|
|
Review of Online Anti-terrorism Research in China |
Huang Wei1,2(),Yu Hui1,Li Yuefeng1 |
1School of Economy and Management, Hubei University of Technology, Wuhan 430064, China 2School of Management, Wuhan University of Technology, Wuhan 430072, China |
|
|
Abstract [Objective] This paper reviews the studies of online anti-terrorism in China and then identifies their limitations as well as future research trends. [Coverage] We retrieved 60 Chinese journal articles and books from CNKI, Wanfang, Web of Science, ScienceDirect and Engineering Village databases, which were published after 2002 and had the topic of “Online Anti-terrorism”. [Methods] We examined the Chinese literature from the perspectives of anti-terrorism data analysis, public opinion dissemination, as well as early warning and crisis response mechanisms. [Results] Most of the Chinese online anti-terrorism research collected terrorism data and then analyzed terrorism- related remarks and public opinion. However, the big data processing and non-textual data analysis techniques adopted by these studies were not sufficient. Meanwhile, the online anti-terrorism laws and education need to be improved. [Limitations] We only collected the target literature from scholarly journals and books, and should have more data from the real world counter-terrorism cases. [Conclusions] Online anti-terrorism research in China is still developing, which requires coordinated support from technology, management and regulation sections to promote its advancement and integration with the big data.
|
Received: 21 June 2016
Published: 20 December 2016
|
[1] | 张婷, 王沙骋. 基于人际网络的公安边防反恐情报网络模式研究[J]. 情报杂志, 2014, 33(6): 17-21. | [1] | (Zhang Ting, Wang Shacheng.Study on the Intelligence Network Model of Public Security’s Border Counterterrorism Based on Social Network[J]. Journal of Intelligence, 2014, 33(6): 17-21.) | [2] | Pollit M.Cyber Terrorism [C]. In: Procceedings of the 20th National Infomation Systems Security Conference. 1997. | [3] | 李本先, 江成俊, 方锦清. 网络科学在反恐研究中面临的挑战和机遇[J]. 复杂系统与复杂性科学, 2014, 11(1): 60-66. | [3] | (Li Benxian, Jiang Chengjun, Fang Jinqing.Network Science’s Challenges and Opportunities in Counter-Terrorism Research[J]. Complex Systems and Complexity Science, 2014, 11(1): 60-66.) | [4] | 樊彦芳. 利用型网络恐怖犯罪是当前网络反恐重点[N]. 中国社会科学报, 2012-09-03 (A08). | [4] | (Fan Yanfang. The Use of Terror Crime Network is the Focus of the Current Anti-Terrorism Network [N]. Social Sciences in China, 2012-09-03(A08).) | [5] | 叶慧珏. 反恐专家罗伯特·佩普: 打击恐怖主义需要战略与战术上的平衡[N]. 21世纪经济报道, 2014-07-03(002). | [5] | (Ye Huijue. Terrorism Experts Robert Peiper: The Fight Against Terrorism Requires Tactical and Strategic Balance [N]. 21st Century Business Herald, 2014-07-03(002).) | [6] | 李鸥. 网络反恐及对策[J]. 江西警察学院学报, 2006(3): 92-95. | [6] | (Li Ou.Comment on Counter Cyber-terrorism and Its Control Method[J]. Journal of Jiangxi Police Institute, 2006(3): 92-95.) | [7] | Sageman M.Understanding Terror Networks [M]. University of Pennsylvania Press, 2004: 132-137. | [8] | Chaudhuri S, Dayal U.An Overview of Data Warehousing and OLAP Technology[J]. ACM SIGMOD Record, 1997, 26(1): 65-74. | [9] | Appelt D E.Introduction to Information Extraction[J]. AI Communications, 1999, 12(3): 161-172. | [10] | Conlon S J, Abrahams A S, Simmons L L.Terrorism Information Extraction from Online Reports[J]. Journal of Computer Information Systems, 2015, 55(3): 20-28. | [11] | 许发见, 汪宏伟, 杨杰. 