Disrupting Dark Networks ( Structural Analysis in the Social Sciences )

Publication series :Structural Analysis in the Social Sciences

Author: Sean F. Everton  

Publisher: Cambridge University Press‎

Publication year: 2012

E-ISBN: 9781139786577

P-ISBN(Paperback): 9781107022591

Subject: C912.3 Social relations, social thought.

Keyword: 社会学

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Disrupting Dark Networks

Description

Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholars and analysts an array of approaches for disrupting dark networks.

Chapter

Tie

Cohesive Subgroups (Subnetworks)

Centrality

Brokers and Bridges

Roles and Positions

Attributes

1.4 Assumptions

Interdependence of Actors

Ties as Conduits

Social Structure in Terms of Social Networks

Emergent Social Formations

Structural Location: Beliefs, Norms, Intentions, Behavior, and Identity

Dynamic Social Networks

1.5 Social Networks, Human Agency, and Culture

1.6 Summary and Conclusion

2 Strategic Options for Disrupting Dark Networks

2.1 Introduction

2.2 Strategic Options for Disrupting Dark Networks2

Kinetic Approach

Nonkinetic Approach

Summary

2.3 Crafting Strategies with Social Network Analysis

Developing Working Hypotheses

Identifying, Collecting, and Recording Social Network Data

Aggregating (Combining) and/or Parsing Networks

Analysis and Interpretation

Crafting Strategies

2.4 Summary and Conclusion

Part II: Social Network Analysis: Techniques

3 Getting Started with UCINET, NetDraw, Pajek, and ORA

3.1 Introduction

3.2 UCINET

Getting Started with UCINET

3.3 NetDraw

Getting Started with NetDraw

Mapping Algorithms in NetDraw

Visualizing Attribute Data in NetDraw

3.4 Pajek

Getting Started with Pajek

Mapping Algorithms in Pajek

Visualizing Attribute Data in Pajek

3.5 ORA (Organizational Risk Analyzer)

Getting Started with ORA

Mapping Algorithms in ORA

Visualizing Attribute Data in ORA

3.6 Summary and Conclusion

4 Gathering, Recording, and Manipulating Social Networks

4.1 Introduction

4.2 Boundary Specification

Realist vs. Nominalist Strategies

Definitional Focus: Attributes, Relations, or Events

Summary

4.3 Ego Networks and Complete Networks

Ego Networks

Complete Networks

4.4 Types of Social Network Data

Symmetric One-Mode Networks

Asymmetric One-Mode Networks

Two-Mode Networks

4.5 Collecting Social Network Data

Questionnaires

Interviews

Direct Observation

Written Records

Other Approaches

4.6 Recording Social Network Data

Recording One-Mode Social Network Data

Recording Two-Mode Social Network Data

Recording Attribute Data

Exporting Social Network Data to Pajek

Importing/Reading UCINET Data into Pajek and ORA

4.7 Deriving One-Mode Networks from Two-Mode Networks

4.8 Combining, Aggregating, and Parsing Networks

Multirelational Data in UCINET and NetDraw

Multirelational Data in Pajek

Excursus: Positive and Negative Relations in UCINET and Pajek

Multirelational Data in ORA

4.9 Extracting and Simplifying Networks

Extracting Networks in UCINET

Simplifying (Collapsing) Networks in NetDraw

Extraction and Simplification in Pajek

Extraction and Simplification in ORA

4.10 Summary and Conclusion

Part III: Social Network Analysis: Metrics

5 Network Topography1

5.1 Introduction

5.2 Some Basic Topographical Metrics

5.3 The Provincial-Cosmopolitan Dimension

5.4 The Hierarchical-Heterarchical Dimension

5.5 Estimating Network Topographical Metrics

Network Topography in UCINET

Network Topography in Pajek

Network Topography in ORA

A Cautionary Note

5.6 Summary and Conclusion

6 Cohesion and Clustering

6.1 Introduction

6.2 Components

Identifying Components in UCINET

Visualizing Components in NetDraw

Identifying Components in Pajek

Identifying Components in ORA

6.3 Cores

Identifying Cores in UCINET and NetDraw

Identifying Cores in Pajek

6.4 Factions

Identifying Factions in UCINET and NetDraw

6.5 Newman Groups

Identifying Newman Groups in UCINET and NetDraw

Identifying Newman Groups in ORA

6.6 Summary and Conclusion

7 Centrality, Power, and Prestige

7.1 Introduction

Degree-Like Measures

Closeness-Like Measures

Betweenness-Like Measures

Summary

7.2 Centrality and Power

Centrality in UCINET

Excursus: Correlating Centrality Metrics with Attributes

