Skip to main content Accessibility help
×
  • Cited by 19
Publisher:
Cambridge University Press
Online publication date:
August 2015
Print publication year:
2015
Online ISBN:
9781316212639
Subjects:
Social Theory, Organisational Sociology, Research Methods in Sociology and Criminology, Research Methods In Sociology and Criminology, Sociology

Book description

Some of the most important international security threats stem from terror groups, criminal enterprises, and other violent non-state actors (VNSAs). Because these groups are often structured as complex, dark networks, analysts have begun to use network science to study them. However, standard network tools were originally developed to examine companies, friendship groups, and other transparent networks. The inherently clandestine nature of dark networks dictates that conventional analytical tools do not always apply. Data on dark networks is incomplete, inaccurate, and often just difficult to find. Moreover, dark networks are often organized to undertake fundamentally different tasks than transparent networks, so resources and information may follow different paths through these two types of organizations. Given the distinctive characteristics of dark networks, unique tools and methods are needed to understand these structures. Illuminating Dark Networks explores the state of the art in methods to study and understand dark networks.

Reviews

'Social network analysis is now a well-established paradigm within the social sciences and has been successfully applied to various types of relational data. However, until now, too little attention has been paid to how it should be applied to dark networks. Illuminating Dark Networks brings together leading academics, military researchers, and civilian analysts to provide the reader with the latest thinking on how to collect, analyze, and understand clandestine networks. Challenging traditional thinking and proposing new methods and ideas, this volume is timely, informative, and engaging.'

Martin Everett - Chair in Social Network Analysis, Mitchell Centre, University of Manchester

'Illuminating Dark Networks: The Study of Clandestine Groups and Organizations is a rare book title in that it conveys exactly what the book actually delivers. Drawing on work from some of the best researchers in this area, both from the policy world and academia, across fields as diverse as sociology, statistics, and computer science, this edited volume makes an important contribution to our understanding of dark networks and how to study them.'

Victor Asal - University at Albany, State University of New York

Refine List

Actions for selected content:

Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Save to Kindle
  • Save to Dropbox
  • Save to Google Drive

