CFP last date
20 May 2024
Reseach Article

A Survey on Social Network Analysis for Counter-Terrorism

by Pankaj Choudhary, Upasna Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 9
Year of Publication: 2015
Authors: Pankaj Choudhary, Upasna Singh
10.5120/19695-1455

Pankaj Choudhary, Upasna Singh . A Survey on Social Network Analysis for Counter-Terrorism. International Journal of Computer Applications. 112, 9 ( February 2015), 24-29. DOI=10.5120/19695-1455

@article{ 10.5120/19695-1455,
author = { Pankaj Choudhary, Upasna Singh },
title = { A Survey on Social Network Analysis for Counter-Terrorism },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 9 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number9/19695-1455/ },
doi = { 10.5120/19695-1455 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:01.361861+05:30
%A Pankaj Choudhary
%A Upasna Singh
%T A Survey on Social Network Analysis for Counter-Terrorism
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 9
%P 24-29
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Terrorist Activities worldwide has approached the evolution of various high-ended methodologies for analyzing terrorist groups and networks. Existing research found that Social Network Analysis (SNA) is one of the most effective and predictive method for countering terrorism in social networks. The study reviewed various SNA measures for predicting the key players/ main actors of terrorist network in terms of global as well as Indian perspective. Comparative study among SNA tools demonstrated the applicability and feasibility for online and offline social networks. It is recommended to incorporate temporal analysis using data mining methods. It can enhance the capability of SNA for handing dynamic behavior of online social networks.

