Sun Duo-yong, Guo Shu-quan, Zhang Hai, Liu Ben-xian
{"title":"Study on covert networks of terroristic organizations based on text analysis","authors":"Sun Duo-yong, Guo Shu-quan, Zhang Hai, Liu Ben-xian","doi":"10.1109/ISI.2011.5984117","DOIUrl":null,"url":null,"abstract":"Text information on typical domestic terrorist organization released by domestic mainstream network media is collected, and network text analysis tools are adopted to extract the entities that reflect the social network structure of terroristic organizations and the associated data from text information, to construct the covert networks for social organization structure of terrorists. Network analysis tools are adopted to carry out a social network quantitative analysis to the terroristic network characteristics in both individual level and organizational level. The study shows, that text information on terroristic activities from various network media can be effectively processed by text data mining, and visual network models that reflect social organization structure of terrorists can be made accordingly, and this demonstrates that to combine data mining tools with social network analytical method is an effective approach to study the covert networks of terroristic organizations.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"116 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2011.5984117","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Text information on typical domestic terrorist organization released by domestic mainstream network media is collected, and network text analysis tools are adopted to extract the entities that reflect the social network structure of terroristic organizations and the associated data from text information, to construct the covert networks for social organization structure of terrorists. Network analysis tools are adopted to carry out a social network quantitative analysis to the terroristic network characteristics in both individual level and organizational level. The study shows, that text information on terroristic activities from various network media can be effectively processed by text data mining, and visual network models that reflect social organization structure of terrorists can be made accordingly, and this demonstrates that to combine data mining tools with social network analytical method is an effective approach to study the covert networks of terroristic organizations.