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.
×

Contents

References

Ackerman, G. A., & Pinson, L. (2011). Speaking truth to sources: Introducing a method for the quantitative evaluation of open-sources in event data. National Consortium for the Study of Terrorism and Responses to Terrorism (START) Working Paper. College Park, MD.
Alberts, D., & Hayes, R. (2005). Power to the edge: Command and control in the information age. Boca Raton, FL: CRC Press.
AlSumait, L., Barbara, D., & Domeniconi, C. (2008). On-line LDA: Adaptive topic models for mining text streams with applications to topic detection and tracking. IEEE International Conference on Data Mining (ICDM), 3–12.
Andrich, D. (1988). Rasch models for measurement. Newbury Park, CA: Sage.10.4135/9781412985598
Arquilla, J. (2008). Worst enemy: The reluctant transformation of the American military. Chicago, IL: Ivan R. Dee.
Arquilla, J. (2009). Aspects of netwar & the conflict with al Qaeda. Monterey, CA: Information Operations Center, Naval Postgraduate School.
Arquilla, J., & Ronfeldt, D. (2001). The advent of netwar (revised). In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 1–25). Santa Monica, CA: RAND.
Arreguin-Toft, A. (2001). How the weak win wars: A theory of asymmetric conflict. International Relations, 26(1), 93128.
ARTIS Research. (2009, June). REL codebook – public. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/files/Relations_Codebook_Public_Version2.pdf.
Asal, V. H., & Rethemeyer, R. K. (2006). Researching terrorist networks. Journal of Security Education, 1, 6574.
Asal, V. H., (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. Journal of Politics, 70(2), 437–49.10.1017/S0022381608080419
Asal, V. H., (2009). Islamist use and pursuit of CBRN terrorism. In Ackerman, G. & Tamsett, J. (Eds.), Jihadists and weapons of mass destruction (pp. 335–58). Boca Raton, FL: CRC Press.
Axelrod, R., & Cohen, M. D. (2000). Harnessing complexity: Organizational implications of a scientific frontier. New York: Basic Books.
Baker, W. E., & Faulkner, R. R. (1993). The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review, 58(6), 837–60.10.2307/2095954
Bakker, R. M., Raab, J., & Milward, H. B. (2011). A preliminary theory of dark network resilience. Journal of Policy Analysis and Management, 31, 3362.
Barabási, A.-L. (2002). Linked: How everything is connected to everything else and what it means for business, science, and everyday life. New York: Basic Books.
Barabási, A.-L. (2009). Scale-free networks: A decade and beyond. Science, 325(5939), 412–13.
Barabási, A.-L., Albert, R., & Jeong, H. (1999). Mean-field theory for scale-free random networks. Physica A, 272, 173–87.10.1016/S0378-4371(99)00291-5
Barabási, A.-L., & Bonabeau, E. (2003). Scale-free networks. Scientific American, 288, 60–9.10.1038/scientificamerican0503-60
Barthelemy, M., & Amaral, L. A. N. (1999). Small-world networks: Evidence for a crossover picture. Physical Review Letters, 82, 3180–3.10.1103/PhysRevLett.82.3180
Bavelas, A. (1948). A mathematical model for group structures. Human Organization, 7(3), 1630.10.17730/humo.7.3.f4033344851gl053
Bavelas, A. (1950). Communication patterns in task oriented groups. The Journal of the Acoustical Society of America, 22(6), 725–30.10.1121/1.1906679
Bavelas, A., & Barret, D. (1951). An experimental approach to organizational communication. Personnel, 27, 366–71.
Baxter, G. J., Dorogovtsev, S. N., Goltsev, A. V., & Mendes, J. F. (2011). Heterogeneous k-core versus bootstrap percolation on complex networks.Physical Review E, 83, 051134.10.1103/PhysRevE.83.051134
Bayat, A. (2007). Making Islam democratic: Social movements and the post-Islamist turn. Stanford, CA: Stanford University Press.10.1515/9781503626485
Bayir, M. A., Demirbas, M., & Eagle, N. (2009). “Discovering spatiotemporal mobility profiles of cellphone users.” Paper presented at the World of Wireless, Mobile, and Multimedia Networks & Workshops.10.1109/WOWMOM.2009.5282489
Beauchamp, M. A. (1965). An improved index of centrality. Behavioral Science, 10(2), 161–3.
Beckmann, N., Kriegel, H.-P., Schneider, R., & Seeger, B. (1990). The R*-tree: An efficient and robust access method for points and rectangles. ACM SIGMOD Record, 19(2), 322–31.10.1145/93605.98741
Bell, J. R. (2014). Subgroup centrality measures. Network Science, 2(2), 277–97.10.1017/nws.2014.15
Belsley, D. A., Kuh, E., & Welsch, R. E. [1980] (2004). Regression diagnostics: Identifying influential data and sources of collinearity. Hoboken, NJ: Wiley.
Bentley, J. L. (1975). Multidimensional binary search trees used for associative searching. Communications of the ACM, 18(9), 509–17.10.1145/361002.361007
Berman, E. (2009). Radical, religious, and violent: The new economics of terrorism. Cambridge, MA: MIT Press.
Bernard, H. R., Killworth, D., Kronenfeld, D., & Sailer, L. (1984). On the validity of retrospective data: The problem of informant accuracy. Annual Review of Anthropology, 13, 495517.10.1146/annurev.an.13.100184.002431
Bertetto, J. (2012, November 15). Countering criminal street gangs: Lessons from the counterinsurgent battlespace. Small Wars Journal. Retrieved from: http://smallwarsjournal.com/jrnl/art/countering-criminal-street-gangs-lessons-from-the-counterinsurgent-battlespace.
Bienenstock, E. J., & Bonacich, P. (1992). The core as a solution to exclusionary networks. Social Networks, 14, 231–43.10.1016/0378-8733(92)90003-P
Bienenstock, E. J., (1993). Game theory models for exchange networks: Experimental results. Sociological Perspectives, 36(2), 117–35.10.2307/1389425
Blau, P. M. (1964). Exchange and power in social life. New Brunswick, NJ: Transaction.
Blau, P. M. (1994). Structural contexts of opportunities. Chicago, IL: University of Chicago Press.
Blondel, V. D., Guillaume, J.-L., Lambiotte, R., & Lefebvre, E. (2008). Fast unfolding of communities in large networks. Journal of Statistical Mechanics, 10, 10008.10.1088/1742-5468/2008/10/P10008
Bollobas, B. (1985). Random graphs. London: London Mathematical Society Monographs, Academic Press.
Bollobas, B., & Riordan, O. (2004). Robustness and vulnerability of scale-free random graphs. Internet Mathematics, 1(1), 135.10.1080/15427951.2004.10129080
Bolz, F., Dudonis, K., & Schulz, D. (2002). Counterterrorism handbook: Tactics, procedures, and techniques. Boca Raton, FL: CRC Press.
Bonacich, P. (1972). Factoring and weighting approaches to status scores and clique identification. Journal of Mathematical Sociology, 2(1), 113–20.10.1080/0022250X.1972.9989806
Bonacich, P. (1979). A single measure for point and interval predictions of coalition theories. Behavioral Science, 23, 8593.10.1002/bs.3830240203
Bonacich, P. (1987). Power and centrality a family of measures. American Journal of Sociology, 92, 1170–82.10.1086/228631
Bonacich, P. (1991). Simultaneous group and individual centralities. Social Networks, 13(2), 155–68.10.1016/0378-8733(91)90018-O
Bonacich, P., & Bienenstock, E. J. (1997). Latent classes in exchange networks: Sets of positions with common interest. Journal of Mathematical Sociology, 22(1), 128.10.1080/0022250X.1997.9990192
Borgatti, S. P. (2006). Identifying sets of key players in a social network. Computational and Mathematical and Organizational Theory, 12, 2134.10.1007/s10588-006-7084-x
Borgatti, S. P. (2009). 2-Mode concepts in social network analysis. In Meyers, R. A. (Ed.), Encyclopedia of Complexity and Social Science (pp. 8279–91). New York: Springer.
Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). On the robustness of centrality measures under conditions of imperfect data. Social Networks, 28(2), 124–36.
Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). UCINET 6 for Windows. Columbia, SC: Analytic Technologies.
Bott, E. (1955). Urban families: Conjugal roles and social networks. Human Relations, 8, 345–84.10.1177/001872675500800401
Bowden, M. (2012, October 12). The death of Osama bin Laden: How the US finally got its man. The Guardian. Retrieved from: http://www.theguardian.com/world/2012/oct/12/death-osama-bin-laden-us.
Brafman, O., & Beckstrom, R. A. (2006). The starfish and the spider: The unstoppable power of leaderless organizations. New York: Portfolio.
Brandes, U., Robins, G., McCranie, A., & Wasserman, S. (2013). What is network science?Network Science, 1(1), 115.10.1017/nws.2013.2
Breiger, R. L., Ackerman, G. A., Asal, V. H., Melamed, D., Milward, H. B., Rethemeyer, R. K., & Schoon, E. (2011). Application of a profile similarity methodology for identifying terrorist groups that use or pursue CBRN weapons. In Salerno, J., Yang, S. J., Nau, D., & Chai, S. (Eds.), Social computing, behavioral-cultural modeling and prediction (pp. 2633). Berlin, Germany: Springer.
Breiger, R. L., Carley, K. M., & Pattinson, P. (Eds.) (2003). Dynamic social network modeling and analysis: Workshop summary and papers. Washington, DC: National Academic Press.
Breiger, R. L., & Melamed, D. (2014). The duality of organizations and their attributes: Turning regression modeling “inside out.”Research in the Sociology of Organizations, 40, 263–75.10.1108/S0733-558X(2014)0000040013
Breiger, R. L., Schoon, E., Melamed, D., Asal, V. H., & Rethemeyer, R. K. (2014). Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade. Social Networks, 36, 2339.10.1016/j.socnet.2013.04.002
Bright, D. A., & Delaney, J. J. (2013). Evolution of a drug trafficking network: Mapping changes in network structure and function across time. Global Crime, 14(2–3), 238–60.10.1080/17440572.2013.787927
