Social Network Analysis (SNA)
- see also behavior modeling above
- see also data mining on Air War College Gateway to the Internet
- Analysis of Layered Social Networks (local copy), by Hamill, AFIT dissertation, Sep 2006
- Prevention of near-term terrorist attacks requires an understanding of current terrorist organizations to include their composition, the actors involved, and how they operate to achieve their objectives. To aid this understanding, operations research, sociological, and behavioral theory relevant to the study of social networks are applied, thereby providing theoretical foundations for new methodologies to analyze non-cooperative organizations, defined as those trying to hide their structure or are unwilling to provide information regarding their operations.
- Networks and Social Dynamics Research Group, Cornell University – “studies the effects of network topology on the dynamics of social interaction” – including research topics such as collective action and cultural diffusion
- How the NSA Does “Social Network Analysis” – It’s like the Kevin Bacon game, by Dryer, in Slate, 15 May 2006
- An Introduction to Social Network Analysis, by OrgNet.com
- Simulating Network Influence Algorithms Using Particle-Swarms: Pagerank and Pagerank-Priors (local copy), by Rodriguez and Bollen, Los Alamos National Laboratory, Aug 2005 – article submitted to Journal of Complexity
- The Convergence of Digital Libraries and the Peer Review Process (local copy), by Rodriguez, Sompel, and Bollen, Los Alamos National Laboratory, 2005 – article submitted to Journal of Information Science – discusses using “a social-network algorithm for determining potential reviewers for a submitted manuscript and for weighting the influence of each participating reviewer’s evaluations”
- Social Networks and Social Networking, by Churchill and Halverson, in IEEE Internet Computing, Sep-Oct 2005
- Social Networking Analysis: One of the First Steps in Net-Centric Operations (local copy), by Edison, in Defense Acquisition Review Journal, Aug-Nov 2005
- Network Topology and the Dynamics of Collective Action (local copy), project abstract by Macy, Cornell University, for National Science Foundation, Sep 2005
- Our research has led to several important discoveries about the diffusion of innovation and beliefs, including the spread of participation in collective action. Diffusion over social and information networks displays a striking regularity that Granovetter (1973) called “the strength of weak ties.” As Granovetter put it, “whatever is to be diffused can reach a larger number of people, and traverse a greater social distance, when passed through weak ties rather than strong.” The strength of weak ties is that they tend to be long – they connect socially distant locations. Recent research on “small worlds” shows that remarkably few long ties are needed to give large and highly clustered populations the “degrees of separation” of a random network, in which information can rapidly diffuse.
- Computational Social Science, Culture and the Global War on Terror (local copy), by Dr Rebecca Goolsby, ONR, at Naval-Industry R&D Partnership Conference, 26-29 Jul 05
- Iraq: the Social Context of IEDs (local copy), by McFate, in Military Review, May-June 2005
- How do you locate insurgents within a tribal network? Social network analysis (SNA) provides valuable tools for understanding tribal organization and charting the links between tribes and insurgents. Social network analysis is the mapping and measuring of relationships and flows between people, groups, organizations, and computers or other knowledge-processing entities. These methods proved highly successful in capturing Saddam Hussein. The 104th Military Intelligence Battalion developed a social network program called “Mongo Link” to chart personal relationships using data from Iraqi informants, military patrols, electronic intercepts, and a range of other sources. One of the 62,500 connections led directly to Saddam.
- SNA resources, such as those under development at the Office of Naval Research, identify how to maximally disrupt a network by intervening with the key players and how to maximally spread ideas, misinformation, and materials by seeding key players. By using data about IIS members and their personal relationships within the Iraqi tribal network, SNA can describe terrorist networks, anticipate their actions, predict their targets, and deny the insurgents the ability to act.
- Modeling and Analysis of Clandestine Networks (local copy), by Clark, AFIT, March 2005
- The methodology is applied to open source data on both Al Qaeda and the Jemaah Islamiah (JI) terrorist networks. Key leaders are identified, and leadership profiles are developed. Further, a parametric analysis is performed to compare influence based on individual characteristics, network topology characteristics, and mixtures of network and non-network characteristics.
- Aggregation Techniques to Characterize Social Networks (local copy), by Sterling, AFIT, Sep 2004
- Social network analysis focuses on modeling and understanding individuals of interest and their relationships. Aggregation of social networks can be used both to make analysis computationally easier on large networks, and to gain insight in subgroup interactions.
- Modeling and Analysis of Social Networks (local copy), by Renfro, AFIT, Dec 2001
- Social networks depict the complex relationships of individuals and groups in multiple overlapping contexts. Influence in a social network impacts behavior and decision making in every setting in which individuals participate. This study defines a methodology for modeling and analyzing this complex behavior using a Flow Model representation. Multiple objectives in an influencing effort targeted at a social network are modeled using Goal Programming. Value Focused Thinking is applied to model influence and predict decisions based on the reaction of the psychological state of individuals to environmental stimuli.
- A Social Network Analysis of the Iranian Government (local copy), by Renfro and Deckro, AFIT, June 2001
- Competition in Social Networks: Emergence of a Scale-free Leadership Structure and Collective Efficiency (local copy), by Anghel et al, Los Alamos National Laboratory, July 2003
- Team Seldon: Simulation of Extreme Transitions in Social Dynamic (local copy), Sandia National Labs, July 2003
- Modeling Terrorist Networks – Complex Systems at the Mid-Range, by Fellman and Wright
|