{"id":"https://openalex.org/W2086946047","doi":"https://doi.org/10.1109/isi.2012.6284279","title":"Categorizing temporal events: A case study of domestic terrorism","display_name":"Categorizing temporal events: A case study of domestic terrorism","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2086946047","doi":"https://doi.org/10.1109/isi.2012.6284279","mag":"2086946047"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2012.6284279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284279","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101455869","display_name":"Wingyan Chung","orcid":"https://orcid.org/0000-0002-5102-5844"},"institutions":[{"id":"https://openalex.org/I184654094","display_name":"Fayetteville State University","ror":"https://ror.org/03rj92e31","country_code":"US","type":"education","lineage":["https://openalex.org/I184654094"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wingyan Chung","raw_affiliation_strings":["School of Business and Economics, UNC Fayetteville State University, Fayetteville, NC, USA","UNC Fayetteville State University, School of Business and Economics, Fayetteville, North Carolina 28301, USA"],"affiliations":[{"raw_affiliation_string":"School of Business and Economics, UNC Fayetteville State University, Fayetteville, NC, USA","institution_ids":["https://openalex.org/I184654094"]},{"raw_affiliation_string":"UNC Fayetteville State University, School of Business and Economics, Fayetteville, North Carolina 28301, USA","institution_ids":["https://openalex.org/I184654094"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101455869"],"corresponding_institution_ids":["https://openalex.org/I184654094"],"apc_list":null,"apc_paid":null,"fwci":2.9111,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.92577099,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"21","issue":null,"first_page":"159","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9453999996185303,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9453999996185303,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9409999847412109,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.6554540395736694},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.563194751739502},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3698752522468567},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.21236664056777954},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08788806200027466}],"concepts":[{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.6554540395736694},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.563194751739502},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3698752522468567},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.21236664056777954},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08788806200027466}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isi.2012.6284279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284279","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.uncfsu.edu:college_business_economics-1104","is_oa":false,"landing_page_url":"https://digitalcommons.uncfsu.edu/college_business_economics/105","pdf_url":null,"source":{"id":"https://openalex.org/S4306400276","display_name":"DigitalCommons@Fayetteville State University (Fayetteville State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184654094","host_organization_name":"Fayetteville State University","host_organization_lineage":["https://openalex.org/I184654094"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"College of Business and Economics","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1833785989","https://openalex.org/W1981745473","https://openalex.org/W1987915487","https://openalex.org/W2018651639","https://openalex.org/W2025678938","https://openalex.org/W2101287943","https://openalex.org/W2128213723","https://openalex.org/W2157315510","https://openalex.org/W2164337513","https://openalex.org/W4252565443","https://openalex.org/W4256224324"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W569815712","https://openalex.org/W4235672678","https://openalex.org/W1894594762","https://openalex.org/W1487740203","https://openalex.org/W1590627964","https://openalex.org/W1982644550","https://openalex.org/W1973338178","https://openalex.org/W2103198501"],"abstract_inverted_index":{"In":[0,68],"many":[1],"emergency":[2,193],"incidents,":[3],"multiple":[4],"reports":[5],"and":[6,15,29,92,119,153,182,192],"information":[7,33],"sources":[8],"are":[9],"often":[10],"used":[11,135],"to":[12,18,49,76,133,161,185],"help":[13],"intelligence":[14,183],"security":[16,61],"personnel":[17,184],"understand":[19,186],"the":[20,36,137,167,187],"situation":[21],"during":[22],"a":[23,97,111,141],"short":[24],"time":[25],"period.":[26],"Proper":[27],"categorization":[28,55,139],"analysis":[30],"of":[31,38,43,54,56,87,100,124,127,144],"this":[32,40,69],"could":[34],"enhance":[35],"efficiency":[37],"handling":[39],"large":[41],"amount":[42],"potentially":[44],"conflicting":[45],"information,":[46],"thus":[47],"contributing":[48],"saving":[50],"lives.":[51],"The":[52,84,175],"study":[53,99],"temporal":[57,78,138],"events":[58,79],"in":[59,81,116,136],"cyber":[60],"application":[62],"is,":[63],"however,":[64],"not":[65],"widely":[66],"found.":[67],"research,":[70],"we":[71,104],"developed":[72],"an":[73],"automated":[74],"approach":[75,85],"categorizing":[77],"described":[80],"textual":[82,129,190],"documents.":[83],"consists":[86],"automatic":[88,93],"indexing,":[89],"term":[90],"extraction,":[91],"categorization.":[94],"We":[95],"conducted":[96],"case":[98],"domestic":[101],"terrorism":[102],"where":[103],"analyzed":[105],"96":[106],"online":[107],"news":[108],"articles":[109],"about":[110],"shooting":[112],"tragedy":[113],"that":[114],"resulted":[115],"6":[117],"deaths":[118],"1":[120],"seriously":[121],"injured.":[122],"Analyses":[123],"different":[125,148],"numbers":[126],"extracted":[128],"features":[130,172,191],"(from":[131,159],"20":[132],"100)":[134],"revealed":[140],"gradual":[142],"improvement":[143,158],"classification":[145,155],"accuracies":[146],"across":[147],"algorithms":[149],"used.":[150,174],"Na\u00efve":[151],"Bayes":[152],"SVM":[154],"provided":[156],"stable":[157],"47%":[160],"68%),":[162],"whereas":[163],"Neural":[164],"Network":[165],"had":[166],"highest":[168],"accuracy":[169],"when":[170],"70":[171],"were":[173],"results":[176],"provide":[177],"new":[178],"insights":[179],"for":[180],"researchers":[181],"relationship":[188],"between":[189],"event":[194],"evolution.":[195]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