Centrality in NetDraw

Centrality in Pajek

Excursus: Correlation in Pajek

Centrality in ORA

Summary

7.3 Centrality and Prestige

Estimating Prestige in UCINET

Estimating Prestige in Pajek

Estimating Prestige in ORA

7.4 Summary and Conclusion

8 Brokers, Bridges, and Structural Holes

8.1 Introduction

8.2 Structural Holes

Constraint (Structural Holes) in UCINET and NetDraw

Constraint (Structural Holes) in Pajek

Constraint (Structural Holes) in ORA

8.3 Bridges, Bi-Components, and Cutpoints

Bridges, Bi-Components, and Cutpoints in NetDraw and UCINET

Bridges, Bi-Components, and Cutpoints in Pajek

Cutpoints (Boundary Spanners) in ORA

8.4 Key Players

Identifying Key Players with Key Player

Identifying Key Players (Critical Sets) with ORA

8.5 Affiliations and Brokerage

Affiliations and Brokerage in UCINET and NetDraw

Affiliations and Brokerage in Pajek

8.6 Bridges and Network Flow

Edge Betweenness in UCINET and NetDraw

8.7 Summary and Conclusion

9 Positions, Roles, and Blockmodels

9.1 Introduction

9.2 Structural Equivalence

9.3 Automorphic Equivalence

9.4 Regular Equivalence

9.5 Blockmodeling in UCINET, Pajek, and ORA

Roles, Positions, and Structural Equivalence in UCINET

Roles, Positions, and Structural Equivalence in UCINET (Noordin)

9.6 Summary and Conclusion

Part IV: Social Network Analysis: Advances

10 Dynamic Analyses of Dark Networks

10.1 Introduction

10.2 The Longitudinal Analysis of Dark Networks

Longitudinal Networks in Pajek (Sampson Data)

Longitudinal Networks in Pajek (Noordin Operational Network)

Longitudinal Networks in ORA (Noordin Operational Network)

Social Network Change Detection in ORA (Noordin Operational Network)

10.3 Fusing Geospatial and Social Network Data

Preparing Social Network and Geospatial Data in ORA

Visualizing Social Network and Geospatial Data in ORA

Geospatially Weighted Social Network Metrics in ORA

10.4 Summary and Conclusion

11 Statistical Models for Dark Networks

11.1 Introduction

11.2 Statistical Models for Social Network Data

11.3 Statistical Models in UCINET and ORA

Multivariate Regression with UCINET

Multivariate Regression with ORA

11.4 Summary and Conclusion

Part V: Conclusion

12 The Promise and Limits of Social Network Analysis

12.1 Introduction

12.2 The Promise and Limits of Social Network Analysis

12.3 Disrupting Dark Networks Justly

Contemporary Moral Discourse

The Just War Tradition

Fighting Justly with Social Network Analysis

Summary

12.4 Summary and Conclusion

Appendix 1: The Noordin Top Terrorist Network

1. Organizational Affiliation

Definitions of Terrorist/Insurgent and Affiliated Organizations

List of Terrorist/Insurgent Organizations

2A. Educational Affiliation

Definition of Educational Relations

List of Schools

2B. Classmates/Educational Colleagues

Definition of Classmate Relations

3. Communication Ties

Definition of Internal Communication

4. Kinship Ties

Definition of Kinship

5. Training Events

Definition of Training Relations

List of Training Locations

6. Business and Finance Affiliation

Definition of Business Relations

Types of Businesses

7. Operations

Definition of Operations

List of Operations

8. Friendship Ties

Definition of Friendship Relations

9A. Religious Affiliation

Definition of Religious Relations

List of Mosques

9B. Soulmates

Definition of Soulmate Relations

10. Logistical Place

Definition of Logistical Relations

List of Places Where Logistical Support Is Given

11. Logistical Function

Definition of Logistic Functions

List of Logistic Functions

12. Meetings

Definition of Meetings

List of Meetings

13. Attribute Data

Appendix 2: Glossary of Terms

Appendix 3: Multidimensional Scaling with UCINET

Multidimensional Scaling of Symmetric One-Mode Networks

Metric Multidimensional Scaling

Nonmetric Multidimensional Scaling

Using UCINET Coordinates with NetDraw and Mage

Multidimensional Scaling of Asymmetric One-Mode Networks

Visual Representation of Two-Mode Networks

Appendix 4: The Just War Tradition

Jus ad bellum (Justice in Deciding to Go to War)

Jus in bello (Justice during War)

Jus post bellum (Justice After War)

References

Index

The users who browse this book also browse


No browse record.