Skip to main content

Advertisement

Log in

The “six-element” analysis method for the research on the characteristics of terrorist activities

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

The rapid development of social network theory provides a new perspective for the research on counter-terrorism, however, current research mostly relates to terrorists and terrorist organizations. Firstly, the “six-element” analysis method for terrorist activities based on social network is proposed in this paper, namely, a variety of sub-networks are constructed according to the correlation among the six elements—people, organization, time, location, manner and event. These sub-networks are assessed through using centrality analysis, cohesive subgroup analysis, spatial correlation analysis, invulnerability analysis and descriptive statistic analysis; the characteristics and laws of terrorist activities are revealed from several different perspectives. Then, the “six-element” analysis method is applied to conduct empirical research on “East Turkistan” terrorist activities since the founding of the People’s Republic of China, so as to effectively identify core people and key organizations of the “East Turkistan” terrorist activity network, to assess the invulnerability of the “East Turkistan” terrorist network and to reveal the temporal and spatial distribution rules as well as the characteristics of the means and manners adopted in all previous terrorist activities. Lastly, the analysis results are interpreted qualitatively. This research can provide a basis for decision making and an analysis method for the identification of core terrorists and key terrorist organizations, determination of the key alert period, location of counter-terrorism and the early warning of the means of major terrorist activities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Airoldi, E. M., Bai, X., & Carley, K. M. (2011). Network sampling and classification: an investigation of network model representations. Decision Support Systems, 51(3), 506–518.

    Article  Google Scholar 

  • Albert, R., Jeong, H., & Barabási, A. L. (2000). Error and attack tolerance of complex networks. Nature, 406(6794), 378–382.

    Article  Google Scholar 

  • Basu, A. (2005). Social network analysis of terrorist organizations in India. In Conference of the North American association for computational social and organizational science.

    Google Scholar 

  • Bier, V. M., & Hausken, K. (2011). Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures. Annals of Operations Research, 186(1), 39–59.

    Article  Google Scholar 

  • Bohannon, J. (2009a). Counterterrorism’s new tool: ‘metanetwork’ analysis. Science, 325(5939), 409.

    Article  Google Scholar 

  • Bohannon, J. (2009b). Investigating networks: the dark side. Science, 325(5939), 410–411.

    Article  Google Scholar 

  • Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). Ucinet for windows: software for social network analysis. Harvard: Analytic Technologies.

    Google Scholar 

  • Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). On the robustness of centrality measures under conditions of imperfect data. Social Networks, 28(2), 124–136.

    Article  Google Scholar 

  • Borgatti, S. P., Mehra, A., Brass, D. J., & Labianca, G. (2009). Network analysis in the social sciences. Science, 323(5916), 892–895.

    Article  Google Scholar 

  • Carley, K. M., & Dereno, M. (2011). ORA: organization risk analyzer, ORA user’s guide (Technical Report). Carnegie Mellon University, School of Computer Science, Institute for Software Research.

  • Carley, K. M., Lee, J., & Krackhardt, D. (2002). Destabilizing terrorist networks. Connections, 24(3), 79–92.

    Google Scholar 

  • Carley, K. M., Diesner, J., & Reminga, J. (2006). Toward an interoperable dynamic analysis toolkit. Decision Support Systems, 43(4), 1324–1347.

    Article  Google Scholar 

  • Carrington, P. J., Scott, J., & Wasserman, S. (2005). Models and methods in social network analysis. New York: Cambridge University Press.

    Book  Google Scholar 

  • Chen, H., Chung, W., & Qin, J. (2008). Uncovering the dark Web: a case study of Jihad on the web. Journal of the American Society for Information Science and Technology, 59(8), 1347–1359.

    Article  Google Scholar 

  • Davis, G. B., & Carley, K. M. (2008). Clearing the FOG: fuzzy, overlapping groups for social networks. Social Networks, 30(3), 201–212.

    Article  Google Scholar 

  • Freeman, L. C. (1979). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–239.

    Article  Google Scholar 

  • Gómez, D., González–Arangüena, E., Manuel, C., Owen, G., del Pozo, M., & Saboyá, M. (2008). The cohesiveness of subgroups in social networks: a view from game theory. Annals of Operations Research, 158(1), 33–46.

    Article  Google Scholar 

  • Krebs, V. E. (2002). Mapping networks of terrorist cells. Connections, 24(3), 43–52.

    Google Scholar 

  • Lee, K. L., Maheshwary, S., Mason, J., & Glisson, W. (2006). Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks. Annals of Operations Research, 148(1), 25–53.

    Article  Google Scholar 

  • Lesser, I. O., Hoffman, B., & Arquilla, J. (1999). Countering the new terrorism. Santa Monica: Rand Corporation.

    Google Scholar 

  • Li, Z. J. (2011). The terrorism threat faced by China and a preview on security situation. In The third session of the international forum on crime and criminal law in the global ear, Beijing.

    Google Scholar 

  • Liu, J. (2009). Lectures on whole network approach: a practical guide to UCINET. Shanghai: Shanghai People’s Publishing House.

    Google Scholar 

  • Memon, N., Harkiolakis, N., & Hicks, D. L. (2008). Detecting high-value individuals in covert networks: 7/7 London bombing case study. In AICCSA 08-6th IEEE/ACS international conference on computer systems and applications (pp. 206–215).

    Google Scholar 

  • Moon, I. C., Carley, K. M., & Levis, A. H. (2008). Vulnerability assessment on adversarial organization: unifying command and control structure analysis and social network analysis. In SIAM international conference on data mining workshop on link analysis counterterrorism and security.

    Google Scholar 

  • Morselli, C., Giguere, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143–153.

    Article  Google Scholar 

  • Mucha, P. J., Richardson, T., Macon, K., Porter, M. A., & Onnela, J. P. (2010). Community structure in time-dependent, multiscale, and multiplex networks. Science, 328(5980), 876–878.

    Article  Google Scholar 

  • Rodríguez, J. A. (2005). The March 11th terrorist network: in its weakness lies its strength. In Proc. XXV international sunbelt conference, Los Angeles.

    Google Scholar 

  • Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.

    Book  Google Scholar 

  • Tsvetovat, M., & Carley, K. M. (2005). Structural knowledge and success of anti-terrorist activity: the downside of structural equivalence. Journal of Social Structure, 6.

  • Wasserman, S., & Faust, K. (1994). Social network analysis: methods and applications. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Xu, J. J., & Chen, H. (2005). CrimeNet explorer: a framework for criminal network knowledge discovery. ACM Transactions on Information Systems, 23(2), 201–226.

    Article  Google Scholar 

  • Zheng, X. Y. (2011). The basic situation and strategic measures of counter-terrorism in China. In The third session of the international forum on crime and criminal law in the global ear, Beijing.

    Google Scholar 

Download references

Acknowledgement

This research is supported by the Natural Science Foundation of China under Grant No. 70973138.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shouyang Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fu, J., Sun, D., Chai, J. et al. The “six-element” analysis method for the research on the characteristics of terrorist activities. Ann Oper Res 234, 17–35 (2015). https://doi.org/10.1007/s10479-013-1444-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-013-1444-y

Keywords

Navigation