A Survey on Social Network Analysis for Counter- Terrorism
|
|
|
- Solomon McDonald
- 10 years ago
- Views:
Transcription
1 A Survey on Social Network Analysis for Counter- Terrorism Pankaj Choudhary Department of Computer Engineering Defence Institute of Advanced Technology Pune, India Upasna Singh Department of Computer Engineering Defence Institute of Advanced Technology Pune, India ABSTRACT Terrorist Activities worldwide has approached the evolution of various high-ended methodologies for analyzing terrorist groups and networks. Existing research found that Social Network Analysis (SNA) is one of the most effective and predictive method for countering terrorism in social networks. The study reviewed various SNA measures for predicting the key players/ main actors of terrorist network in terms of global as well as Indian perspective. Comparative study among SNA tools demonstrated the applicability and feasibility for online and offline social networks. It is recommended to incorporate temporal analysis using data mining methods. It can enhance the capability of SNA for handing dynamic behavior of online social networks. General Terms Social Network Analysis, Data Mining. Keywords Social Network Analysis, Terrorist Networks, Counter- Terrorism, Centrality, Online and Offline Social Networks. 1. INTRODUCTION Social Network Analysis (SNA) is the application of network theory to analyze social networks in terms of social relationships. It comprises of nodes (actors, persons, organizations etc.) within the network and ties representing relationships (friendship, kinship, conversation, financial transaction etc.) among the nodes. Social relationships may be in the form of real world offline social networks (like friendship, kinship, communication, transaction etc.) or it may be online social networks (like Facebook, Twitter etc.). Various SNA measures has been used for representing interaction among actors, examining strong or weak ties, identifying key/central players and subgroups in network, finding topology and strength of network. Recently SNA has appeared as a practice in various domains. It is significantly applied in Information Science, Political Science, Organizational Studies, Social Psychology, Biology, Communication Studies, Business Analysis, Economics and Intelligence Analysis. Facebook, Twitter and few more social networking sites use various measures of SNA to develop strategies and policies for users. Studies based on SNA in Counter-Terrorism became popular just after the attacks of 9/11. SNA has extensively been used by the intelligence and law enforcement agencies for understanding the structure of terrorist networks and developing strategies to disrupt them by recognizing leaders and hidden patterns in the criminal and terrorist networks. Some common applications of SNA in Counter-Terrorism are Key-Player Identification, Community Discovery, Link (relation) Analysis, Node (actor) Discovery and Dynamic Network Analysis etc. This paper outlines a variety of measures and techniques used in SNA for counter-terrorism activities. Section 2 outlines the review of research done using various SNA measures in the field of counter-terrorism analysis. Section 3 provides detailed comparison of various tools and techniques for online and offline SNA. It also highlights the methods for collecting social network data. Section 4 provides suggestions and comments on the existing measures, future scope and directions for using SNA in Counter-Terrorism and wraps up the paper with a concise summary. 2. RELATED WORK In this section, we present a general idea of research work done in the field of SNA with a more broad set of prior research focused on counter-terrorism and analysis of criminal networks. 2.1 Social Network Analysis and its Measures Various measures have been developed over time for analyzing the social network in term of identifying keyplayers, community detection, finding pattern in network, node and link discovery etc. Centrality is one of the commonly considered notions in social network analysis for identifying key players. Several measures have been developed for centrality, including degree, betweenness, closeness, eigenvector centrality, information centrality, flow betweenness [8], Katz s influence [9] measure etc. Freeman [1] proposed three different intuitive notion of centrality namely degree, betweenness and closeness centrality, which are mostly used in identifying key players in the social network. Bonacich [2] [3] proposed eigenvector centrality for finding relative importance of a node, which is mostly used for defining the influence of a node on its neighboring nodes. Everett and et al. [4] in their work, extended the centrality measures of degree, closeness and betweenness to apply to groups and classes as well as individuals. UCINET, a tool for analyzing social network data was released then by Everett and et al. [5] with most of the common SNA measures for analysis. Borgatti [6] suggested a typology of network flows depending on two dimensions of variation. Everett [7] studied social networks containing negative ties such as dislike, evading, and conflict and proposed a new centrality measure, PN centrality for both positive and negative ties. 2.2 Social Network Analysis in Counter Terrorism Global Perspective After tragic 9/11 attacks, various studies involved the use of social network analysis in countering terrorism and crime. Key-player identification, community discovery, covert 24
