Abstract
Over time, people change with whom they interact and where they are. For instance, terrorists attempt different tasks, move to new locations, and interact with different groups. Understanding how changes in social and geospatial relations interact is critical to a number of areas, including counterterrorism, counternarcotics, and general social change. This case study introduces a simple theoretical multi-agent model for reasoning about the influence on the criticality of agents and locations as the distribution of agents in geospatial and the social interaction space coevolve. The model simulates social changes regarding with whom they interact, and spatial changes in where they relocate as functions of learning and evolutions. The analysis suggests that terrorists will disperse around the world rather than gather at a specific location. Similarly, terrorists who have been at the center of social networks will be same. This model helps us gain insights into the complexities and social organizations evolving in social and geospatial dimensions simultaneously.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This case study is introduced by Moon and Carley (2007). This chapter expands the initial publication with additional background, dataset description, and virtual experiment results. Also, at the end of this chapter, we discuss how to interpret the result in the context of the command and control.
References
Akerlof, G.A.: Social distance and social decisions. Econometrica. 65(5), 1005–1027 (1997)
Arquilla, J., D. Ronfeldt (eds.).: Networks and netwars: the future of terror, crime, and militancy. Santa Monica, Calif: RAND, MR-1382-OSD. www.rand.org/publica-tions/MR/MR1382/ (2001)
Bergkvist, M., Davidson, P., Persson, J.A., Ramstedt, L.: A hybrid micro-simulator for determining the effects of governmental control policies on transport chains. Joint Work-shop on Multi-Agent and Multi-Agent Based Simulation. Springer, New York (2004)
Butts, C.T.: Spatial models of large-scale interpersonal networks. Doctoral Dissertation, Carnegie Mellon University (2002)
Carley, K.M., Lee, J.S., Krackhardt, D.: Destabilizing networks. Connections 24(3), 31–44 (2001)
Carley, K.M.: Dynamic network analysis. Committee on Human Factors, National Research Council. pp. 133–145 (2003)
Carley, K.M.: Computational organization science: a new frontier.In: Proceedings of the National Academy of Science, vol. 99(3), pp. 7314–7316 (2002)
Carley, K.M., Svoboda, D.M.: Modeling organizational adaptation as a simulated annealing process. Sociol. Methods Res. 25(1), 138–168 (1996)
Carley, K.M.: On generating hypotheses using computer simulations. Syst. Eng. 2(2), 69–77 (1999)
Carley, K.M., Diesner, J., Reminga, J., Tsvetovat, M.: Toward an interoperable dynamic network analysis toolkit, DSS special issue on cyber infrastructure for homeland security: advances in information sharing, data mining, and collaboration systems, forthcoming
Carley, K.M.: Smart agents and organizations of the future, the handbook of new media. In: Lievrouw, L., Livingstone, S (eds.). Thousand Oaks, CA, Sage, Ch. 12, 206–220 (2002)
Chen, H., Wang, F., Zeng, D.: Intelligence and security informatics for homeland security: information, communication, and transportation. IEEE Trans. Intell. Transp. Syst. 5(4), 329–341 (2004)
Diesner, J., Carley, K.M.: Revealing and comparing the organizational structure of covert networks with network text analysis. XXV Sunbelt Social Network Conference, Redondo Beach, 16–20 Feb (2005)
Epstein, J., Steinbruner, J.D., Parker, M.T.: Modeling Civil Violence: An Agent-Based Computational Approach. Center of Social and Economic Dynamics, Brookings Institute, Washington, D.C (2001)
Friedkin, N.E.: Horizons of observability and limits of informal control in organizations. Soc. Forces 62, 54–77 (1983)
