Computational and Mathematical Organization Theory

, Volume 18, Issue 3, pp 328–339 | Cite as

Extracting socio-cultural networks of the Sudan from open-source, large-scale text data

  • Jana Diesner
  • Kathleen M. CarleyEmail author
  • Laurent Tambayong
SI: Data to Model

Introduction and background

This paper was originally presented at the annual conference of the Sudan Studies Association (SSA) at Purdue University in 2010, and has been adapted for this publication. At the SSA meeting, we had the opportunity to present our work on a computer-supported methodology for extracting and analyzing over-time network data based on open source text data about the Sudan, and to receive feedback from subject matter experts on the Sudan. Our presentation was part of a panel on “Data analyses of Sudan’s reality”. In this panel, the collaborators from a multi-university research initiative that focuses on rapid ethnographic retrieval reported on their work.

The field of Network Analysis provides theories and methods for representing and examining the structure, functioning and dynamics of interactions between social agents, infrastructures and information (Wasserman and Faust 1994; National Research Council 2005). To give an example, in a social network, social...


Social networks Automated text analysis Sudan Dynamic network analysis 



This research was supported in part by ARI W91WAW07C0063, GMU MURI FA9550-05-1-0388, and ONR N00014-08-1-1186. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Institute, the Air Force Office of Sponsored Research, the Office of Naval Research, or the United States Government. We also thank our research partners Jeffrey Johnson and Tracy van Holt, both from East Carolina University, and Richard Lobban from Rhode Island College for their continuous help on this project. Special thanks also to Frank Kunkel, CMU, for his help with this project. We are furthermore grateful to the feedback from the attendees of our presentation at the 29th Annual Conference of the Sudan Studies Organization (SSA).


  1. Baker WE, Faulkner RR (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58(6):837–860 CrossRefGoogle Scholar
  2. Carley KM (1991) Designing organizational structures to cope with communication breakdowns: a simulation model. Organization & Environment 5(1):19–57 CrossRefGoogle Scholar
  3. Carley KM (2002) Smart agents and organizations of the future. In: Lievrouw L, Livingstone S (eds) The handbook of new media: social shaping and consequences of ICTs. Sage, Thousand Oaks, pp 206–220 Google Scholar
  4. Carley KM, Columbus D, Bigrigg M, Kunkel F (2011a) AutoMap User’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-108 Google Scholar
  5. Carley KM, Diesner J, Reminga J, Tsvetovat M (2007) Toward an interoperable dynamic network analysis toolkit. Decis Support Syst 43(4):1324–1347. Special Issue Cyberinfrastructure for Homeland Security CrossRefGoogle Scholar
  6. Carley KM, Lanham M, Martin M, Morgon G, Schmerl B, van Holt T, Bigrigg MW, Garlan D, Johnson J, Kunkel F (2011b) Rapid ethnographic assessment: data to model. Paper presented at the HSCB Focus 2011: Integrating Social Science Theory and Analytic Methods for Operational Use Google Scholar
  7. Carley KM, Reminga J, Storrick J, Columbus D (2011c) ORA User’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-107 Google Scholar
  8. Carrington PJ, Scott J, Wasserman S (2005) Models and methods in social network analysis. Cambridge University Press, Cambridge CrossRefGoogle Scholar
  9. Committee SC QI.Z.168.04. Ahmad Zerfaoui. Security Council Committee pursuant to resolutions 1267 (1999) and 1989 (2011) concerning Al-Qaida and associated individuals and entities.
  10. Danowski JA (1993) Network analysis of message content. Prog Commun Sci 12:198–221 Google Scholar
  11. Diesner J (2012) Uncovering and managing the impact of methodological choices for the computational construction of socio-technical networks from texts. CMU-ISR-12-101 (forthcoming) Google Scholar
  12. Diesner J, Carley KM (2005) Revealing social structure from texts: meta-matrix text analysis as a novel method for network text analysis. In: Narayanan VK, Armstrong DJ (eds) Causal mapping for information systems and technology research: approaches, advances, and illustrations. Idea Group Publishing, Harrisburg, pp 81–108 Google Scholar
  13. Diesner J, Carley KM (2008) Conditional random fields for entity extraction and ontological text coding. J Comput Math Organ Theory 14:248–262 CrossRefGoogle Scholar
  14. Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquitous Comput 10(4):255–268 CrossRefGoogle Scholar
  15. Emery F, Trist E (1960) Socio-technical systems. Manag Sci, Models Tech 2:83–97 Google Scholar
  16. Enders W, Su X (2007) Rational terrorists and optimal network structure. J Confl Resolut 51(1):33–57 CrossRefGoogle Scholar
  17. Erickson B (1981) Secret societies and social structure. Soc Forces 60:188–210 Google Scholar
  18. Freeman L (2000) Visualizing social networks. J Soc Struct 1(1). Available:
  19. Hämmerli A, Gattiker R, Weyermann R (2006) Conflict and cooperation in an actors’ network of Chechnya based on event data. J Confl Resolut 50(2):159–175 CrossRefGoogle Scholar
  20. Howlett J (1980) Analytical investigative techniques: tools for complex criminal investigations. Police Chief 47(12):42–45 Google Scholar
  21. Humphreys M (2005) Natural resources, conflict, and conflict resolution. J Confl Resolut 49(4):508–537 CrossRefGoogle Scholar
  22. Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators. Connections 24(3):53–65 Google Scholar
  23. Krackhardt D (1987) Cognitive social structures. Soc Netw 9:109–134 CrossRefGoogle Scholar
  24. Krackhardt D (1998) Simmelian ties: super strong and sticky. In: Power and influence in organizations, pp 21–38 Google Scholar
  25. Malm A, Kinney J, Pollard N (2008) Social network and distance correlates of criminal associates involved in illicit drug production. Security J 21(1–2):77–94 CrossRefGoogle Scholar
  26. Milgram S (1967) The small world problem. Psychol Today 2(1):60–67 Google Scholar
  27. Mitchell J (1969) The concept and use of social networks. In: Mitchell J (ed) Social networks in urban situations: analyses of personal relationships in central African towns. Manchester University Press, Manchester, pp 1–50 Google Scholar
  28. National Research Council CoNSfFAA (2005) Network science. National Academies Press, Washington Google Scholar
  29. Popp R, Poindexter J (2006) Countering terrorism through information and privacy protection technologies. IEEE Secur Priv 4(6):18–27 CrossRefGoogle Scholar
  30. Ryan B, Gross N (1943) The diffusion of hybrid seed corn in two Iowa communities. Rural Soc 8(1):15–24 Google Scholar
  31. Schrodt P, Simpson E, Gerner D (2001) Monitoring conflict using automated coding of newswire reports: a comparison of five geographical regions. Paper presented at the PRIO/Uppsala University/DECRG high-level scientific conference on identifying wars: systematic conflict research and its utility in conflict resolution and prevention, Uppsala, Sweden, 8–9 June Google Scholar
  32. Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  • Jana Diesner
    • 1
  • Kathleen M. Carley
    • 2
    Email author
  • Laurent Tambayong
    • 3
  1. 1.UIUCUrbana ChampaignUSA
  2. 2.ISR, SCSCarnegie Mellon UniversityPittsburghUSA
  3. 3.California State University at FullertonFullertonUSA

Personalised recommendations