Abstract
Recently, an exponential growth in the use of social network analysis (SNA) tools has been witnessed. SNA offers quantitative measures known as centralities which allow the identification of important nodes in a given network. In fact, determining such nodes in terrorist networks is a way to destabilize these cells and prevent their criminal activities. Identifying key players is highly dependent on structural characteristics of nodes. Therefore, many approaches rely on centrality metrics to propose various disruption strategies. Indeed, knowledge of these measures helps in revealing vulnerabilities of terrorist networks and may have important implications for investigations. It is debatable how to choose the suitable centrality measure that helps effectively to destabilize the terrorist network. In this paper, we aim to answer this question. We first provide an analytical study where we identify 6 topologies of terrorist networks and discuss the appropriate metrics per topology. Secondly, we provide the performed experimental analysis on five data sets (with 5 different topologies) to prove our analytical conclusions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Magalingam, P., Davis, S.: Ranking the importance level of intermediaries to a criminal using a reliance measure. arXiv preprint arXiv:1506.06221 (2016)
Michalak, T.P., Rahwan, T., Skibski, O., Wooldridge, M.: Defeating terrorist networks with game theory. IEEE Intell. Syst. 1, 53–61 (2015)
Michalak, T.P., Aadithya, K.V., Szczepanski, P.L., Ravindran, B., Jennings, N.R.: Efficient computation of the Shapley value for game-theoretic network centrality. J. Artif. Intell. Res. 46, 607–650 (2013)
Skibski, O., Michalak, T.P., Rahwan, T., Wooldridge, M.: Algorithms for the Shapley and Myerson values in graph-restricted games. In: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, pp. 197–204. International Foundation for Autonomous Agents and Multiagent Systems, May 2014
Xuan, D., Yu, H., Wang, J.: A novel method of centrality in terrorist network. In: Seventh International Symposium on Computational Intelligence and Design (ISCID), December 2014, vol. 2, pp. 144–149. IEEE (2014)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)
Sparrow, M.K.: The application of network analysis to criminal intelligence: an assessment of the prospects. Soc. Netw. 13(3), 251–274 (1991)
Berzinji, A., Kaati, L., Rezine, A.: Detecting key players in terrorist networks. In: 2012 European Intelligence and Security Informatics Conference (EISIC), pp. 297–302. IEEE, August 2012
Azad, S., Gupta, A.: A quantitative assessment on 26/11 Mumbai attack using social network analysis. J. Terrorism Res. 2(2), 1–10 (2011)
Nasrullah, M., Larsen, H.L.: Structural analysis and mathematical methods for destabilizing terrorist networks. In: Proceedings of the International Conference on Advanced Data Mining Applications, pp. 1037–1048 (2006)
Fellman, P.V., Clemens, J.P., Wright, R., Post, J.V., Dadmun, M.: Disrupting terrorist networks: a dynamic fitness landscape approach. In: Minai, A.A., Braha, D., Bar-Yam, Y. (eds.) Conflict and Complexity, pp. 165–178. Springer, New York (2015)
Ozgul, F., Bowerman, C.: Characteristics of terrorists networks based on ideology and practices. In: 2014 European Network Intelligence Conference (ENIC), pp. 95–99. IEEE (2014)
Bonacich, P.: Factoring and weighting approaches to status scores and clique identification. J. Math. Soc. 2(1), 113–120 (1972)
Karthika, S., Bose, S.: A comparative study of social networking approaches in identifying the covert nodes. Int. J. Web Serv. Comput. 2(3), 65 (2011)
Hamed, I., Charrad, M.: Recognizing information spreaders in terrorist networks: 26/11 attack case study. In: Bellamine Ben Saoud, N., Adam, C., Hanachi, C. (eds.) ISCRAM-med 2015. LNBIP, vol. 233, pp. 27–38. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24399-3_3
Everett, M.G., Borgatti, S.P.: The centrality of groups and classes. J. Math. Sociol. 23(3), 181–201 (1999)
Everton, S.F.: Network topography, key players and terrorist networks (2009)
http://www.inf.fu-berlin.de/lehre/WS06/pmo/eng/audio/Chomsky.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Hamed, I., Charrad, M., Ben Saoud, N.B. (2016). Which Centrality Metric for Which Terrorist Network Topology?. In: Díaz, P., Bellamine Ben Saoud, N., Dugdale, J., Hanachi, C. (eds) Information Systems for Crisis Response and Management in Mediterranean Countries. ISCRAM-med 2016. Lecture Notes in Business Information Processing, vol 265. Springer, Cham. https://doi.org/10.1007/978-3-319-47093-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-47093-1_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47092-4
Online ISBN: 978-3-319-47093-1
eBook Packages: Business and ManagementBusiness and Management (R0)