Skip to main content Accessibility help
×
Hostname: page-component-5b777bbd6c-5mwv9 Total loading time: 0 Render date: 2025-06-19T06:12:27.516Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  05 August 2015

Luke M. Gerdes
Affiliation:
United States Military Academy
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Illuminating Dark Networks
The Study of Clandestine Groups and Organizations
, pp. 227 - 249
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Book purchase

Temporarily unavailable

References

Ackerman, G. A., & Pinson, L. (2011). Speaking truth to sources: Introducing a method for the quantitative evaluation of open-sources in event data. National Consortium for the Study of Terrorism and Responses to Terrorism (START) Working Paper. College Park, MD.Google Scholar
Alberts, D., & Hayes, R. (2005). Power to the edge: Command and control in the information age. Boca Raton, FL: CRC Press.Google Scholar
AlSumait, L., Barbara, D., & Domeniconi, C. (2008). On-line LDA: Adaptive topic models for mining text streams with applications to topic detection and tracking. IEEE International Conference on Data Mining (ICDM), 3–12.10.1109/ICDM.2008.140CrossRefGoogle Scholar
Andrich, D. (1988). Rasch models for measurement. Newbury Park, CA: Sage.CrossRefGoogle Scholar
Arquilla, J. (2008). Worst enemy: The reluctant transformation of the American military. Chicago, IL: Ivan R. Dee.Google Scholar
Arquilla, J. (2009). Aspects of netwar & the conflict with al Qaeda. Monterey, CA: Information Operations Center, Naval Postgraduate School.Google Scholar
Arquilla, J., & Ronfeldt, D. (2001). The advent of netwar (revised). In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 1–25). Santa Monica, CA: RAND.Google Scholar
Arreguin-Toft, A. (2001). How the weak win wars: A theory of asymmetric conflict. International Relations, 26(1), 93128.Google Scholar
ARTIS Research. (2009, June). REL codebook – public. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/files/Relations_Codebook_Public_Version2.pdf.Google Scholar
Asal, V. H., & Rethemeyer, R. K. (2006). Researching terrorist networks. Journal of Security Education, 1, 6574.10.1300/J460v01n04_06CrossRefGoogle Scholar
Asal, V. H., (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. Journal of Politics, 70(2), 437–49.10.1017/S0022381608080419CrossRefGoogle Scholar
Asal, V. H., (2009). Islamist use and pursuit of CBRN terrorism. In Ackerman, G. & Tamsett, J. (Eds.), Jihadists and weapons of mass destruction (pp. 335–58). Boca Raton, FL: CRC Press.Google Scholar
Axelrod, R., & Cohen, M. D. (2000). Harnessing complexity: Organizational implications of a scientific frontier. New York: Basic Books.Google Scholar
Baker, W. E., & Faulkner, R. R. (1993). The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review, 58(6), 837–60.CrossRefGoogle Scholar
Bakker, R. M., Raab, J., & Milward, H. B. (2011). A preliminary theory of dark network resilience. Journal of Policy Analysis and Management, 31, 3362.10.1002/pam.20619CrossRefGoogle Scholar
Barabási, A.-L. (2002). Linked: How everything is connected to everything else and what it means for business, science, and everyday life. New York: Basic Books.Google Scholar
Barabási, A.-L. (2009). Scale-free networks: A decade and beyond. Science, 325(5939), 412–13.CrossRefGoogle ScholarPubMed
Barabási, A.-L., Albert, R., & Jeong, H. (1999). Mean-field theory for scale-free random networks. Physica A, 272, 173–87.10.1016/S0378-4371(99)00291-5CrossRefGoogle Scholar
Barabási, A.-L., & Bonabeau, E. (2003). Scale-free networks. Scientific American, 288, 60–9.10.1038/scientificamerican0503-60CrossRefGoogle ScholarPubMed
Barthelemy, M., & Amaral, L. A. N. (1999). Small-world networks: Evidence for a crossover picture. Physical Review Letters, 82, 3180–3.CrossRefGoogle Scholar
Bavelas, A. (1948). A mathematical model for group structures. Human Organization, 7(3), 1630.CrossRefGoogle Scholar
Bavelas, A. (1950). Communication patterns in task oriented groups. The Journal of the Acoustical Society of America, 22(6), 725–30.CrossRefGoogle Scholar
Bavelas, A., & Barret, D. (1951). An experimental approach to organizational communication. Personnel, 27, 366–71.Google Scholar
Baxter, G. J., Dorogovtsev, S. N., Goltsev, A. V., & Mendes, J. F. (2011). Heterogeneous k-core versus bootstrap percolation on complex networks.Physical Review E, 83, 051134.CrossRefGoogle ScholarPubMed
Bayat, A. (2007). Making Islam democratic: Social movements and the post-Islamist turn. Stanford, CA: Stanford University Press.10.1515/9781503626485CrossRefGoogle Scholar
Bayir, M. A., Demirbas, M., & Eagle, N. (2009). “Discovering spatiotemporal mobility profiles of cellphone users.” Paper presented at the World of Wireless, Mobile, and Multimedia Networks & Workshops.10.1109/WOWMOM.2009.5282489CrossRefGoogle Scholar
Beauchamp, M. A. (1965). An improved index of centrality. Behavioral Science, 10(2), 161–3.10.1002/bs.3830100205CrossRefGoogle ScholarPubMed
Beckmann, N., Kriegel, H.-P., Schneider, R., & Seeger, B. (1990). The R*-tree: An efficient and robust access method for points and rectangles. ACM SIGMOD Record, 19(2), 322–31.CrossRefGoogle Scholar
Bell, J. R. (2014). Subgroup centrality measures. Network Science, 2(2), 277–97.CrossRefGoogle Scholar
Belsley, D. A., Kuh, E., & Welsch, R. E. [1980] (2004). Regression diagnostics: Identifying influential data and sources of collinearity. Hoboken, NJ: Wiley.Google Scholar
Bentley, J. L. (1975). Multidimensional binary search trees used for associative searching. Communications of the ACM, 18(9), 509–17.CrossRefGoogle Scholar
Berman, E. (2009). Radical, religious, and violent: The new economics of terrorism. Cambridge, MA: MIT Press.10.7551/mitpress/7881.001.0001CrossRefGoogle Scholar
Bernard, H. R., Killworth, D., Kronenfeld, D., & Sailer, L. (1984). On the validity of retrospective data: The problem of informant accuracy. Annual Review of Anthropology, 13, 495517.10.1146/annurev.an.13.100184.002431CrossRefGoogle Scholar
Bertetto, J. (2012, November 15). Countering criminal street gangs: Lessons from the counterinsurgent battlespace. Small Wars Journal. Retrieved from: http://smallwarsjournal.com/jrnl/art/countering-criminal-street-gangs-lessons-from-the-counterinsurgent-battlespace.Google Scholar
Bienenstock, E. J., & Bonacich, P. (1992). The core as a solution to exclusionary networks. Social Networks, 14, 231–43.CrossRefGoogle Scholar
Bienenstock, E. J., (1993). Game theory models for exchange networks: Experimental results. Sociological Perspectives, 36(2), 117–35.10.2307/1389425CrossRefGoogle Scholar
Blau, P. M. (1964). Exchange and power in social life. New Brunswick, NJ: Transaction.Google Scholar
Blau, P. M. (1994). Structural contexts of opportunities. Chicago, IL: University of Chicago Press.Google Scholar
Blondel, V. D., Guillaume, J.-L., Lambiotte, R., & Lefebvre, E. (2008). Fast unfolding of communities in large networks. Journal of Statistical Mechanics, 10, 10008.10.1088/1742-5468/2008/10/P10008CrossRefGoogle Scholar
Bollobas, B. (1985). Random graphs. London: London Mathematical Society Monographs, Academic Press.Google Scholar
Bollobas, B., & Riordan, O. (2004). Robustness and vulnerability of scale-free random graphs. Internet Mathematics, 1(1), 135.10.1080/15427951.2004.10129080CrossRefGoogle Scholar
Bolz, F., Dudonis, K., & Schulz, D. (2002). Counterterrorism handbook: Tactics, procedures, and techniques. Boca Raton, FL: CRC Press.Google Scholar
Bonacich, P. (1972). Factoring and weighting approaches to status scores and clique identification. Journal of Mathematical Sociology, 2(1), 113–20.10.1080/0022250X.1972.9989806CrossRefGoogle Scholar
Bonacich, P. (1979). A single measure for point and interval predictions of coalition theories. Behavioral Science, 23, 8593.10.1002/bs.3830240203CrossRefGoogle Scholar
Bonacich, P. (1987). Power and centrality a family of measures. American Journal of Sociology, 92, 1170–82.10.1086/228631CrossRefGoogle Scholar
Bonacich, P. (1991). Simultaneous group and individual centralities. Social Networks, 13(2), 155–68.CrossRefGoogle Scholar
Bonacich, P., & Bienenstock, E. J. (1997). Latent classes in exchange networks: Sets of positions with common interest. Journal of Mathematical Sociology, 22(1), 128.10.1080/0022250X.1997.9990192CrossRefGoogle Scholar
Borgatti, S. P. (2006). Identifying sets of key players in a social network. Computational and Mathematical and Organizational Theory, 12, 2134.10.1007/s10588-006-7084-xCrossRefGoogle Scholar
Borgatti, S. P. (2009). 2-Mode concepts in social network analysis. In Meyers, R. A. (Ed.), Encyclopedia of Complexity and Social Science (pp. 8279–91). New York: Springer.Google Scholar
Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). On the robustness of centrality measures under conditions of imperfect data. Social Networks, 28(2), 124–36.10.1016/j.socnet.2005.05.001CrossRefGoogle Scholar
Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). UCINET 6 for Windows. Columbia, SC: Analytic Technologies.Google Scholar
Bott, E. (1955). Urban families: Conjugal roles and social networks. Human Relations, 8, 345–84.10.1177/001872675500800401CrossRefGoogle Scholar
Bowden, M. (2012, October 12). The death of Osama bin Laden: How the US finally got its man. The Guardian. Retrieved from: http://www.theguardian.com/world/2012/oct/12/death-osama-bin-laden-us.Google Scholar
