ABSTRACT

Part I discussed supporting technologies for Web mining, Part II discussed concepts in Web mining, and Part III discussed applications of Web and data mining for counter-terrorism. In particular, we examined each technology discussed in Parts I and II and its potential applications in counter-terrorism. In this chapter, we will draw parallels between E-commerce and counter-terrorism as they are both applications of the Web. Note that our assumption is that much of the data will eventually be on the Web either through intranets and private networks or public networks and the Internet.