2 network analysis, dynamic network analysis, and disruption of terrorist networks are the most common studies among them. Krebs [10], studied and mapped the 9/11 Al-Qaeda terrorist network by gathering publicly available information on 19 hijackers of Al-Qaeda and applying basic SNA centrality and community measures with the help of SNA tools to identify the key p layers and leaders in the network. This research gives some vision for further work and research into the terrorist networks analysis. Carley [11] studied social network analysis and multi-agent models for destabilizing networks. It explain the challenges in disrupting networks that are large, distributed and dynamic in nature. It also proposed multi-agent model for agents, knowledge and tasks based on various meta-networks (like: social network, knowledge network, information network, assignment network etc). Carley [12] proposed an approach for evaluating destabilization strategies for covert terrorist networks by using data in publicly available records, newspaper reports, and professional journals. Jennifer Xu [13] categorized existing criminal network analysis approaches and tools for identifying subgroups, discovering their patterns of interaction, finding key players, and uncovering organizational structures. Memon [14] proposed an algorithms for creating hierarchy of the covert networks and for better understanding the structure of the informal or unusual organizations, in order to disrupt these networks. The algorithms are verified by using open source dataset. An overview of the history of social network analysis in counter-terrorism research is provided by Ressler [15]. The study was focused on various academic, defence and government activities for data collection and modelling for terrorism networks. Everton [16] suggested to consider overall topography of social network before shaping strategies for their disruption by using SNA centrality measures for identifying key players. Size, number of attacks and network resiliency must be included for effectively computing the effectiveness of terrorist networks. Roberts [17] explored kinetic and non-kinetic approaches to disrupting dark networks. The kinetic approach involves aggressive and offensive measures to eliminate or capture network members, while the non-kinetic approach involves the use of SNA for combating dark networks. To explain both these approaches they used network data from of Noordin Top s terrorist network (operational and trust network) of South East Asia. Everton [18] studied and prepared the Noordin Top s terrorist network from in order to detect changes over time in network structure (i.e. density, centralization) and effectiveness (i.e. Recruitment of members, quality of members). This study suggested that, dense but decentralized terrorist groups are more effective and more difficult to disrupt. Klausen [19] studied the social network of YouTube account holders linked with al-muhajiroun s posts of jihadist and violent contents on YouTube by applying various SNA measures. Using social network analysis and media based evidences, Wu [20] tried to find the possible leader after Bin Laden by examining the Al-Queda terrorist network by considering network position in terms of social capital as an important factor for identifying the new leader. Sarvari [21] created a large scale social network graph through a set of publicly leaked addresses of several criminals and by identifying Facebook profiles connected to these addresses. By applying various social network analysis measures they recognized profiles of high rank criminals, various criminal communities and public groups on Facebook Indian Perspective Saxena [22] studied the network of terrorist organizations, operating actively in State of Jammu & Kashmir of India by identifying their relations, and then by applying various methods of analysis to identify the key players among these organizations. With the help of public or intelligence data and applying methods of social network analysis Basu [23] studied major terrorist groups operating in India and their linkages to international terrorist groups. Azad [24] analyzed the network of 26/11 terror attacks of Mumbai (India), based on the communication between ten attackers and their handlers in Pakistan. Using various network analysis measures they identified the key leaders and sub groups inside the terrorist network. Karthika [25] studied and compared the research work done in the field of social network analysis for covert networks and categorized various approaches in social network analysis like identifying key player and subgroups, destabilizing terrorist and covert networks, dynamic network analysis and so on. 3. TOOLS AND TECHNIQUES USED FOR SNA IN COUNTER-TERRORISM A social network is an architecture which consists of set of nodes (as actors or organizations) and relationships between these nodes. These social network may be online as well as offline in nature. Online social networks are basically in the form of online social networking sites (like Facebook, Twitter, YouTube, Google+, LinkedIn etc.), which allow users to interact with other users through sending messages, posting information, images, videos, likes and comments on them. On the other hand offline social networks are the real life social networks based on the relations like friendship, kinship, communication, financial transactions, locations, events etc. 3.1 Methods for Data Collection In recent works the data is collected from online as well as offline social networks Data Collection from Online Social Networks Data collection from online social networks include the extraction of public and private data of users, groups and pages, which contain posts, tweets, likes, comments, photos, videos etc. A number of tools and APIs are available for extracting data from various online social networks like Facebook, Twitter, YouTube and few more. Facebook graph API, Twitter API, Netvizz [26] and NodeXL [27] are such tools for extracting social network data and further analyzing most of the criminal and terrorist activities using online social networks. 25
3 3.1.2 Data collection from offline social networks Data collection for offline social network analysis involves the public and open source data from various news articles, reports, phone call records, textual analysis etc. For offline social network analysis of terrorist and criminal networks, few services and databases are available like GTD [28] and GDELT [29]. Global Terrorism Database (GTD) is service which provides open source data for various terrorist and criminal activities around the world. GDELT is a project which monitors and extracts the network of individuals, events, organizations and locations based on the news media and other open source information. Using these services with manual data collection, more relevant data can be gathered for modelling and analyzing terrorist and criminal networks. 3.2 Methods for Analysis SNA provides various measures for analysis of central node within the network, overall importance of a node in the network, highly connected node in network, groups and subgroups in the network and flow of information within the network. The measure of importance and position of a node in the network is often defined by centrality. In analysis of terrorist network following types of centrality is commonly used: Degree Centrality Degree centrality [1] is defined as the number of direct links or connections to a node. A node with higher degree centrality value is often considered as a hub and an active entity in the network. In terrorist and criminal networks it helps in identifying number of persons that can be reached directly from particular person. It is not necessary that highest degree centrality node is the leader in the network. Generally social network G is represented as adjacency matrix A. Degree Centrality of node i in the network can be defined as, D i = j G A ij N 1 Where A ij is the element in the adjacency matrix A at ij th position. N is the total nodes in the network. (N-1) is the factor for normalization. (1) Betweenness Centrality Betweenness centrality [1] is a measure for identifying a node, which act as a bridge to make connections to other groups or communities in the network. It can be defined as the number of shortest paths between any pair that pass through a node. A node with higher betweenness centrality considered as powerful node with great amount of influence. In terrorist and criminal networks it helps in finding a person may be a potential broker (having maximum information) between two groups or communities in that network. Betweenness centrality of node i the network can be defined as: B i = j,k=g g jk (i) gjk (N 1)(N 2) Where g jk is total shortest paths between two nodes j and k, and g jk (i) is total shortest paths between j and k which pass via node i. For normalize the value (N-1) (N-2) is used. (2) Closeness centrality Closeness centrality [1] is a measure of how fast one can reach from a node to all other nodes in the network. It can be defined as the mean length of all shortest paths between a node and all other nodes in the network. A node with high closeness centrality is much closer and can quickly access the other nodes in the network. In terrorist networks, it may be useful in identifying the person which can quickly access other persons in the network. Closeness centrality of node i the network can be defined as: C i = N 1 (3) j G d ij Where d ij is the distance or path length between two nodes i and j Eigenvector centrality Eigenvector centrality [2] is a measure of relative importance in terms of influence of a node to its neighboring nodes in the network. It is generally used for finding the most central node in the network globally. A node with high eigenvector centrality is generally considered as a more central node with more influence over other nodes and act as a leader in the network. In terrorist network analysis, it helps in identifying the person, well connected to other well connected persons. Eigenvector centrality of a network can be defined as: X i = 1 λ A ij. X j j Nb i (4) Where Nb i are all the neighboring nodes of i and λ is eigenvalue. A ij is the element in the adjacency matrix A at ij th position. X j is the eigenvector centrality of node j PageRank PageRank [30] is a measure for computing the relative importance and ranking the nodes in the social network. Using PageRank in terrorist network analysis overall importance of a person can be determined based on its position in the network. PageRank of node a in network can be defined as: PR a = PR(b) (5) L(b) b Nb a 26
4 Where Nb a are the nodes connected to node a and L(b) is the total links outgoing to node b. PR b is the PageRank of node b. 3.3 Comparison of SNA Tools Various tools and libraries are commonly used by researchers for social network analysis and visualization of terrorist and criminal networks. We considered following commonly used tools for comparison with respect to their functionality, platform, license type and file-formats respectively, based on the features like network visualization, computation of nodelevel and network-level measures (centrality, community, power and information flow) and handling of large networks with many nodes. Table 1. Comparison of various tools for social network analysis Tools Functionality Platform License Type File Format Limitations UCINET [5] Analysis of social network data, Visualization through NetDraw, Various Centrality and Power measures, Clustering and Community algorithms, Various data Import and export formats, Handling with large datasets Windows Commercial and Academic.dl,.net,.vna,.csv, Raw matrices Platform dependent, Not Scalable, Lack of dynamic network analysis Gephi [31] Social network analysis and Visualization, various layouts for visualization, various measures of centrality, clustering and modularity, Ranking and partitioning of network, Timeline feature, plugin support available.dot,.gml,.gdf,.net,.dot,.dl,.gexf,.csv, databases Not suitable for very large datasets ORA [32] Analysis and visualization of two mode and multi-relational networks, Various visualization layouts, Dynamic network analysis, Measures of centrality, power and clustering. Report Generation of analysis. Windows Commercial and Academic.xml,.dynetml,.zip Platform dependent, Limited number of nodes. NodeXL [27] Template for MS-Excel, Visualization and Analysis of networks, Data import directly from few online social networks, Data export in various formats, Visualization layouts, Measures for analysis. Windows.dl,.net, matrix formats Incapable of handling and visualizing large datasets JUNG [33] Java API and library for modelling, analysis and visualization of social network, Includes various algorithms for centrality, clustering, flow etc., Capable of handling very large datasets All platform.net,.graphml Lack of interactive interface, Not appropriate for dynamic network analysis. Pajek [34] Social network analysis and visualization for large networks, Two-mode, multi-relational and temporal network analysis, Algorithms for Centrality and graph layouts.net,.dl Limited number of nodes, less customization NetworkX [35] Python library for analysis of social network, Supports two-mode and temporal networks, Few centrality measures, Handel large networks well.gml,.net No user interface, No direct graph importing Igraph [36] Library in R, Python and C for network analytics, Supports twomode networks, Lot of measures for centrality, clustering and layouts, Handel very large networks with millions of relations.gml,.net Lack of user interface, No direct importing from online social network 27
