***** To join INSNA, visit http://www.insna.org *****
Hi,
Let me add a book on dark networks which covers a number of topics
from the machine-learning/artificial_intelligence point of view:
Hsinchun Chen, Dark Web: Exploring and Data Mining the Dark Side of
the Web. Springer 2012
My apologies if it has been already mentioned.
--Moses
On Sat, Oct 26, 2013 at 3:11 AM, Brian Phillips
<[log in to unmask]> wrote:
> ***** To join INSNA, visit http://www.insna.org *****
> Dear all,
>
> These are great resources. I have a few more cites on dark networks, even
> if that term is not used explicitly in all the articles. Some are about
> ties between terrorist organizations (networks of networks, if you will),
> although some look at the group as a network.
>
> Best,
> Brian Phillips
>
> Asal, Ackerman and Rethemeyer 2012 Studies in Conflict and Terrorism
> "Connections Can Be Toxic: Terrorist Organizational Factors and the Pursuit
> of CBRN Weapons"
>
> Asal and Rethemeyer 2008 Journal of Politics "The Nature of the Beast:
> Terrorist Organizational Characteristics and Organizational Lethality"
>
> Enders and Su 2007 Journal of Conflict Resolution "Rational Terrorists and
> Optimal Network Structure"
>
> Enders and Jindapon 2010 Journal of Conflict Resolution "Network
> Externalities and the Structure of Terror Networks"
>
> Heger et al. 2012 Terrorism and Political Violence "Organizing for
> Resistance: How Group Structure Impacts the Character of Violence"
>
> Horowitz 2010 International Organization "Nonstate Actors and the Diffusion
> of Innovation: The Case of Suicide Terrorism"
>
> Horwitz and Potter 2013 Journal of Conflict Resolution "Allying to Kill :
> Terrorist Intergroup Cooperation and the Consequences for Lethality"
>
> Perliger and Pedahzur 2011 PS: Political Science and Politics "Social
> Network Analysis in the Study of Terrorism and Political Violence"
>
> Phillips 2013 International Studies Quarterly "Terrorist Group Cooperation
> and Longevity"
>
>
> Brian J. Phillips, PhD
>
> Profesor Investigador Titular (Assistant Professor)
> División de Estudios Internacionales
> Centro de Investigación y Docencia Económicas (CIDE)
>
> https://sites.google.com/site/brianjphillips/
>
>
>
> On Fri, Oct 25, 2013 at 4:09 PM, Alla G. Khadka <[log in to unmask]> wrote:
>>
>> ***** To join INSNA, visit http://www.insna.org *****
>>
>> Hi Chiara,
>>
>> Take a look at Studies in Conflict and Terrorism journal - they have some
>> good pieces on
>> SNA and terrorist networks.
>>
>> Below is my bibliography on SNA/DNA of terrorist/covert networks.
>>
>> We are currently doing two projects that involve network analysis and
>> terrorist
>> networks. One is on terrorism knowledge base and another is on DNA of
>> terrorist
>> organizations in Afg and Pakistan. We will have our datasets ready in 2-3
>> weeks. Let me
>> know if you are interested, or looking for collaboration opportunities.
>>
>> Best,
>> Alla
>>
>> Acosta, B., & Childs, S. J. (2013). Illuminating the Global Suicide-Attack
>> Network.
>> Studies in Conflict & Terrorism, 36(1), 49-76. doi:
>> 10.1080/1057610x.2013.739079
>> Arquilla, John, Ronfeldt, David F., United States. Department of Defense.
>> Office of the
>> Secretary of Defense. (2001). Networks and Netwars: the future of terror,
>> crime, and
>> militancy. Santa Monica, CA: RAND Corporation.
>> Baker, Wayne E., & Faulkner, Robert R. (1993). The Social Organization of
>> Conspiracy:
>> Illegal Networks in the Heavy Electrical Equipment Industry. American
>> Sociological
>> Review, 58(6), 837-860.
>> Bakker, René M., Raab, Jörg, & Milward, H. Brinton. (2012). A preliminary
>> theory of dark
>> network resilience. Journal of Policy Analysis and Management, 31(1),
>> 33-62. doi:
>> 10.1002/pam.20619
>> Bright, David, Hughes, Caitlin, & Chalmers, Jenny. (2012). Illuminating
>> Dark Networks: A
>> Social Network Analysis of an Australian Drug Trafficking Syndicate.
>> Crime, Law and
>> Social Change, 57(2), 151-176.
>> Carley, Kathleen M. (2006). A Dynamic Network Approach to the Assessment
>> of Terrorist
>> Groups and the Impact of Alternative Courses of Action. Visualising
>> Network Information
>> Conference. Paper# RTO-MP-IST-063. Neuilly-sur-Seine, France.
>> Carley, Kathleen M., Lee, Ju-Sung, & Krackhardt, David. (2002).
>> Destabilizing Networks.
>> Connections, 24(3), 79-92.
>> Carley, Kathleen M., Reminga, Jeffrey, & Kamneva, Natasha. (1998).
>> Destabilizing
>> Terrorist Networks. Institute for Software Research, Carnegie Mellon
>> University, Paper
>> 45. http://repository.cmu.edu/isr/45.
>> DeServe, Edward G. (2009). Integration of Innovation in the Intelligence
>> Community: the
>> role of the netcentric environment, managed networks, and social networks.
>> In S.
>> Goldsmith & D. F. Kettl (Eds.), Unlocking the Power of Networks: Keys to
>> high
>> performance government (pp. 121-143). Washington, D.C.: Brookings
>> Institution.
>> Everton, Sean F. (2012). Disrupting Dark Networks: Structural Analysis in
>> the Social
>> Sciences. New York: NY: Cambridge University Press.
>> Faia, M. A. (2000). "Three can keep a secret if two are dead'': Weak ties
>> as
>> infiltration routes. Quality & Quantity, 34(2), 193-216. doi:
>> 10.1023/a:1004785122594
>> Harris-Hogan, S. (2012). Australian Neo-Jihadist Terrorism: Mapping the
>> Network and Cell
>> Analysis Using Wiretap Evidence. Studies in Conflict & Terrorism, 35(4),
>> 298-314. doi:
>> 10.1080/1057610x.2012.656344
>> Horne, C., & Horgan, J. (2012). Methodological Triangulation in the
>> Analysis of
>> Terrorist Networks. Studies in Conflict & Terrorism, 35(2), 182-192. doi:
>> 10.1080/1057610x.2012.639064
>> Keller, Jared P, Desouza, Kevin C., & Lin, Yuan. (2012). Dismantling
>> Terrorist Networks:
>> Evaluating Strategic Options Using Agent-Based Modeling. Technological
>> Forecasting and
>> Social Change, 77(7), 1014-1036.
>> Kenney, Michael. (2003). From Pablo to Osama: Counter-terrorism lessons
>> from the war on
>> drugs. Survival, 45(3), 187-+. doi: 10.1093/survival/45.3.187
>> Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The
>> applications to
>> counterterrorism and intelligence. Studies in Conflict & Terrorism, 29(6),
>> 589-605. doi:
>> 10.1080/10576100600798418
>> Krebs, Valdis. (2001). Mapping Networks of Terrorist Cells. Connections,
>> 24(3), 43-52.
>> Lauchs, Mark, Keast, Robyn, & Le, Vy. (2012). Social Network Analysis of
>> Terrorist
>> Networks: Can it Add Value? Pakistan Journal of Criminology, 4(1).
>> Lindelauf, Roy, Borm, Peter, & Hamers, Herbert. (2009). The influence of
>> secrecy on the
>> communication structure of covert networks. Social Networks, 31(2),
>> 126-137. doi:
>> 10.1016/j.socnet.2008.12.003
>> Memon, N., & Larsen, H. L. (2006). Practical algorithms for destabilizing
>> terrorist
>> networks. In S. Mehrotra, D. D. Zeng, H. Chen, B. Thuraisingham & F. Y.
>> Wang (Eds.),
>> Intelligence and Security Informatics, Proceedings (Vol. 3975, pp.
>> 389-400).
>> Memon, N., & Larsen, H. L. (2006). Structural analysis and mathematical
>> methods for
>> destabilizing terrorist networks using investigative data mining. In X.
>> Li, O. R. Zaiane
>> & Z. H. Li (Eds.), Advanced Data Mining and Applications, Proceedings
>> (Vol. 4093, pp.
>> 1037-1048).
>> Milward, H. Brinton, & Raab, Jörg. (2009). Dark Networks and the Problem
>> of Islamic
>> Jihadist Terrorism. In S. Goldsmith & D. F. Kettl (Eds.), Unlocking the
>> Power of
>> Networks: Keys to high performance government (pp. 168-189). Washington,
>> D.C.: Brookings
>> Institution.
>> Moon, I. C., & Carley, K. M. (2007). Modeling and simulating terrorist
>> networks in
>> social and geospatial. Ieee Intelligent Systems, 22(5), 40-49. doi:
>> 10.1109/mis.2007.4338493
>> Patterson, S. A., & Apostolakis, G. E. (2007). Identification of critical
>> locations
>> across multiple infrastructures for terrorist actions. Reliability
>> Engineering & System
>> Safety, 92(9), 1183-1203. doi: 10.1016/j.ress.2006.08.004
>> Perliger, Arie, & Pedahzur, Ami. (2011). Social Network Analysis in the
>> Study of
>> Terrorism and Political Violence. Political Science & Politics, 44(1),
>> 45-50.
>> Raab, Jörg, & Milward, H. Brinton. (2003). Dark Networks as Problems.
