Please wait a minute...
New Technology of Library and Information Service  2016, Vol. 32 Issue (11): 1-10    DOI: 10.11925/infotech.1003-3513.2016.11.01
Orginal Article Current Issue | Archive | Adv Search |
Review of Online Anti-terrorism Research in China
Huang Wei1,2(),Yu Hui1,Li Yuefeng1
1School of Economy and Management, Hubei University of Technology, Wuhan 430064, China
2School of Management, Wuhan University of Technology, Wuhan 430072, China
Export: BibTeX | EndNote (RIS)      

[Objective] This paper reviews the studies of online anti-terrorism in China and then identifies their limitations as well as future research trends. [Coverage] We retrieved 60 Chinese journal articles and books from CNKI, Wanfang, Web of Science, ScienceDirect and Engineering Village databases, which were published after 2002 and had the topic of “Online Anti-terrorism”. [Methods] We examined the Chinese literature from the perspectives of anti-terrorism data analysis, public opinion dissemination, as well as early warning and crisis response mechanisms. [Results] Most of the Chinese online anti-terrorism research collected terrorism data and then analyzed terrorism- related remarks and public opinion. However, the big data processing and non-textual data analysis techniques adopted by these studies were not sufficient. Meanwhile, the online anti-terrorism laws and education need to be improved. [Limitations] We only collected the target literature from scholarly journals and books, and should have more data from the real world counter-terrorism cases. [Conclusions] Online anti-terrorism research in China is still developing, which requires coordinated support from technology, management and regulation sections to promote its advancement and integration with the big data.

Key wordsOnline anti-terrorism      Internet public opinion      Anti-terrorism warning      Network structure     
Received: 21 June 2016      Published: 20 December 2016

Cite this article:

Huang Wei,Yu Hui,Li Yuefeng. Review of Online Anti-terrorism Research in China. New Technology of Library and Information Service, 2016, 32(11): 1-10.

URL:     OR

[1] 张婷, 王沙骋. 基于人际网络的公安边防反恐情报网络模式研究[J]. 情报杂志, 2014, 33(6): 17-21.
[1] (Zhang Ting, Wang Shacheng.Study on the Intelligence Network Model of Public Security’s Border Counterterrorism Based on Social Network[J]. Journal of Intelligence, 2014, 33(6): 17-21.)
[2] Pollit M.Cyber Terrorism [C]. In: Procceedings of the 20th National Infomation Systems Security Conference. 1997.
[3] 李本先, 江成俊, 方锦清. 网络科学在反恐研究中面临的挑战和机遇[J]. 复杂系统与复杂性科学, 2014, 11(1): 60-66.
[3] (Li Benxian, Jiang Chengjun, Fang Jinqing.Network Science’s Challenges and Opportunities in Counter-Terrorism Research[J]. Complex Systems and Complexity Science, 2014, 11(1): 60-66.)
[4] 樊彦芳. 利用型网络恐怖犯罪是当前网络反恐重点[N]. 中国社会科学报, 2012-09-03 (A08).
[4] (Fan Yanfang. The Use of Terror Crime Network is the Focus of the Current Anti-Terrorism Network [N]. Social Sciences in China, 2012-09-03(A08).)
[5] 叶慧珏. 反恐专家罗伯特·佩普: 打击恐怖主义需要战略与战术上的平衡[N]. 21世纪经济报道, 2014-07-03(002).
[5] (Ye Huijue. Terrorism Experts Robert Peiper: The Fight Against Terrorism Requires Tactical and Strategic Balance [N]. 21st Century Business Herald, 2014-07-03(002).)
[6] 李鸥. 网络反恐及对策[J]. 江西警察学院学报, 2006(3): 92-95.
[6] (Li Ou.Comment on Counter Cyber-terrorism and Its Control Method[J]. Journal of Jiangxi Police Institute, 2006(3): 92-95.)
[7] Sageman M.Understanding Terror Networks [M]. University of Pennsylvania Press, 2004: 132-137.
[8] Chaudhuri S, Dayal U.An Overview of Data Warehousing and OLAP Technology[J]. ACM SIGMOD Record, 1997, 26(1): 65-74.