Bright, D. A., Greenhill, C., & Levenkova, N. (2010). “Attack of the nodes: Scale-free criminal networks and vulnerability to targeted law enforcement interventions.” Paper presented at the 2nd Illicit Networks Workshop, Wollongong, Australia.
Bright, D. A., Greenhill, C., (2014). Dismantling criminal networks: Can node attributes play a role? In Morselli, C. (Ed.), Crime and networks. New York: Routledge.
Bright, D. A., Hughes, C. E., & Chalmers, J. (2012). Illuminating dark networks: A social network analysis of an Australian drug trafficking syndicate. Crime, Law, and Social Change, 57(2), 151–76.10.1007/s10611-011-9336-z
Burns, J., & Cowell, A. (2013, May 23). Britain knew of 2 suspects in the killing of a soldier. New York Times.
Burt, R. S. (1982). Toward a structural theory of action. Waltham, MA: Academic Press.10.1016/B978-0-12-147150-7.50014-4
Bush, G. W. (2008, January 28). President Bush delivers State of the Union Address. Retrieved from the White House Web page: http://georgewbush-whitehouse.archives.gov/news/releases/2008/01/20080128-13.html.
Callahan, D., Shakarian, P., Nielsen, J., & Johnson, A. (2012). “Shaping Operations to Attack Robust Terror Networks.” Paper presented at the International Conference on Social Informatics. Washington, DC.
Cameron, D. (2014, August 29). Threat level from international terrorism raised: PM press statement. Retrieved from Government of the United Kingdom Web page: https://www.gov.uk/government/speeches/threat-level-from-international-terrorism-raised-pm-press-conference.
Carley, K. M. (1990). Group stability: A socio-cognitive approach. In Lawler, E., Markovsky, B., Ridgeway, C., & Walker, H. (Eds.), Advances in group processes: Theory and research, Vol. VII (pp. 144). Greenwich, CT: JAI Press.
Carley, K. M. (2002). Smart agents and organizations of the future. In Lievrouw, L. & Livingston, S. (Eds.), The handbook of new media (pp. 206–20).Thousand Oaks, CA: Sage.
Carley, K. M. (2003). Dynamic network analysis. In Breiger, R., Carley, K. M., & Pattinson, P. (Eds.), Dynamic social network modeling and analysis: Workshop summary and papers (pp. 133–45). Washington, DC: National Academic Press.
Carley, K. M. (2004). ORA: Organization risk analyzer. Retrieved from the Carnegie Mellon University Web page: http://www.casos.cs.cmu.edu/publications/papers/carley_2004_oraorganizationrisk.pdf.
Carley, K. M. (2006a). A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action: Visualizing Network Information Meeting Proceedings, RTO-MP-IST-063. Neuilly-sur-Seine, France.
Carley, K. M. (2006b). Destabilization of covert networks. Computational and Mathematical Organization Theory, 12, 5166.10.1007/s10588-006-7083-y
Carley, K. M. (2007). Casos dataset. Retrieved from the Center for Computational Analysis of Social and Organizational Systems Web page: http://www.casos.cs.cmu.edu/tools/data2.php.
Carley, K. M. (2014). ORA: A toolkit for dynamic network analysis and visualization. In Alhajj, R. & Rokne, J. (Eds.), Encyclopedia of social network analysis and mining, Springer.
Carley, K. M., & Pfeffer, J. (2012). Dynamic network analysis (DNA) and ORA. In Schmorrow, D. D. & Nicholson, D. M. (Eds.), Advances in design for cross-cultural activities, Part I (pp. 265–74). Boca Raton, FL: CRC Press.
Carley, K. M., Bigrigg, M. W., & Diallo, B. (2012). Data-to-model: A mixed initiative approach for rapid ethnographic assessment. Computational and Mathematical Organization Theory, 18(3), 300–27.10.1007/s10588-012-9125-y
Carley, K. M., Columbus, D., Bigrigg, M. W., & Kunkel, F. (2011). AutoMap user’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, CMU-ISR-11e108.
Carley, K. M., Columbus, D., & Landwehr, P. (2013). AutoMap user’s guide 2013. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, CMU-ISR-13–105.10.21236/ADA586976
Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks: Proceedings of the 8th International Command and Control Research and Technology Symposium. Vienna, VA.
Carley, K. M., Lee, J.-S., &. Krackhardt, D. (2001). Destabilizing networks. Connections, 24(3), 7992.
Carley, K. M., Martin, M. K., & Hirshman, B. (2009). The etiology of social change. Topics in Cognitive Science, 1(4), 621–50.10.1111/j.1756-8765.2009.01037.x
Carley, K. M., Pfeffer, J., Liu, H., Morstatter, F., & Goolsby, R. (2013, August). Near real time assessment of social media using geo-temporal network analytics: Proceedings of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.10.1145/2492517.2492561
Carley, K. M., Reminga, J., & Kamneva, N. (1998). Destabilizing terrorist networks. Institute for Software Research, 45.
Carley, K. M., Reminga, J., (2003). Destabilizing terrorist networks: Proceedings of the 8th International Command and Control Research and Technology Symposium. Evidence Based Research, Track 3. Washington, DC. Retrieved from: http://www.dodccrp.org/events/2003/8th_ICCRTS/pdf/021.pdf.
Carley, K. M., Reminga, J., Storrick, J., & Columbus, D. (2013). ORA user’s guide 2013. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Pittsburgh, PA, Technical Report CMUISR- 13–108.10.21236/ADA587056
Carmi, S., Havlin, S., Kirkpatrick, S., Shavitt, Y., & Shir, E. (2007). A model of Internet topology using k-shell decomposition. PNAS, 104(27), 11150–4.10.1073/pnas.0701175104
Centola, D. (2010). The spread of behavior in an online social network experiment. Science, 329(5996), 1194–7.10.1126/science.1185231
Chao, L. (2013, February 4). Brazil: The social media capital of the universe. Wall Street Journal. Retrieved from: http://online.wsj.com/news/articles/SB10001424127887323301104578257950857891898.
Cho, E., Myers, S. A., & Leskovec, J. (2011). Friendship and mobility: user movement in location-based social networks: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY.
Clarke, R. A., Aga, G. P., Cressey, R. W., Flynn, S. E., Mobley, B. W., Rosenback, E., Simon, S., Wechsler, W. F., & Wolosky, L. S. (2004). Defeating the jihadists: A blueprint for action. New York: Century Foundation Press.
Clauset, A., Newman, M. E., & Moore, C. (2004). Finding community structure in very large networks. Physical Review E, 70(6), 066111.10.1103/PhysRevE.70.066111
Clinton, H. R., & Espinosa, P. (2010, March 29). Joint statement of the Merida Initiative High-Level Consultative Group on Bilateral Cooperation Against Transnational Organized Crime. Retrieved from the U.S. Department of State Web page: http://www.state.gov/secretary/20092013clinton/rm/2010/03/139196.htm.
Coleman, J. S. (1990). Foundations of social theory. Cambridge, MA: Harvard University Press.
Coll, S. (2004). Ghost wars: The secret history of the CIA, Afghanistan, and bin Laden, from the Soviet invasion to September 10, 2001. New York: Penguin.
Conboy, K. (2006). The second front. Jakarta, Indonesia: Equinox Press.
Cook, K. S., & Cheshire, C. (2013). Social exchange, power, and inequality in networks. In Wittek, R., Snijders, T., & Nee, V. (Eds.), The handbook of rational choice social research (p. 185). Stanford, CA: Stanford University Press.
Cook, K. S., Emerson, R. M., Gilmore, M. R., & Yamagishi, T. (1983). The distribution of power in exchange networks: Theory and experimental results. American Journal of Sociology, 89, 275305.
Coronges, K. A., Miller, K. M., Tamyo, C. I., & Ender, M. G. (2013). A network evaluation of attitudes toward gays and lesbians among U.S. military cadets. Journal of Homosexuality, 60(11), 1557–80.10.1080/00918369.2013.824322
Costenbender, E., & Valente, T. W. (2003). The stability of centrality measures when networks are sampled. Social Networks, 25, 283307.10.1016/S0378-8733(03)00012-1
CRAN. (2014). Comprehensive R archive network. Retrieved from: http://cran.us.r-project.org/.
Crelinsten, R. (2002). Analysing terrorism and counter-terrorism: A communication model. Terrorism and Political Violence, 14(2), 77122.10.1080/714005618
Csardi, G., & Nepusz, T. (2006). The igraph software package for complex network research. InterJournal, Complex Systems, 1695. Retrieved from: http://igraph.org.
Dahl, O.-J., & Nygaard, K. (1966). SIMULA: An ALGOL-based simulation language. Communications of the ACM, 9(9), 671–8.10.1145/365813.365819
Davulcu, H., Ahmed, S., Gokalp, S., Temkit, H., Taylor, T., Woodward, M., & Amin, A. (2010). Analyzing sentiment markers describing radical and counter-radical elements in online news. IEEE Symposium on Social Intelligence and Networking (SIN), 335–40.
de Nooy, W., Mrvar, A., & Batagelj, V. (2011). Exploratory social network analysis with Pajek (revised and expanded edition). Cambridge: Cambridge University Press.10.1017/CBO9780511996368
Dekker, D., Krackhardt, D., & Snijders, T. A. B. (2007). Sensitivity of MRQAP tests to collinearity and autocorrelation conditions. Psychmetrika, 72(4), 563–81.10.1007/s11336-007-9016-1
Department of the Army. (2006, December). Field Manual 3–24 MCWP 3–33.5: Counterinsurgency. Retrieved from the University of Louisville ROTC Web site: http://louisville.edu/armyrotc/files/FM%203–24%20Counterinsurgency.pdf/view.
Diesner, J. (2012). “Uncovering and managing the impact of methodological choices for the computational construction of socio-technical networks from texts” (Doctoral dissertation). Available from ProQuest Dissertations and Theses database (AAI3536166).
Diesner, J., & Carley, K. M. (2005, April). Exploration of communication networks from the Enron email corpus: Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA.
Diesner, J., (2005). “Revealing and comparing the organizational structure of covert networks with network text analysis.” Paper presented at XXV International Sunbelt Social Network Conference Program, Redondo Beach, CA.
