{"id":"https://openalex.org/W2123924992","doi":"https://doi.org/10.1109/hicss.2005.317","title":"Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives","display_name":"Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives","publication_year":2005,"publication_date":"2005-04-01","ids":{"openalex":"https://openalex.org/W2123924992","doi":"https://doi.org/10.1109/hicss.2005.317","mag":"2123924992"},"language":"en","primary_location":{"id":"doi:10.1109/hicss.2005.317","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2005.317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073748197","display_name":"Terrence A. Maxwell","orcid":null},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"T.A. Maxwell","raw_affiliation_strings":["School of Information Science and Policy, Albany, NY, USA","University at Albany , NY,"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Policy, Albany, NY, USA","institution_ids":["https://openalex.org/I392282"]},{"raw_affiliation_string":"University at Albany , NY,","institution_ids":["https://openalex.org/I392282"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5073748197"],"corresponding_institution_ids":["https://openalex.org/I392282"],"apc_list":null,"apc_paid":null,"fwci":1.3163,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.84809309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"134c","last_page":"134c"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.7581318616867065},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6796098947525024},{"id":"https://openalex.org/keywords/false-positives-and-false-negatives","display_name":"False positives and false negatives","score":0.5713025331497192},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5039121508598328},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4918856620788574},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.46691539883613586},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3818712830543518},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1665884256362915},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13843324780464172}],"concepts":[{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.7581318616867065},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6796098947525024},{"id":"https://openalex.org/C112789634","wikidata":"https://www.wikidata.org/wiki/Q18207010","display_name":"False positives and false negatives","level":3,"score":0.5713025331497192},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5039121508598328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4918856620788574},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.46691539883613586},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3818712830543518},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1665884256362915},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13843324780464172},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hicss.2005.317","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2005.317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320315885","display_name":"Australian Government","ror":"https://ror.org/0314h5y94"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W332208005","https://openalex.org/W2091840223","https://openalex.org/W2103299013","https://openalex.org/W2108971776","https://openalex.org/W2155822737","https://openalex.org/W2586636305","https://openalex.org/W2797148639","https://openalex.org/W2964098880","https://openalex.org/W6766248245","https://openalex.org/W6817799170"],"related_works":["https://openalex.org/W1557094818","https://openalex.org/W2183246718","https://openalex.org/W4292605373","https://openalex.org/W1973412793","https://openalex.org/W4226316650","https://openalex.org/W2099261052","https://openalex.org/W2951146195","https://openalex.org/W3123215897","https://openalex.org/W2153600354","https://openalex.org/W4243739114"],"abstract_inverted_index":{"Since":[0],"9/11,":[1],"intelligence":[2],"agencies":[3],"in":[4],"the":[5,32,59,78,83],"United":[6],"States":[7],"have":[8,24],"expanded":[9],"experimentation":[10],"and":[11,16,29,38],"use":[12,84],"of":[13,58,62,85,91],"data":[14,63,86],"mining":[15,64],"analysis":[17],"techniques":[18],"to":[19,66],"combat":[20],"terrorism.":[21],"These":[22],"efforts":[23],"generated":[25],"significant":[26],"privacy":[27,47,92],"concerns":[28,90],"discussions":[30,48],"about":[31],"appropriate":[33],"balance":[34],"between":[35],"civil":[36],"liberties":[37],"technology-aided":[39],"information":[40],"integration.":[41],"This":[42],"paper":[43],"argues":[44],"that":[45],"while":[46],"are":[49],"important,":[50],"they":[51],"should":[52],"be":[53,95],"framed":[54],"within":[55],"a":[56],"discussion":[57],"likely":[60],"ability":[61],"systems":[65],"meet":[67],"their":[68],"stated":[69],"policy":[70],"goals.":[71],"If":[72],"goal":[73],"success":[74],"is":[75],"not":[76],"assured,":[77],"decision":[79],"calculus":[80],"for":[81],"balancing":[82],"integration":[87],"technology":[88],"against":[89],"abuse":[93],"will":[94],"significantly":[96],"altered.":[97]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
