Detecting Key Players in Terrorist Networks

The interest in analyzing loosely connected and decentralized terrorist networks of global reach has grown during the past decade. Social Network Analysis (SNA) is a mature approach towards understanding terrorist networks since it can be used to analyze a networks structure and properties and to de...

Full description

Bibliographic Details
Main Author: Berzinji, Ala
Format: Others
Language:English
Published: Uppsala universitet, Institutionen för informationsteknologi 2011
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-159130
id ndltd-UPSALLA1-oai-DiVA.org-uu-159130
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-uu-1591302013-01-08T13:50:34ZDetecting Key Players in Terrorist NetworksengBerzinji, AlaUppsala universitet, Institutionen för informationsteknologi2011The interest in analyzing loosely connected and decentralized terrorist networks of global reach has grown during the past decade. Social Network Analysis (SNA) is a mature approach towards understanding terrorist networks since it can be used to analyze a networks structure and properties and to detect important persons and links. In this work we study decentralized terrorist networks with different types of nodes. The nodes can be either organizations, places or persons. We use a combination of different centrality measures to detect key players in such networks. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-159130IT ; 11 060application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
description The interest in analyzing loosely connected and decentralized terrorist networks of global reach has grown during the past decade. Social Network Analysis (SNA) is a mature approach towards understanding terrorist networks since it can be used to analyze a networks structure and properties and to detect important persons and links. In this work we study decentralized terrorist networks with different types of nodes. The nodes can be either organizations, places or persons. We use a combination of different centrality measures to detect key players in such networks.
author Berzinji, Ala
spellingShingle Berzinji, Ala
Detecting Key Players in Terrorist Networks
author_facet Berzinji, Ala
author_sort Berzinji, Ala
title Detecting Key Players in Terrorist Networks
title_short Detecting Key Players in Terrorist Networks
title_full Detecting Key Players in Terrorist Networks
title_fullStr Detecting Key Players in Terrorist Networks
title_full_unstemmed Detecting Key Players in Terrorist Networks
title_sort detecting key players in terrorist networks
publisher Uppsala universitet, Institutionen för informationsteknologi
publishDate 2011
url http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-159130
work_keys_str_mv AT berzinjiala detectingkeyplayersinterroristnetworks
_version_ 1716530539757830144