References
  1. Freeman, Linton C. , (1979) "Centrality in social networks conceptual clarification", Social networks, Vol. 1, No. 3, pp215-239.
  2. Bonacich, Phillip, (1972) "Factoring and weighting approaches to status scores and clique identification", Journal of Mathematical Sociology, Vol. 2, No. 1, pp113-120.
  3. Bonacich, Phillip, (1987) "Power and centrality: A family of measures", American Journal of Sociology, pp1170-1182.
  4. Everett, Martin G. , & Stephen P. Borgatti, (1999) "The centrality of groups and classes", The Journal of mathematical sociology, Vol. 23, No. 3, pp181-201.
  5. Borgatti, Stephen P. , Martin G. Everett, & Linton C. Freeman, (2002) "Ucinet for Windows: Software for social network analysis".
  6. Borgatti, Stephen P. , (2005) "Centrality and network flow", Social networks, Vol. 27, No. 1, pp55-71.
  7. Everett, Martin G. , and Borgatti, Stephen P. , (2014) "Networks containing negative ties", Social Networks, Vol. 38, pp111-120.
  8. Freeman, Linton C. , Borgatti, Stephen P. , and Douglas R. White. , (1991) "Centrality in valued graphs: A measure of betweenness based on network flow", Social networks, Vol. 13, No. 2, pp141-154.
  9. Katz, Leo, (1953) "A new status index derived from sociometric analysis", Psychometrika Vol. 18, No. 1, pp39-43.
  10. Krebs, Valdis E. , (2002) "Mapping networks of terrorist cells", Connections, Vol. 24, No. 3, pp43-52.
  11. Carley, K. M. , Ju-Sung Lee, and David Krackhardt, (2001) "Destabilizing networks", Connections, Vol. 24, No. 3, pp31-34.
  12. Carley, K. M. , Dombroski, M. , Tsvetovat, M. , Reminga, J. , & Kamneva, N. , (2003) "Destabilizing dynamic covert networks", Proceedings of the 8th international Command and Control Research and Technology Symposium.
  13. Xu, Jennifer, and Hsinchun Chen, (2005) "Criminal network analysis and visualization", Communications of the ACM, Vol. 48, No. 6, pp100-107.
  14. Memon, Nasrullah, and Henrik Legind Larsen, (2006) "Practical algorithms for destabilizing terrorist networks", Intelligence and Security Informatics. Springer, Berlin Heidelberg, pp389-400.
  15. Ressler, Steve, (2006) "Social network analysis as an approach to combat terrorism: past, present, and future research", Homeland Security Affairs, Vol. 2, No. 2, pp1-10.
  16. Everton, Sean F. , (2009) "Network topography, key players and terrorist networks" Annual Conference of the Association for the Study of Economics, Religion and Culture, Washington, DC.
  17. Roberts, Nancy, and Everton, Sean F. , (2011) "Strategies for Combating Dark Networks", Journal of Social Structure.
  18. Everton, Sean F. , Cunningham and Dan, (2011) "Terrorist Network Adaptation to a Changing Environment".
  19. Klausen, J. , Barbieri, E. T. , Reichlin-Melnick, A. , & Zelin, A. Y. , (2012) "The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun's Propaganda Campaign", Perspectives on Terrorism, Vol. 6, No. 1.
  20. Wu, Edith, Rebecca Carleton, and Garth Davies, (2014) "Discovering bin-Laden's Replacement in al-Qaeda, using Social Network Analysis: A Methodological Investigation", Perspectives on Terrorism, Vol. 8, No. 1.
  21. Sarvari, H. , Abozinadah, E. , Mbaziira, A. , & McCoy, D. , (2014). " Constructing and Analyzing Criminal Networks", IEEE Security and Privacy Workshops.
  22. Saxena, Sudhir, K. Santhanam, and Basu, Aparna, (2004) "Application of social network analysis (SNA) to terrorist networks in Jammu & Kashmir", Strategic Analysis, Vol. 28, No. 1, pp84-101.
  23. Basu, Aparna, (2005) "Social network analysis of terrorist organizations in India", North American Association for Computational Social and Organizational Science (NAACSOS) Conference.
  24. Azad, Sarita, and Arvind Gupta, (2011) "A quantitative assessment on 26/11 Mumbai attack using social network analysis", Journal of Terrorism Research, Vol. 2, No. 2.
  25. Karthika, S. , and S. Bose, (2011) "A comparative study of social networking approaches in identifying the covert nodes", International Journal on Web Services Computing (IJWSC), Vol. 2, pp65-78.
  26. Rieder, B. , (2013) "Studying Facebook via data extraction: the Netvizz application", 5th Annual ACM Web Science Conference, pp346-355.
  27. Smith, M. , Milic-Frayling, N. , Shneiderman, B. , Mendes Rodrigues, E. , Leskovec, J. , & Dunne, C. , (2010) "NodeXL: a free and open network overview, discovery and exploration add-in for Excel 2007/2010", Social Media Research Foundation.
  28. LaFree, Gary, and Laura Dugan, (2007) "Introducing the global terrorism database", Terrorism and Political Violence, Vol. 19, No. 2, pp181-204.
  29. Leetaru, Kalev, and Philip A. Schrodt, (2013) "GDELT: Global data on events, location, and tone, 1979–2012", ISA Annual Convention, Vol. 2.
  30. Page, L. , Brin, S. , Motwani, R. , & Winograd, T. , (1999). "The PageRank citation ranking: Bringing order to the web". Stanford Digital Library Project.
  31. Bastian, M. , Heymann, S. , & Jacomy, M. , (2009) "Gephi: an open source software for exploring and manipulating networks". ICWSM, 8, 361-362.
  32. Carley, K. M. , & Reminga, J. , (2004) "ORA: Organization risk analyzer (No. CMU-ISRI-04-106)", Carnegie-Mellon University, Pittsburgh, Institute of Software Research Internet.
  33. O'Madadhain, J. , Fisher, D. , White, S. , & Boey, Y. , (2003) "The jung (java universal network/graph) framework", University of California, Irvine, California.
  34. Batagelj, V. , & Mrvar, A. , (1998) "Pajek-program for large network analysis", Connections, Vol. 21, No. 2, pp47-57.
  35. Hagberg, A. , Schult, D. , Swart, P. , Conway, D. , Séguin-Charbonneau, L. , Ellison, C. and Torrents, J. (2004). "Networkx. High productivity software for complex networks", link: https://networkx. lanl. gov/wiki.
  36. Csardi, G. , & Nepusz, T. (2006). "The igraph software package for complex network research. InterJournal, Complex Systems, 1695(5).
Index Terms

Computer Science
Information Sciences

Keywords

Social Network Analysis Terrorist Networks Counter-Terrorism Centrality Online and Offline Social Networks.