Skip to main content

Knowledge Discovery and Information Visualization for Terrorist Social Networks

  • Chapter
Intelligence and Security Informatics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 135))

Abstract

Terrorist social networks present information about the relationships between terrorists which is important for investigators in combating the war of terrorism. A good analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Typical social network analysis techniques discover patterns of interactions between social actors, for examples, detecting subgroup and identifying central individuals. Such knowledge is important for developing effective combating strategies against terrorism. A typical terrorist social network has several hundreds to thousands of nodes. Given the large number of nodes and links, it is difficult to integrate the extracted pattern with the global structure of the terrorist social network to further analyze the related actors. With the support of interactive visualization tools, investigators can further explore the network by selecting the focus of interests and extract the useful information and patterns. In this chapter, we present a social network analysis and interactive visualization technique for complex terrorist social networks. Case studies are presented to illustrate how such techniques are capable to extract the hidden relationships among terrorists in the network through user interactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brown, M.H., Meehan, J.R., Sarkar, M.: Browsing Graphs using a Fisheye View. In: Proceedings of ACM on Human Factors in Computing Systems, Amsterdam, Netherlands (1993)

    Google Scholar 

  2. Eades, P.: A Heuristic for Graph Drawing. Congressus Numerantium 42 (1984)

    Google Scholar 

  3. Deter, J.: Fractals. Plenum, New York (1988)

    Google Scholar 

  4. Furnas, G.W.: Generalized Fisheye Views. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (1986)

    Google Scholar 

  5. Herman, I., Melancon, G., Marshall, M.S.: Graph Visualization and Navigation in Information Visualization: A Survey. IEEE Transactions on Visualization and Computer Graphics 6(1), 24–43 (2000)

    Article  Google Scholar 

  6. Koike, H., Yoshihara, H.: Fractal Approaches for Visualizing Huge Hierarchies. In: Proceedings of IEEE Symposium on Visual Languages, Bergen, Norway, August 24-27 (1993)

    Google Scholar 

  7. Manojit, S., Brown, M.H.: Graphical Fisheye Views. Communications of the ACM 37(12), 73–83 (1994)

    Article  Google Scholar 

  8. Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press (2004)

    Google Scholar 

  9. Yang, C.C., Chen, H., Hong, K.: Visualization of Large Category Map for Internet Browsing. Decision Support Systems 35(1), 89–102 (2003)

    Article  Google Scholar 

  10. Yang, C.C., Liu, N., Sageman, M.: Analyzing the Terrorist Social Networks with Visualization Tools. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics, San Diego, CA, US, May 23–24 (2006)

    Google Scholar 

  11. Yang, C.C., Ng, T.D., Wang, J.H., Wei, C., Chen, H.: Analyzing and Visualizing Gray Web Forum Structure. In: Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, Chengdu, China, April 11–12 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hsinchun Chen Christopher C. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yang, C.C. (2008). Knowledge Discovery and Information Visualization for Terrorist Social Networks. In: Chen, H., Yang, C.C. (eds) Intelligence and Security Informatics. Studies in Computational Intelligence, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69209-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69209-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69207-2

  • Online ISBN: 978-3-540-69209-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics