Aims:
  • The CTiL is an efficient and largely automated system for:
  • Monitoring and downloading text data from web sites of interest;
  • Adapting concept classifiers from an analyst specified codebook to the changing vocabulary used in the data to express these concepts;
  • Coding these documents with identified concepts from the codebook;
  • Identifying likely intervention instances from the extracted codes, along with the discovered attribute codes for each intervention instance;
  • Inserting intervention instances with attributes into a first tier database, along with archived and linked copies of all supporting text documents;
  • Allowing supervising analysts to oversee and modify all automatically discovered intervention instances and attributes, and copy these confirmed records into a second tier database; and
  • Permitting analysts to extract data exports from the databases for analysis.

The Counter Terrorism i-Library

The Counter Terrorism Intelligent Library (CTiL) is an initiative of the Centre of Excellence in Policing and Security (CEPS). Developed in 2009, the CTiL is a database and associated infrastructure that identifies, records and maintains a list of counter-terrorism interventions, all accessible through a query mechanism. This project was led by Professor Lorraine Mazerolle and Dr Gentry White for the Department of Prime Minister and Cabinet.

Project Value: 
$160 206.00
Funding: 
Department of Prime Minister and Cabinet
Partners: 
Griffith University
Date: 
2009 to 2011
Time status: 
Complete
Contact: 
Professor Lorraine Mazerolle ( l.mazerolle@uq.edu.au)
Aims:
  • The CTiL is an efficient and largely automated system for:
  • Monitoring and downloading text data from web sites of interest;
  • Adapting concept classifiers from an analyst specified codebook to the changing vocabulary used in the data to express these concepts;
  • Coding these documents with identified concepts from the codebook;
  • Identifying likely intervention instances from the extracted codes, along with the discovered attribute codes for each intervention instance;
  • Inserting intervention instances with attributes into a first tier database, along with archived and linked copies of all supporting text documents;
  • Allowing supervising analysts to oversee and modify all automatically discovered intervention instances and attributes, and copy these confirmed records into a second tier database; and
  • Permitting analysts to extract data exports from the databases for analysis.
Program/Affiliation: 
Type: 
Quantitative
Keywords: 
Terrorism
Crime control
Resilience
Resource management
Number: 
ISSR30029