Skip to main content

Tracing the Event Evolution of Terror Attacks from On-Line News

  • Conference paper
Intelligence and Security Informatics (ISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3975))

Included in the following conference series:

Abstract

Since the September 11th terror attack at New York in 2001, the frequency of terror attacks around the world has been increasing and it draws more attention of the public. On January 20 of 2006, CNN reported that al Qaeda leader Osama bin Laden had released a tape claiming that a series of terror attacks were planned in US. These attacks and messages from terrorists are threatening everyone in the world. As an intelligence officer or a citizen in any countries, we are interested in the development of the terror attacks around us. We can easily extract hundreds or thousands of news stories of any terror attack incidents from newswires such as CNN.com but the volume of information is too large to capture the information we need. Information retrieval techniques such as Topic Detection and Tracking are able to organize the news stories as events within a topic of terror attack. However, they are incapable to present the complex evolution relationships between the events. We are interested to learn what the major events but also how they develop within the topic of a terror attack. It is beneficial to identify the starting and ending events, the seminal events and the evolution of these events. In this work, we propose to utilize the temporal relationship, event similarity, temporal proximity and document distributional proximity to identify the event evolution relationships between events in a terror attack incident. An event evolution graph is utilized to present the underlying structure of events for efficient browsing and extracting information. Case study and experiment are presented to illustrate and show the performance of our proposing technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Allan, J. (ed.): Topic Detection and Tracking: Event Based Information Organization. Kluwer Academic Publishers, Dordrecht (2000)

    Google Scholar 

  2. Allan, J., Carbonell, J., Doddington, G., Yamron, J., Yang, Y.: Topic Detection and Tracking Pilot Study Final Report. In: Proceedings of the Broadcast News Transcription and Understanding Workshop (1998)

    Google Scholar 

  3. Allan, J., Papka, R., Lavrenko, V.: On-line New Event Detection and Iracking. In: Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 37–45. ACM Press, New York (1998)

    Chapter  Google Scholar 

  4. Allen, J.F.: Maintaining Knowledge about Temporal Intervals. Communications of the ACM 26(11), 832–843 (1983)

    Article  MATH  Google Scholar 

  5. Carthy, J.: Lexical Chains for Topic Detection. Technical Report in Department of Computer Science: National University of Dublin (2002)

    Google Scholar 

  6. Makkonen, J.: Investigations on Event Evolution in TDT. In: Proceedings of HLT-NAACL 2003 Student Workshop, pp. 43–48 (2004)

    Google Scholar 

  7. Mei, Q., Zhai, C.: Discovering Evolutionary Theme Patterns from Text: an Exploration of Temporal Text Mining. In: Proceeding of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 198–207 (2005)

    Google Scholar 

  8. Nallapati, R., Feng, A., Peng, F., Allan, J.: Event Threading within News Topics. In: Proceedings of the 2004 Thirteenth ACM Conference on Information and Knowledge Management, pp. 446–453 (2004)

    Google Scholar 

  9. Wei, C.-P., Chang, Y.-H.: Discovering Event Evolution Patterns from Document Sequences. In: IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, (forthcoming)

    Google Scholar 

  10. Yang, C.C., Shi, X.: Tracking the Evolution of News Events. In: Proceedings of the Workshop on the Science of the Artificial, Taiwan (December 2005)

    Google Scholar 

  11. Yang, Y., Carbonell, J., Brown, R., Pierce, T., Archibald, B.T., Liu, X.: Learning Approaches for Detecting and Tracking News Events. IEEE Intelligent Systems 14(4), 32–43 (1999)

    Article  Google Scholar 

  12. Yang, Y., Ault, T., Pierce, T., Lattimer, C.W.: Improving Text Categorization Methods for Event Tracking. In: Proceedings of the 23rd International ACM SIGIR Conference on Research and Development in Information Retrieval, Athens, Greece (2000)

    Google Scholar 

  13. Yang, Y., Carbonell, J., Brown, R., Lafferty, J., Pierce, T., Ault, T.: Multi-Strategy Learning for TDT. In: Allan, J. (ed.) Topic Detection and Tracking: Event-based Information Organization, pp. 85–114. Kluwer Academic Publishers, Norvell (2002)

    Google Scholar 

  14. Yang, Y., Zhang, J., Carbonell, J., Jin, C.: Topic-conditioned Novelty Detection. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, C.C., Shi, X., Wei, CP. (2006). Tracing the Event Evolution of Terror Attacks from On-Line News. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_30

Download citation

  • DOI: https://doi.org/10.1007/11760146_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34478-0

  • Online ISBN: 978-3-540-34479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics