Detecting Key Players in Terrorist Networks
The interest in analyzing loosely connected and decentralized terrorist networks of global reach has grown during the past decade. Social Network Analysis (SNA) is a mature approach towards understanding terrorist networks since it can be used to analyze a networks structure and properties and to de...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Uppsala universitet, Institutionen för informationsteknologi
2011
|
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-159130 |
id |
ndltd-UPSALLA1-oai-DiVA.org-uu-159130 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-uu-1591302013-01-08T13:50:34ZDetecting Key Players in Terrorist NetworksengBerzinji, AlaUppsala universitet, Institutionen för informationsteknologi2011The interest in analyzing loosely connected and decentralized terrorist networks of global reach has grown during the past decade. Social Network Analysis (SNA) is a mature approach towards understanding terrorist networks since it can be used to analyze a networks structure and properties and to detect important persons and links. In this work we study decentralized terrorist networks with different types of nodes. The nodes can be either organizations, places or persons. We use a combination of different centrality measures to detect key players in such networks. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-159130IT ; 11 060application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
description |
The interest in analyzing loosely connected and decentralized terrorist networks of global reach has grown during the past decade. Social Network Analysis (SNA) is a mature approach towards understanding terrorist networks since it can be used to analyze a networks structure and properties and to detect important persons and links. In this work we study decentralized terrorist networks with different types of nodes. The nodes can be either organizations, places or persons. We use a combination of different centrality measures to detect key players in such networks. |
author |
Berzinji, Ala |
spellingShingle |
Berzinji, Ala Detecting Key Players in Terrorist Networks |
author_facet |
Berzinji, Ala |
author_sort |
Berzinji, Ala |
title |
Detecting Key Players in Terrorist Networks |
title_short |
Detecting Key Players in Terrorist Networks |
title_full |
Detecting Key Players in Terrorist Networks |
title_fullStr |
Detecting Key Players in Terrorist Networks |
title_full_unstemmed |
Detecting Key Players in Terrorist Networks |
title_sort |
detecting key players in terrorist networks |
publisher |
Uppsala universitet, Institutionen för informationsteknologi |
publishDate |
2011 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-159130 |
work_keys_str_mv |
AT berzinjiala detectingkeyplayersinterroristnetworks |
_version_ |
1716530539757830144 |