{"id":"https://openalex.org/W2043457885","doi":"https://doi.org/10.1142/s0219649203000401","title":"An Integrated Knowledge Management Environment: A Study of Counter Terrorism Technologies","display_name":"An Integrated Knowledge Management Environment: A Study of Counter Terrorism Technologies","publication_year":2003,"publication_date":"2003-09-01","ids":{"openalex":"https://openalex.org/W2043457885","doi":"https://doi.org/10.1142/s0219649203000401","mag":"2043457885"},"language":"en","primary_location":{"id":"doi:10.1142/s0219649203000401","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219649203000401","pdf_url":null,"source":{"id":"https://openalex.org/S30163770","display_name":"Journal of Information & Knowledge Management","issn_l":"0219-6492","issn":["0219-6492","1793-6926"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information &amp; Knowledge Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110190476","display_name":"Stuart H. Rubin","orcid":null},"institutions":[{"id":"https://openalex.org/I1339224429","display_name":"Naval Information Warfare Center Pacific","ror":"https://ror.org/01gs1cg95","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330347796","https://openalex.org/I1339224429","https://openalex.org/I2802223155","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Stuart H. Rubin","raw_affiliation_strings":["SPAWAR Systems Center, San Diego,  CA 92152-5001, USA","SPAWAR Systems Center, San Diego, CA 92152-5001, USA"],"affiliations":[{"raw_affiliation_string":"SPAWAR Systems Center, San Diego,  CA 92152-5001, USA","institution_ids":["https://openalex.org/I1339224429"]},{"raw_affiliation_string":"SPAWAR Systems Center, San Diego, CA 92152-5001, USA","institution_ids":["https://openalex.org/I1339224429"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100671164","display_name":"Wei Dai","orcid":"https://orcid.org/0000-0002-7571-4863"},"institutions":[{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"education","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wei Dai","raw_affiliation_strings":["School of Information Systems, Victoria University of Technology, PO Box 14428, Melbourne City, MC 8001, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Victoria University of Technology, PO Box 14428, Melbourne City, MC 8001, Victoria, Australia","institution_ids":["https://openalex.org/I71270174"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110190476"],"corresponding_institution_ids":["https://openalex.org/I1339224429"],"apc_list":null,"apc_paid":null,"fwci":0.7666,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.84879001,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"02","issue":"03","first_page":"203","last_page":"217"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9319999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9319999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9054999947547913,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.902899980545044,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6690382361412048},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.5437151193618774},{"id":"https://openalex.org/keywords/business-intelligence","display_name":"Business intelligence","score":0.540042519569397},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5097967982292175},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.48892489075660706},{"id":"https://openalex.org/keywords/domain-knowledge","display_name":"Domain knowledge","score":0.48508015275001526},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4700450003147125},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.4545820951461792},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4461193084716797},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3992465138435364},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1492505669593811}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6690382361412048},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.5437151193618774},{"id":"https://openalex.org/C2767350","wikidata":"https://www.wikidata.org/wiki/Q6662173","display_name":"Business intelligence","level":2,"score":0.540042519569397},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5097967982292175},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.48892489075660706},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.48508015275001526},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4700450003147125},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.4545820951461792},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4461193084716797},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3992465138435364},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1492505669593811},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1142/s0219649203000401","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219649203000401","pdf_url":null,"source":{"id":"https://openalex.org/S30163770","display_name":"Journal of Information & Knowledge Management","issn_l":"0219-6492","issn":["0219-6492","1793-6926"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information &amp; Knowledge Management","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:wsi:jikmxx:v:02:y:2003:i:03:n:s0219649203000401","is_oa":false,"landing_page_url":"http://www.worldscientific.com/doi/abs/10.1142/S0219649203000401","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W95727115","https://openalex.org/W1546647560","https://openalex.org/W1787190784","https://openalex.org/W2031221329","https://openalex.org/W2042157954","https://openalex.org/W2072291005","https://openalex.org/W2090036533","https://openalex.org/W2123873762","https://openalex.org/W2145346462","https://openalex.org/W2165094119","https://openalex.org/W2500186585"],"related_works":["https://openalex.org/W569815712","https://openalex.org/W1992686066","https://openalex.org/W2572815910","https://openalex.org/W1487740203","https://openalex.org/W4235672678","https://openalex.org/W1590627964","https://openalex.org/W1583422155","https://openalex.org/W1649619740","https://openalex.org/W3213252596","https://openalex.org/W1534006406"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,58,61,71,79,97,112],"impact":[4],"of":[5,29,82,100,114],"knowledge":[6,117],"management":[7,118],"on":[8],"business":[9,85],"practice":[10],"and":[11,39,63,84,102,109,116],"proposes":[12],"a":[13,27],"software":[14,40],"environment":[15],"that":[16,74,96],"is":[17,93],"in":[18],"line":[19],"with":[20,89],"our":[21,90],"vision.":[22],"It":[23],"necessarily":[24],"ties":[25],"together":[26],"plethora":[28],"interrelated":[30],"computing":[31],"disciplines":[32,44],"\u2014":[33],"including":[34],"artificial":[35],"intelligence,":[36],"database":[37],"systems,":[38],"development":[41,83],"environments.":[42],"These":[43],"are":[45],"treated":[46],"from":[47],"an":[48],"applications":[49],"perspective.":[50],"The":[51],"counter-terrorism":[52],"domain":[53],"was":[54],"chosen":[55],"to":[56,69,120],"demonstrate":[57,70],"links":[59],"between":[60],"technologies":[62],"corporate":[64,103],"requirements":[65],"as":[66,68],"well":[67],"practical":[72],"values":[73],"can":[75,105],"be":[76,106],"achieved":[77],"under":[78],"current":[80],"state":[81],"culture.":[86],"In":[87],"keeping":[88],"vision,":[91],"it":[92],"further":[94],"demonstrated":[95],"large":[98],"volume":[99],"commercial":[101],"data":[104,115],"effectively":[107],"used":[108],"controlled":[110],"through":[111],"integration":[113],"techniques":[119],"meet":[121],"real-time":[122],"information":[123],"services.":[124]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
