Skip to main content
Log in

Extracting socio-cultural networks of the Sudan from open-source, large-scale text data

  • SI: Data to Model
  • Published:
Computational and Mathematical Organization Theory Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Notes

  1. http://www.sudantribune.com/.

  2. For weighed term frequency we used the tf-idf metric.

  3. Broken down by years, we used 2003 (2932), 2004 (6943), 2005 (3828), 2006 (3828), 2007 (5815), 2008 (9266) text files.

  4. For organizations, we disregarded “islamist” as it seemed too broad and “university” as is correlated with “students”.

  5. The specificity value can be “specific”, e.g. for the concept “Khartoum” or “generic”, e.g. for the concept “city”.

References

  • Baker WE, Faulkner RR (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58(6):837–860

    Article  Google Scholar 

  • Carley KM (1991) Designing organizational structures to cope with communication breakdowns: a simulation model. Organization & Environment 5(1):19–57

    Article  Google Scholar 

  • Carley KM (2002) Smart agents and organizations of the future. In: Lievrouw L, Livingstone S (eds) The handbook of new media: social shaping and consequences of ICTs. Sage, Thousand Oaks, pp 206–220

    Google Scholar 

  • Carley KM, Columbus D, Bigrigg M, Kunkel F (2011a) AutoMap User’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-108

  • Carley KM, Diesner J, Reminga J, Tsvetovat M (2007) Toward an interoperable dynamic network analysis toolkit. Decis Support Syst 43(4):1324–1347. Special Issue Cyberinfrastructure for Homeland Security

    Article  Google Scholar 

  • Carley KM, Lanham M, Martin M, Morgon G, Schmerl B, van Holt T, Bigrigg MW, Garlan D, Johnson J, Kunkel F (2011b) Rapid ethnographic assessment: data to model. Paper presented at the HSCB Focus 2011: Integrating Social Science Theory and Analytic Methods for Operational Use

  • Carley KM, Reminga J, Storrick J, Columbus D (2011c) ORA User’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-107

  • Carrington PJ, Scott J, Wasserman S (2005) Models and methods in social network analysis. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Committee SC QI.Z.168.04. Ahmad Zerfaoui. Security Council Committee pursuant to resolutions 1267 (1999) and 1989 (2011) concerning Al-Qaida and associated individuals and entities. http://www.un.org/sc/committees/1267/NSQI16804E.shtml

  • Danowski JA (1993) Network analysis of message content. Prog Commun Sci 12:198–221

    Google Scholar 

  • Diesner J (2012) Uncovering and managing the impact of methodological choices for the computational construction of socio-technical networks from texts. CMU-ISR-12-101 (forthcoming)

  • Diesner J, Carley KM (2005) Revealing social structure from texts: meta-matrix text analysis as a novel method for network text analysis. In: Narayanan VK, Armstrong DJ (eds) Causal mapping for information systems and technology research: approaches, advances, and illustrations. Idea Group Publishing, Harrisburg, pp 81–108

    Google Scholar 

  • Diesner J, Carley KM (2008) Conditional random fields for entity extraction and ontological text coding. J Comput Math Organ Theory 14:248–262

    Article  Google Scholar 

  • Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquitous Comput 10(4):255–268

    Article  Google Scholar 

  • Emery F, Trist E (1960) Socio-technical systems. Manag Sci, Models Tech 2:83–97

    Google Scholar 

  • Enders W, Su X (2007) Rational terrorists and optimal network structure. J Confl Resolut 51(1):33–57

    Article  Google Scholar 

  • Erickson B (1981) Secret societies and social structure. Soc Forces 60:188–210

    Google Scholar 

  • Freeman L (2000) Visualizing social networks. J Soc Struct 1(1). Available: http://www.cmu.edu/joss/content/articles/volume1/Freeman.html

  • Hämmerli A, Gattiker R, Weyermann R (2006) Conflict and cooperation in an actors’ network of Chechnya based on event data. J Confl Resolut 50(2):159–175

    Article  Google Scholar 

  • Howlett J (1980) Analytical investigative techniques: tools for complex criminal investigations. Police Chief 47(12):42–45

    Google Scholar 

  • Humphreys M (2005) Natural resources, conflict, and conflict resolution. J Confl Resolut 49(4):508–537

    Article  Google Scholar 

  • Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators. Connections 24(3):53–65

    Google Scholar 

  • Krackhardt D (1987) Cognitive social structures. Soc Netw 9:109–134

    Article  Google Scholar 

  • Krackhardt D (1998) Simmelian ties: super strong and sticky. In: Power and influence in organizations, pp 21–38

    Google Scholar 

  • Malm A, Kinney J, Pollard N (2008) Social network and distance correlates of criminal associates involved in illicit drug production. Security J 21(1–2):77–94

    Article  Google Scholar 

  • Milgram S (1967) The small world problem. Psychol Today 2(1):60–67

    Google Scholar 

  • Mitchell J (1969) The concept and use of social networks. In: Mitchell J (ed) Social networks in urban situations: analyses of personal relationships in central African towns. Manchester University Press, Manchester, pp 1–50

    Google Scholar 

  • National Research Council CoNSfFAA (2005) Network science. National Academies Press, Washington

    Google Scholar 

  • Popp R, Poindexter J (2006) Countering terrorism through information and privacy protection technologies. IEEE Secur Priv 4(6):18–27

    Article  Google Scholar 

  • Ryan B, Gross N (1943) The diffusion of hybrid seed corn in two Iowa communities. Rural Soc 8(1):15–24

    Google Scholar 

  • Schrodt P, Simpson E, Gerner D (2001) Monitoring conflict using automated coding of newswire reports: a comparison of five geographical regions. Paper presented at the PRIO/Uppsala University/DECRG high-level scientific conference on identifying wars: systematic conflict research and its utility in conflict resolution and prevention, Uppsala, Sweden, 8–9 June

  • Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge

    Book  Google Scholar 

Download references

Acknowledgements

This research was supported in part by ARI W91WAW07C0063, GMU MURI FA9550-05-1-0388, and ONR N00014-08-1-1186. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Institute, the Air Force Office of Sponsored Research, the Office of Naval Research, or the United States Government. We also thank our research partners Jeffrey Johnson and Tracy van Holt, both from East Carolina University, and Richard Lobban from Rhode Island College for their continuous help on this project. Special thanks also to Frank Kunkel, CMU, for his help with this project. We are furthermore grateful to the feedback from the attendees of our presentation at the 29th Annual Conference of the Sudan Studies Organization (SSA).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kathleen M. Carley.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Diesner, J., Carley, K.M. & Tambayong, L. Extracting socio-cultural networks of the Sudan from open-source, large-scale text data. Comput Math Organ Theory 18, 328–339 (2012). https://doi.org/10.1007/s10588-012-9126-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10588-012-9126-x

Keywords

Navigation