Chapter
Cohesive Subgroups (Subnetworks)
Interdependence of Actors
Social Structure in Terms of Social Networks
Emergent Social Formations
Structural Location: Beliefs, Norms, Intentions, Behavior, and Identity
1.5 Social Networks, Human Agency, and Culture
1.6 Summary and Conclusion
2 Strategic Options for Disrupting Dark Networks
2.2 Strategic Options for Disrupting Dark Networks2
2.3 Crafting Strategies with Social Network Analysis
Developing Working Hypotheses
Identifying, Collecting, and Recording Social Network Data
Aggregating (Combining) and/or Parsing Networks
Analysis and Interpretation
2.4 Summary and Conclusion
Part II: Social Network Analysis: Techniques
3 Getting Started with UCINET, NetDraw, Pajek, and ORA
Getting Started with UCINET
Getting Started with NetDraw
Mapping Algorithms in NetDraw
Visualizing Attribute Data in NetDraw
Getting Started with Pajek
Mapping Algorithms in Pajek
Visualizing Attribute Data in Pajek
3.5 ORA (Organizational Risk Analyzer)
Mapping Algorithms in ORA
Visualizing Attribute Data in ORA
3.6 Summary and Conclusion
4 Gathering, Recording, and Manipulating Social Networks
4.2 Boundary Specification
Realist vs. Nominalist Strategies
Definitional Focus: Attributes, Relations, or Events
4.3 Ego Networks and Complete Networks
4.4 Types of Social Network Data
Symmetric One-Mode Networks
Asymmetric One-Mode Networks
4.5 Collecting Social Network Data
4.6 Recording Social Network Data
Recording One-Mode Social Network Data
Recording Two-Mode Social Network Data
Exporting Social Network Data to Pajek
Importing/Reading UCINET Data into Pajek and ORA
4.7 Deriving One-Mode Networks from Two-Mode Networks
4.8 Combining, Aggregating, and Parsing Networks
Multirelational Data in UCINET and NetDraw
Multirelational Data in Pajek
Excursus: Positive and Negative Relations in UCINET and Pajek
Multirelational Data in ORA
4.9 Extracting and Simplifying Networks
Extracting Networks in UCINET
Simplifying (Collapsing) Networks in NetDraw
Extraction and Simplification in Pajek
Extraction and Simplification in ORA
4.10 Summary and Conclusion
Part III: Social Network Analysis: Metrics
5.2 Some Basic Topographical Metrics
5.3 The Provincial-Cosmopolitan Dimension
5.4 The Hierarchical-Heterarchical Dimension
5.5 Estimating Network Topographical Metrics
Network Topography in UCINET
Network Topography in Pajek
Network Topography in ORA
5.6 Summary and Conclusion
6 Cohesion and Clustering
Identifying Components in UCINET
Visualizing Components in NetDraw
Identifying Components in Pajek
Identifying Components in ORA
Identifying Cores in UCINET and NetDraw
Identifying Cores in Pajek
Identifying Factions in UCINET and NetDraw
Identifying Newman Groups in UCINET and NetDraw
Identifying Newman Groups in ORA
6.6 Summary and Conclusion
7 Centrality, Power, and Prestige
Betweenness-Like Measures
Excursus: Correlating Centrality Metrics with Attributes
Excursus: Correlation in Pajek
7.3 Centrality and Prestige
Estimating Prestige in UCINET
Estimating Prestige in Pajek
Estimating Prestige in ORA
7.4 Summary and Conclusion
8 Brokers, Bridges, and Structural Holes
Constraint (Structural Holes) in UCINET and NetDraw
Constraint (Structural Holes) in Pajek
Constraint (Structural Holes) in ORA
8.3 Bridges, Bi-Components, and Cutpoints
Bridges, Bi-Components, and Cutpoints in NetDraw and UCINET
Bridges, Bi-Components, and Cutpoints in Pajek
Cutpoints (Boundary Spanners) in ORA
Identifying Key Players with Key Player
Identifying Key Players (Critical Sets) with ORA
8.5 Affiliations and Brokerage
Affiliations and Brokerage in UCINET and NetDraw
Affiliations and Brokerage in Pajek
8.6 Bridges and Network Flow
Edge Betweenness in UCINET and NetDraw
8.7 Summary and Conclusion
9 Positions, Roles, and Blockmodels
9.2 Structural Equivalence
9.3 Automorphic Equivalence
9.5 Blockmodeling in UCINET, Pajek, and ORA
Roles, Positions, and Structural Equivalence in UCINET
Roles, Positions, and Structural Equivalence in UCINET (Noordin)
9.6 Summary and Conclusion
Part IV: Social Network Analysis: Advances
10 Dynamic Analyses of Dark Networks
10.2 The Longitudinal Analysis of Dark Networks
Longitudinal Networks in Pajek (Sampson Data)
Longitudinal Networks in Pajek (Noordin Operational Network)
Longitudinal Networks in ORA (Noordin Operational Network)
Social Network Change Detection in ORA (Noordin Operational Network)
10.3 Fusing Geospatial and Social Network Data
Preparing Social Network and Geospatial Data in ORA
Visualizing Social Network and Geospatial Data in ORA
Geospatially Weighted Social Network Metrics in ORA
10.4 Summary and Conclusion
11 Statistical Models for Dark Networks
11.2 Statistical Models for Social Network Data
11.3 Statistical Models in UCINET and ORA
Multivariate Regression with UCINET
Multivariate Regression with ORA
11.4 Summary and Conclusion
12 The Promise and Limits of Social Network Analysis
12.2 The Promise and Limits of Social Network Analysis
12.3 Disrupting Dark Networks Justly
Contemporary Moral Discourse
Fighting Justly with Social Network Analysis
12.4 Summary and Conclusion
Appendix 1: The Noordin Top Terrorist Network
1. Organizational Affiliation
Definitions of Terrorist/Insurgent and Affiliated Organizations
List of Terrorist/Insurgent Organizations
2A. Educational Affiliation
Definition of Educational Relations
2B. Classmates/Educational Colleagues
Definition of Classmate Relations
Definition of Internal Communication
Definition of Training Relations
List of Training Locations
6. Business and Finance Affiliation
Definition of Business Relations
Definition of Friendship Relations
9A. Religious Affiliation
Definition of Religious Relations
Definition of Soulmate Relations
Definition of Logistical Relations
List of Places Where Logistical Support Is Given
Definition of Logistic Functions
List of Logistic Functions
Appendix 2: Glossary of Terms
Appendix 3: Multidimensional Scaling with UCINET
Multidimensional Scaling of Symmetric One-Mode Networks
Metric Multidimensional Scaling
Nonmetric Multidimensional Scaling
Using UCINET Coordinates with NetDraw and Mage
Multidimensional Scaling of Asymmetric One-Mode Networks
Visual Representation of Two-Mode Networks
Appendix 4: The Just War Tradition
Jus ad bellum (Justice in Deciding to Go to War)
Jus in bello (Justice during War)
Jus post bellum (Justice After War)