Mining Semantic Relationships Between Concepts Across

Total Page:16

File Type:pdf, Size:1020Kb

Mining Semantic Relationships Between Concepts Across MINING SEMANTIC RELATIONSHIPS BETWEEN CONCEPTS ACROSS DOCUMENTS USING WIKIPEDIA KNOWLEDGE A Dissertation Submitted to the Graduate Faculty of the North Dakota State University of Agriculture and Applied Science By Peng Yan In Partial Fulfillment for the Degree of DOCTOR OF PHILOSOPHY Major Department: Computer Science September 2013 Fargo, North Dakota North Dakota State University Graduate School Title Mining Semantic Relationships between Concepts across Documents using Wikipedia Knowledge By Peng Yan The Supervisory Committee certifies that this disquisition complies with North Dakota State University’s regulations and meets the accepted standards for the degree of DOCTOR OF PHILOSOPHY SUPERVISORY COMMITTEE: Wei Jin Chair Brian M. Slator Juan Li Ying Huang Approved: 11/01/2013 Brian M. Slator Date Department Chair ABSTRACT The ongoing astounding growth of text data has created an enormous need for fast and efficient Text Mining algorithms. However, the sparsity and high dimensionality of text data present great challenges for representing the semantics of natural language text. Traditional approaches for document representation are mostly based on the Vector Space (VSM) Model which takes a document as an unordered collection of words and only document-level statistical information is recorded (e.g., document frequency, inverse document frequency). Due to the lack of capturing semantics in texts, for certain tasks, especially fine-grained information discovery applications, such as mining relationships between concepts, VSM demonstrates its inherent limitations because of its rationale for computing relatedness between words only based on the statistical information collected from documents themselves. In this dissertation, we present a new framework that attempts to address the above problems by utilizing background knowledge to provide a better semantic representation of any text. This is accomplished through leveraging Wikipedia, the world’s currently largest human built encyclopedia. Meanwhile, this integration also sufficiently complements the existing information contained in text corpus and facilitates the construction of a more comprehensive representation and retrieval framework. Specifically, we present 1) Semantic Path Chaining (SPC), a new text mining model that automatically discovers semantic relationships between concepts across multiple documents (which the traditional search paradigm such as search engines cannot help much) and effectively integrates various evidence sources from Wikipedia; 2) the kernel methods that provide a more appropriate estimation of semantic relatedness between concepts and better utilize Wikipedia background knowledge in our defined query contexts; 3) Concept Association Graph (CAG), a iii graph-based mining prototype system interfaced directly to Wikipedia, enables fast and customizable concept relationship search using Wikipedia resources. The effectiveness of the proposed techniques has been evaluated on different data sets. The experimental results demonstrate the search performance has been significantly enhanced in terms of accuracy and coverage compared with several baseline models. In particular, some existing state-of-the-art related work such as Srinivasan’s closed text mining algorithm, Explicit Semantic Analysis (ESA) [19] and the RelFinder system [26, 27, 41] has been used as the comparison models. iv ACKNOWLEDGMENTS First and foremost, I would like to thank my advisor, Dr. Wei Jin, who offered me an opportunity to come to the U.S. to pursue my PH.D study, introduced me to the research area of text mining, and gave excellent guidance and enormous support to my research. It was Dr. Jin who helped me out of numerous research difficulties, enlightened me with constructive advice, and guided me to move forward along the right track during my research. I have been always feeling that it is my great luck to have such a nice advisor who is strict towards my research in school but treats me as a friend in normal times. Without her guidance, I would never be able to complete my PH.D work. I am also very grateful to Dr. Brian Slator, who brought me to the research field of immersive virtual environments, and has been supporting my study over the past 17 months. Because of Dr. Slator, I was able to continue my study, and had a chance to apply one of the models proposed in this dissertation into the real world software industry. I was honored to be a member in his development team and work with so many talented engineers I wish to express my love and gratitude to my beloved brother, Fei Yan, who works hard in China and takes almost all of the responsibilities for my parents that I should have taken, so that I can focus on my study. If it had not been for supporting my life in the U.S., he would have had a car that he had craved for two years. No matter how far we are away from each other, I want to let him know my heart has always been with him. Also, I want to thank my parents, who pushed the longing of wanting me to go back and stay with them down into the dim recesses of their minds, understood and supported me in all moments of my life. v I would also like to thank my wife, Shuhui Ren, who sacrificed her personal career and life in China, and came here to take care of me. We lived a hard life together due to the financial embarrassment, but she had never complained to me and always unconditionally supported me for the past two years. I would never forget those numerous late nights she accompanied me either in school or at home for catching up with approaching conference deadlines. My current achievement is at too much cost of her interests. Deepest gratitude is also due to members of my committee, Dr. Juan Li, Dr. Ying Huang