[9] Appelt D E.Introduction to Information Extraction[J]. AI Communications, 1999, 12(3): 161-172.
[10] Conlon S J, Abrahams A S, Simmons L L.Terrorism Information Extraction from Online Reports[J]. Journal of Computer Information Systems, 2015, 55(3): 20-28.
[11] 许发见, 汪宏伟, 杨杰. 垂直搜索在网络反恐信息分析系统中的应用研究[J]. 福建警察学院学报, 2010(2): 11-15.
[11] (Xu Fajian, Wang Hongwei, Yang Jie.Application Research on Vertical Search Technique Used in the Information Analytic System of Anti-terrorism in Internet[J]. Journal of Fujian Police College, 2010(2): 11-15.)
[12] Dugan L F L. Introducing the Global Terrorism Database[J]. Terrorism & Political Violence, 2007, 19(2): 181-204.
[13] Lafree G.The Global Terrorism Database: Accomplishments and Challenges [J]. Perspectives on Terrorism, 2010, 4(1). .
[14] 秦殿启. 论泛在信息社会的人际情报网络[J]. 情报杂志, 2013, 32(7): 24-27.
[14] (Qin Dianqi.On Human Intelligence Network in Ubiquitous Information Society[J]. Journal of Intelligence, 2013 , 32(7): 24-27.)
[15] 林聚任. 社会网络分析: 理论、方法与应用[M]. 北京: 北京师范大学出版社, 2009.
[15] (Lin Juren.Social Network Analysis: Theory, Methods and Applications [M]. Beijing: Beijing Normal University Publishing House, 2009.)
[16] 罗家德. 社会网分析讲义[M]. 北京: 社会科学文献出版社, 2010.
[16] (Luo Jiade.Social Network Analysis Notes [M]. Beijing: Social Sciences Academic Press, 2010.)
[17] Penzar D, Srblinovic A.About Modeling of Complex Networks with Appiication to Terrorist Group Modeling[J]. Inter-Disciplinary Description of Complex Systems, 2005, 3(1): 35-43.
[18] Estrada E.The Structure of Complex Networks [M]. Oxford University Press, 2012.
[19] Roberts N, Everton S F.Strategies for Combating Dark Networks[J]. Journal of Social Structure, 2009, 12(2): 1-32.
[20] Everton S F, Cunningham D.Terrorist Network Adaptation to a Changing Environment [A].// Crime and Networks[M]. Routledge, 2013.
[21] Krebs V.Mapping Networks of Terrorist Cells[J]. Connections, 2001, 24(3): 43-52.
[22] Freeman L C.Centrality in Social Networks: I. Conceptual Clarification[J]. Social Networks, 1979, 1(3): 215-239.
[23] McCulloh I, Carley K M. Longitudinal Dynamic Network Analysis: Using the Over Time Viewer Feature in ORA[R]. Social Science Electronic Publishing, 2009.
[24] Arquilla J, Ronfeldt D F.Networks and Netwars: The Future of Terror, Crime, and Militancy[M]. Santa Monica, California: RAND Corporation, 2001.
[25] 张海, 孙多勇. 基于社会网络理论的恐怖组织隐蔽网络分析方法[J]. 安全与环境学报, 2011, 11(3): 259-264.
[25] (Zhang Hai, Sun Duoyong.Stuty on the Terrorist Covert Networks from the Perpective of Social Network Analysis[J]. Journal of Safety and Environment, 2011, 11(3): 259-264.)
[26] Martino F, Spoto A.Social Network Analysis: A Brief Theoretical Review and Further Perspectives in the Study of Information Technology[J]. Psychology Journal, 2006(1): 53-86.
[27] 李本先, 李孟军, 孙多勇, 等. 社会网络分析在反恐中的应用[J]. 复杂系统与复杂性科学, 2012, 9(2): 84-93.
[27] (Li Benxian, Li Mengjun, Sun Duoyong, et al.A Brief Review of Applications of Social Networks Analysis Against Terrorism[J]. Complex Systems and Complexity Science, 2012, 9(2): 84-93.)
