基于社会网络理论的恐怖组织隐蔽网络分析方法  被引量:14

Study on the terrorist covert networks from the perspective of social network analysis

在线阅读下载全文

作  者:张海[1] 孙多勇[1] 

机构地区:[1]国防科学技术大学信息系统与管理学院,长沙410073

出  处:《安全与环境学报》2011年第3期259-264,共6页Journal of Safety and Environment

基  金:国家自然科学基金项目(70973138)

摘  要:针对以"基地"为典型的国际恐怖组织网络化运作的趋势,从组织行为学的角度分析恐怖组织网络特点及其带来的挑战,总结社会网络分析在描述恐怖分子静态网络特征,定位关键人物方面的基本方法,运用等价性分析从整体结构上评估恐怖组织隐蔽网络,对网络作基于人际交互流向的指挥控制结构脆弱性分析,利用网络中心度量化及派系参与分析方法找出网络中的核心人物,并以美国大使馆爆炸案为例进行实证分析。研究表明,结合网络结构等价分析,基于人际交互流向的指控结构分析、网络中心度量化及派系参与方法可以有效评估恐怖组织隐蔽网络并挖掘网络核心人物。This paper is to present its research results on how to use the social network analysis method to analyze the terrorist network structure and detect the vulnerability of such covert networks. In proceeding with our study, we have given a brief recount of what the "new terrorism" is, how it has evolved, and how it interferes with any detective activities oriented on them in hoping to gain access to their network operations and insights into their activities so as to be able to work out tit-for-tat count measures in dealing with them. In doing so, we have divided our study into four stages: ( 1 ) the Contextual Background; (2) the Relational Data Study Stage; (3) Network Criteria Analysis, and ; (4) the Application of Destabilisation Analysis Techniques. The so-called contextual background analysis is aimed at making a comprehensive analysis of the physical environment of the network, the group itseff, the individual figures inside the network, and, particularly, the mutual connection and interaction among these figures. The so-called relational data stage intends to identify the individual figures within the nuclear cell. The information data on their relations can be stored in a binary one-to-one matrix form, in which A-to-B interaction can be represented with number 1, and number 0 (zero) to stand for either on-going interaction or no interaction between any two members, though it merely indicates if there exists any two-way connection between the terrorist elements. Here in this stage we may present a case study to introduce what data can be accessed from the center of Computational Analysis of Social and Organizational Systems. Here in the case study, the cell from the binary matrix can be used to construct a sociograph or a network analysis program named ORA 1.9.5, which helps to analyze the criteria of density, cohesion and the Core-Periphe situation. The next stage is to use the Structural Equivalence and the CONCOR approach to decypher the characteristics of the network by combini

关 键 词:安全工程 社会网络分析 恐怖组织结构 蜂窝状网络 数据挖掘 打击策略 

分 类 号:X915.2[环境科学与工程—安全科学]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象