Skip to main content Accessibility help
×
  • Cited by 19
Publisher:
Cambridge University Press
Online publication date:
August 2015
Print publication year:
2015
Online ISBN:
9781316212639
Subjects:
Social Theory, Organisational Sociology, Research Methods in Sociology and Criminology, Research Methods In Sociology and Criminology, Sociology

Book description

Some of the most important international security threats stem from terror groups, criminal enterprises, and other violent non-state actors (VNSAs). Because these groups are often structured as complex, dark networks, analysts have begun to use network science to study them. However, standard network tools were originally developed to examine companies, friendship groups, and other transparent networks. The inherently clandestine nature of dark networks dictates that conventional analytical tools do not always apply. Data on dark networks is incomplete, inaccurate, and often just difficult to find. Moreover, dark networks are often organized to undertake fundamentally different tasks than transparent networks, so resources and information may follow different paths through these two types of organizations. Given the distinctive characteristics of dark networks, unique tools and methods are needed to understand these structures. Illuminating Dark Networks explores the state of the art in methods to study and understand dark networks.

Reviews

'Social network analysis is now a well-established paradigm within the social sciences and has been successfully applied to various types of relational data. However, until now, too little attention has been paid to how it should be applied to dark networks. Illuminating Dark Networks brings together leading academics, military researchers, and civilian analysts to provide the reader with the latest thinking on how to collect, analyze, and understand clandestine networks. Challenging traditional thinking and proposing new methods and ideas, this volume is timely, informative, and engaging.'

Martin Everett - Chair in Social Network Analysis, Mitchell Centre, University of Manchester

'Illuminating Dark Networks: The Study of Clandestine Groups and Organizations is a rare book title in that it conveys exactly what the book actually delivers. Drawing on work from some of the best researchers in this area, both from the policy world and academia, across fields as diverse as sociology, statistics, and computer science, this edited volume makes an important contribution to our understanding of dark networks and how to study them.'

Victor Asal - University at Albany, State University of New York

Refine List

Actions for selected content:

Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Save to Kindle
  • Save to Dropbox
  • Save to Google Drive

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.
×

Contents

References

Ackerman, G. A., & Pinson, L. (2011). Speaking truth to sources: Introducing a method for the quantitative evaluation of open-sources in event data. National Consortium for the Study of Terrorism and Responses to Terrorism (START) Working Paper. College Park, MD.
Alberts, D., & Hayes, R. (2005). Power to the edge: Command and control in the information age. Boca Raton, FL: CRC Press.
AlSumait, L., Barbara, D., & Domeniconi, C. (2008). On-line LDA: Adaptive topic models for mining text streams with applications to topic detection and tracking. IEEE International Conference on Data Mining (ICDM), 3–12.
Andrich, D. (1988). Rasch models for measurement. Newbury Park, CA: Sage.
Arquilla, J. (2008). Worst enemy: The reluctant transformation of the American military. Chicago, IL: Ivan R. Dee.
Arquilla, J. (2009). Aspects of netwar & the conflict with al Qaeda. Monterey, CA: Information Operations Center, Naval Postgraduate School.
Arquilla, J., & Ronfeldt, D. (2001). The advent of netwar (revised). In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 1–25). Santa Monica, CA: RAND.
Arreguin-Toft, A. (2001). How the weak win wars: A theory of asymmetric conflict. International Relations, 26(1), 93128.
ARTIS Research. (2009, June). REL codebook – public. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/files/Relations_Codebook_Public_Version2.pdf.
Asal, V. H., & Rethemeyer, R. K. (2006). Researching terrorist networks. Journal of Security Education, 1, 6574.
Asal, V. H., (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. Journal of Politics, 70(2), 437–49.
Asal, V. H., (2009). Islamist use and pursuit of CBRN terrorism. In Ackerman, G. & Tamsett, J. (Eds.), Jihadists and weapons of mass destruction (pp. 335–58). Boca Raton, FL: CRC Press.
Axelrod, R., & Cohen, M. D. (2000). Harnessing complexity: Organizational implications of a scientific frontier. New York: Basic Books.
Baker, W. E., & Faulkner, R. R. (1993). The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review, 58(6), 837–60.
Bakker, R. M., Raab, J., & Milward, H. B. (2011). A preliminary theory of dark network resilience. Journal of Policy Analysis and Management, 31, 3362.
Barabási, A.-L. (2002). Linked: How everything is connected to everything else and what it means for business, science, and everyday life. New York: Basic Books.
Barabási, A.-L. (2009). Scale-free networks: A decade and beyond. Science, 325(5939), 412–13.
Barabási, A.-L., Albert, R., & Jeong, H. (1999). Mean-field theory for scale-free random networks. Physica A, 272, 173–87.
Barabási, A.-L., & Bonabeau, E. (2003). Scale-free networks. Scientific American, 288, 60–9.
Barthelemy, M., & Amaral, L. A. N. (1999). Small-world networks: Evidence for a crossover picture. Physical Review Letters, 82, 3180–3.
Bavelas, A. (1948). A mathematical model for group structures. Human Organization, 7(3), 1630.
Bavelas, A. (1950). Communication patterns in task oriented groups. The Journal of the Acoustical Society of America, 22(6), 725–30.
Bavelas, A., & Barret, D. (1951). An experimental approach to organizational communication. Personnel, 27, 366–71.
Baxter, G. J., Dorogovtsev, S. N., Goltsev, A. V., & Mendes, J. F. (2011). Heterogeneous k-core versus bootstrap percolation on complex networks.Physical Review E, 83, 051134.
Bayat, A. (2007). Making Islam democratic: Social movements and the post-Islamist turn. Stanford, CA: Stanford University Press.
Bayir, M. A., Demirbas, M., & Eagle, N. (2009). “Discovering spatiotemporal mobility profiles of cellphone users.” Paper presented at the World of Wireless, Mobile, and Multimedia Networks & Workshops.
Beauchamp, M. A. (1965). An improved index of centrality. Behavioral Science, 10(2), 161–3.
Beckmann, N., Kriegel, H.-P., Schneider, R., & Seeger, B. (1990). The R*-tree: An efficient and robust access method for points and rectangles. ACM SIGMOD Record, 19(2), 322–31.
Bell, J. R. (2014). Subgroup centrality measures. Network Science, 2(2), 277–97.
Belsley, D. A., Kuh, E., & Welsch, R. E. [1980] (2004). Regression diagnostics: Identifying influential data and sources of collinearity. Hoboken, NJ: Wiley.
Bentley, J. L. (1975). Multidimensional binary search trees used for associative searching. Communications of the ACM, 18(9), 509–17.
Berman, E. (2009). Radical, religious, and violent: The new economics of terrorism. Cambridge, MA: MIT Press.
Bernard, H. R., Killworth, D., Kronenfeld, D., & Sailer, L. (1984). On the validity of retrospective data: The problem of informant accuracy. Annual Review of Anthropology, 13, 495517.
Bertetto, J. (2012, November 15). Countering criminal street gangs: Lessons from the counterinsurgent battlespace. Small Wars Journal. Retrieved from: http://smallwarsjournal.com/jrnl/art/countering-criminal-street-gangs-lessons-from-the-counterinsurgent-battlespace.
Bienenstock, E. J., & Bonacich, P. (1992). The core as a solution to exclusionary networks. Social Networks, 14, 231–43.
Bienenstock, E. J., (1993). Game theory models for exchange networks: Experimental results. Sociological Perspectives, 36(2), 117–35.
Blau, P. M. (1964). Exchange and power in social life. New Brunswick, NJ: Transaction.
Blau, P. M. (1994). Structural contexts of opportunities. Chicago, IL: University of Chicago Press.
Blondel, V. D., Guillaume, J.-L., Lambiotte, R., & Lefebvre, E. (2008). Fast unfolding of communities in large networks. Journal of Statistical Mechanics, 10, 10008.
Bollobas, B. (1985). Random graphs. London: London Mathematical Society Monographs, Academic Press.
Bollobas, B., & Riordan, O. (2004). Robustness and vulnerability of scale-free random graphs. Internet Mathematics, 1(1), 135.
Bolz, F., Dudonis, K., & Schulz, D. (2002). Counterterrorism handbook: Tactics, procedures, and techniques. Boca Raton, FL: CRC Press.
Bonacich, P. (1972). Factoring and weighting approaches to status scores and clique identification. Journal of Mathematical Sociology, 2(1), 113–20.
Bonacich, P. (1979). A single measure for point and interval predictions of coalition theories. Behavioral Science, 23, 8593.
Bonacich, P. (1987). Power and centrality a family of measures. American Journal of Sociology, 92, 1170–82.
Bonacich, P. (1991). Simultaneous group and individual centralities. Social Networks, 13(2), 155–68.
Bonacich, P., & Bienenstock, E. J. (1997). Latent classes in exchange networks: Sets of positions with common interest. Journal of Mathematical Sociology, 22(1), 128.
Borgatti, S. P. (2006). Identifying sets of key players in a social network. Computational and Mathematical and Organizational Theory, 12, 2134.
Borgatti, S. P. (2009). 2-Mode concepts in social network analysis. In Meyers, R. A. (Ed.), Encyclopedia of Complexity and Social Science (pp. 8279–91). New York: Springer.
Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). On the robustness of centrality measures under conditions of imperfect data. Social Networks, 28(2), 124–36.
Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). UCINET 6 for Windows. Columbia, SC: Analytic Technologies.
Bott, E. (1955). Urban families: Conjugal roles and social networks. Human Relations, 8, 345–84.
Bowden, M. (2012, October 12). The death of Osama bin Laden: How the US finally got its man. The Guardian. Retrieved from: http://www.theguardian.com/world/2012/oct/12/death-osama-bin-laden-us.
Brafman, O., & Beckstrom, R. A. (2006). The starfish and the spider: The unstoppable power of leaderless organizations. New York: Portfolio.
Brandes, U., Robins, G., McCranie, A., & Wasserman, S. (2013). What is network science?Network Science, 1(1), 115.
Breiger, R. L., Ackerman, G. A., Asal, V. H., Melamed, D., Milward, H. B., Rethemeyer, R. K., & Schoon, E. (2011). Application of a profile similarity methodology for identifying terrorist groups that use or pursue CBRN weapons. In Salerno, J., Yang, S. J., Nau, D., & Chai, S. (Eds.), Social computing, behavioral-cultural modeling and prediction (pp. 2633). Berlin, Germany: Springer.
Breiger, R. L., Carley, K. M., & Pattinson, P. (Eds.) (2003). Dynamic social network modeling and analysis: Workshop summary and papers. Washington, DC: National Academic Press.
Breiger, R. L., & Melamed, D. (2014). The duality of organizations and their attributes: Turning regression modeling “inside out.”Research in the Sociology of Organizations, 40, 263–75.
Breiger, R. L., Schoon, E., Melamed, D., Asal, V. H., & Rethemeyer, R. K. (2014). Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade. Social Networks, 36, 2339.
Bright, D. A., & Delaney, J. J. (2013). Evolution of a drug trafficking network: Mapping changes in network structure and function across time. Global Crime, 14(2–3), 238–60.
Bright, D. A., Greenhill, C., & Levenkova, N. (2010). “Attack of the nodes: Scale-free criminal networks and vulnerability to targeted law enforcement interventions.” Paper presented at the 2nd Illicit Networks Workshop, Wollongong, Australia.