[28] Silke A.Holy Warriors: Exploring the Psychological Processes of Jihadi Radicalization[J]. European Journal of Criminology, 2008, 5(1): 99-123.
[29] Manrique P, Cao Z, Gabriel A, et al.Women’s Connectivity in Extreme Networks[J]. Science Advances, 2016, 2(6): e1501742.
[30] Bohannon J.How to Attack the Islamic State Online[J]. Science, 2016, 352(6292): 1380.
[31] Cohen D K.Female Combatants and the Perpetration of Violence: Wartime Rape in the Sierra Leone Civil War[J]. World Politics, 2013, 65(3): 383-415.
[32] Bohannon J. News Investigating Networks: The Dark Side [J]. Science, 2009, 325(5939): 4l0-411.
[33] Weiss M, H. asan H. ISIS: Inside the Army of Terror[M]. Regan Arts, 2015.
[34] 邹东升, 丁柯尹. 移动互联时代的涉恐网络舆论与网络反恐策略[J]. 甘肃社会科学, 2015(2): 195-198.
[34] (Zou Dongsheng, Ding Keyin.Involvement of Mobile Internet Era May Network Public Opinion and Counter-Terrorism Strategy[J]. Gansu Social Sciences, 2015(2): 195-198.)
[35] 丁红军, 陈德俊. ISIS网络恐怖主义活动对国内反恐形势的影响及应对措施[J]. 中国公共安全: 学术版, 2015(2): 95-97.
[35] (Ding Hongjun, Chen Dejun.ISIS’s Cyber Terrorism Acticity Impacts on China’s Counter-terrorism and the Countermeasures[J]. China Public Security: Academy Edition, 2015(2): 95-97.)
[36] 杨勇, 杨晓萍. 反恐形势下新疆网络传播面临的挑战与应对路径研究[J]. 克拉玛依学刊, 2014, 4(6): 26-31.
[36] (Yang Yong, Yang Xiaoping.Research on the Challenges and Countermeasures of the Network Communication in Xinjiang Under the Anti-Terrorism Situation[J]. Journal of Karamay, 2014, 4(6): 26-31.)
[37] Conway M, Mcinerney L.What’s Love Got to Do with It? Framing ‘JihadJane’ in the US Press [J]. Media War & Conflict, 2012, 5(5): 6-21.
[38] 叶战备. 江苏网络群体性事件的舆情疏导[J]. 唯实, 2016(4): 66-67.
[38] (Ye Zhanbei.Jiangsu Network Group Events of Public Opinion Counseling[J]. Reality Only, 2016(4): 66-67.)
[39] 金苗. 权力场域视阈下的国际反恐与大众传媒[J]. 南京政治学院学报, 2012, 28(6): 94-98.
[39] (Jin Miao.International Anti-terrorism and Mass Media from the Perspective of Power Field[J]. Journal of PLA Nanjing Institute of Politics, 2012, 28(6): 94-98.)
[40] 吴照美, 刘冲. 关于完善国内反恐预警机制的思考[J]. 武汉公安干部学院学报, 2011, 25(3): 24-26.
[40] (Wu Zhaomei, Liu Chong.Thoughts on the Improvement of the Anti-Terrorism Early Warning System in China[J]. Journal of Wuhan Public Security Cadre’s College, 2011, 25(3): 24-26.)
[41] 蔡华利, 刘鲁, 李红. 基于规则推理的突发事件发生地点识别研究[J]. 情报学报, 2011, 30(2): 219-224.
[41] (Cai Huali, Liu Lu, Li Hong.Rule Reasoning-based Occurring Place Recognition for Unexpected Event[J]. Journal of the China Society for Scientific and Technical Information, 2011, 30(2): 219-224.)
[42] O’Brien S P. Crisis Early Warning and Decision Support: Contemporary Approaches and Thoughts on Future Research[J]. International Studies Review, 2010, 12(1): 87-104.
[43] Berrick C A.Computer-Assisted Passenger Prescreening System Faces Significant Implementation Challenges [R]. United States General Accounting Office, 2004.