without whose assistance, this study would not have been completed. vi DEDICATION I dedicate this dissertation to my brother, my parents and my wife. vii TABLE OF CONTENTS ABSTRACT ................................................................................................................................... iii ACKNOWLEDGMENTS .............................................................................................................. v DEDICATION .............................................................................................................................. vii LIST OF TABLES ....................................................................................................................... xiii LIST OF FIGURES ..................................................................................................................... xiv CHAPTER 1. INTRODUCTION ................................................................................................... 1 1.1. Problem Description and Motivation ............................................................................. 2 1.2. Research Contributions .................................................................................................. 4 1.3. System Overview ........................................................................................................... 6 1.4. Organization of the Dissertation .................................................................................... 9 CHAPTER 2. LITERATURE REVIEW ...................................................................................... 10 2.1. Vector Space Model ..................................................................................................... 10 2.1.1. TFIDF Weighting Scheme ................................................................................. 10 2.1.2. Limitations of Vector Space Model ................................................................... 12 2.2. VSM-based Approaches ............................................................................................... 12 2.2.1. Cross-Document Coreference ............................................................................ 12 2.2.2. Open and Closed Discovery Algorithm ............................................................. 14 2.2.3. Concept Chain Queries ...................................................................................... 16 2.3. Web Oriented Approaches for Measuring Semantic Relatedness ............................... 17 2.3.1. Web Page Counts Oriented Approach ............................................................... 17 2.3.2. Related Terms Oriented Approach .................................................................... 18 2.4. WordNet-based Approaches ........................................................................................ 20 viii 2.4.1. Introduction to WordNet .................................................................................... 20 2.4.2. WordNet for Knowledge Representation ........................................................... 21 2.5. DBpedia-based Approaches ......................................................................................... 23 2.5.1. Introduction to DBpedia ..................................................................................... 23 2.5.2. Faceted Wikipedia Search .................................................................................. 24 2.5.3. RelFinder: DBpedia Relationship Finder ........................................................... 26 2.6. Wikipedia-based Approaches ....................................................................................... 28 2.6.1. Introduction to Wikipedia .................................................................................
Recommended publications
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • The Structure of Osama Bin Laden, Al-Qaeda, Hamas and Other Jihadist Organizations in the United States
    Testimony of Steven Emerson Before the Senate Judiciary Committee. "DOJ Oversight: Preserving Our Freedoms While Defending Against Terrorism.” An Investigation into the Modus Operandi of Terrorist Networks in the United States: The Structure of Osama Bin Laden, Al-Qaeda, Hamas and other Jihadist Organizations in the United States December 4, 2001 Steven Emerson Executive Director The Investigative Project Washington, DC Executive Summary On September 11, 2001, thousands of Americans were executed, most of them incinerated in the worst terrorist attack on American soil in the history of the United States. In the wake of this attack, the President of the United States has declared a war against the terrorists. In the war on terrorism, the military component poses the greatest strategic challenge and incurs the greatest potential for American casualties. But from the widest political perspective, the greatest challenge to the United States is the ability to recognize terrorist groups operating under false cover and veneer. Clearly, the success of Osama Bin Laden and his Al-Qaeda network has demonstrated, with murderous consequences, the ability of terrorist groups to hide under the facade of “human rights,” “charitable” and “humanitarian” cover. In addition, the ability of militant Islamic groups to hide under the protection of the larger non-violent and peaceful Islamic community has created a challenge for policymakers and officials, the likes of which has not been present before in American society. Sleeper cells that are believed to number in the tens, possibly hundreds, also constitute a dangerous threat to American society. As someone who has tracked and investigated the activities of militant Islamic fundamentalist networks for the past eight years, I am presenting in the following testimony the results of my recent investigations into the operations of terrorist networks in the United States.