>> Journal of Public
>> Administration Research and Theory: J-PART, 13(4), 413-439. doi:
>> 10.1093/jopart/mug029
>> Roberts, Nancy, & Everton, Sean F. (2011). Strategies for Combating Dark
>> Networks.
>> Journal of Social Structure, 12(2), 1-32.
>> Rodríguez Díaz, José A. (2005). The March 11th Terrorist Network: In its
>> weakness lies
>> in its strength. Paper presented at the XXV International Sunbelt Social
>> Network
>> Conference, Redondo Beach, CA.
>> http://sites.google.com/site/estudiospoderprivilegio/redessociales3.
>> Rodríguez Díaz, José A. (2008). Weakness and strengths of terrorist
>> networks: The
>> Madrid’s March 11th attacks. Paper presented at the American Sociological
>> Association
>> Annual Meeting, Sheraton Boston and the Boston Marriott Copley Place,
>> Boston, MA.
>>
>> http://www.allacademic.com/meta/p_mla_apa_research_citation/2/4/3/0/5/p243052_index.html.
>> Rodríguez Díaz, José A. (2009). Networks and the future: A new
>> methodological approach
>> to envision and create the network society of tomorrow. Futures, 41(7),
>> 490-501. doi:
>> 10.1016/j.futures.2009.01.004
>> Sageman, Marc. (2004). Understanding terror networks. Philadelphia:
>> University of
>> Pennsylvania Press.
>> Saxena, Sudhir, Santhanam, K., & Basu, Aparna. (2004). Application of
>> Social Network
>> Analysis (SNA) to terrorist networks in Jammu & Kashmir. Strategic
>> Analysis, 28(1),
>> 84-101. doi: 10.1080/09700160408450119
>> Scott, Helfstein, & Wright, Dominick. (2011). Covert or Convenient?
>> Evolution of Terror
>> Attack Networks. Journal of Conflict Resolution, 55(5), 785-813. doi:
>> 10.1177/0022002710393919
>> Subrahmanian, V. S., & SpringerLink. (2013). Handbook of Computational
>> Approaches to
>> Counterterrorism. New York, NY: Springer New York.
>> Yang, C. C., & Sageman, M. (2009). Analysis of terrorist social networks
>> with fractal
>> views. Journal of Information Science, 35(3), 299-320. doi:
>> 10.1177/0165551508099089
>>
>> Datasets (Dark Networks):
>> Valdis Krebs
>> http://thenetworkthinkers.com
>>
>> Carley, K. M., Diesner, J., Reminga, J., & Tsvetovat, M. (2007). Toward an
>> interoperable
>> dynamic network analysis toolkit. Decision Support Systems (DSS), 43(4),
>> 1324-1347.
>>
>> http://casos.cs.cmu.edu/computational_tools/datasets/internal/west_bank_18/index11.php
>>
>> LINQS, Two data sets on dark networks:
>> http://www.cs.umd.edu/projects/linqs/projects/lbc/index.html
>>
>> Sean Everton, Noordin Top Terrorist network datasets:
>> https://sites.google.com/site/sfeverton18/research/appendix-1
>>
>>
>>
>>
>>
>> > ***** To join INSNA, visit http://www.insna.org *****
>> >
>> > Chiara,
>> >
>> > These might also be useful:
>> >
>> > Helfstein, S., & Wright, D. (2011). Covert or Convenient? Evolution of
>> > Terror Attack
>> > Networks. Journal of Conflict Resolution, 55(5), 785-813.
>> > doi:10.1177/0022002710393919
>> >
>> > Lindelauf, R., Borm, P., & Hamers, H. (2009). The influence of secrecy
>> > on the
>> > communication structure of covert networks. Social Networks, 31(2),
>> > 126-137.
>> > doi:10.1016/j.socnet.2008.12.003
>> >
>> > Morselli, C., Giguere, C., & Petit, K. (2007). The efficiency/security
>> > trade-off in
>> > criminal networks. Social Networks, 29(1), 143-153.
>> > doi:10.1016/j.socnet.2006.05.001
>> >
>> > Cameron Ward-Hunt
>> > School of Public Affairs
>> > University of Colorado Denver
>> > ________________________________________
>> > From: Social Networks Discussion Forum [<a
>> > href="mailto:SOCNET@LISTS_____________________________________________________________________
>> > SOCNET is a service of INSNA, the professional association for social
>> > network researchers (http://www.insna.org). To unsubscribe, send an email
>> > message to [log in to unmask] containing the line UNSUBSCRIBE SOCNET in
>> > the body of the message.
_____________________________________________________________________
SOCNET is a service of INSNA, the professional association for social
network researchers (http://www.insna.org). To unsubscribe, send
an email message to [log in to unmask] containing the line
UNSUBSCRIBE SOCNET in the body of the message.
|