Computational and Mathematical Organization Theory

, Volume 18, Issue 3, pp 328–339

Extracting socio-cultural networks of the Sudan from open-source, large-scale text data

  • Jana Diesner
  • Kathleen M. Carley
  • Laurent Tambayong
SI: Data to Model

Keywords

Social networks Automated text analysis Sudan Dynamic network analysis 

References

  1. Baker WE, Faulkner RR (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58(6):837–860 CrossRefGoogle Scholar
  2. Carley KM (1991) Designing organizational structures to cope with communication breakdowns: a simulation model. Organization & Environment 5(1):19–57 CrossRefGoogle Scholar
  3. Carley KM (2002) Smart agents and organizations of the future. In: Lievrouw L, Livingstone S (eds) The handbook of new media: social shaping and consequences of ICTs. Sage, Thousand Oaks, pp 206–220 Google Scholar
  4. Carley KM, Columbus D, Bigrigg M, Kunkel F (2011a) AutoMap User’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-108 Google Scholar
  5. Carley KM, Diesner J, Reminga J, Tsvetovat M (2007) Toward an interoperable dynamic network analysis toolkit. Decis Support Syst 43(4):1324–1347. Special Issue Cyberinfrastructure for Homeland Security CrossRefGoogle Scholar
  6. Carley KM, Lanham M, Martin M, Morgon G, Schmerl B, van Holt T, Bigrigg MW, Garlan D, Johnson J, Kunkel F (2011b) Rapid ethnographic assessment: data to model. Paper presented at the HSCB Focus 2011: Integrating Social Science Theory and Analytic Methods for Operational Use Google Scholar
  7. Carley KM, Reminga J, Storrick J, Columbus D (2011c) ORA User’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-107 Google Scholar
  8. Carrington PJ, Scott J, Wasserman S (2005) Models and methods in social network analysis. Cambridge University Press, Cambridge CrossRefGoogle Scholar
  9. Committee SC QI.Z.168.04. Ahmad Zerfaoui. Security Council Committee pursuant to resolutions 1267 (1999) and 1989 (2011) concerning Al-Qaida and associated individuals and entities. http://www.un.org/sc/committees/1267/NSQI16804E.shtml
  10. Danowski JA (1993) Network analysis of message content. Prog Commun Sci 12:198–221 Google Scholar
  11. Diesner J (2012) Uncovering and managing the impact of methodological choices for the computational construction of socio-technical networks from texts. CMU-ISR-12-101 (forthcoming) Google Scholar
  12. Diesner J, Carley KM (2005) Revealing social structure from texts: meta-matrix text analysis as a novel method for network text analysis. In: Narayanan VK, Armstrong DJ (eds) Causal mapping for information systems and technology research: approaches, advances, and illustrations. Idea Group Publishing, Harrisburg, pp 81–108 Google Scholar
  13. Diesner J, Carley KM (2008) Conditional random fields for entity extraction and ontological text coding. J Comput Math Organ Theory 14:248–262 CrossRefGoogle Scholar
  14. Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquitous Comput 10(4):255–268 CrossRefGoogle Scholar
  15. Emery F, Trist E (1960) Socio-technical systems. Manag Sci, Models Tech 2:83–97 Google Scholar
  16. Enders W, Su X (2007) Rational terrorists and optimal network structure. J Confl Resolut 51(1):33–57 CrossRefGoogle Scholar
  17. Erickson B (1981) Secret societies and social structure. Soc Forces 60:188–210 Google Scholar
  18. Freeman L (2000) Visualizing social networks. J Soc Struct 1(1). Available: http://www.cmu.edu/joss/content/articles/volume1/Freeman.html
  19. Hämmerli A, Gattiker R, Weyermann R (2006) Conflict and cooperation in an actors’ network of Chechnya based on event data. J Confl Resolut 50(2):159–175 CrossRefGoogle Scholar
  20. Howlett J (1980) Analytical investigative techniques: tools for complex criminal investigations. Police Chief 47(12):42–45 Google Scholar
  21. Humphreys M (2005) Natural resources, conflict, and conflict resolution. J Confl Resolut 49(4):508–537 CrossRefGoogle Scholar
  22. Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators. Connections 24(3):53–65 Google Scholar
  23. Krackhardt D (1987) Cognitive social structures. Soc Netw 9:109–134 CrossRefGoogle Scholar
  24. Krackhardt D (1998) Simmelian ties: super strong and sticky. In: Power and influence in organizations, pp 21–38 Google Scholar
  25. Malm A, Kinney J, Pollard N (2008) Social network and distance correlates of criminal associates involved in illicit drug production. Security J 21(1–2):77–94 CrossRefGoogle Scholar
  26. Milgram S (1967) The small world problem. Psychol Today 2(1):60–67 Google Scholar
  27. Mitchell J (1969) The concept and use of social networks. In: Mitchell J (ed) Social networks in urban situations: analyses of personal relationships in central African towns. Manchester University Press, Manchester, pp 1–50 Google Scholar
  28. National Research Council CoNSfFAA (2005) Network science. National Academies Press, Washington Google Scholar
  29. Popp R, Poindexter J (2006) Countering terrorism through information and privacy protection technologies. IEEE Secur Priv 4(6):18–27 CrossRefGoogle Scholar
  30. Ryan B, Gross N (1943) The diffusion of hybrid seed corn in two Iowa communities. Rural Soc 8(1):15–24 Google Scholar
  31. Schrodt P, Simpson E, Gerner D (2001) Monitoring conflict using automated coding of newswire reports: a comparison of five geographical regions. Paper presented at the PRIO/Uppsala University/DECRG high-level scientific conference on identifying wars: systematic conflict research and its utility in conflict resolution and prevention, Uppsala, Sweden, 8–9 June Google Scholar
  32. Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  • Jana Diesner
    • 1
  • Kathleen M. Carley
    • 2
  • Laurent Tambayong
    • 3
  1. 1.UIUCUrbana ChampaignUSA
  2. 2.ISR, SCSCarnegie Mellon UniversityPittsburghUSA
  3. 3.California State University at FullertonFullertonUSA

Personalised recommendations