Skip to main content

2011 | OriginalPaper | Buchkapitel

Retracted: A Novel Method to Analyze the Importance of Links in Terrorist Networks

verfasst von : Uffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon

Erschienen in: Counterterrorism and Open Source Intelligence

Verlag: Springer Vienna

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A terrorist network is a special kind of social network with emphasis on both secrecy and efficiency. Such networks are intentionally structured to ensure efficient communication between members without being detected. A terrorist network can be modeled as a generalized network (graph) consisting of nodes and links. Techniques from social network analysis (SNA) and graph theory can be used to identify key entities in the network, which is helpful for network destabilization purposes. Research on terrorist network analysis (TNA) has mainly focuses on analysis of nodes, which is in contrast to the fact that the links between the nodes provide at least as much relevant information about the network as the nodes themselves. This paper presents a novel method to analyze the importance of links in terrorist networks inspired by research on transportation networks. The12.6pc]The first author has been considered as corresponding author. Please check. link importance measure is implemented in CrimeFighter Assistant and evaluated on known terrorist networks harvested from open sources.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Baccara, M., Bar-Isaac, H.: Interrogation methods and terror networks. Mathematical Methods in Counterterrorism, pp. 271–290. Springer, Berlin (2009) Baccara, M., Bar-Isaac, H.: Interrogation methods and terror networks. Mathematical Methods in Counterterrorism, pp. 271–290. Springer, Berlin (2009)
2.
Zurück zum Zitat Lindelauf, R., Borm, P., Hamers, H.: On heterogeneous covert networks. Mathematical Methods in Counterterrorism, pp. 215–228. Springer, Berlin (2009) Lindelauf, R., Borm, P., Hamers, H.: On heterogeneous covert networks. Mathematical Methods in Counterterrorism, pp. 215–228. Springer, Berlin (2009)
3.
Zurück zum Zitat Lindelauf, R., Borm, P., Hamers, H.: The influence of secrecy on the communication structure of covert networks. Soc. Netw. 31, 126–137 (2009)CrossRef Lindelauf, R., Borm, P., Hamers, H.: The influence of secrecy on the communication structure of covert networks. Soc. Netw. 31, 126–137 (2009)CrossRef
4.
Zurück zum Zitat Wiil, U.K., Memon, N., Gniadek, J.: Knowledge management processes, tools and techniques for counterterrorism. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 29–36. INSTICC Press, Funchal, Portugal, Oct 2009 Wiil, U.K., Memon, N., Gniadek, J.: Knowledge management processes, tools and techniques for counterterrorism. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 29–36. INSTICC Press, Funchal, Portugal, Oct 2009
5.
Zurück zum Zitat Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)CrossRef Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)CrossRef
6.
Zurück zum Zitat Memon, N., Wiil, U.K., Alhajj, R., Atzenbeck, C., Harkiolakis, N.: Harvesting covert networks: The case study of the iMiner database. Int. J. Netw. Virtual Organ. 8(1/2), 52–74 (2011)CrossRef Memon, N., Wiil, U.K., Alhajj, R., Atzenbeck, C., Harkiolakis, N.: Harvesting covert networks: The case study of the iMiner database. Int. J. Netw. Virtual Organ. 8(1/2), 52–74 (2011)CrossRef
7.
Zurück zum Zitat Gloor, P.A., Zhao, Y.: Analyzing actors and their discussion topics by semantic social network analysis. Inform. Vis. 130–135 (2006) Gloor, P.A., Zhao, Y.: Analyzing actors and their discussion topics by semantic social network analysis. Inform. Vis. 130–135 (2006)
8.
Zurück zum Zitat Krebs, V.E.: Uncloaking terrorist networks. First Monday 7(4–1) (2002) Krebs, V.E.: Uncloaking terrorist networks. First Monday 7(4–1) (2002)
9.
