Publication Type
Book Chapter
Version
publishedVersion
Publication Date
2008
Abstract
In this chapter, we study the problem of selecting documents so as to extract terrorist event information from a collection of documents. We represent an event by its entity and relation instances. Very often, these entity and relation instances have to be extracted from multiple documents. We therefore define an information extraction (IE) task as selecting documents and extracting from which entity and relation instances relevant to a user-specified event (aka domain specific event entity and relation extraction). We adopt domain specific IE patterns to extract potentially relevant entity and relation instances from documents, and develop a number of document ranking strategies using the extracted instances to address this extraction task. Each ranking strategy (aka pattern-based document ranking strategy) assigns a score to each document, which estimates the latter's contribution to the gain in event related instances. We conducted experiments on two document collection datasets constructed using two historical terrorism events. Experiments showed that our proposed patternbased document ranking strategies performed well on the domain specific event entity and relation extraction task for document collections of various sizes.
Discipline
Databases and Information Systems | Defense and Security Studies | Numerical Analysis and Scientific Computing
Publication
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Volume
18
Editor
Chen, Hsinchun; Reid, Edna; Sinai, Joshua; Silke, Andrew; Ganor, Boaz
First Page
309
Last Page
346
ISBN
9780387716138
Identifier
10.1007/978-0-387-71613-8_15
Publisher
Springer Verlag
City or Country
New York
Citation
SUN, Zhen; LIM, Ee Peng; CHANG, Kuiyu; Suryanto, Maggy Anastasia; and Gunaratna, Rohan Kumar.
Document selection for extracting entity and relationship instances of terrorist events. (2008). Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security. 18, 309-346.
Available at: https://ink.library.smu.edu.sg/sis_research/848
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
http://doi.org/10.1007/978-0-387-71613-8_15
Included in
Databases and Information Systems Commons, Defense and Security Studies Commons, Numerical Analysis and Scientific Computing Commons