5 Today s requirements of SNA tools for counter-terrorism research include the high-level visualization of terrorist networks, temporal analysis of networks over time, ability to analyze two-mode and multi-relational networks, dynamic network analysis of terrorist groups and use of data mining and big data analysis techniques for analyzing very large networks. 4. CONCLUSIONS AND FUTURE RECOMMENDATIONS SNA can be considered as one of the powerful tool for analyzing the terrorist and criminal networks. Various algorithms of SNA measures like: centrality, community detection, clustering, and information flow are very effective for finding the key players or leader, their pattern of communication and then developing the disrupting strategy for terrorist networks. These measures are very helpful in analysis of covert, decentralized and large terrorist network. But also there are challenges associated with the data collection and analysis of terrorist networks. The data collection for terrorist networks is very difficult for researchers as it is highly confidential and covert in nature. So, researcher often uses data which is open source on public platform whereas the reliability of this data is again a serious concern. Most of the times data tends to be incomplete with lot of missing and fake nodes and relations, which often leads to incorrect analysis result of such terrorist network. Also the terrorist networks are highly decentralized and dynamic in nature with continuously changing nodes and their relations. In case of online social network analysis the privacy of individual while crawling personal data is also very sensitive issue. Considering these challenges and limitations, future research recommends the requirement of more effective and reliable methods for data collection in such network. It is also necessary to study the discovery of spoofing or fake nodes and relations and benchmarking for network analysis. For handling dynamic nature of terrorist networks, temporal and spatio-temporal analysis is recommended by using timeline based approach. Data mining and big data analysis techniques can be integrated with existing techniques to deal with dynamic analysis. Further research is required for effective and predictive modeling of attacks and identifying the potential leaders in a particular network. 5. ACKNOWLEDGMENTS Our sincere thanks to all the members of Digital Forensics Lab, Dept. of Computer Engineering, DIAT, Pune for successful completion of this study. 6. REFERENCES [1] Freeman, Linton C., (1979) "Centrality in social networks conceptual clarification", Social networks, Vol. 1, No. 3, pp [2] Bonacich, Phillip, (1972) "Factoring and weighting approaches to status scores and clique identification", Journal of Mathematical Sociology, Vol. 2, No.1, pp [3] Bonacich, Phillip, (1987) "Power and centrality: A family of measures", American Journal of Sociology, pp [4] Everett, Martin G., & Stephen P. Borgatti, (1999) "The centrality of groups and classes", The Journal of mathematical sociology, Vol. 23, No.3, pp [5] Borgatti, Stephen P., Martin G. Everett, & Linton C. Freeman, (2002) "Ucinet for Windows: Software for social network analysis". [6] Borgatti, Stephen P., (2005) "Centrality and network flow", Social networks, Vol. 27, No.1, pp [7] Everett, Martin G., and Borgatti, Stephen P., (2014) "Networks containing negative ties", Social Networks, Vol. 38, pp [8] Freeman, Linton C., Borgatti, Stephen P., and Douglas R. White., (1991) "Centrality in valued graphs: A measure of betweenness based on network flow", Social networks, Vol. 13, No.2, pp [9] Katz, Leo, (1953) "A new status index derived from sociometric analysis", Psychometrika Vol. 18, No. 1, pp [10] Krebs, Valdis E., (2002) "Mapping networks of terrorist cells", Connections, Vol. 24, No. 3, pp [11] Carley, K. M., Ju-Sung Lee, and David Krackhardt, (2001) "Destabilizing networks", Connections, Vol. 24, No. 3, pp [12] Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N., (2003) "Destabilizing dynamic covert networks", Proceedings of the 8th international Command and Control Research and Technology Symposium. [13] Xu, Jennifer, and Hsinchun Chen, (2005) "Criminal network analysis and visualization", Communications of the ACM, Vol. 48, No.6, pp [14] Memon, Nasrullah, and Henrik Legind Larsen, (2006) "Practical algorithms for destabilizing terrorist networks", Intelligence and Security Informatics. Springer, Berlin Heidelberg, pp [15] Ressler, Steve, (2006) "Social network analysis as an approach to combat terrorism: past, present, and future research", Homeland Security Affairs, Vol. 2, No.2, pp1-10. [16] Everton, Sean F., (2009) "Network topography, key players and terrorist networks" Annual Conference of the Association for the Study of Economics, Religion and Culture, Washington, DC. [17] Roberts, Nancy, and Everton, Sean F., (2011) "Strategies for Combating Dark Networks", Journal of Social Structure. [18] Everton, Sean F., Cunningham and Dan, (2011) Terrorist Network Adaptation to a Changing Environment. [19] Klausen, J., Barbieri, E. T., Reichlin-Melnick, A., & Zelin, A. Y., (2012) The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun s Propaganda Campaign, Perspectives on Terrorism, Vol. 6, No. 1. [20] Wu, Edith, Rebecca Carleton, and Garth Davies, (2014) "Discovering bin-laden s Replacement in al-qaeda, using Social Network Analysis: A Methodological Investigation", Perspectives on Terrorism, Vol. 8, No.1. [21] Sarvari, H., Abozinadah, E., Mbaziira, A., & McCoy, D., (2014). Constructing and Analyzing Criminal Networks, IEEE Security and Privacy Workshops. 28