    [Show full text]
  • CARLOS ACOSTA, Et Al., ) ) Plaintiffs, ) ) V
    Case 1:06-cv-00745-RCL Document 33 Filed 08/26/08 Page 1 of 27 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ____________________________________ ) CARLOS ACOSTA, et al., ) ) Plaintiffs, ) ) v. ) ) Civil Action No. 06-745 (RCL) THE ISLAMIC REPUBLIC ) OF IRAN, et al., ) ) Defendants. ) ____________________________________) FINDINGS OF FACT AND CONCLUSIONS OF LAW This action arises from the assassination of Rabbi Meir Kahane and the shooting of Irving Franklin and U.S. Postal Police Officer Carlos Acosta on November 5, 1990, in New York. Plaintiffs are Carlos Acosta and his wife, Maria Acosta, Irving Franklin (on his own behalf and as administrator of his wife Irma Franklin’s estate), and the surviving spouse, mother, children, and sibling of Rabbi Meir Kahane. Rabbi Meir Kahane was killed and Irving Franklin and Carlos Acosta were seriously wounded by El Sayyid Nosair. Nosair was and is a member of Al- Gam’aa Islamiyah (or, the “Islamic Group”), a terrorist organization headed by Sheik Omar Ahmad Ali Abdel Rahman (“Sheik Abdel Rahman”). Plaintiffs allege that the Islamic Republic of Iran (“Iran”), and the Iranian Ministry of Information and Security (“MOIS”), are liable for damages from the shooting because they provided material support and assistance to the Islamic Group. As such, defendants are subject to suit under the recently revised terrorist exception to Case 1:06-cv-00745-RCL Document 33 Filed 08/26/08 Page 2 of 27 the Foreign Sovereign Immunities Act (“FSIA”), 28 U.S.C. § 1605A.1 This matter is a re-filing of the same claims that previously were the subject matter of Acosta v.
    [Show full text]
  • Brother Saul Text: Acts 9:1-19A Date: July 16, 2017 Context: WWPC By: Rev
    Sermon: Brother Saul Text: Acts 9:1-19a Date: July 16, 2017 Context: WWPC By: Rev. Dr. Steve Runholt He fell to the ground and heard a voice saying to him, ‘Saul, Saul, why do you persecute me?’ Acts 9:4 Like the story I just read, the story I’m about to tell you is a little hard to hear. And because I’ve never had the experience of watching people get up as a group and walk out on me while I’m preaching, I want to assure you from the start that it’s a good story, and a hopeful one. It’s also an important and timely story, which is why I want to start with it this morning. It’s about a young man named Zak Ebrahim. Zak is an American-born peace activist from Pennsylvania. He’s the son of an American mother, and an Egyptian father. He recently gave a talk about how he came to find his vocation as a peace activist. He stared the talk this way: On November 5th, 1990, a man named El-Sayyid Nosair walked into a hotel in Manhattan and assassinated Rabbi Meir Kahane, the leader of the Jewish Defense League. Nosair was initially found not guilty of the murder, but while serving time on lesser charges, he and other men began planning attacks on a dozen New York City landmarks, including tunnels, synagogues and the United Nations headquarters.1 1 Zak’s full talk, which has been viewed more than four million times, can be found here: https://www.ted.com/talks/zak_ebrahim_i_am_the_son_of_a_terrorist_here_s_how_i_chose_peace 1 Pause right there.
    [Show full text]
  • Routledge Handbook of U.S. Counterterrorism and Irregular
    ‘A unique, exceptional volume of compelling, thoughtful, and informative essays on the subjects of irregular warfare, counter-insurgency, and counter-terrorism – endeavors that will, unfortunately, continue to be unavoidable and necessary, even as the U.S. and our allies and partners shift our focus to Asia and the Pacific in an era of renewed great power rivalries. The co-editors – the late Michael Sheehan, a brilliant comrade in uniform and beyond, Liam Collins, one of America’s most talented and accomplished special operators and scholars on these subjects, and Erich Marquardt, the founding editor of the CTC Sentinel – have done a masterful job of assembling the works of the best and brightest on these subjects – subjects that will continue to demand our attention, resources, and commitment.’ General (ret.) David Petraeus, former Commander of the Surge in Afghanistan, U.S. Central Command, and Coalition Forces in Afghanistan and former Director of the CIA ‘Terrorism will continue to be a featured security challenge for the foreseeable future. We need to be careful about losing the intellectual and practical expertise hard-won over the last twenty years. This handbook, the brainchild of my late friend and longtime counter-terrorism expert Michael Sheehan, is an extraordinary resource for future policymakers and CT practitioners who will grapple with the evolving terrorism threat.’ General (ret.) Joseph Votel, former commander of US Special Operations Command and US Central Command ‘This volume will be essential reading for a new generation of practitioners and scholars. Providing vibrant first-hand accounts from experts in counterterrorism and irregular warfare, from 9/11 until the present, this book presents a blueprint of recent efforts and impending challenges.
    [Show full text]
  • Hamas, Islamic Jihad the Muslim Brotherhood
    ADL Special Background Report: Hamas, Islamic Jihad and The Muslim Brotherhood: Islamic Extremists and the Terrorist Threat to America 1913·1993 ' .' From: December 21, 1994 Michael Winograd FOR YOUR INFORMATION To: Dr. Samuel Portnoy As per your request. Sincerely, ANTI-DEFAMATION l"EAGUE OF B'NAI B•RITH FLORIDA RE.GIONAL OFFICE 373-6306 SUITE 800- lSO S.E. 2nd AVE. MIAMI9 FLORIDA 33131 Melvin Salberg, National Chairman Abraham H. Foxman, National Director David H. Strassler, Chair, National Executive Commirtee Peter T. Willner, Associate National Direct.or Meyer Eisenberg, Chair, Civil Rights Comn1ittee Jeffrey P. Sinensky, Director, Civil Rights Division Gary Zaslav, Chair, Fact Finding and Research Committee This publication was made possible by the Marilyn and Leon Klinghoffer Memorial Foundation. ADL Special Background Report is a publication of the Civil Rights Division Research and Evaluation Department. This issue prepared by Yehudit Barsky, Research Analyst. Edited by Alan M. Schwartz, Director, Research and Evaluation Department © 1993 The Anti,Defamation League 823 United Nations Plaza, New York, NY 10017 TABLE OF CONTENTS . Holy War: Now or Later? ........................................................................................ 5 Refuge in Mosques ................................................................................................... 5 Support From Abroad: Money No Object ............................................................. 6 Haven in the Land of the Free ...............................................................................
    [Show full text]
  • Foreign Aid and the Fight Against Terrorism and Proliferation: Leveraging Foreign Aid to Achieve U.S
    FOREIGN AID AND THE FIGHT AGAINST TERRORISM AND PROLIFERATION: LEVERAGING FOREIGN AID TO ACHIEVE U.S. POLICY GOALS HEARING BEFORE THE SUBCOMMITTEE ON TERRORISM, NONPROLIFERATION, AND TRADE OF THE COMMITTEE ON FOREIGN AFFAIRS HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS SECOND SESSION JULY 31, 2008 Serial No. 110–225 Printed for the use of the Committee on Foreign Affairs ( Available via the World Wide Web: http://www.foreignaffairs.house.gov/ U.S. GOVERNMENT PRINTING OFFICE 43–840PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON FOREIGN AFFAIRS HOWARD L. BERMAN, California, Chairman GARY L. ACKERMAN, New York ILEANA ROS-LEHTINEN, Florida ENI F.H. FALEOMAVAEGA, American CHRISTOPHER H. SMITH, New Jersey Samoa DAN BURTON, Indiana DONALD M. PAYNE, New Jersey ELTON GALLEGLY, California BRAD SHERMAN, California DANA ROHRABACHER, California ROBERT WEXLER, Florida DONALD A. MANZULLO, Illinois ELIOT L. ENGEL, New York EDWARD R. ROYCE, California BILL DELAHUNT, Massachusetts STEVE CHABOT, Ohio GREGORY W. MEEKS, New York THOMAS G. TANCREDO, Colorado DIANE E. WATSON, California RON PAUL, Texas ADAM SMITH, Washington JEFF FLAKE, Arizona RUSS CARNAHAN, Missouri MIKE PENCE, Indiana JOHN S. TANNER, Tennessee JOE WILSON, South Carolina GENE GREEN, Texas JOHN BOOZMAN, Arkansas LYNN C. WOOLSEY, California J. GRESHAM BARRETT, South Carolina SHEILA JACKSON LEE, Texas CONNIE MACK, Florida RUBE´ N HINOJOSA, Texas JEFF FORTENBERRY, Nebraska JOSEPH CROWLEY, New York MICHAEL T. MCCAUL, Texas DAVID WU, Oregon TED POE, Texas BRAD MILLER, North Carolina BOB INGLIS, South Carolina LINDA T.
    [Show full text]
  • Complete 911 Timeline
    The following information comes from historycommons.org, which has done yeoman’s work cataloguing some key facts (from a range of sources, with citations) related to the financing of terrorism and other issues. Deep Capture has checked historycommons.org’s information and has found it to be almost uniformly accurate. It is, at any rate, as accurate a history as can be mined from public sources. Deep Capture encourages its readers to visit historycommons.org and dig through its archives. But since information doesn’t always remain on the internet foreover, we provide some of the information here in a more permanent PDF format. http://www.historycommons.org/timeline.jsp?timeline=complete_911_timeline&projects_and_programs= vulgarBetrayal Complete 911 Timeline Robert Wright and Operation Vulgar Betrayal Project: Complete 911 Timeline Open-Content project managed by matt, Paul, KJF, blackmax add event | references 1986-October 1999: New Jersey Firm Investors List Is ‘Who’s Who of Designated Terrorists’ Soliman Biheiri. [Source: US Immigrations and Customs]BMI Inc., a real estate investment firm based in Secaucus, New Jersey, is formed in 1986. Former counterterrorism “tsar” Richard Clarke will state in 2003, “While BMI [has] held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support. BMI‟s investor list reads like a who‟s who of designated terrorists and Islamic extremists.” Investors in BMI include: [US CONGRESS, 10/22/2003] Soliman Biheiri. He is the head of BMI for the duration of the company‟s existence.
    [Show full text]
  • Crimes Committed by Terrorist Groups: Theory, Research and Prevention
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Crimes Committed by Terrorist Groups: Theory, Research and Prevention Author(s): Mark S. Hamm Document No.: 211203 Date Received: September 2005 Award Number: 2003-DT-CX-0002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Crimes Committed by Terrorist Groups: Theory, Research, and Prevention Award #2003 DT CX 0002 Mark S. Hamm Criminology Department Indiana State University Terre Haute, IN 47809 Final Final Report Submitted: June 1, 2005 This project was supported by Grant No. 2003-DT-CX-0002 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Abstract .............................................................. iv Executive Summary....................................................
    [Show full text]
  • Download Mubarak Hamed Combined Exhibits
    Exhibit A Affidavit of Good Cause United States v. Mubarak Ahmed Hamed (W.D. Mo.) COMPLAINT TO REVOKE NATURALIZATION Case 2:18-cv-04024-BCW Document 1-1 Filed 02/07/18 Page 1 of 8 UNITED STATES OF AMERICA ) ) KANSAS CITY, MISSOURI ) ) In the matter of the Revocation ) of the Naturalization of ) ) MUBARAK AHMED HAMED ) AFFIDAVIT OF GOOD CAUSE ~44 ) I, Gina Cox, declare under penalty of perjury as follows: 1. I am a Special Agent for the United States Department of Homeland Security (DHS), United States Immigration and Customs Enforcement (ICE). In this capacity, I have access to the official records ofDHS, including the immigration file of Mubarak Ahmed Hamed, Alllllllllll644. 2. I have examined the records relating to Mr. Hamed. Based on a review of these records, I state, on information and belief, that the information set forth in this Affidavit of Good Cause is true and correct. 3. On November 23, 1999, Mr. Hamed filed an application for naturalization, Form N-400, with the Kansas City District Office of the Immigration and Naturalization Service (INS), 1 now the United States Citizenship and Immigration Service (USCIS). An officer of the INS interviewed Mr. Hamed on May 8, 2000, to determine his eligibility for naturalization. Based on information contained in the naturalization application, his testimony at the naturalization interview, and the documentary evidence he provided, the INS approved Mr. Hamed's application for naturalization on May 8, 2000. On July 21, 2000, Mr. Hamed took the Oath 1 As of March 1, 2003, the INS ceased to exist and its functions were transferred to various agencies within OHS.
    [Show full text]
  • The Falsified War on Terror: How the US Has Protected Some of Its Enemies
    Volume 11 | Issue 40 | Number 2 | Article ID 4005 | Oct 01, 2013 The Asia-Pacific Journal | Japan Focus The Falsified War on Terror: How the US Has Protected Some of Its Enemies Peter Dale Scott surveillance matters by its own Foreign Intelligence Surveillance Court, known as the German translation available FISA court, which according to the New York Times “has quietly become almost a parallel Before World War Two American government, Supreme Court.”3 Thanks largely to Edward for all of its glaring faults, also served as a Snowden, it is now clear that the FISA Court model for the world of limited government, has permitted this deep state to expand having evolved a system of restraints on surveillance beyond the tiny number of known executive power through its constitutional arrangement of checks and balances. All that and suspected Islamic terrorists, to any changed with America’s emergence as a incipient protest movement that might dominant world power, and further after the challenge the policies of the American war Vietnam War. machine. Since 9/11, above all, constitutional American Most Americans have by and large not government has been overshadowed by a series questioned this parallel government, accepting of emergency measures to fight terrorism. The that sacrifices of traditional rights and latter have mushroomed in size and budget, traditional transparency are necessary to keep while traditional government has been shrunk. us safe from al-Qaeda attacks. However secret As a result we have today what the journalist power is unchecked power, and experience of Dana Priest has called the last century has only reinforced the truth of Lord Acton’s famous dictum that unchecked power always corrupts.
    [Show full text]
  • The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015
    The author(s) shown below used Federal funding provided by the U.S. Department of Justice to prepare the following resource: Document Title: The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015 Author(s): Jytte Klausen Document Number: 250416 Date Received: November 2016 Award Number: 2012-ZA-BX-0006 This resource has not been published by the U.S. Department of Justice. This resource is being made publically available through the Office of Justice Programs’ National Criminal Justice Reference Service. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. FINAL REPORT The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015. Principal Investigator: Jytte Klausen, Brandeis University. June 2016. This project was supported by Award No. 2012-ZA-BX-0006, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this report are those of the author and do not necessarily reflect those of the U.S. Department of Justice. This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice Contents EXECUTIVE SUMMARY ........................................................................................................... I 1. INTRODUCTION....................................................................................................................
    [Show full text]