On the topology of the dark web of terrorist groups

Jennifer Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand the characteristics of these websites and predict terrorist activities. In this paper, we propose to apply network topological analysis methods on systematically collected the terrorist website data and to study the structural characteristics at the Web page level. We conducted a case study using the methods on three collections of Middle-Eastern, US domestic, and Latin-American terrorist websites, We found that these three networks have the small-world and scale-free characteristics. We also found that smaller size websites which share same interests tend to make stronger inter-website linkage relationships.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages367-376
Number of pages10
Volume3975 LNCS
StatePublished - 2006
EventIEEE International Conference on Intelligence and Security Informatics, ISI 2006 - San Diego, CA, United States
Duration: May 23 2006May 24 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3975 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherIEEE International Conference on Intelligence and Security Informatics, ISI 2006
CountryUnited States
CitySan Diego, CA
Period5/23/065/24/06

Fingerprint

Websites
Propaganda
Topology
Small World
Linkage
Tend
Predict
Electric network analysis
World Wide Web
Relationships

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Xu, J., Chen, H., Zhou, Y., & Qin, J. (2006). On the topology of the dark web of terrorist groups. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3975 LNCS, pp. 367-376). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3975 LNCS).

On the topology of the dark web of terrorist groups. / Xu, Jennifer; Chen, Hsinchun; Zhou, Yilu; Qin, Jialun.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS 2006. p. 367-376 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Xu, J, Chen, H, Zhou, Y & Qin, J 2006, On the topology of the dark web of terrorist groups. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3975 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3975 LNCS, pp. 367-376, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, United States, 5/23/06.
Xu J, Chen H, Zhou Y, Qin J. On the topology of the dark web of terrorist groups. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS. 2006. p. 367-376. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Xu, Jennifer ; Chen, Hsinchun ; Zhou, Yilu ; Qin, Jialun. / On the topology of the dark web of terrorist groups. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS 2006. pp. 367-376 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{5e28b44b4cde446ca3fd99560ce06a12,
title = "On the topology of the dark web of terrorist groups",
abstract = "In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand the characteristics of these websites and predict terrorist activities. In this paper, we propose to apply network topological analysis methods on systematically collected the terrorist website data and to study the structural characteristics at the Web page level. We conducted a case study using the methods on three collections of Middle-Eastern, US domestic, and Latin-American terrorist websites, We found that these three networks have the small-world and scale-free characteristics. We also found that smaller size websites which share same interests tend to make stronger inter-website linkage relationships.",
author = "Jennifer Xu and Hsinchun Chen and Yilu Zhou and Jialun Qin",
year = "2006",
language = "English (US)",
isbn = "3540344780",
volume = "3975 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "367--376",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - On the topology of the dark web of terrorist groups

AU - Xu, Jennifer

AU - Chen, Hsinchun

AU - Zhou, Yilu

AU - Qin, Jialun

PY - 2006

Y1 - 2006

N2 - In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand the characteristics of these websites and predict terrorist activities. In this paper, we propose to apply network topological analysis methods on systematically collected the terrorist website data and to study the structural characteristics at the Web page level. We conducted a case study using the methods on three collections of Middle-Eastern, US domestic, and Latin-American terrorist websites, We found that these three networks have the small-world and scale-free characteristics. We also found that smaller size websites which share same interests tend to make stronger inter-website linkage relationships.

AB - In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand the characteristics of these websites and predict terrorist activities. In this paper, we propose to apply network topological analysis methods on systematically collected the terrorist website data and to study the structural characteristics at the Web page level. We conducted a case study using the methods on three collections of Middle-Eastern, US domestic, and Latin-American terrorist websites, We found that these three networks have the small-world and scale-free characteristics. We also found that smaller size websites which share same interests tend to make stronger inter-website linkage relationships.

UR - http://www.scopus.com/inward/record.url?scp=33745874077&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745874077&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33745874077

SN - 3540344780

SN - 9783540344780

VL - 3975 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 367

EP - 376

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -