FORTAN 2013 - 2013 First Workshop on Forensic Text Analytics
Topics/Call fo Papers
The workshop will be held in conjunction with the Intelligence and Security Informatics Conference (EISIC 2013).
A suicide note on Twitter, riots organized via Facebook, human traffickers who are part of a multi-national enterprise. Just a few years ago, these things would be unthinkable. Now, law enforcement agencies are adapting to an increasing complexity of today's information society and increasing amounts of available (textual) information. On a positive note, this change offers new opportunities to find key information that would otherwise be out of bounds. The public's expectations are increased accordingly. To meet these expectations, advanced technologies are required for processing and organizing the information. Are we using technology to its full potential?
Aim and scope
A community is emerging which tries to tackle new challenges in the research field which Intersects language technology, forensics and intelligence. Examples of issues which are particularly prominent in forensics/intelligence are transparency, validation, exploration and interaction, depending on the task at hand. The main goal of the workshop is to bring together researchers from both academia and industry who are working on forensic applications of language technology. The workshop provides a platform for discussing methods, applications and resources, as well as problems and bottle necks.
The workshop invites the submission of papers which illustrate research, projects, surveying works and industrial experiences that describe significant advannces in the following areas, but are not limited to:
Methods and tasks:
Document clustering and classification;
Filtering and recommendation;
Author recognition, profiling;
Named entity recognition, fact extraction and event extraction;
Entity linking, disambiguation of named entities;
Relation and network extraction;
Automatic summarization;
Subjectivity, attribution and sentiment analysis;
Anomaly detection and fraud detection;
Process mining;
Anonymization and pseudonymization;
Search and retrieval;
Machine translation;
Detection of deception;
Algorithms and characteristics:
Validation and evaluation;
Reproducibility and transparency;
Real-time analysis and scalability;
Language use and document types:
Social media and web data;
Informal language and personal communication;
Case files and registration systems;
Rare phenomena;
Deceptive language;
Document collection, corpora and annotation;
Natural language, interaction and applications:
Ontologies and knowledge management;
Self-learning systems and interaction;
Integrating text documents and structured data sources;
End-user applications and visualization;
A suicide note on Twitter, riots organized via Facebook, human traffickers who are part of a multi-national enterprise. Just a few years ago, these things would be unthinkable. Now, law enforcement agencies are adapting to an increasing complexity of today's information society and increasing amounts of available (textual) information. On a positive note, this change offers new opportunities to find key information that would otherwise be out of bounds. The public's expectations are increased accordingly. To meet these expectations, advanced technologies are required for processing and organizing the information. Are we using technology to its full potential?
Aim and scope
A community is emerging which tries to tackle new challenges in the research field which Intersects language technology, forensics and intelligence. Examples of issues which are particularly prominent in forensics/intelligence are transparency, validation, exploration and interaction, depending on the task at hand. The main goal of the workshop is to bring together researchers from both academia and industry who are working on forensic applications of language technology. The workshop provides a platform for discussing methods, applications and resources, as well as problems and bottle necks.
The workshop invites the submission of papers which illustrate research, projects, surveying works and industrial experiences that describe significant advannces in the following areas, but are not limited to:
Methods and tasks:
Document clustering and classification;
Filtering and recommendation;
Author recognition, profiling;
Named entity recognition, fact extraction and event extraction;
Entity linking, disambiguation of named entities;
Relation and network extraction;
Automatic summarization;
Subjectivity, attribution and sentiment analysis;
Anomaly detection and fraud detection;
Process mining;
Anonymization and pseudonymization;
Search and retrieval;
Machine translation;
Detection of deception;
Algorithms and characteristics:
Validation and evaluation;
Reproducibility and transparency;
Real-time analysis and scalability;
Language use and document types:
Social media and web data;
Informal language and personal communication;
Case files and registration systems;
Rare phenomena;
Deceptive language;
Document collection, corpora and annotation;
Natural language, interaction and applications:
Ontologies and knowledge management;
Self-learning systems and interaction;
Integrating text documents and structured data sources;
End-user applications and visualization;
Other CFPs
Last modified: 2013-02-27 22:45:17