Skip to main content

Specific Similarity Measure for Terrorist Networks: How Much Similar Are Terrorist Networks of Turkey?

  • Conference paper
Intelligence and Security Informatics (PAISI 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6749))

Included in the following conference series:

Abstract

Some countries suffer from terrorism much more than others, Turkey as one of the most suffering countries who owns about a hundred terrorist groups; most of these organizations cooperate, and interchange knowledge, skills, materials used for terrorist attacks. From criminological perspective terrorist networks of Turkey are categorized into three main groups: extreme left (i.e. Marxist) networks, extreme right (i.e. Fundamentalist, Radical Islamist) networks, and separatist (i.e. ethic, racist) networks. By using their criminal history including the selection of crimes, attacking methods and modus operandi, a crime ontology is created, terrorist networks are attached to this ontology via their attacks and a similarity measure (COSM) is developed according to this ontology. Results of this similarity measure performed better than two common similarity measures; cosine and Jaccard. Results are also presented to domain experts in hierarchical clustering and they also commented as positive. Based on attributes of crimes, COSM similarity can also be applied to other types of social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Asaro, C., Biasiotti, M.A., Guidotti, P., Papini, Sagri, M., Tiscornia, D.: A Domain Ontology: Italian Crime Ontology. In: ICAIL 2003 Workshop on Legal Ontologies & Web Based Legal Information Management (2003)

    Google Scholar 

  2. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. (2001)

    Google Scholar 

  3. Dzemydeiene, D., Kazemikaitiene, E.: Ontology-based decision supporting system for crime investigation processes. Information Systems Development: Advances in Theory, Practice and Education, 427–438 (2005)

    Google Scholar 

  4. Kingston, J., Schafer, B., Vandenberghe, W.: Towards a Financial Fraud Ontology: A Legal Modelling Approach. Journal of Artificial Intelligence and Law 12(4), 419–446 (2004) ISSN 0924-8463

    Article  Google Scholar 

  5. LaFree, G., Dugan, L.: Global Terrorism Database 1.1 and II, 1970-1997, and 1998-2004 ICPSR22541-v1, ICPSR22600- v2. Inter University Consortium for Political and Social Research, Ann Arbor (2008)

    Google Scholar 

  6. Lazarevich, A.: Use of ontologies and probabilistic relational models to aid in cyber crime investigation decision support. George Mason University, Washington D.C., US, Ph.D. thesis (2005)

    Google Scholar 

  7. Macrimeanalysts, Massachusetts Association of Crime Analysts Home Page (2010), http://www.macrimeanalysts.com/articles/classification.pdf (accessed at February 12, 2010)

  8. Marcus, S.M., Moy, M., Coffman, T.: Social Network Analysis in Mining Graph Data, Cook, D.J., Holder, L.B. (eds.). John Wiley &Sons, Inc., Chichester (2007)

    Google Scholar 

  9. Skillicorn, D.: Knowledge Discovery for Counterterrorism and Law Enforcement. CRC Press, Boca Raton (2009)

    Google Scholar 

  10. Spertus, E., Sahami, M., Buyukkokten, O.: Evaluating similarity measures: a large-scale study in the orkut social network. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (KDD 2005), pp. 678–684. ACM, New York (2005)

    Chapter  Google Scholar 

  11. Protégé, Standford University (2010), http://protege.stanford.edu/overview/ (accessed at February 12, 2010)

  12. Wasserman, S., Faust, K.: Social Network Analysis Methods and Applications. Cambridge University Press, Cambridge (1994)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ozgul, F., Celik, A., Atzenbeck, C., Erdem, Z. (2011). Specific Similarity Measure for Terrorist Networks: How Much Similar Are Terrorist Networks of Turkey?. In: Chau, M., Wang, G.A., Zheng, X., Chen, H., Zeng, D., Mao, W. (eds) Intelligence and Security Informatics. PAISI 2011. Lecture Notes in Computer Science, vol 6749. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22039-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22039-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22038-8

  • Online ISBN: 978-3-642-22039-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics