(3): 215-239.
[23] McCulloh I, Carley K M. Longitudinal Dynamic Network Analysis: Using the Over Time Viewer Feature in ORA[R]. Social Science Electronic Publishing, 2009.
[24] Arquilla J, Ronfeldt D F.Networks and Netwars: The Future of Terror, Crime, and Militancy[M]. Santa Monica, California: RAND Corporation, 2001.
[25] 张海, 孙多勇. 基于社会网络理论的恐怖组织隐蔽网络分析方法[J]. 安全与环境学报, 2011, 11(3): 259-264.
[25] (Zhang Hai, Sun Duoyong.Stuty on the Terrorist Covert Networks from the Perpective of Social Network Analysis[J]. Journal of Safety and Environment, 2011, 11(3): 259-264.)
[26] Martino F, Spoto A.Social Network Analysis: A Brief Theoretical Review and Further Perspectives in the Study of Information Technology[J]. Psychology Journal, 2006(1): 53-86.
[27] 李本先, 李孟军, 孙多勇, 等. 社会网络分析在反恐中的应用[J]. 复杂系统与复杂性科学, 2012, 9(2): 84-93.
[27] (Li Benxian, Li Mengjun, Sun Duoyong, et al.A Brief Review of Applications of Social Networks Analysis Against Terrorism[J]. Complex Systems and Complexity Science, 2012, 9(2): 84-93.)
[28] Silke A.Holy Warriors: Exploring the Psychological Processes of Jihadi Radicalization[J]. European Journal of Criminology, 2008, 5(1): 99-123.
[29] Manrique P, Cao Z, Gabriel A, et al.Women’s Connectivity in Extreme Networks[J]. Science Advances, 2016, 2(6): e1501742.
[30] Bohannon J.How to Attack the Islamic State Online[J]. Science, 2016, 352(6292): 1380.
[31] Cohen D K.Female Combatants and the Perpetration of Violence: Wartime Rape in the Sierra Leone Civil War[J]. World Politics, 2013, 65(3): 383-415.
[32] Bohannon J. News Investigating Networks: The Dark Side [J]. Science, 2009, 325(5939): 4l0-411.
[33] Weiss M, H. asan H. ISIS: Inside the Army of Terror[M]. Regan Arts, 2015.
[34] 邹东升, 丁柯尹. 移动互联时代的涉恐网络舆论与网络反恐策略[J]. 甘肃社会科学, 2015(2): 195-198.
[34] (Zou Dongsheng, Ding Keyin.Involvement of Mobile Internet Era May Network Public Opinion and Counter-Terrorism Strategy[J]. Gansu Social Sciences, 2015(2): 195-198.)
[35] 丁红军, 陈德俊. ISIS网络恐怖主义活动对国内反恐形势的影响及应对措施[J]. 中国公共安全: 学术版, 2015(2): 95-97.
[35] (Ding Hongjun, Chen Dejun.ISIS’s Cyber Terrorism Acticity Impacts on China’s Counter-terrorism and the Countermeasures[J]. China Public Security: Academy Edition, 2015(2): 95-97.)
[36] 杨勇, 杨晓萍. 反恐形势下新疆网络传播面临的挑战与应对路径研究[J]. 克拉玛依学刊, 2014, 4(6): 26-31.
[36] (Yang Yong, Yang Xiaoping.Research on the Challenges and Countermeasures of the Network Communication in Xinjiang Under the Anti-Terrorism Situation[J]. Journal of Karamay, 2014, 4(6): 26-31.)
[37] Conway M, Mcinerney L.What’s Love Got to Do with It? Framing ‘JihadJane’ in the US Press [J]. Media War & Conflict, 2012, 5(5): 6-21.
[38] 叶战备. 江苏网络群体性事件的舆情疏导[J]. 唯实, 2016(4): 66-67.
[38] (Ye Zhanbei.Jiangsu Network Group Events of Public Opinion Counseling[J]. Reality Only, 2016(4): 66-67.)
[39] 金苗. 权力场域视阈下的国际反恐与大众传媒[J]. 南京政治学院学报, 2012, 28(6): 94-98.
[39] (Jin Miao.International Anti-terrorism and Mass Media from the Perspective of Power Field[J]. Journal of PLA Nanjing Institute of Politics, 2012, 28(6): 94-98.)
[40] 吴照美, 刘冲. 关于完善国内反恐预警机制的思考[J]. 武汉公安干部学院学报, 2011, 25(3): 24-26.
[40] (Wu Zhaomei, Liu Chong.Thoughts on the Improvement of the Anti-Terrorism Early Warning System in China[J]. Journal of Wuhan Public Security Cadre’s College, 2011, 25(3): 24-26.)
[41] 蔡华利, 刘鲁, 李红. 基于规则推理的突发事件发生地点识别研究[J]. 情报学报, 2011, 30(2): 219-224.
[41] (Cai Huali, Liu Lu, Li Hong.Rule Reasoning-based Occurring Place Recognition for Unexpected Event[J]. Journal of the China Society for Scientific and Technical Information, 2011, 30(2): 219-224.)
[42] O’Brien S P. Crisis Early Warning and Decision Support: Contemporary Approaches and Thoughts on Future Research[J]. International Studies Review, 2010, 12(1): 87-104.
[43] Berrick C A.Computer-Assisted Passenger Prescreening System Faces Significant Implementation Challenges [R]. United States General Accounting Office, 2004.
[44] 王飞跃, 邱晓刚, 曾大军, 等. 基于平行系统的非常规突发事件计算实验平台研究[J]. 复杂系统与复杂性科学, 2010, 7(4): 1-10.
[44] (Wang Feiyue, Qiu Xiaogang, Zeng Dajun, et al.A Computational Experimental Platform for Emergency Response Based on Parallel Systems[J]. Complex Systems and Complexity Science, 2010, 7(4): 1-10.)
[45] 都伊林, 吴骁. 智慧城市视角下完善反恐预警机制研究[J]. 情报杂志, 2015, 34(7): 13-17.
[45] (Du Yilin, Wu Xiao.Terrorist Warning Mechanism Under Perfect Wisdom Urban Perspective[J]. Journal of Intelligence, 2015, 34(7): 13-17.)
[46] 樊明明, 肖欢, 陶祥军. 美俄反恐预警机制的比较及启示[J]. 情报杂志, 2014, 33(12): 6-9.
[46] (Fan Mingming, Xiao Huan, Tao Xiangjun.A Comparative Analysis on the U. S. and Russia’s Terrorism Early Warning System[J]. Journal of Intelligence, 2014, 33(12): 6-9.)
[47] Whittaker A G, Smith F C, Mckune A E.The National Security Policy Process: The National Security Council and Interagency System [R]. National Security Council, 2008.
[48] 李本先, 梅建明, 李孟军. 国内反恐情报及预警系统框架设计[J]. 中国人民公安大学学报: 社会科学版, 2012, 28(4): 117-125.
[48] (Li Benxian, Mei Jianming, Li mengjun. China’s Counter-Terrorism Intelligence and Early Warning System Framework Design[J]. Journal of Chinese People’s Public Security University, 2012, 28(4): 117-125.)
[49] 刘慧娟. 国外民航反恐预警系统[J]. 中国民用航空, 2013(6): 61-62.
[49] (Liu Huijuan.Comparative Analysis of Anti-terrorism Alert Systems for Civil Aviation in Western Countries[J]. China Civil Aviation, 2013(6): 61-62.)
[50] 贾志城. 基于Ad Hoc网络的反恐处突远程监控系统的研究与实现[J]. 自动化与仪器仪表, 2014(3): 108-112.
[50] (Jia Zhicheng.Research and Implementation of Ad Hoc Network Based on the Remote Monitoring and Control System of Counter Terrorism[J]. Automation & Instrumentation, 2014(3): 108-112.)
[51] Guo H.A Method of Life Signal Identification Based on BP Neural Network [C]. In: Proceedings of the 4th International Congress on Image and Signal Processing. 2011.
[52] 杨灵芝, 丁敬达. 论城市突发事件的应急信息管理[J]. 情报科学, 2009, 27(3): 351-355.
[52] (Yang Lingzhi, Ding Jingda.On Emergency Information Management of City Thunderbolt[J]. Information Science, 2009, 27(3): 351-355.)
[53] 林曦, 姚乐野. 国内突发事件应急管理的情报工作现状与问题分析[J]. 图书情报工作, 2014, 58(23): 12-18.
[53] (Lin Xi, Yao Leye.Analysis on Current Situation and Issues of China’s Intelligence Work in Emergency Management[J]. Library and Information Service, 2014, 58(23): 12-18.)
[54] 秦伟毅, 唐绍辉, 李双明, 等. 广州“5·6”火车站恐怖暴力袭击事件应急医学救援分析[J]. 中华损伤与修复杂志: 电子版, 2015, 10(3): 37-40.
[54] (Qin Weiyi, Tang Shaohui, Li Shuangming, et al.Emergency Response Analysis of Guangzhou “5·6” Railway Station Terrorist Violent Attack[J]. Chinese Journal of Injury Repair and Wound Healing: Electronic Edition, 2015, 10(3): 37-40.)
[55] Fuse A, Yokota H.Lessons Learned from the Japan Earthquake and Tsunami, 2011[J]. Journal of Nippon Medical School, 2012, 79(4): 312-315.
