Abstract
Many complex networks have a small-world topology characterized by dense local clustering of connections between neighbouring nodes yet a short path length between any (distant) pair of nodes due to the existence of relatively few long-range connections. This is an attractive model for the organization of terrorist networks because small-world topology can support segregated and integrated information processing. In this article, we empirically tested a number of indicative terrorist networks, we discovered that most of the networks have low connectedness and high closeness, that is, the networks contain small-world characteristics.
An erratum for this chapter can be found at http://dx.doi.org/10.1007/978-1-84800-086-5_30
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReference
Memon Nasrullah. Investigative data mining: mathematical models for analyzing, visualizing and destabilizing terrorist networks. PhD dissertation. Aalborg University Denmark, 2007
DeRosa M., Data mining and data analysis for counterterrorism, CSIS Report, 2004
Newman MEJ. The structure and function of complex networks. SIAM Rev 45:167-256, 2003
Barabasi AL. Linked: how every thing is connected to everything else and what it means. Perseus Publishing, Cambridge, 2002
Buchanan M. Nexus: small worlds and the groundbreaking science of networks. W. W. Norton, New York, 2002
Watts DJ. Six degrees: the science of a connected age. W. W. Norton, New York, 2003
Watts DJ. The new science of networks. Annu Rev Sociol 30:243-270, 2004
Watts DJ. Networks, dynamics, and small-world phenomenon. Am J Sciol 105:494-527, 1999
Watts DJ, Strogatz SH. Collective dynamics of small world networks. Nature 393:440-442, 1998
Latora V, Marchiori M. Efficient behaviour of small-world network. Phy Rev Lett 87:198701-198704, 2001
Ressler S., (2006). Social network analysis as an approach to combat terrorism: past, present, and future research. http://www.hsaj.org/pages/volume2/issue2/pdfs/2.2.8.pdf
Krebs, Valdis E. Mapping networks of terrorist cells. Connections 24 (3) 43-52, 2002
Sageman, M. Understanding terrorist networks, Philadelphia: University of Pennsylvania Press, 2004
Rodriquez, JA. The March 11th terrorist network: in its weakness lies its strength, XXV International Sunbelt Conference, Los Angeles, 2005
Carley, KM. Estimating vulnerabilities in large covert networks,“ in proc. International Symposium on Command and Control Research and Technology San Diego, CA., 2004
Carpenter, T., George Karakostas, and David Shallcross. Practical issues and algorithms for analyzing terrorist networks. In proc. WMC, 2002
Farley D. J. Breaking Al Qaeda Cells. A mathematical analysis of counterterrorism operations (A guide for risk assessment and decision making) Studies in Conflict & Terrorism, 26:399–411, 2003
Memon N., Hicks DL and Larsen HL. Harvesting terrorists information from web. In proc of International Conference on Information Visualization (IV’), Zurich, Switzerland, 664-671, 2007
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2008 Springer-Verlag London Limited
About this paper
Cite this paper
Memon, N., Hicks, D.L., Harkiolakis, N., Rajput, A.K. (2008). Retracted: Small World Terrorist Networks: A Preliminary Investigation. In: Ellis, R., Allen, T., Petridis, M. (eds) Applications and Innovations in Intelligent Systems XV. SGAI 2007. Springer, London. https://doi.org/10.1007/978-1-84800-086-5_28
Download citation
DOI: https://doi.org/10.1007/978-1-84800-086-5_28
Publisher Name: Springer, London
Print ISBN: 978-1-84800-085-8
Online ISBN: 978-1-84800-086-5
eBook Packages: Computer ScienceComputer Science (R0)