ABSTRACT

We have discussed various Web data management and information management technologies, as well as how data and information on the Web can be mined. Then we discussed the applications of Web mining and data mining technologies for counter-terrorism. Throughout the book we have discussed business intelligence and its application to counter-terrorism. Essentially, by using business intelligence, an organization can get information about its competitors and adversaries. This information can be used to combat terrorism. This chapter summarizes the contents of the book and provides an overview of the challenges and directions for Web mining and their applications for counter-terrorism. We also provide some suggestions about where to go from here.