Abstract
A new model of dependence centrality is proposed. The centrality measure is based on shortest paths between the pair of nodes. We apply this measure with the demonstration of a small network example. The comparisons are made with betweenness centrality. We discuss how intelligence investigation agencies could benefit from the proposed measure. In addition to that we argue about the investigative data mining techniques we are using, and a comparison is provided with traditional data mining techniques.
An Erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-540-73871-8_61
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Monge, P.R., Contractor, N.: Theories of Communication Networks. Oxford University Press, New York (2003)
Granovetter, M.: The Strength of Weak Ties. American Journal of Sociology 81, 1287–1303 (1973)
Granovetter, M.: The Strength of Weak Ties: A Network Theory Revisited. In: Collins, R. (ed.) Sociological Theory, pp. 105–130 (1982)
Baker, W.E., Faulkner, R.R.: The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review 58(6), 837–860 (1993)
McAndrew, D.: The Structural Analysis of Criminal Networks. In: Canter, D., Alison, L. (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, Aldershot, Dartmouth. Offender Profiling Series, III, pp. 53–94 (1999)
Sparrow, M.: The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13, 251–274 (1991)
Evan, W.M.: An Organization-set Model of Inter-organizational Relations. In: Tuite, M., Chisholm, R., Radnor, M. (eds.) Inter-organizational Decision-making, Aldine, Chicago, pp. 181–200 (1972)
Ronfeldt, D., Arquilla, J.: What Next for Networks and Netwars? In: Arquilla, J., Ronfeldt, D. (eds.) Networks and Netwars: The Future of Terror, Crime, and Militancy, Rand Press (2001)
Arquilla, J., Ronfeldt, D.: Swarming and a Future of Conflict. RAND National Defense Institute (2001)
Hoffman, B.: Terrorism evolves Toward Netwar. RAND Review 22(2) (1999)
DeRosa, M.: Data Mining and Data Analysis for Counterterrorism, CSIS Report (2004)
Nasrullah, M.: A First Look on iMiner’s Knowledge Base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network. In: Proceedings of International Conference on Data Mining Applications, Hong Kong (March 21-23, 2007)
Memon, N., Larsen, H.L.: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks. In: Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 1037–1048. Springer, Heidelberg (2006)
Degenne, A., Forse, M.: Introducing Social Networks. Sage Publications, London (1999)
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)
Krebs, V.E.: Uncloaking Terrorist Networks (2002) (accessed 23/3/2005), http://www.firstmonday.org/issues/issue7_4/krebs
Stewart, T.: Six Degrees of Mohamed Atta (2001) (accessed 24/1/2006), http://money.cnn.com/magazines/business2
Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth Heinemann (2003)
Hougham, V.: Sociological Skills Used in the Capture of Saddam Hussein (2005) (accessed 22/2/2005), http://www.asanet.org/footnotes/julyaugust05/fn3.html
Memon, N., Kristoffersen, K.C., Hicks, D.L., Larsen, H.L.: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. In: Proceedings of International Conference on Availability, Reliability, and Security 2007, Vienna, Austria (March 10-13, 2007)
Memon, N., Larsen, H.L.: Detecting Hidden Hierarchy from Terrorist Networks. Mathematical Models for Counterterrorism. Springer, Heidelberg (in press, 2007)
West, B.D.: Introduction to Graph Theory, 2nd edn. Prentice Hall, Englewood Cliffs (2001)
Freeman, L.C., Freeman, S.C., Michaelson, A.G.: On Human Social Intelligence. Journal of Social and Biological Structures 11, 415–425 (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Memon, N., Hicks, D.L., Larsen, H.L. (2007). Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks. In: Alhajj, R., Gao, H., Li, J., Li, X., Zaïane, O.R. (eds) Advanced Data Mining and Applications. ADMA 2007. Lecture Notes in Computer Science(), vol 4632. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73871-8_40
Download citation
DOI: https://doi.org/10.1007/978-3-540-73871-8_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73870-1
Online ISBN: 978-3-540-73871-8
eBook Packages: Computer ScienceComputer Science (R0)