垂直搜索在网络反恐信息分析系统中的应用研究[J]. 福建警察学院学报, 2010(2): 11-15. | [11] | (Xu Fajian, Wang Hongwei, Yang Jie.Application Research on Vertical Search Technique Used in the Information Analytic System of Anti-terrorism in Internet[J]. Journal of Fujian Police College, 2010(2): 11-15.) | [12] | Dugan L F L. Introducing the Global Terrorism Database[J]. Terrorism & Political Violence, 2007, 19(2): 181-204. | [13] | Lafree G.The Global Terrorism Database: Accomplishments and Challenges [J]. Perspectives on Terrorism, 2010, 4(1). . | [14] | 秦殿启. 论泛在信息社会的人际情报网络[J]. 情报杂志, 2013, 32(7): 24-27. | [14] | (Qin Dianqi.On Human Intelligence Network in Ubiquitous Information Society[J]. Journal of Intelligence, 2013 , 32(7): 24-27.) | [15] | 林聚任. 社会网络分析: 理论、方法与应用[M]. 北京: 北京师范大学出版社, 2009. | [15] | (Lin Juren.Social Network Analysis: Theory, Methods and Applications [M]. Beijing: Beijing Normal University Publishing House, 2009.) | [16] | 罗家德. 社会网分析讲义[M]. 北京: 社会科学文献出版社, 2010. | [16] | (Luo Jiade.Social Network Analysis Notes [M]. Beijing: Social Sciences Academic Press, 2010.) | [17] | Penzar D, Srblinovic A.About Modeling of Complex Networks with Appiication to Terrorist Group Modeling[J]. Inter-Disciplinary Description of Complex Systems, 2005, 3(1): 35-43. | [18] | Estrada E.The Structure of Complex Networks [M]. Oxford University Press, 2012. | [19] | Roberts N, Everton S F.Strategies for Combating Dark Networks[J]. Journal of Social Structure, 2009, 12(2): 1-32. | [20] | Everton S F, Cunningham D.Terrorist Network Adaptation to a Changing Environment [A].// Crime and Networks[M]. Routledge, 2013. | [21] | Krebs V.Mapping Networks of Terrorist Cells[J]. Connections, 2001, 24(3): 43-52. | [22] | Freeman L C.Centrality in Social Networks: I. Conceptual Clarification[J]. Social Networks, 1979, 1(3): 215-239. | [23] | McCulloh I, Carley K M. Longitudinal Dynamic Network Analysis: Using the Over Time Viewer Feature in ORA[R]. Social Science Electronic Publishing, 2009. | [24] | Arquilla J, Ronfeldt D F.Networks and Netwars: The Future of Terror, Crime, and Militancy[M]. Santa Monica, California: RAND Corporation, 2001. | [25] | 张海, 孙多勇. 基于社会网络理论的恐怖组织隐蔽网络分析方法[J]. 安全与环境学报, 2011, 11(3): 259-264. | [25] | (Zhang Hai, Sun Duoyong.Stuty on the Terrorist Covert Networks from the Perpective of Social Network Analysis[J]. Journal of Safety and Environment, 2011, 11(3): 259-264.) | [26] | Martino F, Spoto A.Social Network Analysis: A Brief Theoretical Review and Further Perspectives in the Study of Information Technology[J]. Psychology Journal, 2006(1): 53-86. | [27] | 李本先, 李孟军, 孙多勇, 等. 社会网络分析在反恐中的应用[J]. 复杂系统与复杂性科学, 2012, 9(2): 84-93. | [27] | (Li Benxian, Li Mengjun, Sun Duoyong, et al.A Brief Review of Applications of Social Networks Analysis Against Terrorism[J]. Complex Systems and Complexity Science, 2012, 9(2): 84-93.) | [28] | Silke A.Holy Warriors: Exploring the Psychological Processes of Jihadi Radicalization[J]. European Journal of Criminology, 2008, 5(1): 99-123. | [29] | Manrique P, Cao Z, Gabriel A, et al.Women’s Connectivity in Extreme Networks[J]. Science Advances, 2016, 2(6): e1501742. | [30] | Bohannon J.How to Attack the Islamic State Online[J]. Science, 2016, 352(6292): 1380. | [31] | Cohen D K.Female Combatants and the Perpetration of Violence: Wartime Rape in the Sierra Leone Civil War[J]. World Politics, 2013, 65(3): 383-415. | [32] | Bohannon J. News Investigating Networks: The Dark Side [J]. Science, 2009, 325(5939): 4l0-411. | [33] | Weiss M, H. asan H. ISIS: Inside the Army of Terror[M]. Regan Arts, 2015. | [34] | 邹东升, 丁柯尹. 