6 [22] Saxena, Sudhir, K. Santhanam, and Basu, Aparna, (2004) "Application of social network analysis (SNA) to terrorist networks in Jammu & Kashmir", Strategic Analysis, Vol. 28, No. 1, pp [23] Basu, Aparna, (2005) "Social network analysis of terrorist organizations in India", North American Association for Computational Social and Organizational Science (NAACSOS) Conference. [24] Azad, Sarita, and Arvind Gupta, (2011) "A quantitative assessment on 26/11 Mumbai attack using social network analysis", Journal of Terrorism Research, Vol. 2, No. 2. [25] Karthika, S., and S. Bose, (2011) "A comparative study of social networking approaches in identifying the covert nodes", International Journal on Web Services Computing (IJWSC), Vol. 2, pp [26] Rieder, B., (2013) Studying Facebook via data extraction: the Netvizz application, 5th Annual ACM Web Science Conference, pp [27] Smith, M., Milic-Frayling, N., Shneiderman, B., Mendes Rodrigues, E., Leskovec, J., & Dunne, C., (2010) NodeXL: a free and open network overview, discovery and exploration add-in for Excel 2007/2010, Social Media Research Foundation. [28] LaFree, Gary, and Laura Dugan, (2007) "Introducing the global terrorism database", Terrorism and Political Violence, Vol. 19, No. 2, pp [29] Leetaru, Kalev, and Philip A. Schrodt, (2013) "GDELT: Global data on events, location, and tone, ", ISA Annual Convention, Vol. 2. [30] Page, L., Brin, S., Motwani, R., & Winograd, T., (1999). The PageRank citation ranking: Bringing order to the web. Stanford Digital Library Project. [31] Bastian, M., Heymann, S., & Jacomy, M., (2009) Gephi: an open source software for exploring and manipulating networks. ICWSM, 8, [32] Carley, K. M., & Reminga, J., (2004) ORA: Organization risk analyzer (No. CMU-ISRI ), Carnegie-Mellon University, Pittsburgh, Institute of Software Research Internet. [33] O Madadhain, J., Fisher, D., White, S., & Boey, Y., (2003) The jung (java universal network/graph) framework, University of California, Irvine, California. [34] Batagelj, V., & Mrvar, A., (1998) Pajek-program for large network analysis, Connections, Vol. 21, No. 2, pp [35] Hagberg, A., Schult, D., Swart, P., Conway, D., Séguin- Charbonneau, L., Ellison, C. and Torrents, J. (2004). Networkx. High productivity software for complex networks, link: lanl. gov/wiki. [36] Csardi, G., & Nepusz, T. (2006). The igraph software package for complex network research. InterJournal, Complex Systems, 1695(5). IJCA TM : 29
A comparative study of social network analysis tools
Membre de Membre de A comparative study of social network analysis tools David Combe, Christine Largeron, Előd Egyed-Zsigmond and Mathias Géry International Workshop on Web Intelligence and Virtual Enterprises
An overview of Software Applications for Social Network Analysis
IRSR INTERNATIONAL REVIEW of SOCIAL RESEARCH Volume 3, Issue 3, October 2013, 71-77 International Review of Social Research An overview of Software Applications for Social Network Analysis Ioana-Alexandra
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University [email protected] [email protected] ABSTRACT Depending
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance of
Temporal Visualization and Analysis of Social Networks
Temporal Visualization and Analysis of Social Networks Peter A. Gloor*, Rob Laubacher MIT {pgloor,rjl}@mit.edu Yan Zhao, Scott B.C. Dynes *Dartmouth {yan.zhao,sdynes}@dartmouth.edu Abstract This paper
Evaluating Software Products - A Case Study
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATION: A CASE STUDY ON GAMES Özge Bengur 1 and Banu Günel 2 Informatics Institute, Middle East Technical University, Ankara, Turkey
Social Network Mining
Social Network Mining Data Mining November 11, 2013 Frank Takes ([email protected]) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics
Network-Based Tools for the Visualization and Analysis of Domain Models
Network-Based Tools for the Visualization and Analysis of Domain Models Paper presented as the annual meeting of the American Educational Research Association, Philadelphia, PA Hua Wei April 2014 Visualizing
SGL: Stata graph library for network analysis
SGL: Stata graph library for network analysis Hirotaka Miura Federal Reserve Bank of San Francisco Stata Conference Chicago 2011 The views presented here are my own and do not necessarily represent the
Introduction to Networks and Business Intelligence
Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological
Social Network Analysis and Simulation of the Development of Adversarial Networks
Social Network Analysis and Simulation of the Development of Adversarial Networks Razvan Orendovici, Computer Science and Engineering Frank E. Ritter, College of IST Pennsylvania State University University
Graph/Network Visualization
Graph/Network Visualization Data model: graph structures (relations, knowledge) and networks. Applications: Telecommunication systems, Internet and WWW, Retailers distribution networks knowledge representation
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Examining graduate committee faculty compositions- A social network analysis example. Kathryn Shirley and Kelly D. Bradley. University of Kentucky
Examining graduate committee faculty compositions- A social network analysis example Kathryn Shirley and Kelly D. Bradley University of Kentucky Graduate committee social network analysis 1 Abstract Social
Network VisualizationS
Network VisualizationS When do they make sense? Where to start? Clement Levallois, Assist. Prof. EMLYON Business School v. 1.1, January 2014 Bio notes Education in economics, management, history of science
Practical Graph Mining with R. 5. Link Analysis
Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities
Information Flow and the Locus of Influence in Online User Networks: The Case of ios Jailbreak *
Information Flow and the Locus of Influence in Online User Networks: The Case of ios Jailbreak * Nitin Mayande & Charles Weber Department of Engineering and Technology Management Portland State University
CrimeFighter: A Toolbox for Counterterrorism. Uffe Kock Wiil
CrimeFighter: A Toolbox for Counterterrorism Uffe Kock Wiil Counterterrorism Research Lab Established in the Spring of 2009 Research goes back to 2003 Research & Development Mathematical models Processes,
Algorithms for representing network centrality, groups and density and clustered graph representation
COSIN IST 2001 33555 COevolution and Self-organization In dynamical Networks Algorithms for representing network centrality, groups and density and clustered graph representation Deliverable Number: D06
MINFS544: Business Network Data Analytics and Applications
MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM IRANDOC CASE STUDY Ammar Jalalimanesh a,*, Elaheh Homayounvala a a Information engineering department, Iranian Research Institute for
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 Yannis Stavrakas Vassilis Plachouras IMIS / RC ATHENA Athens, Greece {yannis, vplachouras}@imis.athena-innovation.gr Abstract.
