Abstract
This paper presents a time and space analysis method based on social network tools, using the open source Chinese text data and social network analysis tools to analyze the temporal and spatial distribution of Chinese terrorist activities. Through the construction of the terrorists network, the terrorists-time binary subnet and the terrorists-location binary subnet, making a social network analysis of the main active sites and active years of Chinese terrorists, and the characteristics of their activities were summarized, with a view to provide a reference for counter-terrorism decision-making departments.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)
Memon, N., Hicks, D.L.: Detecting key players in 11-M terrorist network: a case study. In: International Conference on Availability, Reliability and Security, pp. 1254–1259 (2000)
Carley, K.M.: Destabilization of covert networks. Comput. Math. Organ. Theory 12(1), 51–66 (2006)
Carley, K.M., Dombroski, M., Tsvetovat, M., et al.: Destabilizing dynamic covert networks. In: Proceedings of International Command and Control Research and Technology Symposium (2003)
Carley, K.M., Columbus, D., Landwehr, P.: Automap User’s Guide 2013. http://www.casos.cs.cmu.edu/index.php
Carley, K.M.: ORA-NetScenes Quick Start Guide. http://www.casos.cs.cmu.edu/index.php
Heping, Y., Weifeng, H., Yingming, W.: Ways of controlling the risks terrorist attack through social network analysis. J. Safety Environ. 9(03), 161–165 (2009)
Hai, Z., Duoyong, S.: Study on the terrorist convert networks from the perspective of social network analysis. J. Safety Environ. 11(03), 259–264 (2011)
Miao, Z.: Social network analysis of violent terrorist activities in Xinjiang. Soc. Sci. Xinjiang 02, 109–114 (2016)
Xiaoke, X., Jinqing, F.: Applications of complex network theory in war on terrorism. Complex Syst. Complex. Sci. 7(2–3), 116–119 (2010)
Acknowledgments
The paper is supported by the 2016 National Social Science Fund Western Project “Counter-terrorism early warning system architecture based on the information network and key issues research” (No. 16XSH003).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Guo, X., Xiao, Zt., Zeng, Ps., Yang, Y. (2018). Terrorists Spatio-Temporal Analysis Based on Social Network Tools. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_65
Download citation
DOI: https://doi.org/10.1007/978-3-319-61542-4_65
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61541-7
Online ISBN: 978-3-319-61542-4
eBook Packages: EngineeringEngineering (R0)