移动互联时代的涉恐网络舆论与网络反恐策略[J]. 甘肃社会科学, 2015(2): 195-198. | [34] | (Zou Dongsheng, Ding Keyin.Involvement of Mobile Internet Era May Network Public Opinion and Counter-Terrorism Strategy[J]. Gansu Social Sciences, 2015(2): 195-198.) | [35] | 丁红军, 陈德俊. ISIS网络恐怖主义活动对国内反恐形势的影响及应对措施[J]. 中国公共安全: 学术版, 2015(2): 95-97. | [35] | (Ding Hongjun, Chen Dejun.ISIS’s Cyber Terrorism Acticity Impacts on China’s Counter-terrorism and the Countermeasures[J]. China Public Security: Academy Edition, 2015(2): 95-97.) | [36] | 杨勇, 杨晓萍. 反恐形势下新疆网络传播面临的挑战与应对路径研究[J]. 克拉玛依学刊, 2014, 4(6): 26-31. | [36] | (Yang Yong, Yang Xiaoping.Research on the Challenges and Countermeasures of the Network Communication in Xinjiang Under the Anti-Terrorism Situation[J]. Journal of Karamay, 2014, 4(6): 26-31.) | [37] | Conway M, Mcinerney L.What’s Love Got to Do with It? Framing ‘JihadJane’ in the US Press [J]. Media War & Conflict, 2012, 5(5): 6-21. | [38] | 叶战备. 江苏网络群体性事件的舆情疏导[J]. 唯实, 2016(4): 66-67. | [38] | (Ye Zhanbei.Jiangsu Network Group Events of Public Opinion Counseling[J]. Reality Only, 2016(4): 66-67.) | [39] | 金苗. 权力场域视阈下的国际反恐与大众传媒[J]. 南京政治学院学报, 2012, 28(6): 94-98. | [39] | (Jin Miao.International Anti-terrorism and Mass Media from the Perspective of Power Field[J]. Journal of PLA Nanjing Institute of Politics, 2012, 28(6): 94-98.) | [40] | 吴照美, 刘冲. 关于完善国内反恐预警机制的思考[J]. 武汉公安干部学院学报, 2011, 25(3): 24-26. | [40] | (Wu Zhaomei, Liu Chong.Thoughts on the Improvement of the Anti-Terrorism Early Warning System in China[J]. Journal of Wuhan Public Security Cadre’s College, 2011, 25(3): 24-26.) | [41] | 蔡华利, 刘鲁, 李红. 基于规则推理的突发事件发生地点识别研究[J]. 情报学报, 2011, 30(2): 219-224. | [41] | (Cai Huali, Liu Lu, Li Hong.Rule Reasoning-based Occurring Place Recognition for Unexpected Event[J]. Journal of the China Society for Scientific and Technical Information, 2011, 30(2): 219-224.) | [42] | O’Brien S P. Crisis Early Warning and Decision Support: Contemporary Approaches and Thoughts on Future Research[J]. International Studies Review, 2010, 12(1): 87-104. | [43] | Berrick C A.Computer-Assisted Passenger Prescreening System Faces Significant Implementation Challenges [R]. United States General Accounting Office, 2004. | [44] | 王飞跃, 邱晓刚, 曾大军, 等. 基于平行系统的非常规突发事件计算实验平台研究[J]. 复杂系统与复杂性科学, 2010, 7(4): 1-10. | [44] | (Wang Feiyue, Qiu Xiaogang, Zeng Dajun, et al.A Computational Experimental Platform for Emergency Response Based on Parallel Systems[J]. Complex Systems and Complexity Science, 2010, 7(4): 1-10.) | [45] | 都伊林, 吴骁. 智慧城市视角下完善反恐预警机制研究[J]. 情报杂志, 2015, 34(7): 13-17. | [45] | (Du Yilin, Wu Xiao.Terrorist Warning Mechanism Under Perfect Wisdom Urban Perspective[J]. Journal of Intelligence, 2015, 34(7): 13-17.) | [46] | 樊明明, 肖欢, 陶祥军. 美俄反恐预警机制的比较及启示[J]. 情报杂志, 2014, 33(12): 6-9. | [46] | (Fan Mingming, Xiao Huan, Tao Xiangjun.A Comparative Analysis on the U. S. and Russia’s Terrorism Early Warning System[J]. Journal of Intelligence, 2014, 33(12): 6-9.) | [47] | Whittaker A G, Smith F C, Mckune A E.The National Security Policy Process: The National Security Council and Interagency System [R]. National Security Council, 2008. | [48] | 李本先, 梅建明, 李孟军. 国内反恐情报及预警系统框架设计[J]. 中国人民公安大学学报: 社会科学版, 2012, 28(4): 117-125. | [48] | (Li Benxian, Mei Jianming, Li mengjun. China’s Counter-Terrorism Intelligence and Early Warning System Framework Design[J]. Journal of Chinese People’s Public Security University, 2012, 28(4): 117-125.) | [49] | 刘慧娟. 国外民航反恐预警系统[J]. 中国民用航空, 2013(6): 61-62. | [49] | (Liu Huijuan.Comparative Analysis of Anti-terrorism Alert Systems for Civil Aviation in Western Countries[J]. China Civil Aviation, 2013(6): 61-62.) | [50] | 贾志城. 基于Ad Hoc网络的反恐处突远程监控系统的研究与实现[J]. 自动化与仪器仪表, 2014(3): 108-112. | [50] | (Jia Zhicheng.Research and Implementation of Ad Hoc Network Based on the Remote Monitoring and Control System of Counter Terrorism[J]. Automation & Instrumentation, 2014(3): 108-112.) | [51] | Guo H.A Method of Life Signal Identification Based on BP Neural Network [C]. In: Proceedings of the 4th International Congress on Image and Signal Processing. 2011. | [52] | 杨灵芝, 丁敬达. 论城市突发事件的应急信息管理[J]. 情报科学, 2009, 27(3): 351-355. | [52] | (Yang Lingzhi, Ding Jingda.On Emergency Information Management of City Thunderbolt[J]. Information Science, 2009, 27(3): 351-355.) | [53] | 林曦, 姚乐野. 国内突发事件应急管理的情报工作现状与问题分析[J]. 图书情报工作, 2014, 58(23): 12-18. | [53] | (Lin Xi, Yao Leye.Analysis on Current Situation and Issues of China’s Intelligence Work in Emergency Management[J]. Library and Information Service, 2014, 58(23): 12-18.) | [54] | 秦伟毅, 唐绍辉, 李双明, 等. 广州“5·6”火车站恐怖暴力袭击事件应急医学救援分析[J]. 中华损伤与修复杂志: 电子版, 2015, 10(3): 37-40. | [54] | (Qin Weiyi, Tang Shaohui, Li Shuangming, et al.Emergency Response Analysis of Guangzhou “5·6” Railway Station Terrorist Violent Attack[J]. Chinese Journal of Injury Repair and Wound Healing: Electronic Edition, 2015, 10(3): 37-40.) | [55] | Fuse A, Yokota H.Lessons Learned from the Japan Earthquake and Tsunami, 2011[J]. Journal of Nippon Medical School, 2012, 79(4): 312-315. | [56] | Jones D.Semantic Attacks — A New Wave of Cyber Terrorism[M]. NTA Monitor, 2002. | [57] | Pounder C.Anti-terrorism Legislation: The Impact on The Processing of Data[J]. Computers & Security, 2002, 21(3): 240-245. | [58] | 朱文. 网络反恐:编织国际法律的“天罗地网”[J]. 中国信息安全, 2014(10): 86-89. | [58] | (Zhu Wen.Network Terrorism: International Law “Weaving Nets Above and Snares Below”[J]. China Information Security, 2014(10): 86-89.) | [59] | 皮勇. 全球化信息化背景下国内网络恐怖活动及其犯罪立法研究——兼评国内《刑法修正案(九)(草案)》和《反恐怖主义法(草案)》相关反恐条款[J]. 政法论丛, 2015(1): 68-79. | [59] | (Pi Yong.Research on Cyber-Terrorism in China and the Related Criminal Law——Comment on the Provisions in the Draft of 9th Amendment of Penal Code and the Draft of Anti-terrorism Law[J]. Journal of Political Science and Law, 2015(1): 68-79.) | [60] | 李本先, 梅建明. 国内反恐研究热点问题与未来方向[J]. 中国人民公安大学学报: 社会科学版, 2015, 31(3): 1-9. | [60] | (Li Benxian, Mei Jianming.The Hot Issues and Future Direction of China’s Anti-terrorism Research[J]. Journal of People’s Public Security University of China: Social Sciences Edition, 2015, 31(3): 1-9.) |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|