Bright, D. A., Greenhill, C., (2014). Dismantling criminal networks: Can node attributes play a role? In Morselli, C. (Ed.), Crime and networks. New York: Routledge.
Bright, D. A., Hughes, C. E., & Chalmers, J. (2012). Illuminating dark networks: A social network analysis of an Australian drug trafficking syndicate. Crime, Law, and Social Change, 57(2), 151–76.
Burns, J., & Cowell, A. (2013, May 23). Britain knew of 2 suspects in the killing of a soldier. New York Times.
Burt, R. S. (1982). Toward a structural theory of action. Waltham, MA: Academic Press.
Bush, G. W. (2008, January 28). President Bush delivers State of the Union Address. Retrieved from the White House Web page: http://georgewbush-whitehouse.archives.gov/news/releases/2008/01/20080128-13.html.
Callahan, D., Shakarian, P., Nielsen, J., & Johnson, A. (2012). “Shaping Operations to Attack Robust Terror Networks.” Paper presented at the International Conference on Social Informatics. Washington, DC.
Cameron, D. (2014, August 29). Threat level from international terrorism raised: PM press statement. Retrieved from Government of the United Kingdom Web page: https://www.gov.uk/government/speeches/threat-level-from-international-terrorism-raised-pm-press-conference.
Carley, K. M. (1990). Group stability: A socio-cognitive approach. In Lawler, E., Markovsky, B., Ridgeway, C., & Walker, H. (Eds.), Advances in group processes: Theory and research, Vol. VII (pp. 144). Greenwich, CT: JAI Press.
Carley, K. M. (2002). Smart agents and organizations of the future. In Lievrouw, L. & Livingston, S. (Eds.), The handbook of new media (pp. 206–20).Thousand Oaks, CA: Sage.
Carley, K. M. (2003). Dynamic network analysis. In Breiger, R., Carley, K. M., & Pattinson, P. (Eds.), Dynamic social network modeling and analysis: Workshop summary and papers (pp. 133–45). Washington, DC: National Academic Press.
Carley, K. M. (2004). ORA: Organization risk analyzer. Retrieved from the Carnegie Mellon University Web page: http://www.casos.cs.cmu.edu/publications/papers/carley_2004_oraorganizationrisk.pdf.
Carley, K. M. (2006a). A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action: Visualizing Network Information Meeting Proceedings, RTO-MP-IST-063. Neuilly-sur-Seine, France.
Carley, K. M. (2006b). Destabilization of covert networks. Computational and Mathematical Organization Theory, 12, 5166.
Carley, K. M. (2007). Casos dataset. Retrieved from the Center for Computational Analysis of Social and Organizational Systems Web page: http://www.casos.cs.cmu.edu/tools/data2.php.
Carley, K. M. (2014). ORA: A toolkit for dynamic network analysis and visualization. In Alhajj, R. & Rokne, J. (Eds.), Encyclopedia of social network analysis and mining, Springer.
Carley, K. M., & Pfeffer, J. (2012). Dynamic network analysis (DNA) and ORA. In Schmorrow, D. D. & Nicholson, D. M. (Eds.), Advances in design for cross-cultural activities, Part I (pp. 265–74). Boca Raton, FL: CRC Press.
Carley, K. M., Bigrigg, M. W., & Diallo, B. (2012). Data-to-model: A mixed initiative approach for rapid ethnographic assessment. Computational and Mathematical Organization Theory, 18(3), 300–27.
Carley, K. M., Columbus, D., Bigrigg, M. W., & Kunkel, F. (2011). AutoMap user’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, CMU-ISR-11e108.
Carley, K. M., Columbus, D., & Landwehr, P. (2013). AutoMap user’s guide 2013. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, CMU-ISR-13–105.
Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks: Proceedings of the 8th International Command and Control Research and Technology Symposium. Vienna, VA.
Carley, K. M., Lee, J.-S., &. Krackhardt, D. (2001). Destabilizing networks. Connections, 24(3), 7992.
Carley, K. M., Martin, M. K., & Hirshman, B. (2009). The etiology of social change. Topics in Cognitive Science, 1(4), 621–50.
Carley, K. M., Pfeffer, J., Liu, H., Morstatter, F., & Goolsby, R. (2013, August). Near real time assessment of social media using geo-temporal network analytics: Proceedings of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.
Carley, K. M., Reminga, J., & Kamneva, N. (1998). Destabilizing terrorist networks. Institute for Software Research, 45.
Carley, K. M., Reminga, J., (2003). Destabilizing terrorist networks: Proceedings of the 8th International Command and Control Research and Technology Symposium. Evidence Based Research, Track 3. Washington, DC. Retrieved from: http://www.dodccrp.org/events/2003/8th_ICCRTS/pdf/021.pdf.
Carley, K. M., Reminga, J., Storrick, J., & Columbus, D. (2013). ORA user’s guide 2013. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Pittsburgh, PA, Technical Report CMUISR- 13–108.
Carmi, S., Havlin, S., Kirkpatrick, S., Shavitt, Y., & Shir, E. (2007). A model of Internet topology using k-shell decomposition. PNAS, 104(27), 11150–4.
Centola, D. (2010). The spread of behavior in an online social network experiment. Science, 329(5996), 1194–7.
Chao, L. (2013, February 4). Brazil: The social media capital of the universe. Wall Street Journal. Retrieved from: http://online.wsj.com/news/articles/SB10001424127887323301104578257950857891898.
Cho, E., Myers, S. A., & Leskovec, J. (2011). Friendship and mobility: user movement in location-based social networks: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY.
Clarke, R. A., Aga, G. P., Cressey, R. W., Flynn, S. E., Mobley, B. W., Rosenback, E., Simon, S., Wechsler, W. F., & Wolosky, L. S. (2004). Defeating the jihadists: A blueprint for action. New York: Century Foundation Press.
Clauset, A., Newman, M. E., & Moore, C. (2004). Finding community structure in very large networks. Physical Review E, 70(6), 066111.
Clinton, H. R., & Espinosa, P. (2010, March 29). Joint statement of the Merida Initiative High-Level Consultative Group on Bilateral Cooperation Against Transnational Organized Crime. Retrieved from the U.S. Department of State Web page: http://www.state.gov/secretary/20092013clinton/rm/2010/03/139196.htm.
Coleman, J. S. (1990). Foundations of social theory. Cambridge, MA: Harvard University Press.
Coll, S. (2004). Ghost wars: The secret history of the CIA, Afghanistan, and bin Laden, from the Soviet invasion to September 10, 2001. New York: Penguin.
Conboy, K. (2006). The second front. Jakarta, Indonesia: Equinox Press.
Cook, K. S., & Cheshire, C. (2013). Social exchange, power, and inequality in networks. In Wittek, R., Snijders, T., & Nee, V. (Eds.), The handbook of rational choice social research (p. 185). Stanford, CA: Stanford University Press.
Cook, K. S., Emerson, R. M., Gilmore, M. R., & Yamagishi, T. (1983). The distribution of power in exchange networks: Theory and experimental results. American Journal of Sociology, 89, 275305.
Coronges, K. A., Miller, K. M., Tamyo, C. I., & Ender, M. G. (2013). A network evaluation of attitudes toward gays and lesbians among U.S. military cadets. Journal of Homosexuality, 60(11), 1557–80.
Costenbender, E., & Valente, T. W. (2003). The stability of centrality measures when networks are sampled. Social Networks, 25, 283307.
CRAN. (2014). Comprehensive R archive network. Retrieved from: http://cran.us.r-project.org/.
Crelinsten, R. (2002). Analysing terrorism and counter-terrorism: A communication model. Terrorism and Political Violence, 14(2), 77122.
Csardi, G., & Nepusz, T. (2006). The igraph software package for complex network research. InterJournal, Complex Systems, 1695. Retrieved from: http://igraph.org.
Dahl, O.-J., & Nygaard, K. (1966). SIMULA: An ALGOL-based simulation language. Communications of the ACM, 9(9), 671–8.
Davulcu, H., Ahmed, S., Gokalp, S., Temkit, H., Taylor, T., Woodward, M., & Amin, A. (2010). Analyzing sentiment markers describing radical and counter-radical elements in online news. IEEE Symposium on Social Intelligence and Networking (SIN), 335–40.
de Nooy, W., Mrvar, A., & Batagelj, V. (2011). Exploratory social network analysis with Pajek (revised and expanded edition). Cambridge: Cambridge University Press.
Dekker, D., Krackhardt, D., & Snijders, T. A. B. (2007). Sensitivity of MRQAP tests to collinearity and autocorrelation conditions. Psychmetrika, 72(4), 563–81.
Department of the Army. (2006, December). Field Manual 3–24 MCWP 3–33.5: Counterinsurgency. Retrieved from the University of Louisville ROTC Web site: http://louisville.edu/armyrotc/files/FM%203–24%20Counterinsurgency.pdf/view.
Diesner, J. (2012). “Uncovering and managing the impact of methodological choices for the computational construction of socio-technical networks from texts” (Doctoral dissertation). Available from ProQuest Dissertations and Theses database (AAI3536166).
Diesner, J., & Carley, K. M. (2005, April). Exploration of communication networks from the Enron email corpus: Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA.
Diesner, J., (2005). “Revealing and comparing the organizational structure of covert networks with network text analysis.” Paper presented at XXV International Sunbelt Social Network Conference Program, Redondo Beach, CA.