Network Analysis Basics and applications to online data
Network Analysis Basics and applications to online data Katherine Ognyanova University of Southern California Prepared for the Annenberg Program for Online Communities, 2010. Relational data Node (actor,
Exploring Big Data in Social Networks
Exploring Big Data in Social Networks [email protected] ([email protected]) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about
Social Network Discovery based on Sensitivity Analysis
Social Network Discovery based on Sensitivity Analysis Tarik Crnovrsanin, Carlos D. Correa and Kwan-Liu Ma Department of Computer Science University of California, Davis [email protected], {correac,ma}@cs.ucdavis.edu
BIG DATA IN BUSINESS ENVIRONMENT
Scientific Bulletin Economic Sciences, Volume 14/ Issue 1 BIG DATA IN BUSINESS ENVIRONMENT Logica BANICA 1, Alina HAGIU 2 1 Faculty of Economics, University of Pitesti, Romania [email protected] 2 Faculty
Social Network Analysis
Social Network Analysis Challenges in Computer Science April 1, 2014 Frank Takes ([email protected]) LIACS, Leiden University Overview Context Social Network Analysis Online Social Networks Friendship Graph
Network Metrics, Planar Graphs, and Software Tools. Based on materials by Lala Adamic, UMichigan
Network Metrics, Planar Graphs, and Software Tools Based on materials by Lala Adamic, UMichigan Network Metrics: Bowtie Model of the Web n The Web is a directed graph: n webpages link to other webpages
What is SNA? A sociogram showing ties
Case Western Reserve University School of Medicine Social Network Analysis: Nuts & Bolts Papp KK 1, Zhang GQ 2 1 Director, Program Evaluation, CTSC, 2 Professor, Electrical Engineering and Computer Science,
Constructing and Analyzing Criminal Networks
2014 IEEE Security and Privacy Workshops Constructing and Analyzing Criminal Networks Hamed Sarvari, Ehab Abozinadah, Alex Mbaziira, Damon McCoy George Mason University Abstract Analysis of criminal social
How To Understand The Network Of A Network
Roles in Networks Roles in Networks Motivation for work: Let topology define network roles. Work by Kleinberg on directed graphs, used topology to define two types of roles: authorities and hubs. (Each
How To Understand The Benefits Of Big Data Analysis
Ioana-Brînduşa Bogdan Masterand Faculty of Mathematics and Informatics Spiru Haret University Bucharest, Romania [email protected] THE BENEFITS OF BIG DATA ANALYTICS Abstract: The wealth of information
Vulnerability Assessment on Adversarial Organization: Unifying Command and Control Structure Analysis and Social Network Analysis
Vulnerability Assessment on Adversarial Organization: Unifying Command and Control Structure Analysis and Social Network Analysis Il-Chul Moon Institute for Software Research School of Computer Science
Social Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
The Role of Social Network Analysis in Intelligence-Led Policing
The Role of Social Network Analysis in Intelligence-Led Policing Charles M. Katz, Arizona State University (ASU) Andrew Fox, University of Missouri Kansas City Michael White, ASU David Choate, ASU October
Analyzing (Social Media) Networks with NodeXL
Analyzing (Social Media) Networks with NodeXL Marc A. Smith 1, Ben Shneiderman 2, Natasa Milic-Frayling 3, Eduarda Mendes Rodrigues 3, Vladimir Barash 4, Cody Dunne 2, Tony Capone 5, Adam Perer 2, Eric
Social Network Analysis using Graph Metrics of Web-based Social Networks
Social Network Analysis using Graph Metrics of Web-based Social Networks Robert Hilbrich Department of Computer Science Humboldt Universität Berlin November 27, 2007 1 / 25 ... taken from http://mynetworkvalue.com/
Project Knowledge Management Based on Social Networks
DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological
NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES
43 Chapter 4 NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES Chapter Overview This chapter provides an overview for the next six chapters. Based on research conducted at the University of Arizona
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Visualizing Complexity in Networks: Seeing Both the Forest and the Trees
CONNECTIONS 25(1): 37-47 2003 INSNA Visualizing Complexity in Networks: Seeing Both the Forest and the Trees Cathleen McGrath Loyola Marymount University, USA David Krackhardt The Heinz School, Carnegie
Network Maps for End Users: Collect, Analyze, Visualize and Communicate Network Insights with Zero Coding
Network Maps for End Users: Collect, Analyze, Visualize and Communicate Network Insights with Zero Coding A project from the Social Media Research Founda8on: h:p://www.smrfounda8on.org About Me Introduc8ons
Popularity Analysis on Social Network: A Big Data Analysis
