Filtration of Terrorism-Related Texts in the E-Government Environment

Filtration of Terrorism-Related Texts in the E-Government Environment

Rasim M. Alguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Ramiz M. Aliguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan) and Gunay Y. Niftaliyeva (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan)
DOI: 10.4018/978-1-7998-2466-4.ch083

Abstract

E-government expresses the process of utilizing advanced information and communication technologies (ICT) to automate internal activities of government agencies and their external relations with citizens and businesses. All these interactions provide better, faster and more secure public services. In this article, a method for the detection of terrorism-related activities in the e-government environment has been suggested. In the proposed method, terrorism-related activities are defined based on the similarity between the users' opinions and the vocabulary database created linked to terrorism.
Chapter Preview
Top

2. Terrorism And The Internet

Due to the increased use of the Internet, a large number of new technologies are appearing on different dynamic platforms, which makes the use of it possible for malicious people on damaging society and people. Therefore, if the internet is accepted as a large digital library, we can observe billions of pages accessible information available here, and many of them are in the interest of terrorist groups. For example, terrorists can get information about vehicles, nuclear power plants, public buildings, airports and ports, and even anti-terrorism measures from the Internet.

The use of online platforms by terrorists is not novel. After the September 11 attacks and the anti-terrorism operations, a large number of terrorist groups passed in the cyberspace, establishing thousands of websites promoting their messages and activities. Many terrorist websites were targeted by intelligence and law enforcement agencies, and anti-terrorist services.

Complete Chapter List

Search this Book:
Reset