Diesner, J., (2012, June). Impact of relation extraction methods from text data on network data and analysis results: Proceedings ofthe ACM Web Science Conference (WebSci 2012). Evanston, IL.
Diesner, J., Frantz, T. L., & Carley, K. M. (2005). Communication networks from the Enron email corpus: It’s always about the people. Enron is no different. Computational and Mathematical Organizational Theory, 11(3), 201–28.
Diesner, J., Tambayong, L., & Carley, K. M. (2012). Extracting socio-cultural networks of the Sudan from open-source, large-scale text data. Computational and Mathematical Organizational Theory, 18(3), 328–39.
Dijkstra, E. W. (1959). A note on two problems in connexion with graphs. Numerische Mathematik, 1, 269–71.
Dishman, C. (2005). The leaderless nexus: When crime and terror converge. Studies in Conflict & Terrorism, 28, 237–52.
Doreian, P., & Stockman, F. N. (1997). Evolution of social networks. Amsterdam: Gordon and Breach Publishers.
Durkheim, E. (2004). The cultural logic of collective representations. In Lemert, C. (Ed.), Social theory: The multicultural and classic readings (pp. 90–9). Philadelphia, PA: Westview Press.
Eagle, N. (2011). Mobile phones as sensors for social research. Emergent Technologies in Social Research, 492521.
Eagle, N., & Pentland, A. S. (2006). Reality mining: Sensing complex social systems. Personal and Ubiquitous Computing, 10(4), 255–68.
Eagle, N., Pentland, A. S., & Lazer, D. (2009). Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106, 15274–8.
Efron, B., & Tibshirani, R. (1993). An introduction to the bootstrap. Chapman and Hall.
Eilstrup-Sangiovanni, M., & Jones, C. (2008). Assessing the dangers of illicit networks. International Security, 33(2), 37.
Emerson, R. M. (1962). Power-dependence relations. American Sociological Review, 27, 3141.
Emerson, R. M. (1981). Social exchange theory. In Rosenberg, M. & Turner, R. H. (Eds.), Social psychology: Sociological perspectives (pp. 3065). New York: Basic Books.
EPFL. (2014). The Scala programming language. Retrieved from: http://www.scala-lang.org/.
Epstein, J. (2006). Generative social science: Studies in agent-based computational modeling. Princeton, NJ: Princeton University Press.
Erickson, B. H. (1981). Secret societies and social structure. Social Forces, 60, 188210.
Everett, M. G., & Borgatti, S. P. (2012). Categorical attribute based centrality: E-I and G-F centrality. Social Networks, 34(4), 562–9.
Everton, S. F. (2012a). Network topography, key players and terrorist networks. Connections, 32(1), 1219. Retrieved from: http://www.insna.org/PDF/Connections/v32/Connections_Everton_AP.pdf.
Everton, S. F. (2012b). Disrupting dark networks. Cambridge: Cambridge University Press.
Everton, S. F., & Cunningham, D. (2012). Detecting significant changes in dark networks. Behavioral Sciences of Terrorism and Political Aggression, 5(2).
Everton, S. F., (2013). Terrorist network adaptation to a changing environment. In Morselli, C. (Ed.), Crime and networks (pp. 287308). London: Routledge.
Faust, K. (1997). Centrality in affiliation networks. Social Networks, 19, 157–91.
Finkel, R. A., & Bentley, J. L. (1974). Quad trees a data structure for retrieval on composite keys. Actainformatica, 4(1), 19.
Finn, P., & Tate, J. (2009, June 16). CIA says it misjudged role of high-value detainee Abu Zubaida, transcript shows. Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2009/06/15/AR2009061503045.html.
Flintoff, C. (2010, April 5). Marines tap social sciences in Afghan war effort. NPR. Retrieved from http://www.npr.org/templates/story/story.php?storyId=125502485.
Flynn, M., Pottinger, M., & Batchelor, P. (2010). Fixing intel: A blueprint for making intelligence relevant in Afghanistan. Washington, DC: Center for a New American Security.
Freeman, L. C. (1977). A set of measures of centrality based on betweenness. Sociometry, 40(1), 3541.
Freeman, L. C. (1979). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–39.
Freeman, L. C. (2004). The development of social network analysis: A study in the sociology of science. Vancouver, BC: Empirical Press.
Galula, D. (1964). Counterinsurgency warfare: Theory and practice. Westport, CT: Praeger.
Galula, D. [1964] (2006). Counterinsurgency warfare: Theory and practice. Westport, CT: Praeger Security International.
Gambetta, D. (2009). Codes of the underworld: How criminals communicate. Princeton, NJ: Princeton University Press.
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of reusable object-oriented software. Upper Saddle River, NJ: Pearson Education.
Gartenstein-Ross, D. (2011, October 19). Terrorism and the coming decade. Retrieved from the Global Brief Web page: http://globalbrief.ca/blog/2011/10/19/terrorism-and-the-coming-decade-of-fragility/.
Gerdes, L. M. (2012). “On the edge of Al-Qaida? Assessing Al-Qaida’s changing role in terrorist plots and attacks” (Doctoral Dissertation). Available from the University of Pittsburgh.
Gerdes, L. M. (2014). MAPPing dark networks: A data transformation strategy to study clandestine organizations. Network Science, 2(2), 213–53.
Gerdes, L. M., & Carley, K. M. (2009). “Estimating the accuracy of media sources on terrorism.” Paper presented to the 29th International Sunbelt Social Network Conference of the International Network for Social Network Analysis, San Diego, CA.
Gerdes, L. M., Ringler, K., & Autin, B. (2014). Assessing the Abu Sayyaf Group’s strategic and learning capacities. Studies in Conflict and Terrorism, 37(3), 267–93.
Giles, J. (2012). Computational social science: Making the links from e-mails to social networks. Nature, 488, 448–50.
Githens-Mazer, J. (2010). Understanding violent radicalisation. International Affairs, 86(4), 998–9.
Githens-Mazer, J. (2012). The rhetoric and reality: Radicalization and political discourse. International Political Science Review, 33(5), 556–67.
Goertz, G. (2006). Social science concepts: A user’s guide, Princeton, NJ: Princeton University Press.
Goertz, G., & Mahoney, J. (2005). Two-level theories and fuzzy-set analysis. Sociological Methods Research, 33, 497538.
Goertz, G., (2012). A tale of two cultures: Qualitative and quantitative research in the social sciences. Princeton, NJ: Princeton University Press.
Goodchild, M. F. (2007). Citizens as sensors: The world of volunteered geography. GeoJournal, 69(4), 211–21.
Goode, E. (2012, April 30). With green beret tactics, combating gang warfare. New York Times. Retrieved from: http://www.nytimes.com/2012/05/01/us/springfield-mass-fights-crime-using-green-beret-tactics.html?pagewanted=all&_r=0.
Goodman, L. A. (1961). Snowball sampling. Annals of Mathematical Statistics, 32(1), 148–70.
Graham, J. M., Carley, K. M., & Cukor, D. (2008, January). Intelligence database creation & analysis: Network-based text analysis versus human cognition: Proceedings of the 41st Hawaii International Conference on System Sciences. Waikoloa, HI.
Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360–80.
Granovetter, M. S. (1978). Threshold models of collective behavior. The American Journal of Sociology, 83(6), 1420–43.
Guttman, A. (1984). R-trees: A dynamic index structure for spatial searching (Vol. 14): ACM.
Guttman, L. (1950). The basis for scalogram analysis. Measurement and Prediction, 4, 6090.
Hampson, N. (2012). Hacktivism: A new breed of protests in a networked world. Boston College International & Comparative Law Review, 35(2), 511–42.
Hannigan, J., Hernandez, G., Medina, R. M., Roos, P., & Shakarian, P. (2013). “Mining for spatially-near communities in geo-located social networks.” Paper presented to the AAAI Fall Symposium. Arlington, VA.
Hansen, D., Shneiderman, B., & Smith, M. A. (2010). Analyzing social media networks with NodeXL: Insights from a connected world. San Francisco, CA: Morgan Kaufmann.
Hardy, W., & Richard, W. (2006). Operationally significant patterns of associations: Proceedings of IEE Aerospace Conference 2006. Arlington, VA.
Hariharan, R. (2001). “Modeling intersections of geospatial lifelines” (Master thesis). Retrieved from http://www.library.umaine.edu/theses/pdf/hariharanr2001.pdf.
Harris-Hogan, S. (2012). Australian neo-jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35, 298314.
Hayden, N. K. (2009). Terrifying landscapes: Understanding motivations of non-state actors to acquire and/or use weapons of mass destruction. In Ranstorp, M. & Normark, M. (Eds.), Unconventional weapons and international terrorism: Challenges and new approaches (pp. 163–94).New York: Routledge.
Helfstein, S. (2012). Edges of radicalization: Individuals, networks and ideas in violent extremism. Retrieved from the Combating Terrorism Center at West Point: https://www.ctc.usma.edu/v2/wp-content/uploads/2012/06/CTC_EdgesofRadicalization.pdf.
Helfstein, S., (2014, May 16). Risky business: The global threat network and the politics of contraband. Retrieved from the Combating Terrorism Center at West Point Web site: https://www.ctc.usma.edu/posts/risky-business-the-global-threat-network-and-the-politics-of-contraband.