Popularity Analysis on Social Network: A Big Data Analysis Sufal Das Brandon Victor Syiem Hemanta Kumar Kalita ABSTRACT A social network is a social structure made up of a set of social actors. These actors
Tools and Techniques for Social Network Analysis
Tools and Techniques for Social Network Analysis Pajek Program for Analysis and Visualization of Large Networks Pajek: What is it Pajek is a program, for Windows and Linux (via Wine) Developers: Vladimir
A comparative study of social network analysis tools
A comparative study of social network analysis tools David Combe, Christine Largeron, Elod Egyed-Zsigmond, Mathias Géry To cite this version: David Combe, Christine Largeron, Elod Egyed-Zsigmond, Mathias
Social Networks and Social Media
Social Networks and Social Media Social Media: Many-to-Many Social Networking Content Sharing Social Media Blogs Microblogging Wiki Forum 2 Characteristics of Social Media Consumers become Producers Rich
IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS
IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS V.Sudhakar 1 and G. Draksha 2 Abstract:- Collective behavior refers to the behaviors of individuals
MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS
MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS Zhao Du, Xiaolong Fu, Can Zhao, Ting Liu, Qifeng Liu, Qixin Liu Information Technology Center, Tsinghua University,
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
KAIST Business School
KAIST Business School BA763 Social Network Analysis for Business Fall, 011 (Version 1.1, 9/6/11) Instructor : Professor Sung Joo Park( 朴 成 柱 ) Office (Phone): Supex Bldg. S84 (Tel. 3646, Mobile 010-5405-831)
Groups and Positions in Complete Networks
86 Groups and Positions in Complete Networks OBJECTIVES The objective of this chapter is to show how a complete network can be analyzed further by using different algorithms to identify its groups and
Social and Technological Network Analysis. Lecture 3: Centrality Measures. Dr. Cecilia Mascolo (some material from Lada Adamic s lectures)
Social and Technological Network Analysis Lecture 3: Centrality Measures Dr. Cecilia Mascolo (some material from Lada Adamic s lectures) In This Lecture We will introduce the concept of centrality and
Using R for Social Media Analytics
Using R for Social Media Analytics Presentation to Tools for Teaching and Learning of Social Media Analytics Blue Sky workshop, 2015 International Communication Association conference (San Juan, Puerto
MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS
Computer Science 13 (4) 2012 http://dx.doi.org/10.7494/csci.2012.13.4.87 Michał Wrzeszcz Jacek Kitowski MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS Abstract In this article, we present an idea of combining
ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search
Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti
LAB 1 Intro to Ucinet & Netdraw
LAB 1 Intro to Ucinet & Netdraw Virginie Kidwell Travis Grosser Doctoral Candidates in Management Links Center for Social Network Research in Business Gatton College of Business & Economics University
Analysis of an Outpatient Consultation Network in a Veterans Administration Health Care System Hospital.
Analysis of an Outpatient Consultation Network in a Veterans Administration Health Care System Hospital. Alon Ben-Ari. December 8, 2015 Introduction Many healtcare organizations face the challenge of scaling
Social network analysis: A tool for better understanding and managing your cluster
Social network analysis: A tool for better understanding and managing your cluster Neil Reid, Ph.D. Director of the Urban Affairs Center University of Toledo Toledo, Ohio 43606 USA 1 Outline Cluster-based
Visualization of Communication Patterns in Collaborative Innovation Networks. Analysis of some W3C working groups
Visualization of Communication Patterns in Collaborative Innovation Networks Analysis of some W3C working groups Peter A. Gloor 1,2, Rob Laubacher 1, Scott B.C. Dynes 2, Yan Zhao 3 1 MIT Center for Coordination
Content marketing through data mining on Facebook social network
1 Webology, Volume 11, Number 1, June, 2014 Home Table of Contents Titles & Subject Index Authors Index Content marketing through data mining on Facebook social network Saman Forouzandeh Department of
Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers
60 Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative
How we analyzed Twitter social media networks with NodeXL
1 In association with the Social Media Research Foundation NUMBERS, FACTS AND TRENDS SHAPING THE WORLD How we analyzed Twitter social media networks with NodeXL Social media include all the ways people
Data Mining & Data Stream Mining Open Source Tools
Data Mining & Data Stream Mining Open Source Tools Darshana Parikh, Priyanka Tirkha Student M.Tech, Dept. of CSE, Sri Balaji College Of Engg. & Tech, Jaipur, Rajasthan, India Assistant Professor, Dept.
