Académique Documents
Professionnel Documents
Culture Documents
Learning Objectives
Learning Objectives
Opening Vignette
Mining Text For Security And
Counterterrorism
What is MITRE?
Problem description
Proposed solution
Results
Answer & discuss the case
questions
Opening Vignette:
Mining Text For Security
Spam filtering
Email prioritization and categorization
Automatic response generation
Information extraction
Topic tracking
Summarization
Categorization
Clustering
Concept linking
Question answering
Term dictionary
Word frequency
Part-of-speech tagging
Morphology
Term-by-document matrix
Occurrence matrix
What is a patent?
NLP is
What is Understanding ?
Challenges in NLP
Part-of-speech tagging
Text segmentation
Word sense disambiguation
Syntax ambiguity
Imperfect or irregular input
Speech acts
Dream of AI community
WordNet
Sentiment Analysis
Information retrieval
Information extraction
Named-entity recognition
Question answering
Automatic summarization
Natural language generation & understanding
Machine translation
Foreign language reading & writing
Speech recognition
Text proofing
Optical character recognition
Marketing applications
Security applications
ECHELON, OASIS
Deception detection
example coming up
example coming up
Academic applications
- example coming up
A difficult problem
If detection is limited to only text, then
the problem is even more difficult
The study
Logistic regression
Decision trees 71.60
Neural networks73.46
67.28
Software/hardware limitations
Privacy issues
Linguistic limitations
Extract
knowledge
from available
data sources
A0
Context-specific knowledge
Domain expertise
Tools and techniques
Association
Trend Analysis ()
Journal Year
Author(s)
MISQ
2005
A. Malhotra,
S. Gosain and
O. A. El Sawy
ISR
1999
JMIS
2001
R. Aron and
E. K. Clemons
Title
Vol/No Pages
Absorptive capacity
configurations in
supply chains:
Gearing for partnerenabled market
knowledge creation
D. Robey and
Accounting for the
M. C. Boudreau contradictory
organizational
consequences of
information
technology:
Theoretical directions
and methodological
implications
Keywords
Abstract
29/1
No of Articles
3
3
2
2
1
1
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
C LU S TER : 4
C LU STER : 5
C LU STER : 6
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
5
0
5
0
5
0
5
0
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
5
0
5
0
5
0
5
0
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
3
3
2
2
1
1
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
5
0
5
0
5
0
5
0
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
3
3
2
2
1
1
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
C LU S TER : 1
C LU STER : 2
C LU STER : 3
C LU S TER : 7
C LU STER : 8
C LU STER : 9
Y EAR
IS R
J M IS
M IS Q
IS R
No of Articles
C LU S T ER : 1
J M IS
M IS Q
IS R
C LU S T ER : 2
J M IS
M IS Q
C LU S T E R : 3
100
90
80
70
60
50
40
30
20
10
0
IS R
J M IS
M IS Q
IS R
C LU S T ER : 4
J M IS
M IS Q
IS R
C LU S T ER : 5
J M IS
M IS Q
C LU S T E R : 6
100
90
80
70
60
50
40
30
20
10
0
IS R
J M IS
M IS Q
C LU S T ER : 7
IS R
J M IS
M IS Q
C LU S T ER : 8
JO U R N AL
IS R
J M IS
M IS Q
C LU S T E R : 9
RapidMiner
GATE
Spy-EM
The
The
The
The
The
Web
Web
Web
Web
Web
Web Mining
Authoritative pages
Hubs
hyperlink-induced topic search (HITS)
alg.
Clickstream data
Clickstream analysis
(clickstream analysis)
URL
angoss.com
ClickTracks
clicktracks.com
deepmetrix.com
Megaputer WebAnalyst
megaputer.com
microstrategy.com
sas.com
spss.com
WebTrends
webtrends.com
XML Miner
scientio.com
Questions, comments