Helfstein, S., (2011). Covert or convenient? Evolution of terror attack networks. Journal of Conflict Resolution, 55(5), 785813.
Hoen, A. G., Hladish, T. J., Eggo, R. M., Lenczner, M., Galvanig, A. P., Brownstein, J. S., & Meyers, L. A. (In press). Epidemic wave dynamics attributable to urban community structure. Journal of Medical Internet Research.
Holland, P. W., & Leinhardt, S. (1971). Transitivity of structural models of small groups. Comparative Group Studies, 2, 107–24.
Homans, G. C. (1961). Social behavior: Its elementary forms. New York: Harcourt Brace Jovanovich.
Horgan, J. (2009). Walking away from terrorism. London: Routledge.
Hornsby, K., & Egenhofer, M. J. (2002). Modeling moving objects over multiple granularities. Annals of Mathematics and Artificial Intelligence, 36(1–2), 177–94.
Hu, D., Kaza, S., & Chen, H. (2009). Identifying significant facilitators of dark network evolution. Journal of the American Society for Information Science and Technology, 60, 655–65.
Hung, B., Kolitz, S., & Ozdaglar, A. (2011). Optimization-based influencing of village social networks in a counterinsurgency:Proceedings of the 4th international conference on social computing, behavioral-cultural modeling and prediction(SBP’11). College Park, MD.
Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., & Morris, M. (2008). ERGM: A package to, simulate and diagnose exponential-family models for networks. Journal of Statistical Software, 24(3), 2.
Husain, E. (2007). The Islamist: Why I became an Islamic fundamentalist, what I saw inside, and why I left. New York: Penguin Books.
Hutchins, C. E., & Benham-Hutchins, M. (2010). Hiding in plain sight: Criminal network analysis. Computational & Mathematical Organization Theory, 16, 89111.
International Crisis Group. (2002). Indonesia backgrounder: How the Jemaah Islamiyah terrorist network operates. Brussels, Belgium: International Crisis Group.
International Crisis Group. (2006). Terrorism in Indonesia: Noordin’s networks. Brussels, Belgium: International Crisis Group.
International Crisis Group. (2007). Jihadism in Indonesia: Poso on the edge. Brussels, Belgium: International Crisis Group.
International Crisis Group. (2009a). The hotel bombings. Brussels, Belgium: International Crisis Group.
International Crisis Group. (2009b). Indonesia: Noordin Top’s support base. Brussels, Belgium: International Crisis Group.
Itai, A., & Rodeh, M. (1978). Finding a minimum circuit in a graph. SIAM Journal on Computing, 7(4), 413–23.
Iwanski, N., & Frank, R. (2014). The evolution of a drug co-arrest network, in Morselli, C. (Ed.), Crime and networks (pp. 5280). New York: Routledge.
Janzen, D. S., & Saiedian, H. (2005). Test-driven development: Concepts, taxonomy, and future direction. Computer Science and Software Engineering, 33(9), 4350.
Johnson, D. (1975). Finding all the elementary circuits of a directed graph. SIAM Journal on Computing, 4(1), 7784.
Johnson, S. (2001). Emergence: The connected lives of ants, brains, cities, and software. New York: Scribner.
Jones, D. (2009). Understanding the form, function, and logic of clandestine cellular networks: The first step in effective counternetwork operations. Fort Leavenworth, KS: School of Advanced Military Studies, United States Army Command and General Staff College.
Jones, D. (2012). Understanding the form, function, and logic of clandestine insurgent and terrorist networks. Tampa, FL: Joint Special Operations University.
Jones, S. (2009). Noordin’s dangerous liaisons, tempo. Jakarta, Indonesia: International Crisis Group.
Jordan, J., Mañas, F. M., & Horsburgh, N. (2008). Strengths and weaknesses of grassroots jihadist networks: The Madrid bombings. Studies in Conflict & Terrorism, 31, 1721.
Joseph, K., Carley, K. M., Filonuk, D., Morgan, G. P., & Pfeffer, J. (2014). Arab Spring: From news data to forecasting. Social Networks and Mining, 4(1). Vienna: Springer.
Kamel, I., & Faloutsos, C. (1993). Hilbert R-tree: An improved R-tree using fractals: Proceedings of the Twentieth International Conference on Very Large Data Bases. Santiago de Chile, Chile. Retrieved from: http://www.informatik.uni-trier.de/~ley/db/conf/vldb/vldb94-500.html.
Kang, C., Pugliese, A., Grant, J., & Subrahmanian, V. (2012). “STUN: Spatio-temporal uncertain (social) networks.” Paper presented at the International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM. Istanbul, Turkey.
Kas, M., Carley, K. M., & Carley, L. R. (2013, August). Incremental closeness centrality for dynamically changing social networks: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.
Kas, M., Wachs, W., Carley, K. M., & Carley, L. R. (2013, August). Incremental computation of betweenness centrality for dynamically growing networks: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.
Kean, T. H., Hamilton, L., & Rhodes, B. (2006). Without precedent: The inside story of the 9/11 Commission. New York: Alfred A. Knopf.
Keegan, B., Ahmed, M. A., Williams, D., Srivastava, J., & Contractor, N. (2010). “Dark gold: Statistical properties of clandestine networks in massively multiplayer online games.” Paper presented at the Social Computing, Second International Conference on IEEE.
Kempe, D. K. (2003). “Maximizing the spread of influence through a social network.” Paper presented at the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). Washington, DC.
Kenney, M. (2007). From Pablo to Osama: Trafficking and terrorist networks, government bureaucracies, and competitive adaptation. University Park: Pennsylvania State University Press.
Kenney, M., Horgan, J., Horne, C., Vining, P., Carley, K. M., Bigrigg, M. W., Bloom, M., & Braddock, K. (2013). Organisational adaptation in an activist network: Social networks, leadership, and change in al-Muhajiroun. Applied Ergonomics, 44(5), 739–47.
Kenney, M., Horgan, J., Horne, C., Vining, P., Carley, K. M., Bigrigg, M., Bloom, M., & Braddock, K. (2015). Competitive adaptation in terrorist networks: Preliminary findings from an Islamist case study. In Stedmon, A., Lawson, G., & Saikayasit, R. (Eds.), Hostile intent & counter-terrorism: Human factors theory and application (pp. 177–93). London: Ashgate.
Kerry, J. (1997). The new war: The web of crime that threatens America’s security. New York: Simon & Schuster.
Kilcullen, D. (2009). The accidental guerrilla: Fighting small wars in the midst of a big one. Oxford: Oxford University Press.
Kilcullen, D. (2010). Counterinsurgency. Oxford: Oxford University Press.
Kim, L. (2011). Media framing for stem cell research: A cross-national analysis of political representation of science between the UK and South Korea. Journal of Science Communication, 10(3), 117.
Ki-moon, B. (2013, May 20). Report of the secretary-general on the activities of the United Nations Regional Office for Central Africa and on the Lord’s Resistance Army-affected areas. Retrieved from: http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2013/297.
Ki-moon, B. (2014, September 23). Remarks at the Climate Summit press conference (including comments on Syria). UN News Centre. Retrieved from: http://www.un.org/apps/news/infocus/sgspeeches/statments_full.asp?statID=2356#.VCMTXmNtrKk.
Kitsak, M., Gallos, L. K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H. E., & Makse, H. A. (2010). Identification of influential spreaders in complex networks. Nature Physics, 6, 888–93.
Kivela, M., Arenas, A., Barthelemy, M., Gleeson, J., Moreno, Y., & Porter, M. (2014). Multilayer networks. Journal of Complex Networks, 2(3), 203–71.
Klerks, P. (2001). The network paradigm applied to criminal organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections, 24, 5365.
Knuth, D. E. (1984). Literate programming. The Computer Journal, 27(2), 97111.
Koka, B. R., & Prescott, J. E. (2002). Strategic alliances as social capital: A multidimensional view. Strategic Management Journal, 23(9), 795816.
Koliba, C., Meek, J. W., & Zia, A. (2011). Governance networks in public administration and public policy. Boca Raton, FL: Taylor & Francis/CRC Press.
Koopman, J. S., Singh, P., & Ionides, E. L. (2014). Transmission modeling to enhance surveillance system function. Transforming Public Health Surveillance. Elsevier.
Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict & Terrorism, 29, 559–75.
Kossinets, G. (2006). Effects of missing data in social networks. Social Networks, 28, 247–68.
Kossinets, G., & Watts, D. J. (2006). Empirical analysis of an evolving social network. Science, 311, 8890.
Krackhardt, D. (1987). QAP partialling as a test of spuriousness. Social Networks, 9(2), 171–86.
Krackhardt, D., & Kilduff, M. (2002). Structure, culture, and Simmelian ties in entrepreneurial firms. Social Networks, 24(3), 279–90.
Krebs, V. E. (2002a). Mapping networks of terrorist cells. Connections, 24(3), 4352.
Krebs, V. E. (2002b). Uncloaking terrorist networks. First Monday, 7(4). Retrieved from: http://firstmonday.org/ojs/index.php/fm/article/view/941/863.
