Show simple item record

Files in this item

Thumbnail

Item metadata

dc.contributor.advisorWatson, Alison M. S.
dc.contributor.advisorSchmid, Alex
dc.contributor.authorBowie, Neil Gordon
dc.coverage.spatialxiii, 359en_US
dc.date.accessioned2013-06-10T08:40:12Z
dc.date.available2013-06-10T08:40:12Z
dc.date.issued2012
dc.identifier.urihttps://hdl.handle.net/10023/3641
dc.description.abstractData and information of the highest quality are critical to understanding and countering acts of terrorism. As a tool, database technologies are becoming integral to the field of terrorism studies. The intelligence failings of September 11th 2001 illustrate the need for timely, relevant and accurate data, derived from a plethora of complex intelligence sources. This thesis will argue that, at least until 9/11, the academic study of terrorism and counter-terrorism databases has been limited and that the subject lacks an overall coherency and direction. The thesis asks: what is the quality and practical value of database technologies in the field of terrorism and counter-terrorism post 9/11? The study will provide a cross-disciplinary approach, specifically from the disciplines of political science and computer science. It will present an understanding of the conceptual, design, operation, strengths and weaknesses of terrorism and counterterrorism databases. The ramifications of post 9/11 and its impact upon the intelligence community, and the areas of security, privacy and emerging technologies in data mining and terrorism informatics are assessed. This study will examine mainly open source information on terrorism and counterterrorism databases. The research methodology will be carried out using a series of case studies, from the ITERATE, RAND/MIPT, WITS, and GTDB data sets. Primary sources, for example, codebooks, and secondary source materials such as Library of Congress and GAO reports are used. A comparative sampling of relational databases and terrorism data sets is undertaken. The thesis will illustrate that with increased federal funding, new terrorism database technologies, post 9/11, operate under sophisticated schemata, requiring complex and systematic synthesis. In addition, issues of data sharing, fusion, interoperability and ethical concerns will be addressed. Implications for future terrorism database technologies will be articulated. These require rigorous design methodologies be adopted, while safeguarding ethical and privacy concerns. The thesis provides a coherent systematic analysis of terrorism and counter-terrorism databases, from what to date has been a disaggregated subject field.en_US
dc.language.isoenen_US
dc.publisherUniversity of St Andrews
dc.subject.lccHV6431.B785
dc.subject.lcshTerrorism--Databasesen_US
dc.subject.lcshTerrorism--Databases--Case studiesen_US
dc.subject.lcshTerrorism--Databases--Design and constructionen_US
dc.subject.lcshTerrorism--Prevention--Technological innovationsen_US
dc.titleThe application of database technologies to the study of terrorism and counter-terrorism : a post 9/11 analysisen_US
dc.typeThesisen_US
dc.type.qualificationlevelDoctoralen_US
dc.type.qualificationnamePhD Doctor of Philosophyen_US
dc.publisher.institutionThe University of St Andrewsen_US


This item appears in the following Collection(s)

Show simple item record