Studying the structure of terrorist networks: A web structural mining approach

Jialun Qin, Yilu Zhou, Jennifer J. Xu, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Because terrorist organizations often operate in network forms where individual terrorists collaborate with each other to carry out attacks, we could gain valuable knowledge about the terrorist organizations by studying structural properties of such terrorist networks. However, previous studies of terrorist network structure have generated little actionable results. This is due to the difficulty in collecting and accessing reliable data and the lack of advanced network analysis methodologies in the field. To address these problems, we introduced the Web structural mining technique into the terrorist network analysis field which, to the best our knowledge, has never been done before. We employed the proposed technique on a Global Salafi Jihad network dataset collected through a large scale empirical study. Results from our analysis not only provide insights for terrorism research community but also support decision making in law-reinforcement, intelligence, and security domains to make our nation safer.

Original languageEnglish (US)
Title of host publicationAssociation for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005
Subtitle of host publicationA Conference on a Human Scale
Pages523-530
Number of pages8
StatePublished - Dec 1 2005
Event11th Americas Conference on Information Systems, AMCIS 2005 - Omaha, NE, United States
Duration: Aug 11 2005Aug 15 2005

Publication series

NameAssociation for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale
Volume2

Other

Other11th Americas Conference on Information Systems, AMCIS 2005
CountryUnited States
CityOmaha, NE
Period8/11/058/15/05

Keywords

  • Social network analysis
  • Terrorism
  • Visualization
  • Web structural mining

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Information Systems
  • Library and Information Sciences

Fingerprint Dive into the research topics of 'Studying the structure of terrorist networks: A web structural mining approach'. Together they form a unique fingerprint.

Cite this