Skip to main content

Advertisement

Log in

Network analysis of terrorist activities

  • Published:
Journal of Systems Science and Complexity Aims and scope Submit manuscript

Abstract

This paper uses an extensive network approach to “East Turkistan” activities by building both the one-mode and the bipartite networks for these activities. In the one-mode network, centrality analysis and spectrum analysis are used to describe the importance of each vertex. On this basis, two types of core vertices — The center of communities and the intermediary vertices among communities — are distinguished. The weighted extreme optimization (WEO) algorithm is also applied to detect communities in the one-mode network. In the “terrorist-terrorist organization” bipartite network, the authors adopt centrality analysis as well as clustering analysis based on the original bipartite network in order to calculate the importance of each vertex, and apply the edge clustering coefficient algorithm to detect the communities. The comparative and empirical analysis indicates that this research has been proved to be an effective way to identify the core members, key organizations, and communities in the network of “East Turkistan” terrorist activity. The results can provide a scientific basis for the analysis of “East Turkistan” terrorist activity, and thus provide decision support for the real work of “anti-terrorism”.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Watts D J and Strogatz S H, Collective dynamics of ‘small-world’ networks, Nature, 1998, 393(1): 440–442.

    Article  Google Scholar 

  2. Barabási A L and Albert R, Emergence of scaling in random networks, Science, 1999, 286(5439): 509–512.

    Article  MathSciNet  Google Scholar 

  3. Couzin I D, Ioannou C C, Demirel G, et al., Uninformed individuals promote democratic consensus in animal groups, Science, 2011, 332(6062): 1578–1580.

    Article  Google Scholar 

  4. Barabási A L, Gulbahce N, and Loscalzo J, Network medicine: A network-based approach to human disease, Nature Reviews Genetics, 2011, 12(1): 56–58.

    Article  Google Scholar 

  5. Li Z P, Wang R S, Zhang X S, et al., Self-organizing map of complex networks for community detection, Journal of Systems Science and Complexity, 2010, 23(5): 931–941.

    Article  MATH  MathSciNet  Google Scholar 

  6. Zheng X L, Zhong Y G, Zeng D, and Wang F Y, Social influence and spread dynamics in social networks, Frontiers of Computer Science, 2012, 6(5): 611–620.

    MathSciNet  Google Scholar 

  7. Zheng X L, Zeng D, Li H Q, et al., Analyzing open-source software systems as complex networks, Physica A: Statistical Mechanics and Its Applications, 2008, 387(24): 6190–6200.

    Article  Google Scholar 

  8. Bohannon J, Counterterrorism’s new tool: ‘Metanetwork’ analysis, Science, 2009, 325(5939): 409–411.

    Article  Google Scholar 

  9. Borgatti S P, Mehra A, Brass D J, et al., Network analysis in the social sciences, Science, 2009, 325(5916): 892–895.

    Article  Google Scholar 

  10. Weinberger S, Social science: Web of war, Nature, 2011, 471: 566–568.

    Article  Google Scholar 

  11. Krebs V E, Mapping networks of terrorist cells, Connections, 2002, 24(3): 43–52.

    Google Scholar 

  12. Carley K M, Lee J, and Krackhardt D, Destabilizing networks, Connections, 2002, 24(3): 79–92.

    Google Scholar 

  13. Chen H C, Chung W Y, Qin J L, et al., Uncovering the dark web: A case study of Jihad on the web, Journal of the American Society for Information Science and Technology, 2008, 59(8): 1347–1359.

    Article  Google Scholar 

  14. Rodriguez J A, The March 11th terrorist network: In its weakness lies its strength, XXV. International Sunbelt Conference, Los Angeles, 2005.

    Google Scholar 

  15. Memon N, Harkiolakis N, and Hicks D L, Detecting high-value individuals in covert networks: 7/7 London bombing case study, IEEE/ACS International Conference on Computer Systems and Applications, Doha, March 2008.

  16. Basu A, Social network analysis of terrorist organizations in India, Conference of the North American Association for Computational Social and Organizational Science, Notre Dame, Indiana, June, 2005.

  17. Sageman M, Understanding Terror Networks, University of Pennsylvania Press, Philadelphia, 2004.

    Book  Google Scholar 

  18. Liu J, Lectures on Whole Network Approach: A Practical Guide to UCINET, Shanghai Peoples Publishing House, Shanghai, 2009.

    Google Scholar 

  19. Borgatti S P, Carley K M, and Krackhardt D, On the robustness of centrality measures under conditions of imperfect data, Social Networks, 2006, 28(2): 124–136.

    Article  Google Scholar 

  20. Newman M E J, Networks: An Introduction, Oxford University Press, Oxford, UK, 2009.

    Google Scholar 

  21. Palla G, Derenyi I, Farkas I, et al., Uncovering the overlapping community structure of complex networks in nature and society, Nature, 2005, 435(7043): 814–818.

    Article  Google Scholar 

  22. Mucha P J, Richardson T, Macon K, et al., Community structure in time-dependent, multiscale, and multiplex networks, Science, 2010, 328(5980): 876–878.

    Article  MATH  MathSciNet  Google Scholar 

  23. Newman M E J, Communities, modules and large-scale structure in networks, Nature Physics, 2012, 8(1): 25–31.

    Article  Google Scholar 

  24. Karrer B, Newman M E J, Stochastic block models and community structure in networks, Physical Review E, 2011, 83(1): 016107.

    Article  MathSciNet  Google Scholar 

  25. Wang F, Li T, Wang X, et al., Community discovery using nonnegative matrix factorization, Data Mining and Knowledge Discovery, 2011, 22(3): 493–521.

    Article  MATH  MathSciNet  Google Scholar 

  26. Wang Y, Di Z R, and Fan Y, Identifying and characterizing codes important to community structure using the spectrum of the graph, PLoS One, 2011, 6(11): e27418.

    Article  Google Scholar 

  27. Fan Y, Li M H, Zhang P, et al., Accuracy and precision of methods for community identification in weighted networks, Physica A: Statistical Mechanics and Its Applications, 2007, 377(1): 363–372.

    Article  Google Scholar 

  28. Newman M E J, Fast algorithm for detecting community structure in networks, Physical Review E, 2004, 69(6): 066133.

    Article  Google Scholar 

  29. Zhang P, Wang J L, Li X J, et al., Clustering coefficient and community structure of bipartite networks, Physica A: Statistical Mechanics and Its Applications, 2008, 387(27): 6869–6875.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ying Fan.

Additional information

This work is supported by the Natural Science Foundation of China under Grants Nos. 70771011 and 61174150, the Program for New Century Excellent Talents in University of Ministry of Education of China under Grant No. NCET-09-0228, and Ph.D. Programs Foundation of Ministry of Education of China under Grant No. 20110003110027, and the China Scholarship Council (CSC).

This paper was recommended for publication by Editor DI Zengru.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fu, J., Fan, Y., Wang, Y. et al. Network analysis of terrorist activities. J Syst Sci Complex 27, 1079–1094 (2014). https://doi.org/10.1007/s11424-014-3034-8

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11424-014-3034-8

Keywords

Navigation