Notes
For weighed term frequency we used the tf-idf metric.
Broken down by years, we used 2003 (2932), 2004 (6943), 2005 (3828), 2006 (3828), 2007 (5815), 2008 (9266) text files.
For organizations, we disregarded “islamist” as it seemed too broad and “university” as is correlated with “students”.
The specificity value can be “specific”, e.g. for the concept “Khartoum” or “generic”, e.g. for the concept “city”.
References
Baker WE, Faulkner RR (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58(6):837–860
Carley KM (1991) Designing organizational structures to cope with communication breakdowns: a simulation model. Organization & Environment 5(1):19–57
Carley KM (2002) Smart agents and organizations of the future. In: Lievrouw L, Livingstone S (eds) The handbook of new media: social shaping and consequences of ICTs. Sage, Thousand Oaks, pp 206–220
Carley KM, Columbus D, Bigrigg M, Kunkel F (2011a) AutoMap User’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-108
Carley KM, Diesner J, Reminga J, Tsvetovat M (2007) Toward an interoperable dynamic network analysis toolkit. Decis Support Syst 43(4):1324–1347. Special Issue Cyberinfrastructure for Homeland Security
Carley KM, Lanham M, Martin M, Morgon G, Schmerl B, van Holt T, Bigrigg MW, Garlan D, Johnson J, Kunkel F (2011b) Rapid ethnographic assessment: data to model. Paper presented at the HSCB Focus 2011: Integrating Social Science Theory and Analytic Methods for Operational Use
Carley KM, Reminga J, Storrick J, Columbus D (2011c) ORA User’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-107
Carrington PJ, Scott J, Wasserman S (2005) Models and methods in social network analysis. Cambridge University Press, Cambridge
Committee SC QI.Z.168.04. Ahmad Zerfaoui. Security Council Committee pursuant to resolutions 1267 (1999) and 1989 (2011) concerning Al-Qaida and associated individuals and entities. http://www.un.org/sc/committees/1267/NSQI16804E.shtml
Danowski JA (1993) Network analysis of message content. Prog Commun Sci 12:198–221
Diesner J (2012) Uncovering and managing the impact of methodological choices for the computational construction of socio-technical networks from texts. CMU-ISR-12-101 (forthcoming)
Diesner J, Carley KM (2005) Revealing social structure from texts: meta-matrix text analysis as a novel method for network text analysis. In: Narayanan VK, Armstrong DJ (eds) Causal mapping for information systems and technology research: approaches, advances, and illustrations. Idea Group Publishing, Harrisburg, pp 81–108
Diesner J, Carley KM (2008) Conditional random fields for entity extraction and ontological text coding. J Comput Math Organ Theory 14:248–262
Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquitous Comput 10(4):255–268
Emery F, Trist E (1960) Socio-technical systems. Manag Sci, Models Tech 2:83–97
Enders W, Su X (2007) Rational terrorists and optimal network structure. J Confl Resolut 51(1):33–57
Erickson B (1981) Secret societies and social structure. Soc Forces 60:188–210
Freeman L (2000) Visualizing social networks. J Soc Struct 1(1). Available: http://www.cmu.edu/joss/content/articles/volume1/Freeman.html
Hämmerli A, Gattiker R, Weyermann R (2006) Conflict and cooperation in an actors’ network of Chechnya based on event data. J Confl Resolut 50(2):159–175
Howlett J (1980) Analytical investigative techniques: tools for complex criminal investigations. Police Chief 47(12):42–45
Humphreys M (2005) Natural resources, conflict, and conflict resolution. J Confl Resolut 49(4):508–537
Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators. Connections 24(3):53–65
Krackhardt D (1987) Cognitive social structures. Soc Netw 9:109–134
Krackhardt D (1998) Simmelian ties: super strong and sticky. In: Power and influence in organizations, pp 21–38
Malm A, Kinney J, Pollard N (2008) Social network and distance correlates of criminal associates involved in illicit drug production. Security J 21(1–2):77–94
Milgram S (1967) The small world problem. Psychol Today 2(1):60–67
Mitchell J (1969) The concept and use of social networks. In: Mitchell J (ed) Social networks in urban situations: analyses of personal relationships in central African towns. Manchester University Press, Manchester, pp 1–50
National Research Council CoNSfFAA (2005) Network science. National Academies Press, Washington
Popp R, Poindexter J (2006) Countering terrorism through information and privacy protection technologies. IEEE Secur Priv 4(6):18–27
Ryan B, Gross N (1943) The diffusion of hybrid seed corn in two Iowa communities. Rural Soc 8(1):15–24
Schrodt P, Simpson E, Gerner D (2001) Monitoring conflict using automated coding of newswire reports: a comparison of five geographical regions. Paper presented at the PRIO/Uppsala University/DECRG high-level scientific conference on identifying wars: systematic conflict research and its utility in conflict resolution and prevention, Uppsala, Sweden, 8–9 June
Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge
Acknowledgements
This research was supported in part by ARI W91WAW07C0063, GMU MURI FA9550-05-1-0388, and ONR N00014-08-1-1186. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Institute, the Air Force Office of Sponsored Research, the Office of Naval Research, or the United States Government. We also thank our research partners Jeffrey Johnson and Tracy van Holt, both from East Carolina University, and Richard Lobban from Rhode Island College for their continuous help on this project. Special thanks also to Frank Kunkel, CMU, for his help with this project. We are furthermore grateful to the feedback from the attendees of our presentation at the 29th Annual Conference of the Sudan Studies Organization (SSA).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Diesner, J., Carley, K.M. & Tambayong, L. Extracting socio-cultural networks of the Sudan from open-source, large-scale text data. Comput Math Organ Theory 18, 328–339 (2012). https://doi.org/10.1007/s10588-012-9126-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10588-012-9126-x