[44] 王飞跃, 邱晓刚, 曾大军, 等. 基于平行系统的非常规突发事件计算实验平台研究[J]. 复杂系统与复杂性科学, 2010, 7(4): 1-10.
[44] (Wang Feiyue, Qiu Xiaogang, Zeng Dajun, et al.A Computational Experimental Platform for Emergency Response Based on Parallel Systems[J]. Complex Systems and Complexity Science, 2010, 7(4): 1-10.)
[45] 都伊林, 吴骁. 智慧城市视角下完善反恐预警机制研究[J]. 情报杂志, 2015, 34(7): 13-17.
[45] (Du Yilin, Wu Xiao.Terrorist Warning Mechanism Under Perfect Wisdom Urban Perspective[J]. Journal of Intelligence, 2015, 34(7): 13-17.)
[46] 樊明明, 肖欢, 陶祥军. 美俄反恐预警机制的比较及启示[J]. 情报杂志, 2014, 33(12): 6-9.
[46] (Fan Mingming, Xiao Huan, Tao Xiangjun.A Comparative Analysis on the U. S. and Russia’s Terrorism Early Warning System[J]. Journal of Intelligence, 2014, 33(12): 6-9.)
[47] Whittaker A G, Smith F C, Mckune A E.The National Security Policy Process: The National Security Council and Interagency System [R]. National Security Council, 2008.
[48] 李本先, 梅建明, 李孟军. 国内反恐情报及预警系统框架设计[J]. 中国人民公安大学学报: 社会科学版, 2012, 28(4): 117-125.
[48] (Li Benxian, Mei Jianming, Li mengjun. China’s Counter-Terrorism Intelligence and Early Warning System Framework Design[J]. Journal of Chinese People’s Public Security University, 2012, 28(4): 117-125.)
[49] 刘慧娟. 国外民航反恐预警系统[J]. 中国民用航空, 2013(6): 61-62.
[49] (Liu Huijuan.Comparative Analysis of Anti-terrorism Alert Systems for Civil Aviation in Western Countries[J]. China Civil Aviation, 2013(6): 61-62.)
[50] 贾志城. 基于Ad Hoc网络的反恐处突远程监控系统的研究与实现[J]. 自动化与仪器仪表, 2014(3): 108-112.
[50] (Jia Zhicheng.Research and Implementation of Ad Hoc Network Based on the Remote Monitoring and Control System of Counter Terrorism[J]. Automation & Instrumentation, 2014(3): 108-112.)
[51] Guo H.A Method of Life Signal Identification Based on BP Neural Network [C]. In: Proceedings of the 4th International Congress on Image and Signal Processing. 2011.
[52] 杨灵芝, 丁敬达. 论城市突发事件的应急信息管理[J]. 情报科学, 2009, 27(3): 351-355.
[52] (Yang Lingzhi, Ding Jingda.On Emergency Information Management of City Thunderbolt[J]. Information Science, 2009, 27(3): 351-355.)
[53] 林曦, 姚乐野. 国内突发事件应急管理的情报工作现状与问题分析[J]. 图书情报工作, 2014, 58(23): 12-18.
[53] (Lin Xi, Yao Leye.Analysis on Current Situation and Issues of China’s Intelligence Work in Emergency Management[J]. Library and Information Service, 2014, 58(23): 12-18.)
[54] 秦伟毅, 唐绍辉, 李双明, 等. 广州“5·6”火车站恐怖暴力袭击事件应急医学救援分析[J]. 中华损伤与修复杂志: 电子版, 2015, 10(3): 37-40.
[54] (Qin Weiyi, Tang Shaohui, Li Shuangming, et al.Emergency Response Analysis of Guangzhou “5·6” Railway Station Terrorist Violent Attack[J]. Chinese Journal of Injury Repair and Wound Healing: Electronic Edition, 2015, 10(3): 37-40.)
[55] Fuse A, Yokota H.Lessons Learned from the Japan Earthquake and Tsunami, 2011[J]. Journal of Nippon Medical School, 2012, 79(4): 312-315.
[56] Jones D.Semantic Attacks — A New Wave of Cyber Terrorism[M]. NTA Monitor, 2002.
