Skip to main content
Log in

Value of intelligence applied to networks

  • Published:
Environment Systems and Decisions Aims and scope Submit manuscript

Abstract

A methodology is proposed to complement the subjective “value” of intelligence with an objective metric of “impact” of information on network models. This is a deterministic one-way sensitivity analysis similar to value of information used in inference diagrams. It would measure the impact of a piece of information on a network’s metric, in this case being used to answer intelligence analyst questions. This methodology suggests that the sensitivity of each link to existing analysis implies that the link has an impact on the analysis. The impact of these links can be measured quantitatively. In this paper, we explore data of tweets and apply the methodology to the links between twitter users and use the network measure of betweenness centrality to determine their quantitative impact on the overall network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Albert R, Barabási A-L (2002) Statistical mechanics of complex networks. Rev Mod Phys 74(1):47

    Article  Google Scholar 

  • Barabási A-L, Bonabeau E (2003) Scale-free networks. Sci Am 288(5):50–59

    Article  Google Scholar 

  • Boccaletti S et al (2006) Complex networks: structure and dynamics. Phys Rep 424(4):175–308

    Article  Google Scholar 

  • Borgatti SP, Halgin DS (2011) On network theory. Organ Sci 22(5):1168–1181

    Article  Google Scholar 

  • Borgatti SP, Carley KM, Krackhardt D (2006) On the robustness of centrality measures under conditions of imperfect data. Soc Netw 28(2):124–136

    Article  Google Scholar 

  • Cheong F, Cheong C (2011) Social media data mining: a social network analysis of tweets during the Australian 2010–2011 Floods. In: Seddon PB, Gregor S (eds) PACIS 2011—15th Pacific Asia conference on information systems: quality research in Pacific, Brisbane, Australia, 7–11 July 2011, pp 1–16

  • Coffman T, Greenblatt S, Marcus S (2004) Graph-based technologies for intelligence analysis. Commun ACM 47(3):45–47

    Article  Google Scholar 

  • de Solla Price D (2007) A general theory of bibliometric and other cumulative advantage processes. J Am Soc Inf Sci 27(5):292–306

    Article  Google Scholar 

  • Devore JL (2015) Probability and statistics for engineering and the sciences, 7th edn. Cengage Learning

  • Dorogovtsev SN, Mendes JFF (2002) Evolution of networks. Adv Phys 51(4):1079–1187

    Article  Google Scholar 

  • Ediger D et al (2010) Massive social network analysis: mining twitter for social good. In: IEEE 2010 39th international conference on parallel processing (ICPP)

  • Gill P, Marrin S, Phythian M (eds) (2008) Intelligence theory: key questions and debates. Routledge, New York

    Google Scholar 

  • Glacet C, Hanusse N, Ilcinkas D (2011) The impact of edge deletions on the number of errors in networks. In: Proceedings of the 15th International Conference on Principles of distributed systems, Lecture notes in computer science, vol 7109. Springer, Berlin, Heidelberg, pp 378–391

  • Gruzd A, Wellman B, Takhteyev Y (2011) Imagining Twitter as an imagined community. Am Behav Sci 55(10):1294–1318

    Article  Google Scholar 

  • Heuer RJ, Pherson RH (2011) Structured analytical techniques for intelligence analysts. CQ Press, Washington, DC, p 68

    Google Scholar 

  • Kaplan EH (2012) OR forum—intelligence operations research: the 2010 Philip McCord Morse Lecture. Oper Res 1–13 (Articles in Advance). Published ahead of print July 3, 2012. Accessed 4 October 2012. Located at http://or.journal.informs.org/content/early/2012/07/03/opre.1120.1059.full.pdf+html

  • Keisler JM et al (2014) Value of information analysis: the state of application. Environ Syst Decis 34(1):3–23

    Article  Google Scholar 

  • Kennedy KT, Deckro RF, Moore JT, Hopkinson KM (2011) Nodal interdiction. Math Comput Model 54(11):3116–3125

    Article  Google Scholar 

  • Knightley P (1988) The second oldest profession: spies and spying in the twentieth century. Penguin, New York

    Google Scholar 

  • Linkov I et al (2013) Resilience metrics for cyber systems. Environ Syst Decis 33(4):471–476

    Article  Google Scholar 

  • Massaro E, Bagnoli F (2014) Epidemic spreading and risk perception in multiplex networks: a self-organized percolation method. Phys Rev E 90(5):052817

    Article  Google Scholar 

  • Massaro E et al (2012) Information dynamics algorithm for detecting communities in networks. Commun Nonlinear Sci Numer Simul 17(11):4294–4303

    Article  Google Scholar 

  • Nepusz T, Vicsek T (2012) Controlling edge dynamics in complex networks. Nat Phys 8(7):568–573

    Article  CAS  Google Scholar 

  • Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45(2):167–256

    Article  Google Scholar 

  • Newman MEJ (2005) A measure of betweenness centrality based on random walks. Soc Netw 27(1):39–54

    Article  Google Scholar 

  • Newman M (2010) Networks: an introduction. Oxford University Press, Oxford

    Book  Google Scholar 

  • Overbey LA, Paribello C, Jackson T (2013) Identifying influential Twitter users in the 2011 Egyptian revolution. Social computing, behavioral-cultural modeling and prediction. Springer, Berlin, pp 377–385

    Google Scholar 

  • Rogers S, Sedghi A, Evans L (2011) UK riots: every verified incident—interactive map. The Guardian. 29 December 2011. http://www.guardian.co.uk/news/datablog/interactive/2011/aug/09/uk-riots-incident-map. Accessed 9 Feb 2012

  • Sparrow MK (1991) The application of network analysis to criminal intelligence; an assessment of the prospects. Soc Netw 13:261–263

    Article  Google Scholar 

  • Sterling SE (2004) Aggregation techniques to characterize social networks. No. AFIT/GOR/ENS/04-12. Air Force Inst of Tech Wright-Patterson AFB OH, School of Engineering and Management

  • Travis A (2011) National archives reveals historic parallels between 2011 and 1981 riots. The Guardian. 29 December 2011. http://www.guardian.co.uk/uk/2011/dec/30/national-archives-1981-riots-parallels. Accessed 9 Feb 2012

  • Watts DJ, Strogatz SH (1998) Collective dynamics of ‘small-world’ networks. Nature 393(6684):440–442

    Article  CAS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christopher M. Smith.

Appendix: Results of notional analysis

Appendix: Results of notional analysis

This list is the 5 % of twitter users in our data set with the highest betweenness values (Table 2).

Table 2 List of highest betweenness users

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Smith, C.M., Scherer, W.T. & Carr, S. Value of intelligence applied to networks. Environ Syst Decis 36, 85–91 (2016). https://doi.org/10.1007/s10669-015-9581-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10669-015-9581-2

Keywords

Navigation