NETWORK ANALYSIS OF TERRORIST ACTIVITIES

FU Julei ; FAN Ying; WANG Yang ; WANG Shouyang

Journal of Systems Science & Complexity ›› 2014, Vol. 27 ›› Issue (6) : 1079-1094.

PDF(402 KB)
PDF(402 KB)
Journal of Systems Science & Complexity ›› 2014, Vol. 27 ›› Issue (6) : 1079-1094. DOI: 10.1007/s11424-014-3034-8

NETWORK ANALYSIS OF TERRORIST ACTIVITIES

Author information +
History +

Abstract

This paper uses an extensive network approach to “East Turkistan” activities by building both the one-mode and the bipartite networks for these activities. In the one-mode network, centrality analysis and spectrum analysis are used to describe the importance of each vertex. On this basis, two types of core vertices — The center of communities and the intermediary vertices among communities — are distinguished. The weighted extreme optimization (WEO) algorithm is also applied to detect communities in the one-mode network. In the “terrorist-terrorist organization” bipartite network, the authors adopt centrality analysis as well as clustering analysis based on the original bipartite network in order to calculate the importance of each vertex, and apply the edge clustering coefficient algorithm to detect the communities. The comparative and empirical analysis indicates that this research has been proved to be an effective way to identify the core members, key organizations, and communities in the network of “East Turkistan” terrorist activity. The results can provide a scientific basis for the analysis of “East Turkistan” terrorist activity, and thus provide decision support for the real work of “anti-terrorism”.

Cite this article

Download Citations
FU Julei , FAN Ying , WANG Yang , WANG Shouyang. NETWORK ANALYSIS OF TERRORIST ACTIVITIES. Journal of Systems Science and Complexity, 2014, 27(6): 1079-1094 https://doi.org/10.1007/s11424-014-3034-8
PDF(402 KB)

165

Accesses

0

Citation

2

Altmetric

Detail

Sections
Recommended

/