Zurück zum Zitat Enders, W., Su, X.: Rational terrorists and optimal network structure. J. Confl. Resolut. 51(1), 33 (2007)CrossRef Enders, W., Su, X.: Rational terrorists and optimal network structure. J. Confl. Resolut. 51(1), 33 (2007)CrossRef
10.
Zurück zum Zitat Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos Solitons Fractals 20(1), 69–75 (2004)CrossRefMATHMathSciNet Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos Solitons Fractals 20(1), 69–75 (2004)CrossRefMATHMathSciNet
11.
Zurück zum Zitat Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 837–860 (1993) Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 837–860 (1993)
12.
Zurück zum Zitat Memon, N.: Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks. Ph.D. thesis, Aalborg University, Denmark (2007) Memon, N.: Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks. Ph.D. thesis, Aalborg University, Denmark (2007)
13.
Zurück zum Zitat Rhodes, C.J.: Inference approaches to constructing covert social network topologies. Mathematical Methods in Counterterrorism, pp. 127–140. Springer, Berlin (2009) Rhodes, C.J.: Inference approaches to constructing covert social network topologies. Mathematical Methods in Counterterrorism, pp. 127–140. Springer, Berlin (2009)
14.
Zurück zum Zitat Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. 99(12), 7821–7826 (2002)CrossRefMATHMathSciNet Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. 99(12), 7821–7826 (2002)CrossRefMATHMathSciNet
15.
Zurück zum Zitat Newman, M.E.J.: A measure of betweenness centrality based on random walks. Soc. Netw. 27(1), 39–54 (2005)CrossRef Newman, M.E.J.: A measure of betweenness centrality based on random walks. Soc. Netw. 27(1), 39–54 (2005)CrossRef
16.
Zurück zum Zitat Carley, K.M., Lee, J.S., Krackhardt, D.: Destabilizing networks. Connections 24(3), 31–34 (2001) Carley, K.M., Lee, J.S., Krackhardt, D.: Destabilizing networks. Connections 24(3), 31–34 (2001)
17.
Zurück zum Zitat Fischer, M.M., Lände, R.: GIS and network analysis. Handbook of Transport Geography and Spatial Systems, vol. 5, pp. 391-408. Pergamon Press, Amsterdam (2004) Fischer, M.M., Lände, R.: GIS and network analysis. Handbook of Transport Geography and Spatial Systems, vol. 5, pp. 391-408. Pergamon Press, Amsterdam (2004)
18.
Zurück zum Zitat Bell, M.G.H., Iida, Y.: Transportation Network Analysis. Wiley, New York (1997)CrossRef Bell, M.G.H., Iida, Y.: Transportation Network Analysis. Wiley, New York (1997)CrossRef
19.
Zurück zum Zitat Jenelius, E., Petersen, T., Mattsson, L.G.: Importance and exposure in road network vulnerability analysis. Transport. Res. Part A 40(7), 537–560 (2006) Jenelius, E., Petersen, T., Mattsson, L.G.: Importance and exposure in road network vulnerability analysis. Transport. Res. Part A 40(7), 537–560 (2006)
20.
Zurück zum Zitat Bienenstock, E.J., Bonacich, P.: Balancing efficiency and vulnerability in social networks. Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, pp. 253–264. The National Academies Press (2003) Bienenstock, E.J., Bonacich, P.: Balancing efficiency and vulnerability in social networks. Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, pp. 253–264. The National Academies Press (2003)
21.
Zurück zum Zitat Wiil, U.K., Gniadek, J., Memon, N.: CrimeFighter Assistant: A knowledge management tool for terrorist network analysis. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 15–24. INSTICC Press, Valencia, Spain Oct 2010 Wiil, U.K., Gniadek, J., Memon, N.: CrimeFighter Assistant: A knowledge management tool for terrorist network analysis. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 15–24. INSTICC Press, Valencia, Spain Oct 2010
Metadaten
Titel
Retracted: A Novel Method to Analyze the Importance of Links in Terrorist Networks
verfasst von
Uffe Kock Wiil
Jolanta Gniadek
Nasrullah Memon
Copyright-Jahr
2011
Verlag
Springer Vienna
DOI
https://doi.org/10.1007/978-3-7091-0388-3_10