Krempel, L., & Plümper, T. (2003). Exploring the dynamics of international trade by combining the comparative advantages of multivariate statistics and network visualizations. Journal of Social Structure, 4(1) (electronic).
Kumar, S., Barbier, G., Abbasi, M. A., & Liu, H. (2011). Relief, TweetTracker: An analysis tool for humanitarian and disaster relief: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, ICWSM. Barcelona, Spain.
Kumar, S., Morstatter, F., & Liu, H. (2013). Twitter data analytics. New York: Springer.
Lambiotte, R., Blondel, V. D., de Kerchove, C., Huens, E., Prieur, C., Smoreda, Z., & Van Dooren, P. (2008). Geographical dispersal of mobile communication networks. Physica A: Statistical Mechanics and Its Applications, 387(21), 5317–25.
Lanham, M., Morgan, G., & Carley, K. M. (2011). Social network modeling and simulation of integrated resilient command and control (C2) in contested cyber environments. In Levis, A., Carley, K. M., & Karsai, G. (Eds.), Resilient architectures for integrated command and control in a contested cyber environment (pp. 6394). Fairfax, VA: The Volgenau School of Engineering Department of Electrical and Computer Engineering System Architectures Laboratory, George Mason University.
Lake, E. (2011, March 10). China deemed biggest threat to U.S. Washington Times. Retrieved from: http://www.washingtontimes.com/news/2011/mar/10/china-deemed-biggest-threat-to-us/?page=all.
Lawler, E. J. (2001). An affect theory of social exchange. American Journal of Sociology, 107(2), 321–52.
Leavitt, H. (1951). Some effects of certain communication patterns on group performance. The Journal of Abnormal and Social Psychology, 46(1), 3850.
Leenders, R. T. A. J. (1996). Evolution of friendship and best friendship choices. Journal of Mathematical Sociology, 21, 133–48.
Leinhardt, S. (Ed.) (1977). Social networks: A developing paradigm. New York: Academic Press.
Lindenberg, S. (1992). The method of decreasing abstraction. In Coleman, J. S. & Fararo, T. J. (Eds.), Rational choice theory: Advocacy and critique (pp. 320). London: Sage.
Liu, J., Chen, J., & Ye, J. (2009). Large-scale sparse logistic regression: Proceedings of ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), 547–56.
Lusseau, D., Schneider, K., Boisseau, O., Haase, P., Slooten, E., & Dawson, S. (2003). The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behavioral Ecology and Sociobiology, 54, 396405.
Mackenzie, K. D. (1966). Structural centrality in communications networks. Psychometrika, 31(1), 1725.
Magouirk, J., Atran, S., & Sageman, M. (2008). Connecting terrorist networks. Studies in Conflict & Terrorism, 31, 116.
Malensek, M., Lee Pallickara, S., & Pallickara, S. (2013). Exploiting geospatial and chronological characteristics in data streams to enable efficient storage and retrievals. Future Generation Computer Systems, 29(4), 1049–61.
Mancuso, M. (2014). Not all madams have a central role: Analysis of a Nigerian sex trafficking network. Trends in Organized Crime, 17, 6688.
Markovsky, B., Willer, D., & Patton, T. (1988). Power relations in exchange networks. American Journal of Sociology, 53, 220–36.
Markovsky, B., Willer, D., (1990). Reply to Yamagishi and Cook: Theory, evidence, and intuition. American Sociological Review, 5, 300–4.
Mauss, M. (1950). The gift: The form and reason for exchange in archaic societies. New York: Norton.
McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence, 20(3), 415–33.
McCulloh, I., Armstrong, H., & Johnson, A. (2013). Social network analysis with applications. Hoboken, NJ: Wiley.
McCulloh, I., & Carley, K. M. (2011). Detecting change in longitudinal social networks. Journal of Social Structure, 12(3). Retrieved from: http://www.cmu.edu/joss/content/articles/volume12//McCullohCarley.pdf.
McDonald, J. H. (2009). Spearman rank correlation. In McDonald, J. H., Handbook of biological statistics (2nd ed.). Baltimore, MD: Sparky House Publishing. Retrieved from: http://udel.edu/~mcdonald/statspearman.html.
McPherson, J. M., & Rangermoore, J. R. (1991). Evolution on a dancing landscape: Organizations and networks in dynamic blau space. Social Forces, 70, 1942.
Melamed, D., Breiger, R. L., & Schoon, E. (2013). The duality of clusters and statistical interactions. Sociological Methods & Research, 42(1), 4159.
Melamed, D., Schoon, E., Breiger, R. L., Asal, V. H., & Rethemeyer, R. K. (2012). Using organizational similarity to identify statistical interactions for improving situational awareness of CBRN activities. Social Computing, Behavioral-Cultural Modeling, and Prediction Lecture Notes in Computer Science, 7227, 61–8.
Merton, R. K. (1968). The Matthew effect in science. Science, 159, 5663.
Milgram, S. (1967). The small world problem. Psychology Today, 1(1), 61–7.
Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63, 8197.
Miller, H. J. (1991). Modeling accessibility using space-time prism concepts within geographical information systems. International Journal of Geographical Information System, 5(3), 287301.
Milward, H. B., & Raab, J. (2006). Dark networks as organizational problems: Elements of a theory. International Public Management Journal, 9, 333–60.
Molm, L. D., Collett, J. L., & Schaefer, D. R. (2007). Building solidarity through generalized exchange: A theory of Reciprocity 1. American Journal of Sociology, 113(1), 205–42.
Molm, L., Schaefer, D., & Collett, J. (2009). Fragile and resilient trust: Risk and uncertainty in negotiated and reciprocal Exchange. Sociological Theory, 27, 132.
Moody, J. (2005). Fighting a hydra: A note on the network embeddedness of the war on terror. Structure and Dynamics, 1(2). Retrieved from: http://escholarship.org/uc/item/7x3881bs.
Morgan, J. D., & Steinberg, P. E. (2013). Testing the usability of time-geographic maps for crime mapping. In Leitner, M. (Ed.), Crime modeling and mapping using geospatial technologies (pp. 339–66). New York: Springer.
Morselli, C. (2009). Inside criminal networks. New York: Springer.
Morselli, C. (2010). Assessing vulnerable and strategic positions in a criminal network. Journal of Contemporary Criminal Justice, 26, 382–92.
Morselli, C., Giguère, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143–53.
Morselli, C., & Petit, K. (2007). Law-enforcement disruption of a drug importation network. Global Crime, 8(2), 109–30.
Morton, G. M. (1966). A computer oriented geodetic data base and a new technique in file sequencing: Ottawa, ON: International Business Machines Company.
Nagl, J. A. (2005). Learning to eat soup with a knife: Counterinsurgency lessons from Malaya and Vietnam. Chicago, IL: University of Chicago Press.
Nasiri, O. (2006). Inside the jihad: My life with al Qaeda, a spy’s story. New York: Basic Books.
National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission Report: Final report of the National Commission on Terrorist Attacks upon the United States. Washington, DC: United States Government Printing Office.
National Research Council. (2003). Dynamic social network modeling and analysis: Workshop summary and papers. Washington, DC: The National Academies Press.
Newman, M. E. J. (2001). Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Physical Review E, 64, 016132.
Newman, M. E. J., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review E, 69(2), 026113.
Nieminen, J. (1974). On the centrality in a graph. Scandinavian Journal of Psychology, 15(1), 332–6.
Obama, B. H. (2014, May 28). Remarks by the president at the United States Military Academy commencement ceremony. Retrieved from the White House Web page: http://www.whitehouse.gov/the-press-office/2014/05/28/remarks-president-united-states-military-academy-commencement-ceremony.
Odersky, M., Altherr, P., Cremet, V., Emir, B., Manth, S., Micheloud, S., … Zenger, M. (2006). An overview of the Scala programming language (2nd Ed.). Technical report LAMP-REPORT-2006-001. Retrieved from: http:///www.scala-lang.org/docu/files/ScalaOverview.pdf.
Oliver, K., Crossley, N., Edwards, G., Koskinen, J., & Everett, M. (2014, June 25). “Covert networks: Structures, processes and types.” Mitchell Centre Working Paper. Retrieved from: http://www.socialsciences.manchester.ac.uk/medialibrary/research/mitchell/covertnetworks/wp/working_paper1.pdf.
One boy’s journey to jihad. (2010, January 3). Sunday Times (London).
Openshaw, S. (1983). The modifiable areal unit problem. Norwich, UK: Geo Books.
Opsahl, T., Agneessens, F., & Skvoretz, J. (2010). Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32, 245–51.
Ostrom, E. (2005). Understanding institutional diversity. Princeton, NJ: Princeton University Press.
Padrón, B., Nogales, M., & Traveset, A. (2011). Alternative approaches of transforming bimodal into unimodal mutualistic networks: The usefulness of preserving weighted information. Basic and Applied Ecology, 12, 713–21.
Patton, T., & Willer, D. (1990). Connection and power in centralized exchange networks. Journal of Mathematical Sociology, 16, 3149.
