The Terrorism Informatics: Data Mining And Knowledge Management For The Homeland Security

Read Complete Research Material



The Terrorism Informatics: Data Mining and Knowledge Management for the Homeland Security

The Terrorism Informatics: Data Mining and Knowledge Management for the Homeland Security

Resources to be used in the Research

In order to carry out research on the terrorism informatics, different sources will be used. The sources that will be accessed include online resources, books, articles, and journals. For acquiring information related to knowledge management for the homeland security, following databases will be accessed:

Homeland Security Digital Library

Statistical Abstract: Federal Agency Statistics Reports

Uniform Crime Reports

Emerald

International Security and Counter Terrorism Reference Center

Security Management Practices

Sage Journals

The research journals that will be accessed for gathering information include following:

Journal of Business Continuity & Emergency Planning

Journal of Homeland Security & Emergency Management

Information Systems Frontiers

Purpose Statement

Since the 9/11 terrorist attacks, the importance of homeland security has become magnified in the United States. A considerable attention has been given to different ways in which intelligence is gathered, analyzed as well as disseminated. Today, a number of threats have been posed to the United States by different terrorist group. The terrorist issues have now become national security threats.

Data mining is a critical feature of homeland security initiatives. Data mining is a method that is used for the detection of fraud, assessment of risk, and others. The process of data mining involves different tools that are used to discover patterns and relationships present in large data sets. Data mining has several important implications in the context of homeland security. Data mining is considered to be a potential means to identify different terrorist activities including the transfer of money, communications, and others (Randol, 2009).

Research Hypothesis

This research is based on the hypothesis that there are several terrorist threats in the United States to the homeland security. The research has also hypothesized that data mining and knowledge management are important tools that have several important implications for homeland security.

Significance of the Study

The successful completion of this research will help in understanding the implications and limitations of data mining and knowledge management for homeland security. It has been argued that data mining is helpful in revealing important patterns and relationships. The study will determine the patterns that this technique can analyze. The study will also be helpful in understanding key skills and abilities required for data mining.

Draft of the Course Paper

The course paper will consist of five sections including introduction, literature review, methodology, findings, and conclusion. The first chapter of the research will be the introduction. The introduction section will include background information of the research along with research objectives and significance. The purpose of the first chapter of this research is to understand the background information of this study. The introduction chapter will explain why and how this study is importance.

The literature review section will present arguments that have been presented in the existing studies. The literature review section will present information regarding the threats of terrorism in the United States. The section will also explore different methods that could be used in order to prevent security threats. The literature review section aims to ...
Related Ads