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS
Exploratory Facebook Social Network Analysis
Exploratory Facebook Social Network Analysis with Gephi Thomas Plotkowiak twitterresearcher.wordpress.com Process 1. Import Data with Netviz 2. Gephi 1. Open 2. Layout 3. Ranking (Degree) 4. Statistics
Semantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
Enhancing the Ranking of a Web Page in the Ocean of Data
Database Systems Journal vol. IV, no. 3/2013 3 Enhancing the Ranking of a Web Page in the Ocean of Data Hitesh KUMAR SHARMA University of Petroleum and Energy Studies, India [email protected] In today
BIG DATA - HAND IN HAND WITH SOCIAL NETWORKS
BIG DATA - HAND IN HAND WITH SOCIAL NETWORKS 1 NIVEDITA N, 2 NOORJAHAN M, 3 KARTHIKA S 1,2,3 Department of Information Technology, SSN College of Engineering, Kalavakkam, Chennai 603110 E-mail: 1 [email protected],
POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS
ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations
Dynamics of information spread on networks. Kristina Lerman USC Information Sciences Institute
Dynamics of information spread on networks Kristina Lerman USC Information Sciences Institute Information spread in online social networks Diffusion of activation on a graph, where each infected (activated)
HISTORICAL DEVELOPMENTS AND THEORETICAL APPROACHES IN SOCIOLOGY Vol. I - Social Network Analysis - Wouter de Nooy
SOCIAL NETWORK ANALYSIS University of Amsterdam, Netherlands Keywords: Social networks, structuralism, cohesion, brokerage, stratification, network analysis, methods, graph theory, statistical models Contents
A Big Data Analytical Framework For Portfolio Optimization Abstract. Keywords. 1. Introduction
A Big Data Analytical Framework For Portfolio Optimization Dhanya Jothimani, Ravi Shankar and Surendra S. Yadav Department of Management Studies, Indian Institute of Technology Delhi {dhanya.jothimani,
Big Data and Society: The Use of Big Data in the ATHENA project
Big Data and Society: The Use of Big Data in the ATHENA project Professor David Waddington CENTRIC Lead on Ethics, Media and Public Disorder [email protected] Helen Gibson CENTRIC Researcher [email protected]
Equivalence Concepts for Social Networks
Equivalence Concepts for Social Networks Tom A.B. Snijders University of Oxford March 26, 2009 c Tom A.B. Snijders (University of Oxford) Equivalences in networks March 26, 2009 1 / 40 Outline Structural
How To Analyze The Social Interaction Between Students Of Ou
Using Social Networking Analysis (SNA) to Analyze Collaboration between Students (Case Study: Students of Open University in Kupang) Bonie Empy Giri Faculty of Information Technology Satya Wacana Christian
Graph Processing and Social Networks
Graph Processing and Social Networks Presented by Shu Jiayu, Yang Ji Department of Computer Science and Engineering The Hong Kong University of Science and Technology 2015/4/20 1 Outline Background Graph
A Tutorial on dynamic networks. By Clement Levallois, Erasmus University Rotterdam
A Tutorial on dynamic networks By, Erasmus University Rotterdam V 1.0-2013 Bio notes Education in economics, management, history of science (Ph.D.) Since 2008, turned to digital methods for research. data
Network Analysis of a Large Scale Open Source Project
2014 40th Euromicro Conference on Software Engineering and Advanced Applications Network Analysis of a Large Scale Open Source Project Alma Oručević-Alagić, Martin Höst Department of Computer Science,
International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles are freely available online:http://www.ijoer.
RESEARCH ARTICLE SURVEY ON PAGERANK ALGORITHMS USING WEB-LINK STRUCTURE SOWMYA.M 1, V.S.SREELAXMI 2, MUNESHWARA M.S 3, ANIL G.N 4 Department of CSE, BMS Institute of Technology, Avalahalli, Yelahanka,
An Introduction to Data Mining
An Introduction to Intel Beijing [email protected] January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail
Socio-semantic network data visualization
Socio-semantic network data visualization Alexey Drutsa 1,2, Konstantin Yavorskiy 1 1 Witology [email protected], [email protected] http://www.witology.com 2 Moscow State University,
Search in BigData2 - When Big Text meets Big Graph 1. Introduction State of the Art on Big Data
Search in BigData 2 - When Big Text meets Big Graph Christos Giatsidis, Fragkiskos D. Malliaros, François Rousseau, Michalis Vazirgiannis Computer Science Laboratory, École Polytechnique, France {giatsidis,
Automated Social Network Analysis for Collaborative Work 1
Automated Social Network Analysis for Collaborative Work 1 Larry Korba, Ronggong Song, George Yee, Andrew Patrick Institute for Information Technology, National Research Council of Canada Building M-50,