Paulo, D., Fischl, B., Markow, T., Martin, M., & Shakarian, P. (2013). “Social network intelligence analysis to combat street gang violence.” Paper presented at the International Symposium on Foundations of Open Source Intelligence and Security Informatics. Niagara Falls, ON.
Pawitan, Y. (2001). In all likelihood: Statistical modelling and inference using likelihood. Oxford: Oxford University Press.
Pedahzur, A., & Perliger, A. (2006). The changing nature of suicide attacks: A social network perspective. Social Forces, 84, 19872008.
Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. Social Forces, 84, 19872008.
Petersen, R., Rhodes, C., & Wiil, U. (2011). Node removal in criminal networks: Proceedings of the European Intelligence and Security Informatics Conference (EISIC). Athens, Greece.
Pfeffer, J., & Carley, K. M. (2012a). Social networks, social media, social change. In Schmorrow, D. D. & Nicholson, D. M. (Eds.), Advances in design for cross-cultural activities, Part II (pp. 273–82).Boca Raton, FL: CRC Press.
Pfeffer, J., (2012b). Rapid modeling and analyzing networks extracted from pre-structured news articles. Computational and Mathematical Organizational Theory, 18(3), 280–99.
Pfeffer, J., (2012c). k-Centralities: Local approximations of global measures based on shortest paths: Proceedings of the WWW Conference 2012, 1st International Workshop on Large Scale Network Analysis (LSNA 2012). Lyon, France.
Philby, P. (2013, June 10). The Tor system: Welcome to the dark Internet where you can search in secret. Independent. Retrieved from: http://www.independent.co.uk/news/media/online/the-tor-system-welcome-to-the-dark-internet-where-you-can-search-in-secret-8651364.html.
Phithakkitnukoon, S., Husna, H., & Dantu, R. (2008). Behavioral entropy of a cellular phone user. In Liu, H., Salerno, J., & Young, M. J. (Eds.), Social computing, behavioral modeling, and prediction (pp. 160–7). New York: Springer.
Ponieman, N. B., Salles, A., & Sarraute, C. (2013). Human mobility and predictability enriched by social phenomena information: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Niagara Falls, NY.
Powell, W. W. (1985). Hybrid organizational arrangements: New form or transitional development?California Management Review, 30, 6787.
Powell, W. W. (1990). Neither market nor hierarchy: Network forms of organization. In Staw, B. M. & Cummings, L. L. (Eds.), Research in organizational behavior: An annual series of analytical essays and critical reviews (pp. 295336). Greenwich, CT: JAI Press.
Pregibon, D. (1981). Logistic regression diagnostics. The Annals of Statistics, 9(4), 705–24.
Press, W. H. (2007). Numerical recipes: The art of scientific computing (3rd. ed.). New York: Cambridge University Press.
Raab, J., & Milward, H. B. (2003). Dark networks as problems. Journal of Public Administration Research and Theory, 13(4), 413–39.
Ragin, C. C. (2008). Redesigning social inquiry: Fuzzy sets and beyond. Chicago, IL: University of Chicago Press.
Ratcliffe, J. H. (2006). A temporal constraint theory to explain opportunity-based spatial offending patterns. Journal of Research in Crime and Delinquency, 43(3), 261–91.
Raymond, C. Z. (2010). Al Muhajiroun and Islam4UK: The group behind the ban. Retrieved from the International Centre for the Study of Radicalisation and Political Violence at King’s College Web site: http://icsr.info/2010/05/al-muhajiroun-and-islam4uk-the-group-behind-the-ban/.
Reed, B. (2007). A social network approach to understanding an insurgency. Parameters, 38, 1930. Retrieved from: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA486072.
Ressa, M. (2003). Seeds of terror: An eyewitness account of al-Qaeda’s newest center of operations in southeast Asia. New York: Free Press.
Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, 2(2). Retrieved from: http://www.hsaj.org/?article=2.2.8.
Rew, R., & Davis, G. (1990). NetCDF: An interface for scientific data access. Computer Graphics and Applications, IEEE, 10(4), 7682.
Ripley, R. M., Snijders, T. A. B., & Preciado, P. (2012). Manual for SIENA, Retrieved from University of Oxford Web site: http://www.stats.ox.ac.uk/~snijders/siena/SIENA_Manual.pdf.
Roberts, N. (2011). Beyond smokestacks and silos: Open-source, web-enabled coordination in organizations and networks. Public Administration Review, 71(5), 677–93.
Roberts, N., & Everton, S. F. (2011). Strategies for combating dark networks. Journal of Social Structure, 12(2). Retrieved from: http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf.
Robins, G. (2009). Understanding individual behaviors within covert networks: The interplay of individual qualities, psychological predispositions, and network effects. Trends in Organized Crime, 12(2), 166–87.
Rodriguez, J. A. (2005). “The March 11th terrorist network: In its weakness lies its strength.” EPP-LEA Working Papers, Department de Sociologica i Analisi de les Organitzacions: Universitat de Barcelona, Barcelona, Spain.
Ronfeldt, D., & Arquilla, J. (2001a). Networks, netwars, and the fight for the future. First Monday, 6(10). Retrieved from: http://www.firstmonday.dkJissues/issue6_10lindex.html.
Ronfeldt, D., (2001b). What next for networks and netwars? In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and netwars (pp. 311–61). Santa Monica, CA.
Sabidussi, G. (1966). The centrality index of a graph. Psychometrika, 31(4), 581603.
Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.
Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia: University of Pennsylvania Press.
Salganik, M. J., & Heckathorn, D. D. (2004). Sampling and estimation in hidden populations using respondent-driven sampling. Sociological Methodology, 34(1), 193240.
Sawyer, J., & Ackerman, G. (2012). “Promethean journeys: Examining the mechanisms by which terrorists acquire new technologies of lethality.” Paper presented at the Annual Meeting of the International Studies Association. San Diego, CA.
Schmitt, E., & Perlez, J. (2009, February 24). Strikes worsen Qaeda threat, Pakistan says. New York Times. Retrieved from: http://www.nytimes.com/2009/02/25/world/asia/25drones.html?pagewanted=all&_r=0.
Schroeder, J., Xu, J., & Chen, H. (2003). Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis. In Chen, H., Miranda, R., Zeng, D., Demchak, C., Schroeder, J., & Madhusudan, T. (Eds.), Intelligence and security informatics (pp. 168–80). Berlin, Germany: Springer.
Schwartz, D. M., & Rouselle, D. A. (2009). Using social network analysis to target criminal networks. Trends in Organised Crime, 12, 188207.
Seber, G. A. F., & Lee, A. J. (2003). Linear regression analysis. Hoboken, NJ: Wiley Interscience.
Seidman, S. B. (1983). Network structure and minimum degree. Social Networks, 5(3), 267–87.
Senate condemns crimes of Joseph Kony and Lord’s Resistance Army. News release of U.S. Senator Christopher Coons of Delaware. Retrieved from: http://www.coons.senate.gov/newsroom/releases/release/senate-condemns-crimes-of-joseph-kony-and-lords-resistance-army.
Shakarian, P., & Paulo, D. (2012). “Large social networks can be targeted for viral marketing with small seed sets.” Paper presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM-2012). Istanbul, Turkey.
Shakarian, P., Salmento, J., Pulleyblank, W., & Bertetto, J. (2014). “Reducing gang violence through network influence based targeting of social programs.” Paper presented at the 20th ACM SIGKDD Conference on Knowledge, Discovery, and Data Mining (KDD). New York, NY.
Shakarian, P., Simari, G., & Schroeder, R. (2013). “MANCaLog: A logic for multi-attribute network cascades.” Paper presented at the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-13). St. Paul, MN.
Shalev, M. (2007). Limits and alternatives to multiple regression in comparative research. In Mjøset, L. & Clausen, T. H. (Eds.), Comparative social research (symposium on methodology in comparative research) (pp. 261308).Elsevier.
Sheppard, Z. (2010, September 19). 5,000,000,000. [Blog post]. Retrieved from http://blog.flickr.net/en/2010/09/19/5000000000/.
Silver, N. (2012). The signal and the noise: The art and science of prediction. New York: Penguin Books.
Simcox, R., Stuart, H., & Ahmed, H. (2010). Islamist terrorism: The British connections. Retrieved from the Henry Jackson Society Web page: http://henryjacksonsociety.org/2011/07/07/islamist-terrorism-the-british-connections/.
Simmel, G. (1906). The sociology of secrecy and of secret societies. American Journal of Sociology, 11, 441–98.
Simmel, G. (1950). The secret society. In Wolf, K. H. (Ed.), The sociology of Georg Simmel (pp. 345–76). New York: The Free Press.
Simmel, G. (2008). Sociological theory, New York: McGraw–Hill.
Singer, P. W. (2012, November). The cyber terror bogeyman. Retrieved from the Brookings Institute Web page: http://www.brookings.edu/research/articles/2012/11/cyber-terror-singer.
