Current state of development

Although is in development the following functions are available for users to access as part of our testing of the software:

  • Within users can browse the public collections.
  • Current collections are provided with tag sets which include document tags (e.g. marking the mode of production and primary function of each text) and recipient and sender details where known.
  • Users may also be given further access to view anonymised collections such as AIFL case files where appropriate.
  • Users will be able to contribute their own collections of malicious communications which they can tag using provided or user-defined tag sets.
  • Collection owners can choose to allow access to their collections to other users but have full control over who can view both the open or anonymised versions of texts.
  • Users can create their own analysis sets of documents by filtering data within or between collections using the tags. For example, an analysis set might include all documents from available collections that contain conditional threats, by writers known to be men.
  • Users can search within the texts of documents by either searching for specified word strings or by using regular expressions.
Next developments

As is being developed part-time by student interns our development cycle is slow but we are actively working on the following areas.

  • Users will be able to use a variety of analysis tools, for example creating Key Word in Context (KWIC) lines or generating word n-grams from analysis sets.
  • A future goal will be to allow users to write and share their own scripts using Python or R to run analyses on the query sets.