On the topology of the dark web of terrorist groups

Jennifer Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand the characteristics of these websites and predict terrorist activities. In this paper, we propose to apply network topological analysis methods on systematically collected the terrorist website data and to study the structural characteristics at the Web page level. We conducted a case study using the methods on three collections of Middle-Eastern, US domestic, and Latin-American terrorist websites, We found that these three networks have the small-world and scale-free characteristics. We also found that smaller size websites which share same interests tend to make stronger inter-website linkage relationships.

Original languageEnglish (US)
Title of host publicationIntelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings
PublisherSpringer-Verlag
Pages367-376
Number of pages10
ISBN (Print)3540344780, 9783540344780
DOIs
StatePublished - Jan 1 2006
EventIEEE International Conference on Intelligence and Security Informatics, ISI 2006 - San Diego, CA, United States
Duration: May 23 2006May 24 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3975 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherIEEE International Conference on Intelligence and Security Informatics, ISI 2006
CountryUnited States
CitySan Diego, CA
Period5/23/065/24/06

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'On the topology of the dark web of terrorist groups'. Together they form a unique fingerprint.

  • Cite this

    Xu, J., Chen, H., Zhou, Y., & Qin, J. (2006). On the topology of the dark web of terrorist groups. In Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings (pp. 367-376). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3975 LNCS). Springer-Verlag. https://doi.org/10.1007/11760146_32