Abstract
Terrorist social networks present information about the relationships between terrorists which is important for investigators in combating the war of terrorism. A good analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Typical social network analysis techniques discover patterns of interactions between social actors, for examples, detecting subgroup and identifying central individuals. Such knowledge is important for developing effective combating strategies against terrorism. A typical terrorist social network has several hundreds to thousands of nodes. Given the large number of nodes and links, it is difficult to integrate the extracted pattern with the global structure of the terrorist social network to further analyze the related actors. With the support of interactive visualization tools, investigators can further explore the network by selecting the focus of interests and extract the useful information and patterns. In this chapter, we present a social network analysis and interactive visualization technique for complex terrorist social networks. Case studies are presented to illustrate how such techniques are capable to extract the hidden relationships among terrorists in the network through user interactions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brown, M.H., Meehan, J.R., Sarkar, M.: Browsing Graphs using a Fisheye View. In: Proceedings of ACM on Human Factors in Computing Systems, Amsterdam, Netherlands (1993)
Eades, P.: A Heuristic for Graph Drawing. Congressus Numerantium 42 (1984)
Deter, J.: Fractals. Plenum, New York (1988)
Furnas, G.W.: Generalized Fisheye Views. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (1986)
Herman, I., Melancon, G., Marshall, M.S.: Graph Visualization and Navigation in Information Visualization: A Survey. IEEE Transactions on Visualization and Computer Graphics 6(1), 24–43 (2000)
Koike, H., Yoshihara, H.: Fractal Approaches for Visualizing Huge Hierarchies. In: Proceedings of IEEE Symposium on Visual Languages, Bergen, Norway, August 24-27 (1993)
Manojit, S., Brown, M.H.: Graphical Fisheye Views. Communications of the ACM 37(12), 73–83 (1994)
Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press (2004)
Yang, C.C., Chen, H., Hong, K.: Visualization of Large Category Map for Internet Browsing. Decision Support Systems 35(1), 89–102 (2003)
Yang, C.C., Liu, N., Sageman, M.: Analyzing the Terrorist Social Networks with Visualization Tools. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics, San Diego, CA, US, May 23–24 (2006)
Yang, C.C., Ng, T.D., Wang, J.H., Wei, C., Chen, H.: Analyzing and Visualizing Gray Web Forum Structure. In: Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, Chengdu, China, April 11–12 (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Yang, C.C. (2008). Knowledge Discovery and Information Visualization for Terrorist Social Networks. In: Chen, H., Yang, C.C. (eds) Intelligence and Security Informatics. Studies in Computational Intelligence, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69209-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-69209-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69207-2
Online ISBN: 978-3-540-69209-6
eBook Packages: EngineeringEngineering (R0)