Diesner, J., (2012, June). Impact of relation extraction methods from text data on network data and analysis results: Proceedings ofthe ACM Web Science Conference (WebSci 2012). Evanston, IL.
Diesner, J., Frantz, T. L., & Carley, K. M. (2005). Communication networks from the Enron email corpus: It’s always about the people. Enron is no different. Computational and Mathematical Organizational Theory, 11(3), 201–28.
Diesner, J., Tambayong, L., & Carley, K. M. (2012). Extracting socio-cultural networks of the Sudan from open-source, large-scale text data. Computational and Mathematical Organizational Theory, 18(3), 328–39.
Dijkstra, E. W. (1959). A note on two problems in connexion with graphs. Numerische Mathematik, 1, 269–71.10.1007/BF01386390
Dishman, C. (2005). The leaderless nexus: When crime and terror converge. Studies in Conflict & Terrorism, 28, 237–52.10.1080/10576100590928124
Doreian, P., & Stockman, F. N. (1997). Evolution of social networks. Amsterdam: Gordon and Breach Publishers.
Durkheim, E. (2004). The cultural logic of collective representations. In Lemert, C. (Ed.), Social theory: The multicultural and classic readings (pp. 90–9). Philadelphia, PA: Westview Press.
Eagle, N. (2011). Mobile phones as sensors for social research. Emergent Technologies in Social Research, 492521.
Eagle, N., & Pentland, A. S. (2006). Reality mining: Sensing complex social systems. Personal and Ubiquitous Computing, 10(4), 255–68.10.1007/s00779-005-0046-3
Eagle, N., Pentland, A. S., & Lazer, D. (2009). Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106, 15274–8.10.1073/pnas.0900282106
Efron, B., & Tibshirani, R. (1993). An introduction to the bootstrap. Chapman and Hall.10.1007/978-1-4899-4541-9
Eilstrup-Sangiovanni, M., & Jones, C. (2008). Assessing the dangers of illicit networks. International Security, 33(2), 37.10.1162/isec.2008.33.2.7
Emerson, R. M. (1962). Power-dependence relations. American Sociological Review, 27, 3141.10.2307/2089716
Emerson, R. M. (1981). Social exchange theory. In Rosenberg, M. & Turner, R. H. (Eds.), Social psychology: Sociological perspectives (pp. 3065). New York: Basic Books.
EPFL. (2014). The Scala programming language. Retrieved from: http://www.scala-lang.org/.
Epstein, J. (2006). Generative social science: Studies in agent-based computational modeling. Princeton, NJ: Princeton University Press.
Erickson, B. H. (1981). Secret societies and social structure. Social Forces, 60, 188210.10.2307/2577940
Everett, M. G., & Borgatti, S. P. (2012). Categorical attribute based centrality: E-I and G-F centrality. Social Networks, 34(4), 562–9.10.1016/j.socnet.2012.06.002
Everton, S. F. (2012a). Network topography, key players and terrorist networks. Connections, 32(1), 1219. Retrieved from: http://www.insna.org/PDF/Connections/v32/Connections_Everton_AP.pdf.
Everton, S. F. (2012b). Disrupting dark networks. Cambridge: Cambridge University Press.10.1017/CBO9781139136877
Everton, S. F., & Cunningham, D. (2012). Detecting significant changes in dark networks. Behavioral Sciences of Terrorism and Political Aggression, 5(2).
Everton, S. F., (2013). Terrorist network adaptation to a changing environment. In Morselli, C. (Ed.), Crime and networks (pp. 287308). London: Routledge.
Faust, K. (1997). Centrality in affiliation networks. Social Networks, 19, 157–91.10.1016/S0378-8733(96)00300-0
Finkel, R. A., & Bentley, J. L. (1974). Quad trees a data structure for retrieval on composite keys. Actainformatica, 4(1), 19.
Finn, P., & Tate, J. (2009, June 16). CIA says it misjudged role of high-value detainee Abu Zubaida, transcript shows. Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2009/06/15/AR2009061503045.html.
Flintoff, C. (2010, April 5). Marines tap social sciences in Afghan war effort. NPR. Retrieved from http://www.npr.org/templates/story/story.php?storyId=125502485.
Flynn, M., Pottinger, M., & Batchelor, P. (2010). Fixing intel: A blueprint for making intelligence relevant in Afghanistan. Washington, DC: Center for a New American Security.
Freeman, L. C. (1977). A set of measures of centrality based on betweenness. Sociometry, 40(1), 3541.10.2307/3033543
Freeman, L. C. (1979). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–39.
Freeman, L. C. (2004). The development of social network analysis: A study in the sociology of science. Vancouver, BC: Empirical Press.
Galula, D. (1964). Counterinsurgency warfare: Theory and practice. Westport, CT: Praeger.
Galula, D. [1964] (2006). Counterinsurgency warfare: Theory and practice. Westport, CT: Praeger Security International.10.5040/9798216963066
Gambetta, D. (2009). Codes of the underworld: How criminals communicate. Princeton, NJ: Princeton University Press.10.1515/9781400833610
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of reusable object-oriented software. Upper Saddle River, NJ: Pearson Education.
Gartenstein-Ross, D. (2011, October 19). Terrorism and the coming decade. Retrieved from the Global Brief Web page: http://globalbrief.ca/blog/2011/10/19/terrorism-and-the-coming-decade-of-fragility/.
Gerdes, L. M. (2012). “On the edge of Al-Qaida? Assessing Al-Qaida’s changing role in terrorist plots and attacks” (Doctoral Dissertation). Available from the University of Pittsburgh.
Gerdes, L. M. (2014). MAPPing dark networks: A data transformation strategy to study clandestine organizations. Network Science, 2(2), 213–53.10.1017/nws.2014.8
Gerdes, L. M., & Carley, K. M. (2009). “Estimating the accuracy of media sources on terrorism.” Paper presented to the 29th International Sunbelt Social Network Conference of the International Network for Social Network Analysis, San Diego, CA.
Gerdes, L. M., Ringler, K., & Autin, B. (2014). Assessing the Abu Sayyaf Group’s strategic and learning capacities. Studies in Conflict and Terrorism, 37(3), 267–93.10.1080/1057610X.2014.872021
Giles, J. (2012). Computational social science: Making the links from e-mails to social networks. Nature, 488, 448–50.10.1038/488448a
Githens-Mazer, J. (2010). Understanding violent radicalisation. International Affairs, 86(4), 998–9.
Githens-Mazer, J. (2012). The rhetoric and reality: Radicalization and political discourse. International Political Science Review, 33(5), 556–67.10.1177/0192512112454416
Goertz, G. (2006). Social science concepts: A user’s guide, Princeton, NJ: Princeton University Press.10.1515/9781400842995
Goertz, G., & Mahoney, J. (2005). Two-level theories and fuzzy-set analysis. Sociological Methods Research, 33, 497538.10.1177/0049124104266128
Goertz, G., (2012). A tale of two cultures: Qualitative and quantitative research in the social sciences. Princeton, NJ: Princeton University Press.10.23943/princeton/9780691149707.001.0001
Goodchild, M. F. (2007). Citizens as sensors: The world of volunteered geography. GeoJournal, 69(4), 211–21.10.1007/s10708-007-9111-y
Goode, E. (2012, April 30). With green beret tactics, combating gang warfare. New York Times. Retrieved from: http://www.nytimes.com/2012/05/01/us/springfield-mass-fights-crime-using-green-beret-tactics.html?pagewanted=all&_r=0.
Goodman, L. A. (1961). Snowball sampling. Annals of Mathematical Statistics, 32(1), 148–70.10.1214/aoms/1177705148
Graham, J. M., Carley, K. M., & Cukor, D. (2008, January). Intelligence database creation & analysis: Network-based text analysis versus human cognition: Proceedings of the 41st Hawaii International Conference on System Sciences. Waikoloa, HI.
Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360–80.10.1086/225469
Granovetter, M. S. (1978). Threshold models of collective behavior. The American Journal of Sociology, 83(6), 1420–43.10.1086/226707
Guttman, A. (1984). R-trees: A dynamic index structure for spatial searching (Vol. 14): ACM.10.1145/602259.602266
Guttman, L. (1950). The basis for scalogram analysis. Measurement and Prediction, 4, 6090.
Hampson, N. (2012). Hacktivism: A new breed of protests in a networked world. Boston College International & Comparative Law Review, 35(2), 511–42.
Hannigan, J., Hernandez, G., Medina, R. M., Roos, P., & Shakarian, P. (2013). “Mining for spatially-near communities in geo-located social networks.” Paper presented to the AAAI Fall Symposium. Arlington, VA.10.21236/ADA590263
Hansen, D., Shneiderman, B., & Smith, M. A. (2010). Analyzing social media networks with NodeXL: Insights from a connected world. San Francisco, CA: Morgan Kaufmann.
Hardy, W., & Richard, W. (2006). Operationally significant patterns of associations: Proceedings of IEE Aerospace Conference 2006. Arlington, VA.
Hariharan, R. (2001). “Modeling intersections of geospatial lifelines” (Master thesis). Retrieved from http://www.library.umaine.edu/theses/pdf/hariharanr2001.pdf.
Harris-Hogan, S. (2012). Australian neo-jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35, 298314.10.1080/1057610X.2012.656344
Hayden, N. K. (2009). Terrifying landscapes: Understanding motivations of non-state actors to acquire and/or use weapons of mass destruction. In Ranstorp, M. & Normark, M. (Eds.), Unconventional weapons and international terrorism: Challenges and new approaches (pp. 163–94).New York: Routledge.
Helfstein, S. (2012). Edges of radicalization: Individuals, networks and ideas in violent extremism. Retrieved from the Combating Terrorism Center at West Point: https://www.ctc.usma.edu/v2/wp-content/uploads/2012/06/CTC_EdgesofRadicalization.pdf.
Helfstein, S., (2014, May 16). Risky business: The global threat network and the politics of contraband. Retrieved from the Combating Terrorism Center at West Point Web site: https://www.ctc.usma.edu/posts/risky-business-the-global-threat-network-and-the-politics-of-contraband.10.21236/ADA602252
Helfstein, S., (2011). Covert or convenient? Evolution of terror attack networks. Journal of Conflict Resolution, 55(5), 785813.10.1177/0022002710393919
Hoen, A. G., Hladish, T. J., Eggo, R. M., Lenczner, M., Galvanig, A. P., Brownstein, J. S., & Meyers, L. A. (In press). Epidemic wave dynamics attributable to urban community structure. Journal of Medical Internet Research.
Holland, P. W., & Leinhardt, S. (1971). Transitivity of structural models of small groups. Comparative Group Studies, 2, 107–24.10.1177/104649647100200201
Homans, G. C. (1961). Social behavior: Its elementary forms. New York: Harcourt Brace Jovanovich.
Horgan, J. (2009). Walking away from terrorism. London: Routledge.10.4324/9780203874738
Hornsby, K., & Egenhofer, M. J. (2002). Modeling moving objects over multiple granularities. Annals of Mathematics and Artificial Intelligence, 36(1–2), 177–94.10.1023/A:1015812206586
Hu, D., Kaza, S., & Chen, H. (2009). Identifying significant facilitators of dark network evolution. Journal of the American Society for Information Science and Technology, 60, 655–65.10.1002/asi.21008
Hung, B., Kolitz, S., & Ozdaglar, A. (2011). Optimization-based influencing of village social networks in a counterinsurgency:Proceedings of the 4th international conference on social computing, behavioral-cultural modeling and prediction(SBP’11). College Park, MD.
Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., & Morris, M. (2008). ERGM: A package to, simulate and diagnose exponential-family models for networks. Journal of Statistical Software, 24(3), 2.10.18637/jss.v024.i03
Husain, E. (2007). The Islamist: Why I became an Islamic fundamentalist, what I saw inside, and why I left. New York: Penguin Books.
Hutchins, C. E., & Benham-Hutchins, M. (2010). Hiding in plain sight: Criminal network analysis. Computational & Mathematical Organization Theory, 16, 89111.10.1007/s10588-009-9060-8
International Crisis Group. (2002). Indonesia backgrounder: How the Jemaah Islamiyah terrorist network operates. Brussels, Belgium: International Crisis Group.
International Crisis Group. (2006). Terrorism in Indonesia: Noordin’s networks. Brussels, Belgium: International Crisis Group.
International Crisis Group. (2007). Jihadism in Indonesia: Poso on the edge. Brussels, Belgium: International Crisis Group.
International Crisis Group. (2009a). The hotel bombings. Brussels, Belgium: International Crisis Group.
International Crisis Group. (2009b). Indonesia: Noordin Top’s support base. Brussels, Belgium: International Crisis Group.
Itai, A., & Rodeh, M. (1978). Finding a minimum circuit in a graph. SIAM Journal on Computing, 7(4), 413–23.10.1137/0207033
Iwanski, N., & Frank, R. (2014). The evolution of a drug co-arrest network, in Morselli, C. (Ed.), Crime and networks (pp. 5280). New York: Routledge.
Janzen, D. S., & Saiedian, H. (2005). Test-driven development: Concepts, taxonomy, and future direction. Computer Science and Software Engineering, 33(9), 4350.
Johnson, D. (1975). Finding all the elementary circuits of a directed graph. SIAM Journal on Computing, 4(1), 7784.10.1137/0204007
Johnson, S. (2001). Emergence: The connected lives of ants, brains, cities, and software. New York: Scribner.
Jones, D. (2009). Understanding the form, function, and logic of clandestine cellular networks: The first step in effective counternetwork operations. Fort Leavenworth, KS: School of Advanced Military Studies, United States Army Command and General Staff College.
Jones, D. (2012). Understanding the form, function, and logic of clandestine insurgent and terrorist networks. Tampa, FL: Joint Special Operations University.
Jones, S. (2009). Noordin’s dangerous liaisons, tempo. Jakarta, Indonesia: International Crisis Group.
Jordan, J., Mañas, F. M., & Horsburgh, N. (2008). Strengths and weaknesses of grassroots jihadist networks: The Madrid bombings. Studies in Conflict & Terrorism, 31, 1721.10.1080/10576100701767148
Joseph, K., Carley, K. M., Filonuk, D., Morgan, G. P., & Pfeffer, J. (2014). Arab Spring: From news data to forecasting. Social Networks and Mining, 4(1). Vienna: Springer.
Kamel, I., & Faloutsos, C. (1993). Hilbert R-tree: An improved R-tree using fractals: Proceedings of the Twentieth International Conference on Very Large Data Bases. Santiago de Chile, Chile. Retrieved from: http://www.informatik.uni-trier.de/~ley/db/conf/vldb/vldb94-500.html.
Kang, C., Pugliese, A., Grant, J., & Subrahmanian, V. (2012). “STUN: Spatio-temporal uncertain (social) networks.” Paper presented at the International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM. Istanbul, Turkey.10.1109/ASONAM.2012.93
Kas, M., Carley, K. M., & Carley, L. R. (2013, August). Incremental closeness centrality for dynamically changing social networks: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.10.1145/2492517.2500270
Kas, M., Wachs, W., Carley, K. M., & Carley, L. R. (2013, August). Incremental computation of betweenness centrality for dynamically growing networks: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.10.1145/2492517.2492533
Kean, T. H., Hamilton, L., & Rhodes, B. (2006). Without precedent: The inside story of the 9/11 Commission. New York: Alfred A. Knopf.
Keegan, B., Ahmed, M. A., Williams, D., Srivastava, J., & Contractor, N. (2010). “Dark gold: Statistical properties of clandestine networks in massively multiplayer online games.” Paper presented at the Social Computing, Second International Conference on IEEE.10.1109/SocialCom.2010.36
Kempe, D. K. (2003). “Maximizing the spread of influence through a social network.” Paper presented at the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). Washington, DC.
Kenney, M. (2007). From Pablo to Osama: Trafficking and terrorist networks, government bureaucracies, and competitive adaptation. University Park: Pennsylvania State University Press.
Kenney, M., Horgan, J., Horne, C., Vining, P., Carley, K. M., Bigrigg, M. W., Bloom, M., & Braddock, K. (2013). Organisational adaptation in an activist network: Social networks, leadership, and change in al-Muhajiroun. Applied Ergonomics, 44(5), 739–47.10.1016/j.apergo.2012.05.005
Kenney, M., Horgan, J., Horne, C., Vining, P., Carley, K. M., Bigrigg, M., Bloom, M., & Braddock, K. (2015). Competitive adaptation in terrorist networks: Preliminary findings from an Islamist case study. In Stedmon, A., Lawson, G., & Saikayasit, R. (Eds.), Hostile intent & counter-terrorism: Human factors theory and application (pp. 177–93). London: Ashgate.
Kerry, J. (1997). The new war: The web of crime that threatens America’s security. New York: Simon & Schuster.
Kilcullen, D. (2009). The accidental guerrilla: Fighting small wars in the midst of a big one. Oxford: Oxford University Press.
Kilcullen, D. (2010). Counterinsurgency. Oxford: Oxford University Press.
Kim, L. (2011). Media framing for stem cell research: A cross-national analysis of political representation of science between the UK and South Korea. Journal of Science Communication, 10(3), 117.10.22323/2.10030202
Ki-moon, B. (2013, May 20). Report of the secretary-general on the activities of the United Nations Regional Office for Central Africa and on the Lord’s Resistance Army-affected areas. Retrieved from: http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2013/297.
Ki-moon, B. (2014, September 23). Remarks at the Climate Summit press conference (including comments on Syria). UN News Centre. Retrieved from: http://www.un.org/apps/news/infocus/sgspeeches/statments_full.asp?statID=2356#.VCMTXmNtrKk.
Kitsak, M., Gallos, L. K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H. E., & Makse, H. A. (2010). Identification of influential spreaders in complex networks. Nature Physics, 6, 888–93.
Kivela, M., Arenas, A., Barthelemy, M., Gleeson, J., Moreno, Y., & Porter, M. (2014). Multilayer networks. Journal of Complex Networks, 2(3), 203–71.10.1093/comnet/cnu016
Klerks, P. (2001). The network paradigm applied to criminal organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections, 24, 5365.
Knuth, D. E. (1984). Literate programming. The Computer Journal, 27(2), 97111.10.1093/comjnl/27.2.97
Koka, B. R., & Prescott, J. E. (2002). Strategic alliances as social capital: A multidimensional view. Strategic Management Journal, 23(9), 795816.10.1002/smj.252
Koliba, C., Meek, J. W., & Zia, A. (2011). Governance networks in public administration and public policy. Boca Raton, FL: Taylor & Francis/CRC Press.
Koopman, J. S., Singh, P., & Ionides, E. L. (2014). Transmission modeling to enhance surveillance system function. Transforming Public Health Surveillance. Elsevier.
Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict & Terrorism, 29, 559–75.10.1080/10576100600798418
Kossinets, G. (2006). Effects of missing data in social networks. Social Networks, 28, 247–68.10.1016/j.socnet.2005.07.002
Kossinets, G., & Watts, D. J. (2006). Empirical analysis of an evolving social network. Science, 311, 8890.10.1126/science.1116869
Krackhardt, D. (1987). QAP partialling as a test of spuriousness. Social Networks, 9(2), 171–86.
Krackhardt, D., & Kilduff, M. (2002). Structure, culture, and Simmelian ties in entrepreneurial firms. Social Networks, 24(3), 279–90.10.1016/S0378-8733(02)00008-4
Krebs, V. E. (2002a). Mapping networks of terrorist cells. Connections, 24(3), 4352.
Krebs, V. E. (2002b). Uncloaking terrorist networks. First Monday, 7(4). Retrieved from: http://firstmonday.org/ojs/index.php/fm/article/view/941/863.10.5210/fm.v7i4.941
Krempel, L., & Plümper, T. (2003). Exploring the dynamics of international trade by combining the comparative advantages of multivariate statistics and network visualizations. Journal of Social Structure, 4(1) (electronic).
Kumar, S., Barbier, G., Abbasi, M. A., & Liu, H. (2011). Relief, TweetTracker: An analysis tool for humanitarian and disaster relief: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, ICWSM. Barcelona, Spain.
Kumar, S., Morstatter, F., & Liu, H. (2013). Twitter data analytics. New York: Springer.
Lambiotte, R., Blondel, V. D., de Kerchove, C., Huens, E., Prieur, C., Smoreda, Z., & Van Dooren, P. (2008). Geographical dispersal of mobile communication networks. Physica A: Statistical Mechanics and Its Applications, 387(21), 5317–25.10.1016/j.physa.2008.05.014
Lanham, M., Morgan, G., & Carley, K. M. (2011). Social network modeling and simulation of integrated resilient command and control (C2) in contested cyber environments. In Levis, A., Carley, K. M., & Karsai, G. (Eds.), Resilient architectures for integrated command and control in a contested cyber environment (pp. 6394). Fairfax, VA: The Volgenau School of Engineering Department of Electrical and Computer Engineering System Architectures Laboratory, George Mason University.
Lake, E. (2011, March 10). China deemed biggest threat to U.S. Washington Times. Retrieved from: http://www.washingtontimes.com/news/2011/mar/10/china-deemed-biggest-threat-to-us/?page=all.
Lawler, E. J. (2001). An affect theory of social exchange. American Journal of Sociology, 107(2), 321–52.10.1086/324071
Leavitt, H. (1951). Some effects of certain communication patterns on group performance. The Journal of Abnormal and Social Psychology, 46(1), 3850.
Leenders, R. T. A. J. (1996). Evolution of friendship and best friendship choices. Journal of Mathematical Sociology, 21, 133–48.
Leinhardt, S. (Ed.) (1977). Social networks: A developing paradigm. New York: Academic Press.
Lindenberg, S. (1992). The method of decreasing abstraction. In Coleman, J. S. & Fararo, T. J. (Eds.), Rational choice theory: Advocacy and critique (pp. 320). London: Sage.
Liu, J., Chen, J., & Ye, J. (2009). Large-scale sparse logistic regression: Proceedings of ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), 547–56.10.1145/1557019.1557082
Lusseau, D., Schneider, K., Boisseau, O., Haase, P., Slooten, E., & Dawson, S. (2003). The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behavioral Ecology and Sociobiology, 54, 396405.10.1007/s00265-003-0651-y
Mackenzie, K. D. (1966). Structural centrality in communications networks. Psychometrika, 31(1), 1725.10.1007/BF02289453
Magouirk, J., Atran, S., & Sageman, M. (2008). Connecting terrorist networks. Studies in Conflict & Terrorism, 31, 116.
Malensek, M., Lee Pallickara, S., & Pallickara, S. (2013). Exploiting geospatial and chronological characteristics in data streams to enable efficient storage and retrievals. Future Generation Computer Systems, 29(4), 1049–61.
Mancuso, M. (2014). Not all madams have a central role: Analysis of a Nigerian sex trafficking network. Trends in Organized Crime, 17, 6688.10.1007/s12117-013-9199-z
Markovsky, B., Willer, D., & Patton, T. (1988). Power relations in exchange networks. American Journal of Sociology, 53, 220–36.
Markovsky, B., Willer, D., (1990). Reply to Yamagishi and Cook: Theory, evidence, and intuition. American Sociological Review, 5, 300–4.
Mauss, M. (1950). The gift: The form and reason for exchange in archaic societies. New York: Norton.
McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence, 20(3), 415–33.10.1080/09546550802073367
McCulloh, I., Armstrong, H., & Johnson, A. (2013). Social network analysis with applications. Hoboken, NJ: Wiley.
McCulloh, I., & Carley, K. M. (2011). Detecting change in longitudinal social networks. Journal of Social Structure, 12(3). Retrieved from: http://www.cmu.edu/joss/content/articles/volume12//McCullohCarley.pdf.
McDonald, J. H. (2009). Spearman rank correlation. In McDonald, J. H., Handbook of biological statistics (2nd ed.). Baltimore, MD: Sparky House Publishing. Retrieved from: http://udel.edu/~mcdonald/statspearman.html.
McPherson, J. M., & Rangermoore, J. R. (1991). Evolution on a dancing landscape: Organizations and networks in dynamic blau space. Social Forces, 70, 1942.
Melamed, D., Breiger, R. L., & Schoon, E. (2013). The duality of clusters and statistical interactions. Sociological Methods & Research, 42(1), 4159.10.1177/0049124112464870
Melamed, D., Schoon, E., Breiger, R. L., Asal, V. H., & Rethemeyer, R. K. (2012). Using organizational similarity to identify statistical interactions for improving situational awareness of CBRN activities. Social Computing, Behavioral-Cultural Modeling, and Prediction Lecture Notes in Computer Science, 7227, 61–8.10.1007/978-3-642-29047-3_8
Merton, R. K. (1968). The Matthew effect in science. Science, 159, 5663.
Milgram, S. (1967). The small world problem. Psychology Today, 1(1), 61–7.
Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63, 8197.10.1037/h0043158
Miller, H. J. (1991). Modeling accessibility using space-time prism concepts within geographical information systems. International Journal of Geographical Information System, 5(3), 287301.10.1080/02693799108927856
Milward, H. B., & Raab, J. (2006). Dark networks as organizational problems: Elements of a theory. International Public Management Journal, 9, 333–60.
Molm, L. D., Collett, J. L., & Schaefer, D. R. (2007). Building solidarity through generalized exchange: A theory of Reciprocity 1. American Journal of Sociology, 113(1), 205–42.10.1086/517900
Molm, L., Schaefer, D., & Collett, J. (2009). Fragile and resilient trust: Risk and uncertainty in negotiated and reciprocal Exchange. Sociological Theory, 27, 132.10.1111/j.1467-9558.2009.00336.x
Moody, J. (2005). Fighting a hydra: A note on the network embeddedness of the war on terror. Structure and Dynamics, 1(2). Retrieved from: http://escholarship.org/uc/item/7x3881bs.
Morgan, J. D., & Steinberg, P. E. (2013). Testing the usability of time-geographic maps for crime mapping. In Leitner, M. (Ed.), Crime modeling and mapping using geospatial technologies (pp. 339–66). New York: Springer.
Morselli, C. (2009). Inside criminal networks. New York: Springer.10.1007/978-0-387-09526-4
Morselli, C. (2010). Assessing vulnerable and strategic positions in a criminal network. Journal of Contemporary Criminal Justice, 26, 382–92.10.1177/1043986210377105
Morselli, C., Giguère, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143–53.10.1016/j.socnet.2006.05.001
Morselli, C., & Petit, K. (2007). Law-enforcement disruption of a drug importation network. Global Crime, 8(2), 109–30.10.1080/17440570701362208
Morton, G. M. (1966). A computer oriented geodetic data base and a new technique in file sequencing: Ottawa, ON: International Business Machines Company.
Nagl, J. A. (2005). Learning to eat soup with a knife: Counterinsurgency lessons from Malaya and Vietnam. Chicago, IL: University of Chicago Press.
Nasiri, O. (2006). Inside the jihad: My life with al Qaeda, a spy’s story. New York: Basic Books.
National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission Report: Final report of the National Commission on Terrorist Attacks upon the United States. Washington, DC: United States Government Printing Office.
National Research Council. (2003). Dynamic social network modeling and analysis: Workshop summary and papers. Washington, DC: The National Academies Press.
Newman, M. E. J. (2001). Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Physical Review E, 64, 016132.10.1103/PhysRevE.64.016132
Newman, M. E. J., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review E, 69(2), 026113.10.1103/PhysRevE.69.026113
Nieminen, J. (1974). On the centrality in a graph. Scandinavian Journal of Psychology, 15(1), 332–6.10.1111/j.1467-9450.1974.tb00598.x
Obama, B. H. (2014, May 28). Remarks by the president at the United States Military Academy commencement ceremony. Retrieved from the White House Web page: http://www.whitehouse.gov/the-press-office/2014/05/28/remarks-president-united-states-military-academy-commencement-ceremony.
Odersky, M., Altherr, P., Cremet, V., Emir, B., Manth, S., Micheloud, S., … Zenger, M. (2006). An overview of the Scala programming language (2nd Ed.). Technical report LAMP-REPORT-2006-001. Retrieved from: http:///www.scala-lang.org/docu/files/ScalaOverview.pdf.
Oliver, K., Crossley, N., Edwards, G., Koskinen, J., & Everett, M. (2014, June 25). “Covert networks: Structures, processes and types.” Mitchell Centre Working Paper. Retrieved from: http://www.socialsciences.manchester.ac.uk/medialibrary/research/mitchell/covertnetworks/wp/working_paper1.pdf.
One boy’s journey to jihad. (2010, January 3). Sunday Times (London).
Openshaw, S. (1983). The modifiable areal unit problem. Norwich, UK: Geo Books.
Opsahl, T., Agneessens, F., & Skvoretz, J. (2010). Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32, 245–51.10.1016/j.socnet.2010.03.006
Ostrom, E. (2005). Understanding institutional diversity. Princeton, NJ: Princeton University Press.
Padrón, B., Nogales, M., & Traveset, A. (2011). Alternative approaches of transforming bimodal into unimodal mutualistic networks: The usefulness of preserving weighted information. Basic and Applied Ecology, 12, 713–21.10.1016/j.baae.2011.09.004
Patton, T., & Willer, D. (1990). Connection and power in centralized exchange networks. Journal of Mathematical Sociology, 16, 3149.10.1080/0022250X.1990.9990077
Paulo, D., Fischl, B., Markow, T., Martin, M., & Shakarian, P. (2013). “Social network intelligence analysis to combat street gang violence.” Paper presented at the International Symposium on Foundations of Open Source Intelligence and Security Informatics. Niagara Falls, ON.
Pawitan, Y. (2001). In all likelihood: Statistical modelling and inference using likelihood. Oxford: Oxford University Press.10.1093/oso/9780198507659.001.0001
Pedahzur, A., & Perliger, A. (2006). The changing nature of suicide attacks: A social network perspective. Social Forces, 84, 19872008.10.1353/sof.2006.0104
Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. Social Forces, 84, 19872008.
Petersen, R., Rhodes, C., & Wiil, U. (2011). Node removal in criminal networks: Proceedings of the European Intelligence and Security Informatics Conference (EISIC). Athens, Greece.
Pfeffer, J., & Carley, K. M. (2012a). Social networks, social media, social change. In Schmorrow, D. D. & Nicholson, D. M. (Eds.), Advances in design for cross-cultural activities, Part II (pp. 273–82).Boca Raton, FL: CRC Press.
Pfeffer, J., (2012b). Rapid modeling and analyzing networks extracted from pre-structured news articles. Computational and Mathematical Organizational Theory, 18(3), 280–99.
Pfeffer, J., (2012c). k-Centralities: Local approximations of global measures based on shortest paths: Proceedings of the WWW Conference 2012, 1st International Workshop on Large Scale Network Analysis (LSNA 2012). Lyon, France.
Philby, P. (2013, June 10). The Tor system: Welcome to the dark Internet where you can search in secret. Independent. Retrieved from: http://www.independent.co.uk/news/media/online/the-tor-system-welcome-to-the-dark-internet-where-you-can-search-in-secret-8651364.html.
Phithakkitnukoon, S., Husna, H., & Dantu, R. (2008). Behavioral entropy of a cellular phone user. In Liu, H., Salerno, J., & Young, M. J. (Eds.), Social computing, behavioral modeling, and prediction (pp. 160–7). New York: Springer.
Ponieman, N. B., Salles, A., & Sarraute, C. (2013). Human mobility and predictability enriched by social phenomena information: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Niagara Falls, NY.10.1145/2492517.2500236
Powell, W. W. (1985). Hybrid organizational arrangements: New form or transitional development?California Management Review, 30, 6787.10.2307/41165267
Powell, W. W. (1990). Neither market nor hierarchy: Network forms of organization. In Staw, B. M. & Cummings, L. L. (Eds.), Research in organizational behavior: An annual series of analytical essays and critical reviews (pp. 295336). Greenwich, CT: JAI Press.
Pregibon, D. (1981). Logistic regression diagnostics. The Annals of Statistics, 9(4), 705–24.10.1214/aos/1176345513
Press, W. H. (2007). Numerical recipes: The art of scientific computing (3rd. ed.). New York: Cambridge University Press.
Raab, J., & Milward, H. B. (2003). Dark networks as problems. Journal of Public Administration Research and Theory, 13(4), 413–39.10.1093/jopart/mug029
Ragin, C. C. (2008). Redesigning social inquiry: Fuzzy sets and beyond. Chicago, IL: University of Chicago Press.10.7208/chicago/9780226702797.001.0001
Ratcliffe, J. H. (2006). A temporal constraint theory to explain opportunity-based spatial offending patterns. Journal of Research in Crime and Delinquency, 43(3), 261–91.10.1177/0022427806286566
Raymond, C. Z. (2010). Al Muhajiroun and Islam4UK: The group behind the ban. Retrieved from the International Centre for the Study of Radicalisation and Political Violence at King’s College Web site: http://icsr.info/2010/05/al-muhajiroun-and-islam4uk-the-group-behind-the-ban/.
Reed, B. (2007). A social network approach to understanding an insurgency. Parameters, 38, 1930. Retrieved from: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA486072.
Ressa, M. (2003). Seeds of terror: An eyewitness account of al-Qaeda’s newest center of operations in southeast Asia. New York: Free Press.
Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, 2(2). Retrieved from: http://www.hsaj.org/?article=2.2.8.
Rew, R., & Davis, G. (1990). NetCDF: An interface for scientific data access. Computer Graphics and Applications, IEEE, 10(4), 7682.10.1109/38.56302
Ripley, R. M., Snijders, T. A. B., & Preciado, P. (2012). Manual for SIENA, Retrieved from University of Oxford Web site: http://www.stats.ox.ac.uk/~snijders/siena/SIENA_Manual.pdf.
Roberts, N. (2011). Beyond smokestacks and silos: Open-source, web-enabled coordination in organizations and networks. Public Administration Review, 71(5), 677–93.10.1111/j.1540-6210.2011.02406.x
Roberts, N., & Everton, S. F. (2011). Strategies for combating dark networks. Journal of Social Structure, 12(2). Retrieved from: http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf.10.21307/joss-2019-030
Robins, G. (2009). Understanding individual behaviors within covert networks: The interplay of individual qualities, psychological predispositions, and network effects. Trends in Organized Crime, 12(2), 166–87.10.1007/s12117-008-9059-4
Rodriguez, J. A. (2005). “The March 11th terrorist network: In its weakness lies its strength.” EPP-LEA Working Papers, Department de Sociologica i Analisi de les Organitzacions: Universitat de Barcelona, Barcelona, Spain.
Ronfeldt, D., & Arquilla, J. (2001a). Networks, netwars, and the fight for the future. First Monday, 6(10). Retrieved from: http://www.firstmonday.dkJissues/issue6_10lindex.html.10.5210/fm.v6i10.889
Ronfeldt, D., (2001b). What next for networks and netwars? In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and netwars (pp. 311–61). Santa Monica, CA.
Sabidussi, G. (1966). The centrality index of a graph. Psychometrika, 31(4), 581603.10.1007/BF02289527
Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.10.9783/9780812206791
Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia: University of Pennsylvania Press.10.9783/9780812206784
Salganik, M. J., & Heckathorn, D. D. (2004). Sampling and estimation in hidden populations using respondent-driven sampling. Sociological Methodology, 34(1), 193240.10.1111/j.0081-1750.2004.00152.x
Sawyer, J., & Ackerman, G. (2012). “Promethean journeys: Examining the mechanisms by which terrorists acquire new technologies of lethality.” Paper presented at the Annual Meeting of the International Studies Association. San Diego, CA.
Schmitt, E., & Perlez, J. (2009, February 24). Strikes worsen Qaeda threat, Pakistan says. New York Times. Retrieved from: http://www.nytimes.com/2009/02/25/world/asia/25drones.html?pagewanted=all&_r=0.
Schroeder, J., Xu, J., & Chen, H. (2003). Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis. In Chen, H., Miranda, R., Zeng, D., Demchak, C., Schroeder, J., & Madhusudan, T. (Eds.), Intelligence and security informatics (pp. 168–80). Berlin, Germany: Springer.
Schwartz, D. M., & Rouselle, D. A. (2009). Using social network analysis to target criminal networks. Trends in Organised Crime, 12, 188207.10.1007/s12117-008-9046-9
Seber, G. A. F., & Lee, A. J. (2003). Linear regression analysis. Hoboken, NJ: Wiley Interscience.10.1002/9780471722199
Seidman, S. B. (1983). Network structure and minimum degree. Social Networks, 5(3), 267–87.10.1016/0378-8733(83)90028-X
Senate condemns crimes of Joseph Kony and Lord’s Resistance Army. News release of U.S. Senator Christopher Coons of Delaware. Retrieved from: http://www.coons.senate.gov/newsroom/releases/release/senate-condemns-crimes-of-joseph-kony-and-lords-resistance-army.
Shakarian, P., & Paulo, D. (2012). “Large social networks can be targeted for viral marketing with small seed sets.” Paper presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM-2012). Istanbul, Turkey.10.1109/ASONAM.2012.11
Shakarian, P., Salmento, J., Pulleyblank, W., & Bertetto, J. (2014). “Reducing gang violence through network influence based targeting of social programs.” Paper presented at the 20th ACM SIGKDD Conference on Knowledge, Discovery, and Data Mining (KDD). New York, NY.10.1145/2623330.2623331
Shakarian, P., Simari, G., & Schroeder, R. (2013). “MANCaLog: A logic for multi-attribute network cascades.” Paper presented at the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-13). St. Paul, MN.
Shalev, M. (2007). Limits and alternatives to multiple regression in comparative research. In Mjøset, L. & Clausen, T. H. (Eds.), Comparative social research (symposium on methodology in comparative research) (pp. 261308).Elsevier.
Sheppard, Z. (2010, September 19). 5,000,000,000. [Blog post]. Retrieved from http://blog.flickr.net/en/2010/09/19/5000000000/.
Silver, N. (2012). The signal and the noise: The art and science of prediction. New York: Penguin Books.
Simcox, R., Stuart, H., & Ahmed, H. (2010). Islamist terrorism: The British connections. Retrieved from the Henry Jackson Society Web page: http://henryjacksonsociety.org/2011/07/07/islamist-terrorism-the-british-connections/.
Simmel, G. (1906). The sociology of secrecy and of secret societies. American Journal of Sociology, 11, 441–98.10.1086/211418
Simmel, G. (1950). The secret society. In Wolf, K. H. (Ed.), The sociology of Georg Simmel (pp. 345–76). New York: The Free Press.
Simmel, G. (2008). Sociological theory, New York: McGraw–Hill.
Singer, P. W. (2012, November). The cyber terror bogeyman. Retrieved from the Brookings Institute Web page: http://www.brookings.edu/research/articles/2012/11/cyber-terror-singer.
Skillicorn, D. B. (2006). Social network analysis via matrix decompositions. In Popp, R. L. & Yen, J. (Eds.), Emergent information technologies and enabling policies for counter-terrorism (pp. 367–91). Hoboken, NJ: Wiley Interscience.
Skvoretz, J., & Willer, D. (1993). Exclusion and power: A test of four theories of power in exchange networks. American Sociological Review, 58, 801–18.10.2307/2095952
Snijders, T. A. B. (2001). The statistical evaluation of social network dynamics. Sociological Methodology, 31, 361–95.10.1111/0081-1750.00099
Snijders, T. A. B., Van de Bunt, G. G., & Steglich, C. E. G. (2010). Introduction to stochastic actor-based models for network dynamics. Social Networks, 32(1), 4460.10.1016/j.socnet.2009.02.004
Sparrow, M. K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251–74.10.1016/0378-8733(91)90008-H
Spearman, C. (1904). The proof and measurement of association between two things. American Journal of Psychology, 15, 72101.
Sprinzak, E. (2000). Rational fanatics. Foreign Policy, 122. Retrieved from: http://www.foreignpolicy.com/articles/2000/09/01/rational_fanatics.
Stefik, M., & Bobrow, D. G. (1985). Object-oriented programming: Themes and variations. AI Magazine, 6(4), 40.
Steglich, C., Snijders, T. A. B., & Pearson, M. (2010). Dynamic networks and behavior: Separating selection from influence. Sociological Methodology, 40(1), 329–93.10.1111/j.1467-9531.2010.01225.x
Stevenson, R., & Crossley, N. (2014). Change in covert social movement networks: The “inner circle” of the Provisional Irish Republic Army. Social Movement Studies, 13, 7091.10.1080/14742837.2013.832622
Strogatz, S. H. (2001). Exploring complex networks. Nature, 410, 268–76.10.1038/35065725
Suskind, R. (2006). The one percent doctrine: Deep inside America’s pursuit of its enemies since 9/11. New York: Simon & Schuster.
Thomas, T., Kiser, S., & Casebeer, W. (2005). Warlords rising: Confronting violent non-state actors. Lanham, MD: Lexington Books.10.5771/9780739162361
Thomas, T. L. (2003). Al-Qaida and the Internet: The danger of “cyberplanning.” DTIC, ADA485810.
Tibshirani, R. (1996). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society Series B, 58(1), 267–88.10.1111/j.2517-6161.1996.tb02080.x
Tikves, S., Banerjee, S., Temkit, H., Gokalp, S., Davulcu, H., Sen, A., Corman, S., Woodward, M., & Amin, A. (2011). A system for ranking organizations using social scale analysis. European Intelligence and Security Informatics Conference (EISIC), 308–13.
Tikves, S., Banerjee, S., Temkit, H., Gokalp, S., Davulcu, H., Sen, A., Corman, S., Woodward, M., Rohmaniyah, I., & Amin, A. (2013). A system for ranking organizations using social scale analysis. Social Network Analysis and Mining Journal, 3(3), 313–28.
Tikves, S., Gokalp, S., Temkit, M., Banerjee, S., Ye, J., & Davulcu, H. (2012). Perspective analysis for online debates. Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 898–905.10.1109/ASONAM.2012.161
Tilly, C. (2004a). Social movements, Boulder, CO: Paradigm Publishers.
Tilly, C. (2004b). Trust and rule. Theory and Society, 33, 130.10.1023/B:RYSO.0000021427.13188.26
Tilly, C. (2005). Trust and rule. Cambridge: Cambridge University Press.10.1017/CBO9780511618185
Tong, H., Sakurai, Y., Eliassi-Rad, T., & Faloutsos, C. (2008). Fast mining of complex time-stamped events: Proceedings of the 17th ACM Conference on Information and Knowledge Management. Napa Valley, CA.10.1145/1458082.1458184
Travers, J., & Milgram, S. (1969). An experimental study of the small world problem. Sociometry, 32(4), 425–43.10.2307/2786545
Tsvetovat, M., & Carley, K. M. (2003). “Bouncing back: Recovery mechanisms of covert networks.” Paper presented at the NAACSOS Conference proceedings, Pittsburgh, PA.
Tsvetovat, M., (2005). Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. Journal of Social Structure, 6. Retrieved from: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCarley/.
Typesafe. (2014). Akka. Retrieved from: http://akka.io/.
Ungerer, C. (2011). Jihadists in jail: Radicalisation and the Indonesian prison experience. Barton, Australia: Australian Strategic Policy Institute (ASPI).
United Nations Office on Drugs and Crime (UNODC). (2011). Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. (Research report). Retrieved from: http://www.unodc.org/documents/data-and-analysis/Studies/Illicit_financial_flows_2011_web.pdf.
Ugarte, E. F., & Turner, M.M. (2011). What is the “Abu Sayyaf”? How labels shape reality. Pacific Review, 24(4), 397420.10.1080/09512748.2011.596558
Usher, A. (2010). Temporal algorithms for processing and analyzing large datasets. Sterling Data LLC Report.
Valente, T. W. (2010). Social networks and health: Models, methods, and applications. New York: Oxford University Press.10.1093/acprof:oso/9780195301014.001.0001
Van de Bunt, G. G., Van Duijin, M. A. J., & Snijders, T. A. B. (1999). Friendship networks through time: An actor-oriented statistical network model. Computational and Mathematical Organization Theory, 5, 167–92.10.1023/A:1009683123448
Van de Geer, J. P. (1971). Introduction to multivariate analysis for the social sciences. San Francisco, CA: W. H. Freeman and Co.
Van Holt, T., Johnson, J. C., Brinkley, J., Carley, K. M., & Caspersen, J. (2012). Structure of ethnic violence in Sudan: An automated content, meta-network, and geospatial analytical approach. Computational and Mathematical Organizational Theory, 18, 340–55.
Van Meter, K. M. (2001). Terrorists/liberators: Researching and dealing with adversary social networks. Connections, 24(3), 6678.
Walker, H. A., Thye, S. R., Simpson, B., Lovaglia, M. J., Willer, D., & Markovsky, B. (2000). Network exchange theory: Recent developments and new directions. Social Psychology Quarterly, 63(4), 324–37.10.2307/2695843
Wallace, A. (1956). Revitalization movements. American Anthropologist, 58, 264–81.10.1525/aa.1956.58.2.02a00040
Waltz, K. (1959). Man, the state, and war: A theoretical analysis. New York: Columbia University Press.
Wang, D. J., Shi, X., McFarland, D. A., & Leskovec, J. (2012). Measurement error in network data: a re-classification. Social Networks, 34(4), 396409.10.1016/j.socnet.2012.01.003
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. Cambridge: Cambridge University Press.10.1017/CBO9780511815478
Watts, D. (2004). Six degrees: The science of a connected age. New York: WW Norton.
Watts, D. J., & Strogatz, S. H. (1998). Collective dynamics of “small-world” networks. Nature, 393, 440–2.10.1038/30918
Weiss, G. M. (2005). Data mining in telecommunications. In Maimon, O. & Rokach, L. (Eds.), Data mining and knowledge discovery handbook: A complete guide for practitioners and researchers (pp. 11891201). Norwell, MA: Kluwer Academic Publishers.10.1007/0-387-25465-X_56
West, B. J., & Grigolini, P. (2011). Complex webs: Anticipating the improbable. Cambridge: Cambridge University Press.
Wiemann, G. (2004). Www.terror.net: How modern terrorism uses the Internet. Retrieved from the United States Institute of Peace Web site: http://www.usip.org/sites/default/files/sr116.pdf.
Wigner, E. P. (1960). The unreasonable effectiveness of mathematics in the natural sciences. Richard Courant lecture in mathematical sciences delivered at New York University, May 11, 1959. Communications on Pure and Applied Mathematics, 13(1), 114.10.1002/cpa.3160130102
Wiktorowicz, Q. (2005). Radical Islam rising: Muslim extremism in the west. Lanham, MD: Rowman & Littlefield.10.5771/9781461641711
Willer, D., Van Assen, M., & Emanuelson, P. (2012). Analyzing large scale exchange networks. Social Networks, 34(2), 171–80.10.1016/j.socnet.2011.11.001
Williams, C. (2003). The question of “links” between al Qaeda and southeast Asia. in Ramakrishna, K. and Tan, S. S. (Eds.), After Bali: The threat of terrorism in southeast Asia (pp. 8396).Singapore: World Scientific and the Institute of Defense and Strategic Studies.10.1142/9789812561749_0004
Williams, P. (2001). Transnational criminal networks. In Arquilla, J. (Ed.), Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.
Xu, J., & Chen, H. (2003). Untangling criminal networks: A case study. Intelligence and Security Informatics, Lecture Notes in Computer Science, 2665, 232–48.
Xu, J., & Chen, H. (2008, October). The topology of dark networks. Communications of the ACM, 51(10), 5865.10.1145/1400181.1400198
Xu, J., Hu, D., & Chen, H. (2009). The dynamics of terrorist networks: Understanding the survival mechanisms of global Salafi jihad. Journal of Homeland Security and Emergency Management, 6(1).10.2202/1547-7355.1477
Xu, J., Marshall, B., Kaza, S., & Chen, H. (2004). Analyzing and visualizing criminal network dynamics: A case study. Intelligence and Security Informatics, Lecture Notes in Computer Science, 3073, 359–77.
Yamagishi, T., & Cook, K. S. (1990). Power relations in exchange networks: A comment on “network exchange theory.”American Sociological Review, 55, 297300.10.2307/2095634
Yasin, N. A. (2010, December 17). Counter ideology: Battle for hearts and minds in Indonesia. RSIS Commentaries, 173. Retrieved from: http://www.rsis.edu.sg/rsis-publication/rsis/1463-counter-ideology-battle-for-h/#.VCCOtmNtrKl.
Zhang, H., Korayem, M., You, E., & Crandall, D. J. (2012). Beyond co-occurrence: Discovering and visualizing tag relationships from geo-spatial and temporal similarities: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining. Seattle, WA.
Ziliak, S. T., & McCloskey, D. N. (2008). The cult of statistical significance. Ann Arbor: University of Michigan Press.

Metrics

Altmetric attention score

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Book summary page views

Total views: 0 *
Loading metrics...

* Views captured on Cambridge Core between #date#. This data will be updated every 24 hours.

Usage data cannot currently be displayed.