Abstract
Apply intelligent information technologies to anti-crime and anti-terrorism is a hot topic in security bureaus of different countries. Social Network Analysis is a promising method to analyze terrorist network structures. Yet, the method is inadequate to process the dynamic property of terrorist networks. This paper proposes an approach combining Agent simulation and Social Network Analysis so that the dynamic property of terrorist networks can be handled. We collect criminal data to construct numbers of virtual terrorist networks. A series of experiments have been conducted using real terrorist network data to verify the effectiveness of the proposed approach. The experimental results show that our approach can use to evaluate a number of strategies for destabilization of terrorist organizations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
http://vlado.fmf.uni-lj.si/pub/networks/data/Ucinet/UciData.htm 2008.
References
Astrom KJ (1965) Optimal control of Markov decision processes with incomplete state estimation. J Math Anal Appl 10:174–205
Bellman R (1957) Dynamic programming. Princeton University Press, Princeton
Bratman JM, Israel DJ (1987) Toward an architecture for resource-bounded agents. Technique report CSLI-87-104, Center of Study of Language and Information, SRI and Stanford University, Canada
Carl Baker WE, Faulkner R (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58(12):837–860
Contractor NS, Monge PR (2003) Using multi-theoretical multi-level (MTML) models to study adversarial networks. In: Breiger R, Carley K, Pattison P (eds) Dynamic social network modeling and analysis, workshop summary and papers. The National Academic Press, Washington DC
Contractor NS, Monge PR (2009) Using multi-theoretical multi-level (mtml) models to study adversarial networks. In: Breiger R, Carley KM (eds) Summary of the NRC workshop on social network modeling and analysis. National Research Council
Erol K, Hendler J (1994) Semantics for hierarchical task network planning. Technical report CS-TR-3239, UMIACS-TR-94-31, Computer Science Dept., University of Maryland, March
Freeman LC (1979) Centrality in social networks: I. Conceptual clarification. Soc Netw 1: 215–239
Karnopp D, Margolis D (1990) System dynamics: a unied approach. Wiley, New York
Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators. Connection 24(3):53–56
Krebs VE (2001) Mapping networks of terrorist cells. Connection 24(3):43–52
March J (1988) Decisions and organizations. Basil Blackwell, Oxford
McAndrew D (1999) The structural analysis of criminal networks. In: Canter D, Alison L (eds) The social psychology of crime: groups, teams, and networks, Aldershot, Dartmouth. Offender Profiling Series, III, pp 53–94
Moss S, Davidsson P (2001) MABS 2000. LNCS (LNAI), vol. 1979. Springer, Heidelberg
Schreiber C (2006) Human and organizational risk modeling: critical personnel and leadership in network organizations. PhD thesis, Carnegie Mellon University, CMU-ISRI-06-120, USA
Scott J (1991) Social network analysis. Sage Publication, London
Snijders T Steglich, Christian EG, Schweinberger M (2007) Modeling the co-evolution of networks and behavior. In: van Montfort K, Oud H, Satorra A (eds) Longitudinal models in the behavioral and related sciences. Lawrence Erlbaum, Mahwah, pp 41–71
Sparrow M (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Soc Netw 13:251–274
Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhong, D., Hu, G. (2013). Dynamic Analysis of Terrorism Using Artificial Intelligence Techniques: A Case Study. In: Xu, B. (eds) 2012 International Conference on Information Technology and Management Science(ICITMS 2012) Proceedings. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34910-2_81
Download citation
DOI: https://doi.org/10.1007/978-3-642-34910-2_81
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34909-6
Online ISBN: 978-3-642-34910-2
eBook Packages: Business and EconomicsBusiness and Management (R0)