Skip to main content

Dynamic Analysis of Terrorism Using Artificial Intelligence Techniques: A Case Study

  • Conference paper
  • First Online:
2012 International Conference on Information Technology and Management Science(ICITMS 2012) Proceedings
  • 2138 Accesses

Abstract

Apply intelligent information technologies to anti-crime and anti-terrorism is a hot topic in security bureaus of different countries. Social Network Analysis is a promising method to analyze terrorist network structures. Yet, the method is inadequate to process the dynamic property of terrorist networks. This paper proposes an approach combining Agent simulation and Social Network Analysis so that the dynamic property of terrorist networks can be handled. We collect criminal data to construct numbers of virtual terrorist networks. A series of experiments have been conducted using real terrorist network data to verify the effectiveness of the proposed approach. The experimental results show that our approach can use to evaluate a number of strategies for destabilization of terrorist organizations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://vlado.fmf.uni-lj.si/pub/networks/data/Ucinet/UciData.htm 2008.

References

  • Astrom KJ (1965) Optimal control of Markov decision processes with incomplete state estimation. J Math Anal Appl 10:174–205

    Article  Google Scholar 

  • Bellman R (1957) Dynamic programming. Princeton University Press, Princeton

    Google Scholar 

  • Bratman JM, Israel DJ (1987) Toward an architecture for resource-bounded agents. Technique report CSLI-87-104, Center of Study of Language and Information, SRI and Stanford University, Canada

    Google Scholar 

  • Carl Baker WE, Faulkner R (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58(12):837–860

    Article  Google Scholar 

  • Contractor NS, Monge PR (2003) Using multi-theoretical multi-level (MTML) models to study adversarial networks. In: Breiger R, Carley K, Pattison P (eds) Dynamic social network modeling and analysis, workshop summary and papers. The National Academic Press, Washington DC

    Google Scholar 

  • Contractor NS, Monge PR (2009) Using multi-theoretical multi-level (mtml) models to study adversarial networks. In: Breiger R, Carley KM (eds) Summary of the NRC workshop on social network modeling and analysis. National Research Council

    Google Scholar 

  • Erol K, Hendler J (1994) Semantics for hierarchical task network planning. Technical report CS-TR-3239, UMIACS-TR-94-31, Computer Science Dept., University of Maryland, March

    Google Scholar 

  • Freeman LC (1979) Centrality in social networks: I. Conceptual clarification. Soc Netw 1: 215–239

    Article  Google Scholar 

  • Karnopp D, Margolis D (1990) System dynamics: a unied approach. Wiley, New York

    Google Scholar 

  • Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators. Connection 24(3):53–56

    Google Scholar 

  • Krebs VE (2001) Mapping networks of terrorist cells. Connection 24(3):43–52

    Google Scholar 

  • March J (1988) Decisions and organizations. Basil Blackwell, Oxford

    Google Scholar 

  • McAndrew D (1999) The structural analysis of criminal networks. In: Canter D, Alison L (eds) The social psychology of crime: groups, teams, and networks, Aldershot, Dartmouth. Offender Profiling Series, III, pp 53–94

    Google Scholar 

  • Moss S, Davidsson P (2001) MABS 2000. LNCS (LNAI), vol. 1979. Springer, Heidelberg

    Google Scholar 

  • Schreiber C (2006) Human and organizational risk modeling: critical personnel and leadership in network organizations. PhD thesis, Carnegie Mellon University, CMU-ISRI-06-120, USA

    Google Scholar 

  • Scott J (1991) Social network analysis. Sage Publication, London

    Google Scholar 

  • Snijders T Steglich, Christian EG, Schweinberger M (2007) Modeling the co-evolution of networks and behavior. In: van Montfort K, Oud H, Satorra A (eds) Longitudinal models in the behavioral and related sciences. Lawrence Erlbaum, Mahwah, pp 41–71

    Google Scholar 

  • Sparrow M (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Soc Netw 13:251–274

    Article  Google Scholar 

  • Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daijun Zhong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhong, D., Hu, G. (2013). Dynamic Analysis of Terrorism Using Artificial Intelligence Techniques: A Case Study. In: Xu, B. (eds) 2012 International Conference on Information Technology and Management Science(ICITMS 2012) Proceedings. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34910-2_81

Download citation

Publish with us

Policies and ethics