Duo-Yong Sun, Shu-Quan Guo, Ben-xian Li, Xiao-Peng Liu
{"title":"基于互动关系假设的恐怖分子隐蔽网络研究","authors":"Duo-Yong Sun, Shu-Quan Guo, Ben-xian Li, Xiao-Peng Liu","doi":"10.1109/ISI.2011.5984045","DOIUrl":null,"url":null,"abstract":"Rapid development of social network theory provides new perspective for the study of behavior of terrorist organizations. Due to the covertness of terrorist activities, the absence of individuals and relationships often occurs in the construction of interpersonal relationship network of terrorists using social network theory, thus affecting the effectiveness of analysis. This paper proposes a method for constructing covert terrorist networks based on interactive relationship records and combining hypothesis and inference, and carries out empirical study combining typical terrorist activities within the borders. Study results show that key figures and missing figures obtained according to analysis and evaluation of constructed networks are consistent with reality. This shows that the combination of hypothesis and inference and interpersonal relationship records is a feasible way to improve the construction of terrorist social network model.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Study on covert networks of terrorists based on interactive relationship hypothesis\",\"authors\":\"Duo-Yong Sun, Shu-Quan Guo, Ben-xian Li, Xiao-Peng Liu\",\"doi\":\"10.1109/ISI.2011.5984045\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Rapid development of social network theory provides new perspective for the study of behavior of terrorist organizations. Due to the covertness of terrorist activities, the absence of individuals and relationships often occurs in the construction of interpersonal relationship network of terrorists using social network theory, thus affecting the effectiveness of analysis. This paper proposes a method for constructing covert terrorist networks based on interactive relationship records and combining hypothesis and inference, and carries out empirical study combining typical terrorist activities within the borders. Study results show that key figures and missing figures obtained according to analysis and evaluation of constructed networks are consistent with reality. This shows that the combination of hypothesis and inference and interpersonal relationship records is a feasible way to improve the construction of terrorist social network model.\",\"PeriodicalId\":220165,\"journal\":{\"name\":\"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI.2011.5984045\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2011.5984045","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study on covert networks of terrorists based on interactive relationship hypothesis
Rapid development of social network theory provides new perspective for the study of behavior of terrorist organizations. Due to the covertness of terrorist activities, the absence of individuals and relationships often occurs in the construction of interpersonal relationship network of terrorists using social network theory, thus affecting the effectiveness of analysis. This paper proposes a method for constructing covert terrorist networks based on interactive relationship records and combining hypothesis and inference, and carries out empirical study combining typical terrorist activities within the borders. Study results show that key figures and missing figures obtained according to analysis and evaluation of constructed networks are consistent with reality. This shows that the combination of hypothesis and inference and interpersonal relationship records is a feasible way to improve the construction of terrorist social network model.