Open Access   Article Go Back

Social Network Analysis as Counter Terrorism Tool

A. Srivastava1 , A. Pillai2 , D. J. Gupta3

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 655-661, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.655661

Online published on Sep 30, 2018

Copyright © A. Srivastava, A. Pillai, D. J. Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Srivastava, A. Pillai, D. J. Gupta, “Social Network Analysis as Counter Terrorism Tool,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.655-661, 2018.

MLA Style Citation: A. Srivastava, A. Pillai, D. J. Gupta "Social Network Analysis as Counter Terrorism Tool." International Journal of Computer Sciences and Engineering 6.9 (2018): 655-661.

APA Style Citation: A. Srivastava, A. Pillai, D. J. Gupta, (2018). Social Network Analysis as Counter Terrorism Tool. International Journal of Computer Sciences and Engineering, 6(9), 655-661.

BibTex Style Citation:
@article{Srivastava_2018,
author = {A. Srivastava, A. Pillai, D. J. Gupta},
title = {Social Network Analysis as Counter Terrorism Tool},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {655-661},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2924},
doi = {https://doi.org/10.26438/ijcse/v6i9.655661}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.655661}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2924
TI - Social Network Analysis as Counter Terrorism Tool
T2 - International Journal of Computer Sciences and Engineering
AU - A. Srivastava, A. Pillai, D. J. Gupta
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 655-661
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
415 304 downloads 243 downloads
  
  
           

Abstract

Social network analysis is no more only bound to studying the relationship between the actors to discover the hidden trends and find scope in them but there is a darker side as well. The deep ocean of network has allowed people to counter attack on different countries via acting from various locations by issuing fake identities. The cycle of events that take place with the evil intentions to disrupt and cause fear not only physically but mentally too is referred to terrorism. SNA allows this act to counter prevent and associate the links by identifying the intentions and working of the actors. Various studies have been conducted after 9/11 attack and people all over the world are monitored so as to track the status and if any conviction is predicted, the complete network is examined. The sole purpose of these studies is to prevent thwarting and prepare oneself to counter terrorism. This paper outlines certain methods that recognize the terrorist activities which need to be monitored so as to detect the pre-event occurrence and counter attack on their planning.

Key-Words / Index Term

Social Network Analysis, Counter Terrorism, Information Analysis, Intelligence analysis

References

[1] D.Charabarti and C. Faloutsos. “Graph Mining: Laws, Generators, and Algorithms.” ACM Computing Surveys 38:1(2006) p.4.
[2] J.R.Tyler, D.M.Wilkinson, and B.A. Huberman. “Email as Spectroscopy: Automated discovery of community structure within organizations.” In Communities And Technologies (2003) pp. 81- 96.
[3] J.G. Augustson and J.Minker. “An Analysis Of Some Graph Theoretical Cluster Techniques.” Journal of ACM 17:4 (1970) pp. 571-588.
[4] A. Calvo-Armengol and Y. Zenou. “Social networks and crime decisions: The Role Of Social Structure In Faciliating Delinquent Behaviour.” CEPR Discussion papers (2003) 3966.
[5] A.L. Barabasi. “Linked: The New Science ofNetworks”. Cambridge, MA: Perseus Publishing, 2002.
[6] R. Cross and A. Parker. “The Hidden Power ofSocial Networks.” Cambridge, MA, Harvard Business School Press, 2004.
[7] D. Knoke and S. Yang. ” Social network analysis (Quantitative applications in the social sciences).” New York: Sage Publications. (2008)
[8] S. Koschade. (2006). “A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence”. Studies in Conflict and Terrorism, 29(6), 559–575.
[9] S.F. Everton. (2012). “Disrupting dark networks”. New York: Cambridge University Press.
[10] S.F. Everton & D. Cunningham. (2012). “Detecting significant changes in dark networks”. Behavioral Sciences of Terrorism and Political Aggression, 5(2), 94–114.
[11] G. Bichler & S. Bush. (2015). Networks in a nutshell. In G. Bichler & A. Malm (Eds.), Disrupting criminal networks: Network analysis in crime prevention (pp. 233–244). Boulder, CO: Lynne Reinner Publishers, Inc.
[12] M. Granovetter (1973). “The strength of weak ties.” American Journal of Sociology, 78(6), 1360–1380.
[13] R. Burt. (1992). “Structural holes: The social structure of competition.” Cambridge, MA: Harvard University Press.
[14] D.J. Watts. (2003). “Six degrees: The science of a connected age”. New York: W.W. Norton & Company.
[15] V.E. Krebs. (2001). “Mapping networks of terrorist cells”. Connections, 24(3), 43–52.
[16] M. Sageman. (2004). “Understanding terror networks.” Philadelphia, PA: University of Pennsylvania Press.
[17] J. Xu & H. Chen. (2008). “The topology of dark networks.” Communications of the ACM, 51(10), 58-65.
[18] J. Magouirk, S. Atran, & M. Sageman. (2008). Connecting terrorist networks. Studies in Conflict and Terrorism, 31(1), 1–16.
[19] D. M. Akbar Hussain. “Terrorist Networks Analysis through Argument Driven Hypotheses Model”. In Second International Conference on Availability, Reliability and Security (ARES`07). IEEE 0-7695-2775-2. 2007.
[20] Diesner, J., Carley, K.M.: Using network text analysis to detect the organizational structure of covert networks. In: Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference (2004)
[21] Tsvetovat, M., Carley, K.M.: On effectiveness of wiretap programs in mapping social networks. Computational and Mathematical Organization Theory 13(1), 63–87 (2006).
[22] NETEST: Estimating a Terrorist Network’s Structure. In: 11th European Intelligence and Security Informatics Conference (EISIC), Athens (2011).
[23] Aparna Basu. “Social Network Analysis: A Methodology for Studying Terrorism”. M. Panda, S. Dehuri, and G.-N. Wang (eds.), Social Networking Intelligent Systems Reference Library 65, Springer International Publishing Switzerland 10.1007/978-3-319-05164-2_9. (2014). pp.215-242.
[24] Clifford Weinstein, William Campbell, Brian Delaney, Gerald O’Leary.” Modeling and Detection Techniques for Counter-Terror Social Network Analysis and Intent Recognition” IEEE. 978-1-4244-2622-5 (2009) . pp. 1-16.
[25] Richard M. Adler,” A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support” IEEE. 1-4244-1330-3. (2007). Pp. 47-54.
[26] Julei Fu and Jian Chai “Multi-factor analysis of terrorist activities based on social network” In Fifth International Conference on Business Intelligence and Financial Engineering, IEEE 978-0-7695-4750-3. (2012) pp. 476-480.