[56] Jones D.Semantic Attacks — A New Wave of Cyber Terrorism[M]. NTA Monitor, 2002.
[57] Pounder C.Anti-terrorism Legislation: The Impact on The Processing of Data[J]. Computers & Security, 2002, 21(3): 240-245.
[58] 朱文. 网络反恐:编织国际法律的“天罗地网”[J]. 中国信息安全, 2014(10): 86-89.
[58] (Zhu Wen.Network Terrorism: International Law “Weaving Nets Above and Snares Below”[J]. China Information Security, 2014(10): 86-89.)
[59] 皮勇. 全球化信息化背景下国内网络恐怖活动及其犯罪立法研究——兼评国内《刑法修正案(九)(草案)》和《反恐怖主义法(草案)》相关反恐条款[J]. 政法论丛, 2015(1): 68-79.
[59] (Pi Yong.Research on Cyber-Terrorism in China and the Related Criminal Law——Comment on the Provisions in the Draft of 9th Amendment of Penal Code and the Draft of Anti-terrorism Law[J]. Journal of Political Science and Law, 2015(1): 68-79.)
[60] 李本先, 梅建明. 国内反恐研究热点问题与未来方向[J]. 中国人民公安大学学报: 社会科学版, 2015, 31(3): 1-9.
[60] (Li Benxian, Mei Jianming.The Hot Issues and Future Direction of China’s Anti-terrorism Research[J]. Journal of People’s Public Security University of China: Social Sciences Edition, 2015, 31(3): 1-9.)
[1] 范涛,王昊,吴鹏. 基于图卷积神经网络和依存句法分析的网民负面情感分析研究*[J]. 数据分析与知识发现, 2021, 5(9): 97-106.
[2] 吴胜男, 蒲虹君, 田若楠, 梁雯琪, 于琦. 网络结构对链路预测算法的影响研究*——基于元分析视角[J]. 数据分析与知识发现, 2021, 5(11): 102-113.
[3] 王松, 杨洋, 刘新民. 基于图注意力网络的开放式创新社区用户创意潜在价值发现研究*[J]. 数据分析与知识发现, 2021, 5(11): 89-101.
[4] 程铁军, 王曼, 黄宝凤, 冯兰萍. 基于CEEMDAN-BP模型的突发事件网络舆情预测研究*[J]. 数据分析与知识发现, 2021, 5(11): 59-67.
[5] 邓建高,张璇,傅柱,韦庆明. 基于系统动力学的突发事件网络舆情传播研究:以“江苏响水爆炸事故”为例*[J]. 数据分析与知识发现, 2020, 4(2/3): 110-121.
[6] 梁艳平,安璐,刘静. 同类突发公共卫生事件微博话题共振研究*[J]. 数据分析与知识发现, 2020, 4(2/3): 122-133.
[7] 丁晟春,俞沣洋,李真. 网络舆情潜在热点主题识别研究*[J]. 数据分析与知识发现, 2020, 4(2/3): 29-38.
[8] 黄微,赵江元,闫璐. 网络热点事件话题漂移指数构建与实证研究*[J]. 数据分析与知识发现, 2020, 4(11): 92-101.
[9] 曾庆田,胡晓慧,李超. 融合主题词嵌入和网络结构分析的主题关键词提取方法 *[J]. 数据分析与知识发现, 2019, 3(7): 52-60.
[10] 梅妍霜,朱恒民,魏静. 媒体协同对网络舆情扩散的作用机制研究*[J]. 数据分析与知识发现, 2019, 3(2): 65-71.
[11] 贾隆嘉, 张邦佐. 高校网络舆情安全中主题分类方法研究*——以新浪微博数据为例[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[12] 王璟琦, 李锐, 吴华意. 基于空间自相关的网络舆情话题演化时空规律分析*[J]. 数据分析与知识发现, 2018, 2(2): 64-73.
[13] 李真, 丁晟春, 王楠. 网络舆情观点主题识别研究*[J]. 数据分析与知识发现, 2017, 1(8): 18-30.
[14] 王晰巍, 张柳, 李师萌, 王楠阿雪. 新媒体环境下社会公益网络舆情传播研究* ——以新浪微博“画出生命线”话题为例[J]. 数据分析与知识发现, 2017, 1(6): 93-101.
[15] 丁晟春,龚思兰,李红梅. 基于突发主题词和凝聚式层次聚类的微博突发事件检测研究*[J]. 现代图书情报技术, 2016, 32(7-8): 12-20.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 《数据分析与知识发现》编辑部
地址:北京市海淀区中关村北四环西路33号 邮编:100190
电话/传真:(010)82626611-6626,82624938
E-mail:jishu@mail.las.ac.cn