Skillicorn, D. B. (2006). Social network analysis via matrix decompositions. In Popp, R. L. & Yen, J. (Eds.), Emergent information technologies and enabling policies for counter-terrorism (pp. 367–91). Hoboken, NJ: Wiley Interscience.
Skvoretz, J., & Willer, D. (1993). Exclusion and power: A test of four theories of power in exchange networks. American Sociological Review, 58, 801–18.
Snijders, T. A. B. (2001). The statistical evaluation of social network dynamics. Sociological Methodology, 31, 361–95.
Snijders, T. A. B., Van de Bunt, G. G., & Steglich, C. E. G. (2010). Introduction to stochastic actor-based models for network dynamics. Social Networks, 32(1), 4460.
Sparrow, M. K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251–74.
Spearman, C. (1904). The proof and measurement of association between two things. American Journal of Psychology, 15, 72101.
Sprinzak, E. (2000). Rational fanatics. Foreign Policy, 122. Retrieved from: http://www.foreignpolicy.com/articles/2000/09/01/rational_fanatics.
Stefik, M., & Bobrow, D. G. (1985). Object-oriented programming: Themes and variations. AI Magazine, 6(4), 40.
Steglich, C., Snijders, T. A. B., & Pearson, M. (2010). Dynamic networks and behavior: Separating selection from influence. Sociological Methodology, 40(1), 329–93.
Stevenson, R., & Crossley, N. (2014). Change in covert social movement networks: The “inner circle” of the Provisional Irish Republic Army. Social Movement Studies, 13, 7091.
Strogatz, S. H. (2001). Exploring complex networks. Nature, 410, 268–76.
Suskind, R. (2006). The one percent doctrine: Deep inside America’s pursuit of its enemies since 9/11. New York: Simon & Schuster.
Thomas, T., Kiser, S., & Casebeer, W. (2005). Warlords rising: Confronting violent non-state actors. Lanham, MD: Lexington Books.
Thomas, T. L. (2003). Al-Qaida and the Internet: The danger of “cyberplanning.” DTIC, ADA485810.
Tibshirani, R. (1996). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society Series B, 58(1), 267–88.
Tikves, S., Banerjee, S., Temkit, H., Gokalp, S., Davulcu, H., Sen, A., Corman, S., Woodward, M., & Amin, A. (2011). A system for ranking organizations using social scale analysis. European Intelligence and Security Informatics Conference (EISIC), 308–13.
Tikves, S., Banerjee, S., Temkit, H., Gokalp, S., Davulcu, H., Sen, A., Corman, S., Woodward, M., Rohmaniyah, I., & Amin, A. (2013). A system for ranking organizations using social scale analysis. Social Network Analysis and Mining Journal, 3(3), 313–28.
Tikves, S., Gokalp, S., Temkit, M., Banerjee, S., Ye, J., & Davulcu, H. (2012). Perspective analysis for online debates. Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 898–905.
Tilly, C. (2004a). Social movements, Boulder, CO: Paradigm Publishers.
Tilly, C. (2004b). Trust and rule. Theory and Society, 33, 130.
Tilly, C. (2005). Trust and rule. Cambridge: Cambridge University Press.
Tong, H., Sakurai, Y., Eliassi-Rad, T., & Faloutsos, C. (2008). Fast mining of complex time-stamped events: Proceedings of the 17th ACM Conference on Information and Knowledge Management. Napa Valley, CA.
Travers, J., & Milgram, S. (1969). An experimental study of the small world problem. Sociometry, 32(4), 425–43.
Tsvetovat, M., & Carley, K. M. (2003). “Bouncing back: Recovery mechanisms of covert networks.” Paper presented at the NAACSOS Conference proceedings, Pittsburgh, PA.
Tsvetovat, M., (2005). Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. Journal of Social Structure, 6. Retrieved from: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCarley/.
Typesafe. (2014). Akka. Retrieved from: http://akka.io/.
Ungerer, C. (2011). Jihadists in jail: Radicalisation and the Indonesian prison experience. Barton, Australia: Australian Strategic Policy Institute (ASPI).
United Nations Office on Drugs and Crime (UNODC). (2011). Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. (Research report). Retrieved from: http://www.unodc.org/documents/data-and-analysis/Studies/Illicit_financial_flows_2011_web.pdf.
Ugarte, E. F., & Turner, M.M. (2011). What is the “Abu Sayyaf”? How labels shape reality. Pacific Review, 24(4), 397420.
Usher, A. (2010). Temporal algorithms for processing and analyzing large datasets. Sterling Data LLC Report.
Valente, T. W. (2010). Social networks and health: Models, methods, and applications. New York: Oxford University Press.
Van de Bunt, G. G., Van Duijin, M. A. J., & Snijders, T. A. B. (1999). Friendship networks through time: An actor-oriented statistical network model. Computational and Mathematical Organization Theory, 5, 167–92.
Van de Geer, J. P. (1971). Introduction to multivariate analysis for the social sciences. San Francisco, CA: W. H. Freeman and Co.
Van Holt, T., Johnson, J. C., Brinkley, J., Carley, K. M., & Caspersen, J. (2012). Structure of ethnic violence in Sudan: An automated content, meta-network, and geospatial analytical approach. Computational and Mathematical Organizational Theory, 18, 340–55.
Van Meter, K. M. (2001). Terrorists/liberators: Researching and dealing with adversary social networks. Connections, 24(3), 6678.
Walker, H. A., Thye, S. R., Simpson, B., Lovaglia, M. J., Willer, D., & Markovsky, B. (2000). Network exchange theory: Recent developments and new directions. Social Psychology Quarterly, 63(4), 324–37.
Wallace, A. (1956). Revitalization movements. American Anthropologist, 58, 264–81.
Waltz, K. (1959). Man, the state, and war: A theoretical analysis. New York: Columbia University Press.
Wang, D. J., Shi, X., McFarland, D. A., & Leskovec, J. (2012). Measurement error in network data: a re-classification. Social Networks, 34(4), 396409.
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. Cambridge: Cambridge University Press.
Watts, D. (2004). Six degrees: The science of a connected age. New York: WW Norton.
Watts, D. J., & Strogatz, S. H. (1998). Collective dynamics of “small-world” networks. Nature, 393, 440–2.
Weiss, G. M. (2005). Data mining in telecommunications. In Maimon, O. & Rokach, L. (Eds.), Data mining and knowledge discovery handbook: A complete guide for practitioners and researchers (pp. 11891201). Norwell, MA: Kluwer Academic Publishers.
West, B. J., & Grigolini, P. (2011). Complex webs: Anticipating the improbable. Cambridge: Cambridge University Press.
Wiemann, G. (2004). Www.terror.net: How modern terrorism uses the Internet. Retrieved from the United States Institute of Peace Web site: http://www.usip.org/sites/default/files/sr116.pdf.
Wigner, E. P. (1960). The unreasonable effectiveness of mathematics in the natural sciences. Richard Courant lecture in mathematical sciences delivered at New York University, May 11, 1959. Communications on Pure and Applied Mathematics, 13(1), 114.
Wiktorowicz, Q. (2005). Radical Islam rising: Muslim extremism in the west. Lanham, MD: Rowman & Littlefield.
Willer, D., Van Assen, M., & Emanuelson, P. (2012). Analyzing large scale exchange networks. Social Networks, 34(2), 171–80.
Williams, C. (2003). The question of “links” between al Qaeda and southeast Asia. in Ramakrishna, K. and Tan, S. S. (Eds.), After Bali: The threat of terrorism in southeast Asia (pp. 8396).Singapore: World Scientific and the Institute of Defense and Strategic Studies.
Williams, P. (2001). Transnational criminal networks. In Arquilla, J. (Ed.), Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.
Xu, J., & Chen, H. (2003). Untangling criminal networks: A case study. Intelligence and Security Informatics, Lecture Notes in Computer Science, 2665, 232–48.
Xu, J., & Chen, H. (2008, October). The topology of dark networks. Communications of the ACM, 51(10), 5865.
Xu, J., Hu, D., & Chen, H. (2009). The dynamics of terrorist networks: Understanding the survival mechanisms of global Salafi jihad. Journal of Homeland Security and Emergency Management, 6(1).
Xu, J., Marshall, B., Kaza, S., & Chen, H. (2004). Analyzing and visualizing criminal network dynamics: A case study. Intelligence and Security Informatics, Lecture Notes in Computer Science, 3073, 359–77.
Yamagishi, T., & Cook, K. S. (1990). Power relations in exchange networks: A comment on “network exchange theory.”American Sociological Review, 55, 297300.
Yasin, N. A. (2010, December 17). Counter ideology: Battle for hearts and minds in Indonesia. RSIS Commentaries, 173. Retrieved from: http://www.rsis.edu.sg/rsis-publication/rsis/1463-counter-ideology-battle-for-h/#.VCCOtmNtrKl.
Zhang, H., Korayem, M., You, E., & Crandall, D. J. (2012). Beyond co-occurrence: Discovering and visualizing tag relationships from geo-spatial and temporal similarities: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining. Seattle, WA.
Ziliak, S. T., & McCloskey, D. N. (2008). The cult of statistical significance. Ann Arbor: University of Michigan Press.

Metrics

Altmetric attention score

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Book summary page views

Total views: 0 *
Loading metrics...

* Views captured on Cambridge Core between #date#. This data will be updated every 24 hours.

Usage data cannot currently be displayed.