[go: up one dir, main page]

Skip to main content

Automating Event Extraction for the Security Domain

  • Chapter
Intelligence and Security Informatics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 135))

Abstract

This chapter presents on-going efforts at the Joint-Research Center of the European Commission for automating event extraction from news articles collected through the Internet with the Europe Media Monitor system. Event extraction builds on techniques developed over several years in the fields of information extraction, whose basic goal is to derive quantitative data from unstructured text. The motivation for automated event tracking is to provide objective incident data with broad coverage on terrorist incidents and violent conflicts from around the world. This quantitative data then forms the basis for populating incident databases and systems for trend analysis and risk assessment.

A discussion of the technical requirements for information extraction and the approach adopted by the authors is presented. In particular, we deploy lightweight methods for entity extraction and a machine-learning technique for pattern-based event extraction. A preliminary evaluation of the results shows that the accuracy is already acceptable. Future directions of improving the approach are also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ACE, http://projects.ldc.upenn.edu/ace

  2. Appelt, D.: Introduction to Information Extraction Technology. In: IJCAI 1999, Tutorial, Stockholm, Sweden (1999)

    Google Scholar 

  3. Best, C., van der Goot, E., Blackler, K., Garcia, T., Horby, D.: Europe Media Monitor - System Description. Technical Report EUR 22173 EN, European Commission (2005)

    Google Scholar 

  4. Bond, D.: Integrated Data for Event Analysis (IDEA) (1998-2002), http://vranet.com/idea

  5. Cunningham, H., Maynard, D., Tablan, V.: JAPE: a Java Annotation Patterns Engine (2rd edn). Technical Report, CS–00–10, University of Sheffield, Department of Computer Science (2000)

    Google Scholar 

  6. Discoverer Extractor, http://www.temis-group.com

  7. Drożdżyński, W., Krieger, H.-U., Piskorski, J., Schäfer, U., Xu, F.: Shallow Processing with Unification and Typed Feature Structures — Foundations and Applications. Künstliche Intelligenz 2004(1), 17–23 (2004)

    Google Scholar 

  8. Erjavec, T.: MULTEXT - East Morphosyntactic Specifications (2004), Web document, http://nl.ijs.si/ME/V3/msd/html

  9. Global Public Health Information Network

    Google Scholar 

  10. Goldstein, J.: A Conflict-Cooperation scale for WEIS Events data. Journal of Conflict Resolution 36(2), 369–385 (1992)

    Article  Google Scholar 

  11. http://www.phacaspc.gc.ca/media/nr-rp/2004/2004gphin-rmispbke.html

  12. Infoxtract, http://www.cymfony.com

  13. Institute for Counter Terrorism, http://www.itc.org.il

  14. Inxight ThingFinder Professional, http://www.inxight.com

  15. Jones, R., McCallum, A., Nigam, K., Riloff, E.: Bootstrapping for Text Learning Tasks. In: Proceedings of IJCAI 1999 Workshop on Text Mining: Foundations, Techniques, and Applications, Stockholm, Sweden (1999)

    Google Scholar 

  16. Medical Intelligence System, http://medisys.jrc.it

  17. MIPT Terrorism Knowledge Base (TKB), http://www.tkb.org

  18. MUC, http://www.itl.nist.gov/iaui/894.02/related/projects/muc

  19. Piskorski, J.: Advances in Information Extraction. In: Abramowicz, W. (ed.) Knowledge Based Information Retrieval and Filtering from Internet. Kluwer Academic Publishers, Dordrecht (2003)

    Google Scholar 

  20. Piskorski, J.: On Compact Storage Models for Gazetteers. In: Yli-Jyrä, A., Karttunen, L., Karhumäki, J. (eds.) FSMNLP 2005. LNCS (LNAI), vol. 4002. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  21. Piskorski, J.: CORLEONE - Core Linguistic Entity Online Extraction. Technical Report, European Commission (to appear, 2007)

    Google Scholar 

  22. Pouliquen, B., Kimler, M., Steinberger, R., Ignat, C., Oellinger, T., Blackler, K., Fuart, F., Zaghouani, W., Widiger, A., Forslund, A.C., Best, C.: Geocoding multilingual texts: Recognition, Disambiguation and Visualisation. In: Proceedings of the 5th International Conference on Language Resources and Evaluation (LREC 2006), Genoa, Italy, pp. 24–26 (2006)

    Google Scholar 

  23. Pouliquen, B., Steinberger, R., Ignat, C., Temnikova, I., Widiger, A., Zaghouani, W., Zizka, J.: Multilingual person name recognition and transliteration. Journal CORELA - Cognition, Representation, Langage. Special issue: Le traitement lexicographique des noms propres (2005)

    Google Scholar 

  24. Schrodt, P.: Kansas Event Data Project (KEDS). Dept. of Political Science, University of Kansas, http://www.ku.edu/~keds/project.html

  25. Semantex, http://www.janyainc.com

  26. South Asian Terrorism Portal, http://www.satp.org

  27. Steinberger, R., Pouliquen, B., Ignat, C.: Navigating multilingual news collections using automatically extracted information. Journal of Computing and Information Technology - CIT 13, 257–264 (2005)

    Article  Google Scholar 

  28. Szpektor, I., Tanev, H., Dagan, I., Coppola, B.: Scaling Web-based acquisition of Entailment Relation. In: Proceedings of EMNLP 2004, Barcelona, Spain (2004)

    Google Scholar 

  29. Teragram, http://www.teragram.com

  30. Virtual Research Associates, http://www.vranet.com

  31. Weimann, G.: Terror on the Internet. USIP Press (2006) ISBN 1929223714

    Google Scholar 

  32. Yangarber, R., Jokipii, L., Rauramo, A., Huttunen, S.: Information Extraction from Epidemiological Reports. In: Proceedings of Human Language Technology Conference and Conference on Empirical Methods in Natural Language Processing (HLT/EMNLP-2005), Vancouver, Canada (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hsinchun Chen Christopher C. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Best, C., Piskorski, J., Pouliquen, B., Steinberger, R., Tanev, H. (2008). Automating Event Extraction for the Security Domain. In: Chen, H., Yang, C.C. (eds) Intelligence and Security Informatics. Studies in Computational Intelligence, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69209-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69209-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69207-2

  • Online ISBN: 978-3-540-69209-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics