Skip to main content
Log in

Social network topology: a Bayesian approach

  • Theoretical Paper
  • Published:
Journal of the Operational Research Society

Abstract

Elucidating the pattern of links within social networks is a challenging problem. Of particular difficulty is determining the existence of links in those groups that take active measures to conceal their internal connections, such as terrorist or criminal organizations where conventional social network analysis data-gathering techniques cannot be applied. Network representations of such organizations are useful, because they often represent a useful point of departure in thinking both about the potential capabilities of organizations and how to conduct effective measures to counter them. Developing an effective process for constructing such network representations from incomplete and limited data of variable quality is a topic of much current interest. Here, a method based on Bayesian inference is presented that probabilistically infers the existence of links within a social network. It is tested on data from open source publications. Additionally, the method represents a possible approach to dynamically modelling networks, as it is feasible to calculate how a network will reconfigure following an intervention.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3

Similar content being viewed by others

References

  • Abram PJ and Smith JD (2004). Modelling and analysis of terrorist network disruption. MSc thesis, Cranfield University, Shrivenham.

  • Albert R and Barabasi AL (2002). Statistical mechanics of complex networks. Rev Mod Phys 74: 47–97.

    Article  Google Scholar 

  • Borgatti SP, Everett MG and Freeman LC (2002). UCINET 6.29 for Windows: Software for Social Network Analysis. Analytic Technologies: Harvard.

    Google Scholar 

  • Carley KM, Lee J and Krackhardt D (2001). Destabilizing networks. Connections 24(3): 31–34.

    Google Scholar 

  • Farley JD (2003). Breaking Al Qaeda cells: A mathematical analysis of counter-terrorism operations. Stud Confl Terror 26: 399–411.

    Article  Google Scholar 

  • Fellman PV and Wright R (2004). Modeling terrorist networks: Complex systems at the mid-range. Available online.

  • Irwin C, Roberts C and Mee N (2002). Counter terrorism overseas. Dstl Report, Dstl/CD053271/1.1.

  • Jansen R et al (2003). A Bayesian networks approach for predicting protein–protein interactions from genomic data. Science 302: 449–451.

    Article  Google Scholar 

  • Krebs V (2002). Uncloaking terrorist networks. First Monday 7(4): http://www.Firstmonday.org/issues/issue7_4/Krebs/index.html, November 2006.

  • Newman MEJ (2003). The structure and function of complex networks. SIAM Rev 45: 167–256.

    Article  Google Scholar 

  • Scott J (2000). Social Network Analysis: A Handbook. Sage Publications: London.

    Google Scholar 

  • Wasserman S and Faust K (1994). Social Network Analysis: Methods and Applications. Cambridge University Press: Cambridge.

    Book  Google Scholar 

Download references

Acknowledgements

We thank the referees for many thoughtful and helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C J Rhodes.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rhodes, C., Keefe, E. Social network topology: a Bayesian approach. J Oper Res Soc 58, 1605–1611 (2007). https://doi.org/10.1057/palgrave.jors.2602352

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/palgrave.jors.2602352

Keywords

Navigation