[57] Pounder C.Anti-terrorism Legislation: The Impact on The Processing of Data[J]. Computers & Security, 2002, 21(3): 240-245.
[58] 朱文. 网络反恐:编织国际法律的“天罗地网”[J]. 中国信息安全, 2014(10): 86-89.
[58] (Zhu Wen.Network Terrorism: International Law “Weaving Nets Above and Snares Below”[J]. China Information Security, 2014(10): 86-89.)
[59] 皮勇. 全球化信息化背景下国内网络恐怖活动及其犯罪立法研究——兼评国内《刑法修正案(九)(草案)》和《反恐怖主义法(草案)》相关反恐条款[J]. 政法论丛, 2015(1): 68-79.
[59] (Pi Yong.Research on Cyber-Terrorism in China and the Related Criminal Law——Comment on the Provisions in the Draft of 9th Amendment of Penal Code and the Draft of Anti-terrorism Law[J]. Journal of Political Science and Law, 2015(1): 68-79.)
[60] 李本先, 梅建明. 国内反恐研究热点问题与未来方向[J]. 中国人民公安大学学报: 社会科学版, 2015, 31(3): 1-9.
[60] (Li Benxian, Mei Jianming.The Hot Issues and Future Direction of China’s Anti-terrorism Research[J]. Journal of People’s Public Security University of China: Social Sciences Edition, 2015, 31(3): 1-9.)
[1] Wu Shengnan, Pu Hongjun, Tian Ruonan, Liang Wenqi, Yu Qi. Network Structure’s Impacts on Link Prediction Algorithm from Meta-Analysis Perspective[J]. 数据分析与知识发现, 2021, 5(11): 102-113.
[2] Wang Song, Yang Yang, Liu Xinmin. Discovering Potentialities of User Ideas from Open Innovation Communities with Graph Attention Network[J]. 数据分析与知识发现, 2021, 5(11): 89-101.
[3] Ding Shengchun,Yu Fengyang,Li Zhen. Identifying Potential Trending Topics of Online Public Opinion[J]. 数据分析与知识发现, 2020, 4(2/3): 29-38.
[4] Huang Wei,Zhao Jiangyuan,Yan Lu. Empirical Research on Topic Drift Index for Trending Network Events[J]. 数据分析与知识发现, 2020, 4(11): 92-101.
[5] Qingtian Zeng,Xiaohui Hu,Chao Li. Extracting Keywords with Topic Embedding and Network Structure Analysis[J]. 数据分析与知识发现, 2019, 3(7): 52-60.
[6] Yanshuang Mei,Hengmin Zhu,Jing Wei. A Study on the Mechanism of Media Collaboration on the Spread of Internet Public Opinion[J]. 数据分析与知识发现, 2019, 3(2): 65-71.
[7] Jia Longjia,Zhang Bangzuo. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[8] Wang Jingqi,Li Rui,Wu Huayi. The Evolution of Online Public Opinion Based on Spatial Autocorrelation[J]. 数据分析与知识发现, 2018, 2(2): 64-73.
[9] Lixin Xia,Ying Tan. Analysis and Visualization of the LOD Network Structure[J]. 现代图书情报技术, 2016, 32(1): 65-72.
[10] Zhang Lifan, Zhao Kai. Study on the Internet Public Opinion Dissemination Model with Discussion Under the Effect of Media[J]. 现代图书情报技术, 2015, 31(11): 60-67.
[11] Chen Guo, Hu Changping. Research on the Structural Features of Keyword Network of Scientific Research Areas:An Empirical Study of LIS[J]. 现代图书情报技术, 2014, 30(7): 84-91.
[12] Zhu Hengmin, Liu Kai, Lu Zifang. Study on Topic Propagation Model of Internet Public Opinion Under the Influence of the Media[J]. 现代图书情报技术, 2013, 29(3): 45-50.
[13] Zhu Hengmin, Zhu Weiwei. Study on Web Topic Online Clustering Approach Based on Single-Pass Algorithm[J]. 现代图书情报技术, 2011, 27(12): 52-57.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938