Network analysis of terrorist activities

被引:8
作者
Fu Julei [1 ]
Fan Ying [2 ,3 ]
Wang Yang [2 ,3 ,4 ]
Wang Shouyang [5 ]
机构
[1] Natl Univ Def Technol, Coll Informat Syst & Management, Changsha 410073, Hunan, Peoples R China
[2] Beijing Normal Univ, Dept Syst Sci, Sch Management, Beijing 100875, Peoples R China
[3] Beijing Normal Univ, Ctr Complex Res, Beijing 100875, Peoples R China
[4] Bar Ilan Univ, Dept Phys, IL-52900 Ramat Gan, Israel
[5] Chinese Acad Sci, Acad Math & Syst Sci, Beijing 100190, Peoples R China
关键词
Anti-terrorism; complex networks; terrorist activity network; vertex centrality; COMMUNITY STRUCTURE; COMPLEX NETWORKS; WEB;
D O I
10.1007/s11424-014-3034-8
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper uses an extensive network approach to "East Turkistan" activities by building both the one-mode and the bipartite networks for these activities. In the one-mode network, centrality analysis and spectrum analysis are used to describe the importance of each vertex. On this basis, two types of core vertices - The center of communities and the intermediary vertices among communities - are distinguished. The weighted extreme optimization (WEO) algorithm is also applied to detect communities in the one-mode network. In the "terrorist-terrorist organization" bipartite network, the authors adopt centrality analysis as well as clustering analysis based on the original bipartite network in order to calculate the importance of each vertex, and apply the edge clustering coefficient algorithm to detect the communities. The comparative and empirical analysis indicates that this research has been proved to be an effective way to identify the core members, key organizations, and communities in the network of "East Turkistan" terrorist activity. The results can provide a scientific basis for the analysis of "East Turkistan" terrorist activity, and thus provide decision support for the real work of "anti-terrorism".
引用
收藏
页码:1079 / 1094
页数:16
相关论文
共 29 条
[1]  
[Anonymous], C N AM ASS COMP SOC
[2]  
[Anonymous], 2009, NETWORKS INTRO
[3]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[4]   Network medicine: a network-based approach to human disease [J].
Barabasi, Albert-Laszlo ;
Gulbahce, Natali ;
Loscalzo, Joseph .
NATURE REVIEWS GENETICS, 2011, 12 (01) :56-68
[5]   Counterterrorism's New Tool: 'Metanetwork' Analysis [J].
Bohannon, John .
SCIENCE, 2009, 325 (5939) :409-411
[6]   On the robustness of centrality measures under conditions of imperfect data [J].
Borgatti, SP ;
Carley, KM ;
Krackhardt, D .
SOCIAL NETWORKS, 2006, 28 (02) :124-136
[7]   Network Analysis in the Social Sciences [J].
Borgatti, Stephen P. ;
Mehra, Ajay ;
Brass, Daniel J. ;
Labianca, Giuseppe .
SCIENCE, 2009, 323 (5916) :892-895
[8]  
Carley K.M., 2001, Connections, V24, P79
[9]   Uncovering the Dark Web: A case study of Jihad on the web [J].
Chen, Hsinchun ;
Chung, Wingyan ;
Qin, Jialun ;
Reid, Edna ;
Sageman, Marc ;
Weimann, Gabriel .
JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2008, 59 (08) :1347-1359
[10]   Uninformed Individuals Promote Democratic Consensus in Animal Groups [J].
Couzin, Iain D. ;
Ioannou, Christos C. ;
Demirel, Gueven ;
Gross, Thilo ;
Torney, Colin J. ;
Hartnett, Andrew ;
Conradt, Larissa ;
Levin, Simon A. ;
Leonard, Naomi E. .
SCIENCE, 2011, 334 (6062) :1578-1580