Brafman, O., & Beckstrom, R. A. (2006). The starfish and the spider: The unstoppable power of leaderless organizations. New York: Portfolio.Google Scholar
Brandes, U., Robins, G., McCranie, A., & Wasserman, S. (2013). What is network science?Network Science, 1(1), 115.10.1017/nws.2013.2CrossRefGoogle Scholar
Breiger, R. L., Ackerman, G. A., Asal, V. H., Melamed, D., Milward, H. B., Rethemeyer, R. K., & Schoon, E. (2011). Application of a profile similarity methodology for identifying terrorist groups that use or pursue CBRN weapons. In Salerno, J., Yang, S. J., Nau, D., & Chai, S. (Eds.), Social computing, behavioral-cultural modeling and prediction (pp. 2633). Berlin, Germany: Springer.10.1007/978-3-642-19656-0_5CrossRefGoogle Scholar
Breiger, R. L., Carley, K. M., & Pattinson, P. (Eds.) (2003). Dynamic social network modeling and analysis: Workshop summary and papers. Washington, DC: National Academic Press.Google Scholar
Breiger, R. L., & Melamed, D. (2014). The duality of organizations and their attributes: Turning regression modeling “inside out.”Research in the Sociology of Organizations, 40, 263–75.10.1108/S0733-558X(2014)0000040013CrossRefGoogle Scholar
Breiger, R. L., Schoon, E., Melamed, D., Asal, V. H., & Rethemeyer, R. K. (2014). Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade. Social Networks, 36, 2339.10.1016/j.socnet.2013.04.002CrossRefGoogle Scholar
Bright, D. A., & Delaney, J. J. (2013). Evolution of a drug trafficking network: Mapping changes in network structure and function across time. Global Crime, 14(2–3), 238–60.10.1080/17440572.2013.787927CrossRefGoogle Scholar
Bright, D. A., Greenhill, C., & Levenkova, N. (2010). “Attack of the nodes: Scale-free criminal networks and vulnerability to targeted law enforcement interventions.” Paper presented at the 2nd Illicit Networks Workshop, Wollongong, Australia.Google Scholar
Bright, D. A., Greenhill, C., (2014). Dismantling criminal networks: Can node attributes play a role? In Morselli, C. (Ed.), Crime and networks. New York: Routledge.Google Scholar
Bright, D. A., Hughes, C. E., & Chalmers, J. (2012). Illuminating dark networks: A social network analysis of an Australian drug trafficking syndicate. Crime, Law, and Social Change, 57(2), 151–76.10.1007/s10611-011-9336-zCrossRefGoogle Scholar
Burns, J., & Cowell, A. (2013, May 23). Britain knew of 2 suspects in the killing of a soldier. New York Times.Google Scholar
Burt, R. S. (1982). Toward a structural theory of action. Waltham, MA: Academic Press.10.1016/B978-0-12-147150-7.50014-4CrossRefGoogle Scholar
Bush, G. W. (2008, January 28). President Bush delivers State of the Union Address. Retrieved from the White House Web page: http://georgewbush-whitehouse.archives.gov/news/releases/2008/01/20080128-13.html.Google Scholar
Callahan, D., Shakarian, P., Nielsen, J., & Johnson, A. (2012). “Shaping Operations to Attack Robust Terror Networks.” Paper presented at the International Conference on Social Informatics. Washington, DC.10.1109/SocialInformatics.2012.22CrossRefGoogle Scholar
Cameron, D. (2014, August 29). Threat level from international terrorism raised: PM press statement. Retrieved from Government of the United Kingdom Web page: https://www.gov.uk/government/speeches/threat-level-from-international-terrorism-raised-pm-press-conference.Google Scholar
Carley, K. M. (1990). Group stability: A socio-cognitive approach. In Lawler, E., Markovsky, B., Ridgeway, C., & Walker, H. (Eds.), Advances in group processes: Theory and research, Vol. VII (pp. 144). Greenwich, CT: JAI Press.Google Scholar
Carley, K. M. (2002). Smart agents and organizations of the future. In Lievrouw, L. & Livingston, S. (Eds.), The handbook of new media (pp. 206–20).Thousand Oaks, CA: Sage.Google Scholar
Carley, K. M. (2003). Dynamic network analysis. In Breiger, R., Carley, K. M., & Pattinson, P. (Eds.), Dynamic social network modeling and analysis: Workshop summary and papers (pp. 133–45). Washington, DC: National Academic Press.Google Scholar
Carley, K. M. (2004). ORA: Organization risk analyzer. Retrieved from the Carnegie Mellon University Web page: http://www.casos.cs.cmu.edu/publications/papers/carley_2004_oraorganizationrisk.pdf.Google Scholar
Carley, K. M. (2006a). A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action: Visualizing Network Information Meeting Proceedings, RTO-MP-IST-063. Neuilly-sur-Seine, France.Google Scholar
Carley, K. M. (2006b). Destabilization of covert networks. Computational and Mathematical Organization Theory, 12, 5166.10.1007/s10588-006-7083-yCrossRefGoogle Scholar
Carley, K. M. (2007). Casos dataset. Retrieved from the Center for Computational Analysis of Social and Organizational Systems Web page: http://www.casos.cs.cmu.edu/tools/data2.php.Google Scholar
Carley, K. M. (2014). ORA: A toolkit for dynamic network analysis and visualization. In Alhajj, R. & Rokne, J. (Eds.), Encyclopedia of social network analysis and mining, Springer.Google Scholar
Carley, K. M., & Pfeffer, J. (2012). Dynamic network analysis (DNA) and ORA. In Schmorrow, D. D. & Nicholson, D. M. (Eds.), Advances in design for cross-cultural activities, Part I (pp. 265–74). Boca Raton, FL: CRC Press.Google Scholar
Carley, K. M., Bigrigg, M. W., & Diallo, B. (2012). Data-to-model: A mixed initiative approach for rapid ethnographic assessment. Computational and Mathematical Organization Theory, 18(3), 300–27.10.1007/s10588-012-9125-yCrossRefGoogle Scholar
Carley, K. M., Columbus, D., Bigrigg, M. W., & Kunkel, F. (2011). AutoMap user’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, CMU-ISR-11e108.Google Scholar
Carley, K. M., Columbus, D., & Landwehr, P. (2013). AutoMap user’s guide 2013. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, CMU-ISR-13–105.10.21236/ADA586976CrossRefGoogle Scholar
Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks: Proceedings of the 8th International Command and Control Research and Technology Symposium. Vienna, VA.Google Scholar
Carley, K. M., Lee, J.-S., &. Krackhardt, D. (2001). Destabilizing networks. Connections, 24(3), 7992.Google Scholar
Carley, K. M., Martin, M. K., & Hirshman, B. (2009). The etiology of social change. Topics in Cognitive Science, 1(4), 621–50.10.1111/j.1756-8765.2009.01037.xCrossRefGoogle ScholarPubMed
Carley, K. M., Pfeffer, J., Liu, H., Morstatter, F., & Goolsby, R. (2013, August). Near real time assessment of social media using geo-temporal network analytics: Proceedings of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.10.1145/2492517.2492561CrossRefGoogle Scholar
Carley, K. M., Reminga, J., & Kamneva, N. (1998). Destabilizing terrorist networks. Institute for Software Research, 45.Google Scholar
Carley, K. M., Reminga, J., (2003). Destabilizing terrorist networks: Proceedings of the 8th International Command and Control Research and Technology Symposium. Evidence Based Research, Track 3. Washington, DC. Retrieved from: http://www.dodccrp.org/events/2003/8th_ICCRTS/pdf/021.pdf.Google Scholar
Carley, K. M., Reminga, J., Storrick, J., & Columbus, D. (2013). ORA user’s guide 2013. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Pittsburgh, PA, Technical Report CMUISR- 13–108.10.21236/ADA587056CrossRefGoogle Scholar
Carmi, S., Havlin, S., Kirkpatrick, S., Shavitt, Y., & Shir, E. (2007). A model of Internet topology using k-shell decomposition. PNAS, 104(27), 11150–4.10.1073/pnas.0701175104CrossRefGoogle Scholar
Centola, D. (2010). The spread of behavior in an online social network experiment. Science, 329(5996), 1194–7.10.1126/science.1185231CrossRefGoogle Scholar
Chao, L. (2013, February 4). Brazil: The social media capital of the universe. Wall Street Journal. Retrieved from: http://online.wsj.com/news/articles/SB10001424127887323301104578257950857891898.Google Scholar
Cho, E., Myers, S. A., & Leskovec, J. (2011). Friendship and mobility: user movement in location-based social networks: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY.Google Scholar
Clarke, R. A., Aga, G. P., Cressey, R. W., Flynn, S. E., Mobley, B. W., Rosenback, E., Simon, S., Wechsler, W. F., & Wolosky, L. S. (2004). Defeating the jihadists: A blueprint for action. New York: Century Foundation Press.Google Scholar
Clauset, A., Newman, M. E., & Moore, C. (2004). Finding community structure in very large networks. Physical Review E, 70(6), 066111.10.1103/PhysRevE.70.066111CrossRefGoogle ScholarPubMed
Clinton, H. R., & Espinosa, P. (2010, March 29). Joint statement of the Merida Initiative High-Level Consultative Group on Bilateral Cooperation Against Transnational Organized Crime. Retrieved from the U.S. Department of State Web page: http://www.state.gov/secretary/20092013clinton/rm/2010/03/139196.htm.Google Scholar
Coleman, J. S. (1990). Foundations of social theory. Cambridge, MA: Harvard University Press.Google Scholar
Coll, S. (2004). Ghost wars: The secret history of the CIA, Afghanistan, and bin Laden, from the Soviet invasion to September 10, 2001. New York: Penguin.Google Scholar
Conboy, K. (2006). The second front. Jakarta, Indonesia: Equinox Press.Google Scholar
Cook, K. S., & Cheshire, C. (2013). Social exchange, power, and inequality in networks. In Wittek, R., Snijders, T., & Nee, V. (Eds.), The handbook of rational choice social research (p. 185). Stanford, CA: Stanford University Press.Google Scholar
Cook, K. S., Emerson, R. M., Gilmore, M. R., & Yamagishi, T. (1983). The distribution of power in exchange networks: Theory and experimental results. American Journal of Sociology, 89, 275305.10.1086/227866CrossRefGoogle Scholar
Coronges, K. A., Miller, K. M., Tamyo, C. I., & Ender, M. G. (2013). A network evaluation of attitudes toward gays and lesbians among U.S. military cadets. Journal of Homosexuality, 60(11), 1557–80.10.1080/00918369.2013.824322CrossRefGoogle ScholarPubMed
Costenbender, E., & Valente, T. W. (2003). The stability of centrality measures when networks are sampled. Social Networks, 25, 283307.10.1016/S0378-8733(03)00012-1CrossRefGoogle Scholar
CRAN. (2014). Comprehensive R archive network. Retrieved from: http://cran.us.r-project.org/.Google Scholar
Crelinsten, R. (2002). Analysing terrorism and counter-terrorism: A communication model. Terrorism and Political Violence, 14(2), 77122.10.1080/714005618CrossRefGoogle Scholar
Csardi, G., & Nepusz, T. (2006). The igraph software package for complex network research. InterJournal, Complex Systems, 1695. Retrieved from: http://igraph.org.Google Scholar
Dahl, O.-J., & Nygaard, K. (1966). SIMULA: An ALGOL-based simulation language. Communications of the ACM, 9(9), 671–8.10.1145/365813.365819CrossRefGoogle Scholar
Davulcu, H., Ahmed, S., Gokalp, S., Temkit, H., Taylor, T., Woodward, M., & Amin, A. (2010). Analyzing sentiment markers describing radical and counter-radical elements in online news. IEEE Symposium on Social Intelligence and Networking (SIN), 335–40.Google Scholar
de Nooy, W., Mrvar, A., & Batagelj, V. (2011). Exploratory social network analysis with Pajek (revised and expanded edition). Cambridge: Cambridge University Press.10.1017/CBO9780511996368CrossRefGoogle Scholar
Dekker, D., Krackhardt, D., & Snijders, T. A. B. (2007). Sensitivity of MRQAP tests to collinearity and autocorrelation conditions. Psychmetrika, 72(4), 563–81.10.1007/s11336-007-9016-1CrossRefGoogle ScholarPubMed
Department of the Army. (2006, December). Field Manual 3–24 MCWP 3–33.5: Counterinsurgency. Retrieved from the University of Louisville ROTC Web site: http://louisville.edu/armyrotc/files/FM%203–24%20Counterinsurgency.pdf/view.Google Scholar
Diesner, J. (2012). “Uncovering and managing the impact of methodological choices for the computational construction of socio-technical networks from texts” (Doctoral dissertation). Available from ProQuest Dissertations and Theses database (AAI3536166).Google Scholar
Diesner, J., & Carley, K. M. (2005, April). Exploration of communication networks from the Enron email corpus: Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA.Google Scholar
Diesner, J., (2005). “Revealing and comparing the organizational structure of covert networks with network text analysis.” Paper presented at XXV International Sunbelt Social Network Conference Program, Redondo Beach, CA.Google Scholar
Diesner, J., (2012, June). Impact of relation extraction methods from text data on network data and analysis results: Proceedings ofthe ACM Web Science Conference (WebSci 2012). Evanston, IL.Google Scholar
Diesner, J., Frantz, T. L., & Carley, K. M. (2005). Communication networks from the Enron email corpus: It’s always about the people. Enron is no different. Computational and Mathematical Organizational Theory, 11(3), 201–28.Google Scholar
Diesner, J., Tambayong, L., & Carley, K. M. (2012). Extracting socio-cultural networks of the Sudan from open-source, large-scale text data. Computational and Mathematical Organizational Theory, 18(3), 328–39.Google Scholar
Dijkstra, E. W. (1959). A note on two problems in connexion with graphs. Numerische Mathematik, 1, 269–71.10.1007/BF01386390CrossRefGoogle Scholar
Dishman, C. (2005). The leaderless nexus: When crime and terror converge. Studies in Conflict & Terrorism, 28, 237–52.10.1080/10576100590928124CrossRefGoogle Scholar
Doreian, P., & Stockman, F. N. (1997). Evolution of social networks. Amsterdam: Gordon and Breach Publishers.Google Scholar
Durkheim, E. (2004). The cultural logic of collective representations. In Lemert, C. (Ed.), Social theory: The multicultural and classic readings (pp. 90–9). Philadelphia, PA: Westview Press.Google Scholar
Eagle, N. (2011). Mobile phones as sensors for social research. Emergent Technologies in Social Research, 492521.Google Scholar
Eagle, N., & Pentland, A. S. (2006). Reality mining: Sensing complex social systems. Personal and Ubiquitous Computing, 10(4), 255–68.10.1007/s00779-005-0046-3CrossRefGoogle Scholar
Eagle, N., Pentland, A. S., & Lazer, D. (2009). Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106, 15274–8.10.1073/pnas.0900282106CrossRefGoogle ScholarPubMed
Efron, B., & Tibshirani, R. (1993). An introduction to the bootstrap. Chapman and Hall.CrossRefGoogle Scholar
Eilstrup-Sangiovanni, M., & Jones, C. (2008). Assessing the dangers of illicit networks. International Security, 33(2), 37.CrossRefGoogle Scholar
Emerson, R. M. (1962). Power-dependence relations. American Sociological Review, 27, 3141.10.2307/2089716CrossRefGoogle Scholar
Emerson, R. M. (1981). Social exchange theory. In Rosenberg, M. & Turner, R. H. (Eds.), Social psychology: Sociological perspectives (pp. 3065). New York: Basic Books.Google Scholar
EPFL. (2014). The Scala programming language. Retrieved from: http://www.scala-lang.org/.Google Scholar
Epstein, J. (2006). Generative social science: Studies in agent-based computational modeling. Princeton, NJ: Princeton University Press.Google Scholar
Erickson, B. H. (1981). Secret societies and social structure. Social Forces, 60, 188210.10.2307/2577940CrossRefGoogle Scholar
Everett, M. G., & Borgatti, S. P. (2012). Categorical attribute based centrality: E-I and G-F centrality. Social Networks, 34(4), 562–9.10.1016/j.socnet.2012.06.002CrossRefGoogle Scholar
Everton, S. F. (2012a). Network topography, key players and terrorist networks. Connections, 32(1), 1219. Retrieved from: http://www.insna.org/PDF/Connections/v32/Connections_Everton_AP.pdf.Google Scholar
Everton, S. F. (2012b). Disrupting dark networks. Cambridge: Cambridge University Press.10.1017/CBO9781139136877CrossRefGoogle Scholar
Everton, S. F., & Cunningham, D. (2012). Detecting significant changes in dark networks. Behavioral Sciences of Terrorism and Political Aggression, 5(2).Google Scholar
Everton, S. F., (2013). Terrorist network adaptation to a changing environment. In Morselli, C. (Ed.), Crime and networks (pp. 287308). London: Routledge.Google Scholar
Faust, K. (1997). Centrality in affiliation networks. Social Networks, 19, 157–91.10.1016/S0378-8733(96)00300-0CrossRefGoogle Scholar
Finkel, R. A., & Bentley, J. L. (1974). Quad trees a data structure for retrieval on composite keys. Actainformatica, 4(1), 19.Google Scholar
Finn, P., & Tate, J. (2009, June 16). CIA says it misjudged role of high-value detainee Abu Zubaida, transcript shows. Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2009/06/15/AR2009061503045.html.Google Scholar
Flintoff, C. (2010, April 5). Marines tap social sciences in Afghan war effort. NPR. Retrieved from http://www.npr.org/templates/story/story.php?storyId=125502485.Google Scholar
Flynn, M., Pottinger, M., & Batchelor, P. (2010). Fixing intel: A blueprint for making intelligence relevant in Afghanistan. Washington, DC: Center for a New American Security.Google Scholar
Freeman, L. C. (1977). A set of measures of centrality based on betweenness. Sociometry, 40(1), 3541.10.2307/3033543CrossRefGoogle Scholar
Freeman, L. C. (1979). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–39.Google Scholar
Freeman, L. C. (2004). The development of social network analysis: A study in the sociology of science. Vancouver, BC: Empirical Press.Google Scholar
Galula, D. (1964). Counterinsurgency warfare: Theory and practice. Westport, CT: Praeger.Google Scholar
Galula, D. [1964] (2006). Counterinsurgency warfare: Theory and practice. Westport, CT: Praeger Security International.10.5040/9798216963066CrossRefGoogle Scholar
Gambetta, D. (2009). Codes of the underworld: How criminals communicate. Princeton, NJ: Princeton University Press.10.1515/9781400833610CrossRefGoogle Scholar
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of reusable object-oriented software. Upper Saddle River, NJ: Pearson Education.Google Scholar
Gartenstein-Ross, D. (2011, October 19). Terrorism and the coming decade. Retrieved from the Global Brief Web page: http://globalbrief.ca/blog/2011/10/19/terrorism-and-the-coming-decade-of-fragility/.Google Scholar
Gerdes, L. M. (2012). “On the edge of Al-Qaida? Assessing Al-Qaida’s changing role in terrorist plots and attacks” (Doctoral Dissertation). Available from the University of Pittsburgh.Google Scholar
Gerdes, L. M. (2014). MAPPing dark networks: A data transformation strategy to study clandestine organizations. Network Science, 2(2), 213–53.10.1017/nws.2014.8CrossRefGoogle Scholar
Gerdes, L. M., & Carley, K. M. (2009). “Estimating the accuracy of media sources on terrorism.” Paper presented to the 29th International Sunbelt Social Network Conference of the International Network for Social Network Analysis, San Diego, CA.Google Scholar
Gerdes, L. M., Ringler, K., & Autin, B. (2014). Assessing the Abu Sayyaf Group’s strategic and learning capacities. Studies in Conflict and Terrorism, 37(3), 267–93.10.1080/1057610X.2014.872021CrossRefGoogle Scholar
Giles, J. (2012). Computational social science: Making the links from e-mails to social networks. Nature, 488, 448–50.10.1038/488448aCrossRefGoogle Scholar
Githens-Mazer, J. (2010). Understanding violent radicalisation. International Affairs, 86(4), 998–9.Google Scholar
Githens-Mazer, J. (2012). The rhetoric and reality: Radicalization and political discourse. International Political Science Review, 33(5), 556–67.10.1177/0192512112454416CrossRefGoogle Scholar
Goertz, G. (2006). Social science concepts: A user’s guide, Princeton, NJ: Princeton University Press.10.1515/9781400842995CrossRefGoogle Scholar
Goertz, G., & Mahoney, J. (2005). Two-level theories and fuzzy-set analysis. Sociological Methods Research, 33, 497538.10.1177/0049124104266128CrossRefGoogle Scholar
Goertz, G., (2012). A tale of two cultures: Qualitative and quantitative research in the social sciences. Princeton, NJ: Princeton University Press.10.23943/princeton/9780691149707.001.0001CrossRefGoogle Scholar
Goodchild, M. F. (2007). Citizens as sensors: The world of volunteered geography. GeoJournal, 69(4), 211–21.10.1007/s10708-007-9111-yCrossRefGoogle Scholar
Goode, E. (2012, April 30). With green beret tactics, combating gang warfare. New York Times. Retrieved from: http://www.nytimes.com/2012/05/01/us/springfield-mass-fights-crime-using-green-beret-tactics.html?pagewanted=all&_r=0.Google Scholar
Goodman, L. A. (1961). Snowball sampling. Annals of Mathematical Statistics, 32(1), 148–70.10.1214/aoms/1177705148CrossRefGoogle Scholar
Graham, J. M., Carley, K. M., & Cukor, D. (2008, January). Intelligence database creation & analysis: Network-based text analysis versus human cognition: Proceedings of the 41st Hawaii International Conference on System Sciences. Waikoloa, HI.Google Scholar
Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360–80.10.1086/225469CrossRefGoogle Scholar
Granovetter, M. S. (1978). Threshold models of collective behavior. The American Journal of Sociology, 83(6), 1420–43.10.1086/226707CrossRefGoogle Scholar
Guttman, A. (1984). R-trees: A dynamic index structure for spatial searching (Vol. 14): ACM.10.1145/602259.602266CrossRefGoogle Scholar
Guttman, L. (1950). The basis for scalogram analysis. Measurement and Prediction, 4, 6090.Google Scholar
Hampson, N. (2012). Hacktivism: A new breed of protests in a networked world. Boston College International & Comparative Law Review, 35(2), 511–42.Google Scholar
Hannigan, J., Hernandez, G., Medina, R. M., Roos, P., & Shakarian, P. (2013). “Mining for spatially-near communities in geo-located social networks.” Paper presented to the AAAI Fall Symposium. Arlington, VA.10.21236/ADA590263CrossRefGoogle Scholar
Hansen, D., Shneiderman, B., & Smith, M. A. (2010). Analyzing social media networks with NodeXL: Insights from a connected world. San Francisco, CA: Morgan Kaufmann.Google Scholar
Hardy, W., & Richard, W. (2006). Operationally significant patterns of associations: Proceedings of IEE Aerospace Conference 2006. Arlington, VA.Google Scholar
Hariharan, R. (2001). “Modeling intersections of geospatial lifelines” (Master thesis). Retrieved from http://www.library.umaine.edu/theses/pdf/hariharanr2001.pdf.Google Scholar
Harris-Hogan, S. (2012). Australian neo-jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35, 298314.10.1080/1057610X.2012.656344CrossRefGoogle Scholar
Hayden, N. K. (2009). Terrifying landscapes: Understanding motivations of non-state actors to acquire and/or use weapons of mass destruction. In Ranstorp, M. & Normark, M. (Eds.), Unconventional weapons and international terrorism: Challenges and new approaches (pp. 163–94).New York: Routledge.Google Scholar
Helfstein, S. (2012). Edges of radicalization: Individuals, networks and ideas in violent extremism. Retrieved from the Combating Terrorism Center at West Point: https://www.ctc.usma.edu/v2/wp-content/uploads/2012/06/CTC_EdgesofRadicalization.pdf.Google Scholar
Helfstein, S., (2014, May 16). Risky business: The global threat network and the politics of contraband. Retrieved from the Combating Terrorism Center at West Point Web site: https://www.ctc.usma.edu/posts/risky-business-the-global-threat-network-and-the-politics-of-contraband.10.21236/ADA602252CrossRefGoogle Scholar
Helfstein, S., (2011). Covert or convenient? Evolution of terror attack networks. Journal of Conflict Resolution, 55(5), 785813.10.1177/0022002710393919CrossRefGoogle Scholar
Hoen, A. G., Hladish, T. J., Eggo, R. M., Lenczner, M., Galvanig, A. P., Brownstein, J. S., & Meyers, L. A. (In press). Epidemic wave dynamics attributable to urban community structure. Journal of Medical Internet Research.Google Scholar
Holland, P. W., & Leinhardt, S. (1971). Transitivity of structural models of small groups. Comparative Group Studies, 2, 107–24.10.1177/104649647100200201CrossRefGoogle Scholar
Homans, G. C. (1961). Social behavior: Its elementary forms. New York: Harcourt Brace Jovanovich.Google Scholar
Horgan, J. (2009). Walking away from terrorism. London: Routledge.10.4324/9780203874738CrossRefGoogle Scholar
Hornsby, K., & Egenhofer, M. J. (2002). Modeling moving objects over multiple granularities. Annals of Mathematics and Artificial Intelligence, 36(1–2), 177–94.10.1023/A:1015812206586CrossRefGoogle Scholar
Hu, D., Kaza, S., & Chen, H. (2009). Identifying significant facilitators of dark network evolution. Journal of the American Society for Information Science and Technology, 60, 655–65.10.1002/asi.21008CrossRefGoogle Scholar
Hung, B., Kolitz, S., & Ozdaglar, A. (2011). Optimization-based influencing of village social networks in a counterinsurgency:Proceedings of the 4th international conference on social computing, behavioral-cultural modeling and prediction(SBP’11). College Park, MD.Google Scholar
Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., & Morris, M. (2008). ERGM: A package to, simulate and diagnose exponential-family models for networks. Journal of Statistical Software, 24(3), 2.10.18637/jss.v024.i03CrossRefGoogle ScholarPubMed
Husain, E. (2007). The Islamist: Why I became an Islamic fundamentalist, what I saw inside, and why I left. New York: Penguin Books.Google Scholar
Hutchins, C. E., & Benham-Hutchins, M. (2010). Hiding in plain sight: Criminal network analysis. Computational & Mathematical Organization Theory, 16, 89111.10.1007/s10588-009-9060-8CrossRefGoogle Scholar
International Crisis Group. (2002). Indonesia backgrounder: How the Jemaah Islamiyah terrorist network operates. Brussels, Belgium: International Crisis Group.Google Scholar
International Crisis Group. (2006). Terrorism in Indonesia: Noordin’s networks. Brussels, Belgium: International Crisis Group.Google Scholar
International Crisis Group. (2007). Jihadism in Indonesia: Poso on the edge. Brussels, Belgium: International Crisis Group.Google Scholar
International Crisis Group. (2009a). The hotel bombings. Brussels, Belgium: International Crisis Group.Google Scholar
International Crisis Group. (2009b). Indonesia: Noordin Top’s support base. Brussels, Belgium: International Crisis Group.Google Scholar
Itai, A., & Rodeh, M. (1978). Finding a minimum circuit in a graph. SIAM Journal on Computing, 7(4), 413–23.10.1137/0207033CrossRefGoogle Scholar
Iwanski, N., & Frank, R. (2014). The evolution of a drug co-arrest network, in Morselli, C. (Ed.), Crime and networks (pp. 5280). New York: Routledge.Google Scholar
Janzen, D. S., & Saiedian, H. (2005). Test-driven development: Concepts, taxonomy, and future direction. Computer Science and Software Engineering, 33(9), 4350.Google Scholar
Johnson, D. (1975). Finding all the elementary circuits of a directed graph. SIAM Journal on Computing, 4(1), 7784.10.1137/0204007CrossRefGoogle Scholar
Johnson, S. (2001). Emergence: The connected lives of ants, brains, cities, and software. New York: Scribner.Google Scholar
Jones, D. (2009). Understanding the form, function, and logic of clandestine cellular networks: The first step in effective counternetwork operations. Fort Leavenworth, KS: School of Advanced Military Studies, United States Army Command and General Staff College.Google Scholar
Jones, D. (2012). Understanding the form, function, and logic of clandestine insurgent and terrorist networks. Tampa, FL: Joint Special Operations University.Google Scholar
Jones, S. (2009). Noordin’s dangerous liaisons, tempo. Jakarta, Indonesia: International Crisis Group.Google Scholar
Jordan, J., Mañas, F. M., & Horsburgh, N. (2008). Strengths and weaknesses of grassroots jihadist networks: The Madrid bombings. Studies in Conflict & Terrorism, 31, 1721.10.1080/10576100701767148CrossRefGoogle Scholar
Joseph, K., Carley, K. M., Filonuk, D., Morgan, G. P., & Pfeffer, J. (2014). Arab Spring: From news data to forecasting. Social Networks and Mining, 4(1). Vienna: Springer.Google Scholar
Kamel, I., & Faloutsos, C. (1993). Hilbert R-tree: An improved R-tree using fractals: Proceedings of the Twentieth International Conference on Very Large Data Bases. Santiago de Chile, Chile. Retrieved from: http://www.informatik.uni-trier.de/~ley/db/conf/vldb/vldb94-500.html.Google Scholar
Kang, C., Pugliese, A., Grant, J., & Subrahmanian, V. (2012). “STUN: Spatio-temporal uncertain (social) networks.” Paper presented at the International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM. Istanbul, Turkey.10.1109/ASONAM.2012.93CrossRefGoogle Scholar
Kas, M., Carley, K. M., & Carley, L. R. (2013, August). Incremental closeness centrality for dynamically changing social networks: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.10.1145/2492517.2500270CrossRefGoogle Scholar
Kas, M., Wachs, W., Carley, K. M., & Carley, L. R. (2013, August). Incremental computation of betweenness centrality for dynamically growing networks: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.10.1145/2492517.2492533CrossRefGoogle Scholar
Kean, T. H., Hamilton, L., & Rhodes, B. (2006). Without precedent: The inside story of the 9/11 Commission. New York: Alfred A. Knopf.Google Scholar
Keegan, B., Ahmed, M. A., Williams, D., Srivastava, J., & Contractor, N. (2010). “Dark gold: Statistical properties of clandestine networks in massively multiplayer online games.” Paper presented at the Social Computing, Second International Conference on IEEE.10.1109/SocialCom.2010.36CrossRefGoogle Scholar
Kempe, D. K. (2003). “Maximizing the spread of influence through a social network.” Paper presented at the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). Washington, DC.10.1145/956750.956769CrossRefGoogle Scholar
Kenney, M. (2007). From Pablo to Osama: Trafficking and terrorist networks, government bureaucracies, and competitive adaptation. University Park: Pennsylvania State University Press.Google Scholar
Kenney, M., Horgan, J., Horne, C., Vining, P., Carley, K. M., Bigrigg, M. W., Bloom, M., & Braddock, K. (2013). Organisational adaptation in an activist network: Social networks, leadership, and change in al-Muhajiroun. Applied Ergonomics, 44(5), 739–47.10.1016/j.apergo.2012.05.005CrossRefGoogle Scholar
Kenney, M., Horgan, J., Horne, C., Vining, P., Carley, K. M., Bigrigg, M., Bloom, M., & Braddock, K. (2015). Competitive adaptation in terrorist networks: Preliminary findings from an Islamist case study. In Stedmon, A., Lawson, G., & Saikayasit, R. (Eds.), Hostile intent & counter-terrorism: Human factors theory and application (pp. 177–93). London: Ashgate.Google Scholar
Kerry, J. (1997). The new war: The web of crime that threatens America’s security. New York: Simon & Schuster.Google Scholar
Kilcullen, D. (2009). The accidental guerrilla: Fighting small wars in the midst of a big one. Oxford: Oxford University Press.Google Scholar
Kilcullen, D. (2010). Counterinsurgency. Oxford: Oxford University Press.Google Scholar
Kim, L. (2011). Media framing for stem cell research: A cross-national analysis of political representation of science between the UK and South Korea. Journal of Science Communication, 10(3), 117.10.22323/2.10030202CrossRefGoogle Scholar
Ki-moon, B. (2013, May 20). Report of the secretary-general on the activities of the United Nations Regional Office for Central Africa and on the Lord’s Resistance Army-affected areas. Retrieved from: http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2013/297.Google Scholar
Ki-moon, B. (2014, September 23). Remarks at the Climate Summit press conference (including comments on Syria). UN News Centre. Retrieved from: http://www.un.org/apps/news/infocus/sgspeeches/statments_full.asp?statID=2356#.VCMTXmNtrKk.Google Scholar
Kitsak, M., Gallos, L. K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H. E., & Makse, H. A. (2010). Identification of influential spreaders in complex networks. Nature Physics, 6, 888–93.10.1038/nphys1746CrossRefGoogle Scholar
Kivela, M., Arenas, A., Barthelemy, M., Gleeson, J., Moreno, Y., & Porter, M. (2014). Multilayer networks. Journal of Complex Networks, 2(3), 203–71.10.1093/comnet/cnu016CrossRefGoogle Scholar
Klerks, P. (2001). The network paradigm applied to criminal organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections, 24, 5365.Google Scholar
Knuth, D. E. (1984). Literate programming. The Computer Journal, 27(2), 97111.10.1093/comjnl/27.2.97CrossRefGoogle Scholar
Koka, B. R., & Prescott, J. E. (2002). Strategic alliances as social capital: A multidimensional view. Strategic Management Journal, 23(9), 795816.10.1002/smj.252CrossRefGoogle Scholar
Koliba, C., Meek, J. W., & Zia, A. (2011). Governance networks in public administration and public policy. Boca Raton, FL: Taylor & Francis/CRC Press.Google Scholar
Koopman, J. S., Singh, P., & Ionides, E. L. (2014). Transmission modeling to enhance surveillance system function. Transforming Public Health Surveillance. Elsevier.Google Scholar
Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict & Terrorism, 29, 559–75.10.1080/10576100600798418CrossRefGoogle Scholar
Kossinets, G. (2006). Effects of missing data in social networks. Social Networks, 28, 247–68.10.1016/j.socnet.2005.07.002CrossRefGoogle Scholar
Kossinets, G., & Watts, D. J. (2006). Empirical analysis of an evolving social network. Science, 311, 8890.10.1126/science.1116869CrossRefGoogle ScholarPubMed
Krackhardt, D. (1987). QAP partialling as a test of spuriousness. Social Networks, 9(2), 171–86.Google Scholar
Krackhardt, D., & Kilduff, M. (2002). Structure, culture, and Simmelian ties in entrepreneurial firms. Social Networks, 24(3), 279–90.10.1016/S0378-8733(02)00008-4CrossRefGoogle Scholar
Krebs, V. E. (2002a). Mapping networks of terrorist cells. Connections, 24(3), 4352.Google Scholar
Krebs, V. E. (2002b). Uncloaking terrorist networks. First Monday, 7(4). Retrieved from: http://firstmonday.org/ojs/index.php/fm/article/view/941/863.10.5210/fm.v7i4.941CrossRefGoogle Scholar
Krempel, L., & Plümper, T. (2003). Exploring the dynamics of international trade by combining the comparative advantages of multivariate statistics and network visualizations. Journal of Social Structure, 4(1) (electronic).Google Scholar
Kumar, S., Barbier, G., Abbasi, M. A., & Liu, H. (2011). Relief, TweetTracker: An analysis tool for humanitarian and disaster relief: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, ICWSM. Barcelona, Spain.Google Scholar
Kumar, S., Morstatter, F., & Liu, H. (2013). Twitter data analytics. New York: Springer.Google Scholar
Lambiotte, R., Blondel, V. D., de Kerchove, C., Huens, E., Prieur, C., Smoreda, Z., & Van Dooren, P. (2008). Geographical dispersal of mobile communication networks. Physica A: Statistical Mechanics and Its Applications, 387(21), 5317–25.10.1016/j.physa.2008.05.014CrossRefGoogle Scholar
Lanham, M., Morgan, G., & Carley, K. M. (2011). Social network modeling and simulation of integrated resilient command and control (C2) in contested cyber environments. In Levis, A., Carley, K. M., & Karsai, G. (Eds.), Resilient architectures for integrated command and control in a contested cyber environment (pp. 6394). Fairfax, VA: The Volgenau School of Engineering Department of Electrical and Computer Engineering System Architectures Laboratory, George Mason University.Google Scholar
Lake, E. (2011, March 10). China deemed biggest threat to U.S. Washington Times. Retrieved from: http://www.washingtontimes.com/news/2011/mar/10/china-deemed-biggest-threat-to-us/?page=all.Google Scholar
Lawler, E. J. (2001). An affect theory of social exchange. American Journal of Sociology, 107(2), 321–52.10.1086/324071CrossRefGoogle Scholar
Leavitt, H. (1951). Some effects of certain communication patterns on group performance. The Journal of Abnormal and Social Psychology, 46(1), 3850.10.1037/h0057189CrossRefGoogle ScholarPubMed
Leenders, R. T. A. J. (1996). Evolution of friendship and best friendship choices. Journal of Mathematical Sociology, 21, 133–48.10.1080/0022250X.1996.9990177CrossRefGoogle Scholar
Leinhardt, S. (Ed.) (1977). Social networks: A developing paradigm. New York: Academic Press.Google Scholar
Lindenberg, S. (1992). The method of decreasing abstraction. In Coleman, J. S. & Fararo, T. J. (Eds.), Rational choice theory: Advocacy and critique (pp. 320). London: Sage.Google Scholar
Liu, J., Chen, J., & Ye, J. (2009). Large-scale sparse logistic regression: Proceedings of ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), 547–56.10.1145/1557019.1557082CrossRefGoogle Scholar
Lusseau, D., Schneider, K., Boisseau, O., Haase, P., Slooten, E., & Dawson, S. (2003). The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behavioral Ecology and Sociobiology, 54, 396405.CrossRefGoogle Scholar
Mackenzie, K. D. (1966). Structural centrality in communications networks. Psychometrika, 31(1), 1725.10.1007/BF02289453CrossRefGoogle Scholar
Magouirk, J., Atran, S., & Sageman, M. (2008). Connecting terrorist networks. Studies in Conflict & Terrorism, 31, 116.CrossRefGoogle Scholar
Malensek, M., Lee Pallickara, S., & Pallickara, S. (2013). Exploiting geospatial and chronological characteristics in data streams to enable efficient storage and retrievals. Future Generation Computer Systems, 29(4), 1049–61.CrossRefGoogle Scholar
Mancuso, M. (2014). Not all madams have a central role: Analysis of a Nigerian sex trafficking network. Trends in Organized Crime, 17, 6688.10.1007/s12117-013-9199-zCrossRefGoogle Scholar
Markovsky, B., Willer, D., & Patton, T. (1988). Power relations in exchange networks. American Journal of Sociology, 53, 220–36.Google Scholar
Markovsky, B., Willer, D., (1990). Reply to Yamagishi and Cook: Theory, evidence, and intuition. American Sociological Review, 5, 300–4.Google Scholar
Mauss, M. (1950). The gift: The form and reason for exchange in archaic societies. New York: Norton.Google Scholar
McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence, 20(3), 415–33.10.1080/09546550802073367CrossRefGoogle Scholar
McCulloh, I., Armstrong, H., & Johnson, A. (2013). Social network analysis with applications. Hoboken, NJ: Wiley.Google Scholar
McCulloh, I., & Carley, K. M. (2011). Detecting change in longitudinal social networks. Journal of Social Structure, 12(3). Retrieved from: http://www.cmu.edu/joss/content/articles/volume12//McCullohCarley.pdf.10.21307/joss-2019-031CrossRefGoogle Scholar
McDonald, J. H. (2009). Spearman rank correlation. In McDonald, J. H., Handbook of biological statistics (2nd ed.). Baltimore, MD: Sparky House Publishing. Retrieved from: http://udel.edu/~mcdonald/statspearman.html.Google Scholar
McPherson, J. M., & Rangermoore, J. R. (1991). Evolution on a dancing landscape: Organizations and networks in dynamic blau space. Social Forces, 70, 1942.10.2307/2580060CrossRefGoogle Scholar
Melamed, D., Breiger, R. L., & Schoon, E. (2013). The duality of clusters and statistical interactions. Sociological Methods & Research, 42(1), 4159.10.1177/0049124112464870CrossRefGoogle Scholar
Melamed, D., Schoon, E., Breiger, R. L., Asal, V. H., & Rethemeyer, R. K. (2012). Using organizational similarity to identify statistical interactions for improving situational awareness of CBRN activities. Social Computing, Behavioral-Cultural Modeling, and Prediction Lecture Notes in Computer Science, 7227, 61–8.10.1007/978-3-642-29047-3_8CrossRefGoogle Scholar
Merton, R. K. (1968). The Matthew effect in science. Science, 159, 5663.10.1126/science.159.3810.56CrossRefGoogle Scholar
Milgram, S. (1967). The small world problem. Psychology Today, 1(1), 61–7.Google Scholar
Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63, 8197.CrossRefGoogle ScholarPubMed
Miller, H. J. (1991). Modeling accessibility using space-time prism concepts within geographical information systems. International Journal of Geographical Information System, 5(3), 287301.10.1080/02693799108927856CrossRefGoogle Scholar
Milward, H. B., & Raab, J. (2006). Dark networks as organizational problems: Elements of a theory. International Public Management Journal, 9, 333–60.Google Scholar
Molm, L. D., Collett, J. L., & Schaefer, D. R. (2007). Building solidarity through generalized exchange: A theory of Reciprocity 1. American Journal of Sociology, 113(1), 205–42.10.1086/517900CrossRefGoogle Scholar
Molm, L., Schaefer, D., & Collett, J. (2009). Fragile and resilient trust: Risk and uncertainty in negotiated and reciprocal Exchange. Sociological Theory, 27, 132.10.1111/j.1467-9558.2009.00336.xCrossRefGoogle Scholar
Moody, J. (2005). Fighting a hydra: A note on the network embeddedness of the war on terror. Structure and Dynamics, 1(2). Retrieved from: http://escholarship.org/uc/item/7x3881bs.Google Scholar
Morgan, J. D., & Steinberg, P. E. (2013). Testing the usability of time-geographic maps for crime mapping. In Leitner, M. (Ed.), Crime modeling and mapping using geospatial technologies (pp. 339–66). New York: Springer.Google Scholar
Morselli, C. (2009). Inside criminal networks. New York: Springer.10.1007/978-0-387-09526-4CrossRefGoogle Scholar
Morselli, C. (2010). Assessing vulnerable and strategic positions in a criminal network. Journal of Contemporary Criminal Justice, 26, 382–92.10.1177/1043986210377105CrossRefGoogle Scholar
Morselli, C., Giguère, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143–53.10.1016/j.socnet.2006.05.001CrossRefGoogle Scholar
Morselli, C., & Petit, K. (2007). Law-enforcement disruption of a drug importation network. Global Crime, 8(2), 109–30.10.1080/17440570701362208CrossRefGoogle Scholar
Morton, G. M. (1966). A computer oriented geodetic data base and a new technique in file sequencing: Ottawa, ON: International Business Machines Company.Google Scholar
Nagl, J. A. (2005). Learning to eat soup with a knife: Counterinsurgency lessons from Malaya and Vietnam. Chicago, IL: University of Chicago Press.Google Scholar
Nasiri, O. (2006). Inside the jihad: My life with al Qaeda, a spy’s story. New York: Basic Books.Google Scholar
National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission Report: Final report of the National Commission on Terrorist Attacks upon the United States. Washington, DC: United States Government Printing Office.Google Scholar
National Research Council. (2003). Dynamic social network modeling and analysis: Workshop summary and papers. Washington, DC: The National Academies Press.Google Scholar
Newman, M. E. J. (2001). Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Physical Review E, 64, 016132.CrossRefGoogle ScholarPubMed
Newman, M. E. J., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review E, 69(2), 026113.10.1103/PhysRevE.69.026113CrossRefGoogle ScholarPubMed
Nieminen, J. (1974). On the centrality in a graph. Scandinavian Journal of Psychology, 15(1), 332–6.CrossRefGoogle Scholar
Obama, B. H. (2014, May 28). Remarks by the president at the United States Military Academy commencement ceremony. Retrieved from the White House Web page: http://www.whitehouse.gov/the-press-office/2014/05/28/remarks-president-united-states-military-academy-commencement-ceremony.Google Scholar
Odersky, M., Altherr, P., Cremet, V., Emir, B., Manth, S., Micheloud, S., … Zenger, M. (2006). An overview of the Scala programming language (2nd Ed.). Technical report LAMP-REPORT-2006-001. Retrieved from: http:///www.scala-lang.org/docu/files/ScalaOverview.pdf.Google Scholar
Oliver, K., Crossley, N., Edwards, G., Koskinen, J., & Everett, M. (2014, June 25). “Covert networks: Structures, processes and types.” Mitchell Centre Working Paper. Retrieved from: http://www.socialsciences.manchester.ac.uk/medialibrary/research/mitchell/covertnetworks/wp/working_paper1.pdf.Google Scholar
One boy’s journey to jihad. (2010, January 3). Sunday Times (London).Google Scholar
Openshaw, S. (1983). The modifiable areal unit problem. Norwich, UK: Geo Books.Google Scholar
Opsahl, T., Agneessens, F., & Skvoretz, J. (2010). Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32, 245–51.10.1016/j.socnet.2010.03.006CrossRefGoogle Scholar
Ostrom, E. (2005). Understanding institutional diversity. Princeton, NJ: Princeton University Press.Google Scholar
Padrón, B., Nogales, M., & Traveset, A. (2011). Alternative approaches of transforming bimodal into unimodal mutualistic networks: The usefulness of preserving weighted information. Basic and Applied Ecology, 12, 713–21.10.1016/j.baae.2011.09.004CrossRefGoogle Scholar
Patton, T., & Willer, D. (1990). Connection and power in centralized exchange networks. Journal of Mathematical Sociology, 16, 3149.10.1080/0022250X.1990.9990077CrossRefGoogle Scholar
Paulo, D., Fischl, B., Markow, T., Martin, M., & Shakarian, P. (2013). “Social network intelligence analysis to combat street gang violence.” Paper presented at the International Symposium on Foundations of Open Source Intelligence and Security Informatics. Niagara Falls, ON.10.1145/2492517.2500238CrossRefGoogle Scholar
Pawitan, Y. (2001). In all likelihood: Statistical modelling and inference using likelihood. Oxford: Oxford University Press.10.1093/oso/9780198507659.001.0001CrossRefGoogle Scholar
Pedahzur, A., & Perliger, A. (2006). The changing nature of suicide attacks: A social network perspective. Social Forces, 84, 19872008.10.1353/sof.2006.0104CrossRefGoogle Scholar
Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. Social Forces, 84, 19872008.Google Scholar
Petersen, R., Rhodes, C., & Wiil, U. (2011). Node removal in criminal networks: Proceedings of the European Intelligence and Security Informatics Conference (EISIC). Athens, Greece.Google Scholar
Pfeffer, J., & Carley, K. M. (2012a). Social networks, social media, social change. In Schmorrow, D. D. & Nicholson, D. M. (Eds.), Advances in design for cross-cultural activities, Part II (pp. 273–82).Boca Raton, FL: CRC Press.Google Scholar
Pfeffer, J., (2012b). Rapid modeling and analyzing networks extracted from pre-structured news articles. Computational and Mathematical Organizational Theory, 18(3), 280–99.Google Scholar
Pfeffer, J., (2012c). k-Centralities: Local approximations of global measures based on shortest paths: Proceedings of the WWW Conference 2012, 1st International Workshop on Large Scale Network Analysis (LSNA 2012). Lyon, France.Google Scholar
Philby, P. (2013, June 10). The Tor system: Welcome to the dark Internet where you can search in secret. Independent. Retrieved from: http://www.independent.co.uk/news/media/online/the-tor-system-welcome-to-the-dark-internet-where-you-can-search-in-secret-8651364.html.Google Scholar
Phithakkitnukoon, S., Husna, H., & Dantu, R. (2008). Behavioral entropy of a cellular phone user. In Liu, H., Salerno, J., & Young, M. J. (Eds.), Social computing, behavioral modeling, and prediction (pp. 160–7). New York: Springer.Google Scholar
Ponieman, N. B., Salles, A., & Sarraute, C. (2013). Human mobility and predictability enriched by social phenomena information: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Niagara Falls, NY.10.1145/2492517.2500236CrossRefGoogle Scholar
Powell, W. W. (1985). Hybrid organizational arrangements: New form or transitional development?California Management Review, 30, 6787.10.2307/41165267CrossRefGoogle Scholar
Powell, W. W. (1990). Neither market nor hierarchy: Network forms of organization. In Staw, B. M. & Cummings, L. L. (Eds.), Research in organizational behavior: An annual series of analytical essays and critical reviews (pp. 295336). Greenwich, CT: JAI Press.Google Scholar
Pregibon, D. (1981). Logistic regression diagnostics. The Annals of Statistics, 9(4), 705–24.10.1214/aos/1176345513CrossRefGoogle Scholar
Press, W. H. (2007). Numerical recipes: The art of scientific computing (3rd. ed.). New York: Cambridge University Press.Google Scholar
Raab, J., & Milward, H. B. (2003). Dark networks as problems. Journal of Public Administration Research and Theory, 13(4), 413–39.10.1093/jopart/mug029CrossRefGoogle Scholar
Ragin, C. C. (2008). Redesigning social inquiry: Fuzzy sets and beyond. Chicago, IL: University of Chicago Press.10.7208/chicago/9780226702797.001.0001CrossRefGoogle Scholar
Ratcliffe, J. H. (2006). A temporal constraint theory to explain opportunity-based spatial offending patterns. Journal of Research in Crime and Delinquency, 43(3), 261–91.10.1177/0022427806286566CrossRefGoogle Scholar
Raymond, C. Z. (2010). Al Muhajiroun and Islam4UK: The group behind the ban. Retrieved from the International Centre for the Study of Radicalisation and Political Violence at King’s College Web site: http://icsr.info/2010/05/al-muhajiroun-and-islam4uk-the-group-behind-the-ban/.Google Scholar
Reed, B. (2007). A social network approach to understanding an insurgency. Parameters, 38, 1930. Retrieved from: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA486072.Google Scholar
Ressa, M. (2003). Seeds of terror: An eyewitness account of al-Qaeda’s newest center of operations in southeast Asia. New York: Free Press.Google Scholar
Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, 2(2). Retrieved from: http://www.hsaj.org/?article=2.2.8.Google Scholar
Rew, R., & Davis, G. (1990). NetCDF: An interface for scientific data access. Computer Graphics and Applications, IEEE, 10(4), 7682.10.1109/38.56302CrossRefGoogle Scholar
Ripley, R. M., Snijders, T. A. B., & Preciado, P. (2012). Manual for SIENA, Retrieved from University of Oxford Web site: http://www.stats.ox.ac.uk/~snijders/siena/SIENA_Manual.pdf.Google Scholar
Roberts, N. (2011). Beyond smokestacks and silos: Open-source, web-enabled coordination in organizations and networks. Public Administration Review, 71(5), 677–93.10.1111/j.1540-6210.2011.02406.xCrossRefGoogle Scholar
Roberts, N., & Everton, S. F. (2011). Strategies for combating dark networks. Journal of Social Structure, 12(2). Retrieved from: http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf.10.21307/joss-2019-030CrossRefGoogle Scholar
Robins, G. (2009). Understanding individual behaviors within covert networks: The interplay of individual qualities, psychological predispositions, and network effects. Trends in Organized Crime, 12(2), 166–87.10.1007/s12117-008-9059-4CrossRefGoogle Scholar
Rodriguez, J. A. (2005). “The March 11th terrorist network: In its weakness lies its strength.” EPP-LEA Working Papers, Department de Sociologica i Analisi de les Organitzacions: Universitat de Barcelona, Barcelona, Spain.Google Scholar
Ronfeldt, D., & Arquilla, J. (2001a). Networks, netwars, and the fight for the future. First Monday, 6(10). Retrieved from: http://www.firstmonday.dkJissues/issue6_10lindex.html.10.5210/fm.v6i10.889CrossRefGoogle Scholar
Ronfeldt, D., (2001b). What next for networks and netwars? In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and netwars (pp. 311–61). Santa Monica, CA.Google Scholar
Sabidussi, G. (1966). The centrality index of a graph. Psychometrika, 31(4), 581603.10.1007/BF02289527CrossRefGoogle Scholar
Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.10.9783/9780812206791CrossRefGoogle Scholar
Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia: University of Pennsylvania Press.CrossRefGoogle Scholar
Salganik, M. J., & Heckathorn, D. D. (2004). Sampling and estimation in hidden populations using respondent-driven sampling. Sociological Methodology, 34(1), 193240.10.1111/j.0081-1750.2004.00152.xCrossRefGoogle Scholar
Sawyer, J., & Ackerman, G. (2012). “Promethean journeys: Examining the mechanisms by which terrorists acquire new technologies of lethality.” Paper presented at the Annual Meeting of the International Studies Association. San Diego, CA.Google Scholar
Schmitt, E., & Perlez, J. (2009, February 24). Strikes worsen Qaeda threat, Pakistan says. New York Times. Retrieved from: http://www.nytimes.com/2009/02/25/world/asia/25drones.html?pagewanted=all&_r=0.Google Scholar
Schroeder, J., Xu, J., & Chen, H. (2003). Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis. In Chen, H., Miranda, R., Zeng, D., Demchak, C., Schroeder, J., & Madhusudan, T. (Eds.), Intelligence and security informatics (pp. 168–80). Berlin, Germany: Springer.Google Scholar
Schwartz, D. M., & Rouselle, D. A. (2009). Using social network analysis to target criminal networks. Trends in Organised Crime, 12, 188207.10.1007/s12117-008-9046-9CrossRefGoogle Scholar
Seber, G. A. F., & Lee, A. J. (2003). Linear regression analysis. Hoboken, NJ: Wiley Interscience.CrossRefGoogle Scholar
Seidman, S. B. (1983). Network structure and minimum degree. Social Networks, 5(3), 267–87.10.1016/0378-8733(83)90028-XCrossRefGoogle Scholar
Senate condemns crimes of Joseph Kony and Lord’s Resistance Army. News release of U.S. Senator Christopher Coons of Delaware. Retrieved from: http://www.coons.senate.gov/newsroom/releases/release/senate-condemns-crimes-of-joseph-kony-and-lords-resistance-army.Google Scholar
Shakarian, P., & Paulo, D. (2012). “Large social networks can be targeted for viral marketing with small seed sets.” Paper presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM-2012). Istanbul, Turkey.10.1109/ASONAM.2012.11CrossRefGoogle Scholar
Shakarian, P., Salmento, J., Pulleyblank, W., & Bertetto, J. (2014). “Reducing gang violence through network influence based targeting of social programs.” Paper presented at the 20th ACM SIGKDD Conference on Knowledge, Discovery, and Data Mining (KDD). New York, NY.10.1145/2623330.2623331CrossRefGoogle Scholar
Shakarian, P., Simari, G., & Schroeder, R. (2013). “MANCaLog: A logic for multi-attribute network cascades.” Paper presented at the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-13). St. Paul, MN.Google Scholar
Shalev, M. (2007). Limits and alternatives to multiple regression in comparative research. In Mjøset, L. & Clausen, T. H. (Eds.), Comparative social research (symposium on methodology in comparative research) (pp. 261308).Elsevier.Google Scholar
Sheppard, Z. (2010, September 19). 5,000,000,000. [Blog post]. Retrieved from http://blog.flickr.net/en/2010/09/19/5000000000/.Google Scholar
Silver, N. (2012). The signal and the noise: The art and science of prediction. New York: Penguin Books.Google Scholar
Simcox, R., Stuart, H., & Ahmed, H. (2010). Islamist terrorism: The British connections. Retrieved from the Henry Jackson Society Web page: http://henryjacksonsociety.org/2011/07/07/islamist-terrorism-the-british-connections/.Google Scholar
Simmel, G. (1906). The sociology of secrecy and of secret societies. American Journal of Sociology, 11, 441–98.10.1086/211418CrossRefGoogle Scholar
Simmel, G. (1950). The secret society. In Wolf, K. H. (Ed.), The sociology of Georg Simmel (pp. 345–76). New York: The Free Press.Google Scholar
Simmel, G. (2008). Sociological theory, New York: McGraw–Hill.Google Scholar
Singer, P. W. (2012, November). The cyber terror bogeyman. Retrieved from the Brookings Institute Web page: http://www.brookings.edu/research/articles/2012/11/cyber-terror-singer.Google Scholar
Skillicorn, D. B. (2006). Social network analysis via matrix decompositions. In Popp, R. L. & Yen, J. (Eds.), Emergent information technologies and enabling policies for counter-terrorism (pp. 367–91). Hoboken, NJ: Wiley Interscience.Google Scholar
Skvoretz, J., & Willer, D. (1993). Exclusion and power: A test of four theories of power in exchange networks. American Sociological Review, 58, 801–18.10.2307/2095952CrossRefGoogle Scholar
Snijders, T. A. B. (2001). The statistical evaluation of social network dynamics. Sociological Methodology, 31, 361–95.10.1111/0081-1750.00099CrossRefGoogle Scholar
Snijders, T. A. B., Van de Bunt, G. G., & Steglich, C. E. G. (2010). Introduction to stochastic actor-based models for network dynamics. Social Networks, 32(1), 4460.10.1016/j.socnet.2009.02.004CrossRefGoogle Scholar
Sparrow, M. K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251–74.10.1016/0378-8733(91)90008-HCrossRefGoogle Scholar
Spearman, C. (1904). The proof and measurement of association between two things. American Journal of Psychology, 15, 72101.10.2307/1412159CrossRefGoogle Scholar
Sprinzak, E. (2000). Rational fanatics. Foreign Policy, 122. Retrieved from: http://www.foreignpolicy.com/articles/2000/09/01/rational_fanatics.Google Scholar
Stefik, M., & Bobrow, D. G. (1985). Object-oriented programming: Themes and variations. AI Magazine, 6(4), 40.Google Scholar
Steglich, C., Snijders, T. A. B., & Pearson, M. (2010). Dynamic networks and behavior: Separating selection from influence. Sociological Methodology, 40(1), 329–93.10.1111/j.1467-9531.2010.01225.xCrossRefGoogle Scholar
Stevenson, R., & Crossley, N. (2014). Change in covert social movement networks: The “inner circle” of the Provisional Irish Republic Army. Social Movement Studies, 13, 7091.10.1080/14742837.2013.832622CrossRefGoogle Scholar
Strogatz, S. H. (2001). Exploring complex networks. Nature, 410, 268–76.10.1038/35065725CrossRefGoogle ScholarPubMed
Suskind, R. (2006). The one percent doctrine: Deep inside America’s pursuit of its enemies since 9/11. New York: Simon & Schuster.Google Scholar
Thomas, T., Kiser, S., & Casebeer, W. (2005). Warlords rising: Confronting violent non-state actors. Lanham, MD: Lexington Books.10.5771/9780739162361CrossRefGoogle Scholar
Thomas, T. L. (2003). Al-Qaida and the Internet: The danger of “cyberplanning.” DTIC, ADA485810.Google Scholar
Tibshirani, R. (1996). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society Series B, 58(1), 267–88.10.1111/j.2517-6161.1996.tb02080.xCrossRefGoogle Scholar
Tikves, S., Banerjee, S., Temkit, H., Gokalp, S., Davulcu, H., Sen, A., Corman, S., Woodward, M., & Amin, A. (2011). A system for ranking organizations using social scale analysis. European Intelligence and Security Informatics Conference (EISIC), 308–13.Google Scholar
Tikves, S., Banerjee, S., Temkit, H., Gokalp, S., Davulcu, H., Sen, A., Corman, S., Woodward, M., Rohmaniyah, I., & Amin, A. (2013). A system for ranking organizations using social scale analysis. Social Network Analysis and Mining Journal, 3(3), 313–28.Google Scholar
Tikves, S., Gokalp, S., Temkit, M., Banerjee, S., Ye, J., & Davulcu, H. (2012). Perspective analysis for online debates. Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 898–905.10.1109/ASONAM.2012.161CrossRefGoogle Scholar
Tilly, C. (2004a). Social movements, Boulder, CO: Paradigm Publishers.Google Scholar
Tilly, C. (2004b). Trust and rule. Theory and Society, 33, 130.CrossRefGoogle Scholar
Tilly, C. (2005). Trust and rule. Cambridge: Cambridge University Press.10.1017/CBO9780511618185CrossRefGoogle Scholar
Tong, H., Sakurai, Y., Eliassi-Rad, T., & Faloutsos, C. (2008). Fast mining of complex time-stamped events: Proceedings of the 17th ACM Conference on Information and Knowledge Management. Napa Valley, CA.10.1145/1458082.1458184CrossRefGoogle Scholar
Travers, J., & Milgram, S. (1969). An experimental study of the small world problem. Sociometry, 32(4), 425–43.10.2307/2786545CrossRefGoogle Scholar
Tsvetovat, M., & Carley, K. M. (2003). “Bouncing back: Recovery mechanisms of covert networks.” Paper presented at the NAACSOS Conference proceedings, Pittsburgh, PA.Google Scholar
Tsvetovat, M., (2005). Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. Journal of Social Structure, 6. Retrieved from: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCarley/.Google Scholar
Typesafe. (2014). Akka. Retrieved from: http://akka.io/.Google Scholar
Ungerer, C. (2011). Jihadists in jail: Radicalisation and the Indonesian prison experience. Barton, Australia: Australian Strategic Policy Institute (ASPI).Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2011). Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. (Research report). Retrieved from: http://www.unodc.org/documents/data-and-analysis/Studies/Illicit_financial_flows_2011_web.pdf.Google Scholar
Ugarte, E. F., & Turner, M.M. (2011). What is the “Abu Sayyaf”? How labels shape reality. Pacific Review, 24(4), 397420.CrossRefGoogle Scholar
Usher, A. (2010). Temporal algorithms for processing and analyzing large datasets. Sterling Data LLC Report.Google Scholar
Valente, T. W. (2010). Social networks and health: Models, methods, and applications. New York: Oxford University Press.10.1093/acprof:oso/9780195301014.001.0001CrossRefGoogle Scholar
Van de Bunt, G. G., Van Duijin, M. A. J., & Snijders, T. A. B. (1999). Friendship networks through time: An actor-oriented statistical network model. Computational and Mathematical Organization Theory, 5, 167–92.CrossRefGoogle Scholar
Van de Geer, J. P. (1971). Introduction to multivariate analysis for the social sciences. San Francisco, CA: W. H. Freeman and Co.Google Scholar
Van Holt, T., Johnson, J. C., Brinkley, J., Carley, K. M., & Caspersen, J. (2012). Structure of ethnic violence in Sudan: An automated content, meta-network, and geospatial analytical approach. Computational and Mathematical Organizational Theory, 18, 340–55.Google Scholar
Van Meter, K. M. (2001). Terrorists/liberators: Researching and dealing with adversary social networks. Connections, 24(3), 6678.Google Scholar
Walker, H. A., Thye, S. R., Simpson, B., Lovaglia, M. J., Willer, D., & Markovsky, B. (2000). Network exchange theory: Recent developments and new directions. Social Psychology Quarterly, 63(4), 324–37.10.2307/2695843CrossRefGoogle Scholar
Wallace, A. (1956). Revitalization movements. American Anthropologist, 58, 264–81.10.1525/aa.1956.58.2.02a00040CrossRefGoogle Scholar
Waltz, K. (1959). Man, the state, and war: A theoretical analysis. New York: Columbia University Press.Google Scholar
Wang, D. J., Shi, X., McFarland, D. A., & Leskovec, J. (2012). Measurement error in network data: a re-classification. Social Networks, 34(4), 396409.10.1016/j.socnet.2012.01.003CrossRefGoogle Scholar
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. Cambridge: Cambridge University Press.10.1017/CBO9780511815478CrossRefGoogle Scholar
Watts, D. (2004). Six degrees: The science of a connected age. New York: WW Norton.Google Scholar
Watts, D. J., & Strogatz, S. H. (1998). Collective dynamics of “small-world” networks. Nature, 393, 440–2.10.1038/30918CrossRefGoogle ScholarPubMed
Weiss, G. M. (2005). Data mining in telecommunications. In Maimon, O. & Rokach, L. (Eds.), Data mining and knowledge discovery handbook: A complete guide for practitioners and researchers (pp. 11891201). Norwell, MA: Kluwer Academic Publishers.10.1007/0-387-25465-X_56CrossRefGoogle Scholar
West, B. J., & Grigolini, P. (2011). Complex webs: Anticipating the improbable. Cambridge: Cambridge University Press.Google Scholar
Wiemann, G. (2004). Www.terror.net: How modern terrorism uses the Internet. Retrieved from the United States Institute of Peace Web site: http://www.usip.org/sites/default/files/sr116.pdf.Google Scholar
Wigner, E. P. (1960). The unreasonable effectiveness of mathematics in the natural sciences. Richard Courant lecture in mathematical sciences delivered at New York University, May 11, 1959. Communications on Pure and Applied Mathematics, 13(1), 114.10.1002/cpa.3160130102CrossRefGoogle Scholar
Wiktorowicz, Q. (2005). Radical Islam rising: Muslim extremism in the west. Lanham, MD: Rowman & Littlefield.10.5771/9781461641711CrossRefGoogle Scholar
Willer, D., Van Assen, M., & Emanuelson, P. (2012). Analyzing large scale exchange networks. Social Networks, 34(2), 171–80.10.1016/j.socnet.2011.11.001CrossRefGoogle Scholar
Williams, C. (2003). The question of “links” between al Qaeda and southeast Asia. in Ramakrishna, K. and Tan, S. S. (Eds.), After Bali: The threat of terrorism in southeast Asia (pp. 8396).Singapore: World Scientific and the Institute of Defense and Strategic Studies.10.1142/9789812561749_0004CrossRefGoogle Scholar
Williams, P. (2001). Transnational criminal networks. In Arquilla, J. (Ed.), Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.Google Scholar
Xu, J., & Chen, H. (2003). Untangling criminal networks: A case study. Intelligence and Security Informatics, Lecture Notes in Computer Science, 2665, 232–48.Google Scholar
Xu, J., & Chen, H. (2008, October). The topology of dark networks. Communications of the ACM, 51(10), 5865.10.1145/1400181.1400198CrossRefGoogle Scholar
Xu, J., Hu, D., & Chen, H. (2009). The dynamics of terrorist networks: Understanding the survival mechanisms of global Salafi jihad. Journal of Homeland Security and Emergency Management, 6(1).10.2202/1547-7355.1477CrossRefGoogle Scholar
Xu, J., Marshall, B., Kaza, S., & Chen, H. (2004). Analyzing and visualizing criminal network dynamics: A case study. Intelligence and Security Informatics, Lecture Notes in Computer Science, 3073, 359–77.Google Scholar
Yamagishi, T., & Cook, K. S. (1990). Power relations in exchange networks: A comment on “network exchange theory.”American Sociological Review, 55, 297300.10.2307/2095634CrossRefGoogle Scholar
Yasin, N. A. (2010, December 17). Counter ideology: Battle for hearts and minds in Indonesia. RSIS Commentaries, 173. Retrieved from: http://www.rsis.edu.sg/rsis-publication/rsis/1463-counter-ideology-battle-for-h/#.VCCOtmNtrKl.Google Scholar
Zhang, H., Korayem, M., You, E., & Crandall, D. J. (2012). Beyond co-occurrence: Discovering and visualizing tag relationships from geo-spatial and temporal similarities: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining. Seattle, WA.Google Scholar
Ziliak, S. T., & McCloskey, D. N. (2008). The cult of statistical significance. Ann Arbor: University of Michigan Press.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Edited by Luke M. Gerdes, United States Military Academy
  • Book: Illuminating Dark Networks
  • Online publication: 05 August 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316212639.016
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Edited by Luke M. Gerdes, United States Military Academy
  • Book: Illuminating Dark Networks
  • Online publication: 05 August 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316212639.016
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Edited by Luke M. Gerdes, United States Military Academy
  • Book: Illuminating Dark Networks
  • Online publication: 05 August 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316212639.016
Available formats
×