Gavrieli, D.A., Scott, W.R.: Intercultural knowledge flows in edge organizations: trust as an enabler. In: Proceeding of International Command and Control Research and Technology Symposium (2005)
Hollingshead, A.B.: Perceptions of Expertise and Transactive Memory in Work Relationships. Group Processes Intergroup Relat. 3(3), 257–267 (2000)
Janeja, V.P., Atluri, V., Adam, N.R.: Detecting anomalous geospatial trajectories through spatial characterization and spatio-semantic associations.In: Proceedings of the 2004 Annual National Conference on Digital Government Research, pp. 1–10 (2004)
Jonas, J., Harper, J.: Effective Counterterrorism and the Limited Role of Predictive Data Minig, Policy Analysis, No. 584. CATO Institute, Dec 2006
Kandel, D.B.: Homophily, selection, and socialization in adolescent friendships, Am. J. Sociol. 84(2), 427–436, 1978
Keller-McNulty, S., Bellman, K.L., Carley, K.M., Davis, P.K., Ivanetich, R., Laskey, K.B.: Defense Modeling, Simulation, and Analysis: Meeting the Challenge, The National Academies Press, pp. 64–73, (2006)
Krackhardt, D., Carley, K.M.: A PCANS model of structure in organization. In: Proceedings of the 1998 International Symposium on Command and Control Research and Technology, pp. 113–119, 1998e Challenge, The National Academies Press, pp. 64–73 (2006)
McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a Feather: Homophily in Social Networks, Annual Review of Sociology, vol. 27, pp. 415–444 (2001)
Mieg, A.: The Social Psychology of Expertise: Case Studies in Research, Professional Domains, and Expert Roles. Erlbaum, Mahwah (2001)
Mooney, R.J., Melville, O., Tang, L.R., Shavlik, J., Dutra, I., Page, D., Costa, V.S.: Relational data mining with inductive logic programming for link discovery, in data mining: next generation challenges and future directions. In: Kargupta, H., Joshi, A., Siva-kumar K., and Yesha, Y. (eds.) pp. 239–254, AAAI Press, Menlo Park (2004)
Moon, I.C., Carley K.M.: Modeling and simulation of terrorist networks in social and geospatial dimensions. IEEE Intell. Sys. Special Issue on Social Computing 22, 40–49, Sep/Oct (2007)
Reminga, J., Carley, K.M.: ORA: Organization Risk Analyzer, Tech Report, CMU-ISRI-04-106, CASOS. Carnegie Mellon University, Pittsburgh. http://www.casos.cs.cmu.edu/projects/ora/index.html(2004)
Sageman, M.: Understanding terror networks. University of Pennsylvania Press, Philadelphia, pp. 142–146 (2004)
Schreiber, C., Carley, K.M.: Going beyond the data: empirical validation leading to grounded theory. Comput Math Organ Theory 10, 155–164 (2004)
Snijders, T.A.B., Steglich, C., Schweinberger, M.: Modeling the co-evolution of networks and behavior. In: Van Montfort, K., Oud, H., Satorra, A. (eds.) Longitudinal Models in the Behavioral and Related Sciences. Lawrence Erlbaum, Mahwah (in press)
Sorenson, O., Stuart, T.E.: Syndication networks and the spatial distribution of venture capital investments. Am. J. Sociol. 106, 1546–1588 (2001)
Watts, D.J., Dodds, P.S., Newman, M.E.J.: Identity and search in social net-works. Science 17 296(5571), 1302–1305 May 2002
Wegner, D.M.: Transactive memory: a contemporary analysis of the group mind. In: Mullen, B., Goethals, G.R. (eds.) Theories of Group Behavior, pp. 185–205. Springer, New York (1986)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Il-Chul Moon
About this chapter
Cite this chapter
Moon, IC., Carley, K.M., Kim, T.G. (2013). Modeling and Simulating Command and Control for Terrorist Organization. In: Modeling and Simulating Command and Control. SpringerBriefs in Computer Science. Springer, London. https://doi.org/10.1007/978-1-4471-5037-4_2
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5037-4_2
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5036-7
Online ISBN: 978-1-4471-5037-4
eBook Packages: Computer ScienceComputer Science (R0)