Social Network Analysis
(SNA)
-
see also behavior modeling
above
-
see also
data mining on Air War College Gateway to the Internet
-
Analysis
of Layered Social Networks (local copy), by
Hamill, AFIT dissertation, Sep 2006
-
Prevention of near-term terrorist attacks requires an understanding of current
terrorist organizations to include their composition, the actors involved,
and how they operate to achieve their objectives. To aid this understanding,
operations research, sociological, and behavioral theory relevant to the
study of social networks are applied, thereby providing theoretical foundations
for new methodologies to analyze non-cooperative organizations, defined as
those trying to hide their structure or are unwilling to provide information
regarding their operations.
-
Networks and Social Dynamics Research
Group, Cornell University - "studies the effects of network topology
on the dynamics of social interaction" - including research topics such as
collective action and cultural diffusion
-
How the NSA Does "Social Network
Analysis" - It's like the Kevin Bacon game, by Dryer, in Slate,
15 May 2006
-
An Introduction to Social Network
Analysis, by OrgNet.com
-
Simulating
Network Influence Algorithms Using Particle-Swarms: Pagerank and Pagerank-Priors
(local copy), by Rodriguez and Bollen, Los Alamos
National Laboratory, Aug 2005 - article submitted to Journal of
Complexity
-
The
Convergence of Digital Libraries and the Peer Review Process
(local copy), by Rodriguez, Sompel, and Bollen,
Los Alamos National Laboratory, 2005 - article submitted to Journal of
Information Science - discusses using "a social-network algorithm for
determining potential reviewers for a submitted manuscript and for weighting
the influence of each participating reviewers evaluations"
-
Social
Networks and Social Networking, by Churchill and Halverson, in IEEE
Internet Computing, Sep-Oct 2005
-
Social
Networking Analysis: One of the First Steps in Net-Centric Operations
(local copy), by Edison, in Defense Acquisition
Review Journal, Aug-Nov 2005
-
Network Topology
and the Dynamics of Collective Action (local
copy), project abstract by Macy, Cornell University, for National
Science Foundation, Sep 2005
-
Our research has led to several important discoveries about the diffusion
of innovation and beliefs, including the spread of participation in collective
action. Diffusion over social and information networks displays a striking
regularity that Granovetter (1973) called the strength of weak ties.
As Granovetter put it, whatever is to be diffused can reach a larger
number of people, and traverse a greater social distance, when passed through
weak ties rather than strong. The strength of weak ties is that they
tend to be long they connect socially distant locations. Recent research
on small worlds shows that remarkably few long ties are needed
to give large and highly clustered populations the degrees of
separation of a random network, in which information can rapidly diffuse.
-
Computational
Social Science, Culture and the Global War on Terror (local
copy), by Dr Rebecca Goolsby, ONR, at Naval-Industry R&D
Partnership Conference, 26-29 Jul 05
-
Iraq:
the Social Context of IEDs (local copy), by
McFate, in Military Review, May-June 2005
-
How do you locate insurgents within a tribal network? Social network analysis
(SNA) provides valuable tools for understanding tribal organization and charting
the links between tribes and insurgents. Social network analysis is the mapping
and measuring of relationships and flows between people, groups, organizations,
and computers or other knowledge-processing entities. These methods proved
highly successful in capturing Saddam Hussein. The 104th Military Intelligence
Battalion developed a social network program called Mongo Link
to chart personal relationships using data from Iraqi informants, military
patrols, electronic intercepts, and a range of other sources. One of the
62,500 connections led directly to Saddam.
-
SNA resources, such as those under development at the Office of Naval Research,
identify how to maximally disrupt a network by intervening with the key players
and how to maximally spread ideas, misinformation, and materials by seeding
key players. By using data about IIS members and their personal relationships
within the Iraqi tribal network, SNA can describe terrorist networks, anticipate
their actions, predict their targets, and deny the insurgents the ability
to act.
-
Modeling
and Analysis of Clandestine Networks (local
copy), by Clark, AFIT, March 2005
-
The methodology is applied to open source data on both Al Qaeda and the Jemaah
Islamiah (JI) terrorist networks. Key leaders are identified, and leadership
profiles are developed. Further, a parametric analysis is performed to compare
influence based on individual characteristics, network topology characteristics,
and mixtures of network and non-network characteristics.
-
Aggregation
Techniques to Characterize Social Networks (local
copy), by Sterling, AFIT, Sep 2004
-
Social network analysis focuses on modeling and understanding individuals
of interest and their relationships. Aggregation of social networks can be
used both to make analysis computationally easier on large networks, and
to gain insight in subgroup interactions.
-
Modeling
and Analysis of Social Networks (local copy),
by Renfro, AFIT, Dec 2001
-
Social networks depict the complex relationships of individuals and groups
in multiple overlapping contexts. Influence in a social network impacts behavior
and decision making in every setting in which individuals participate. This
study defines a methodology for modeling and analyzing this complex behavior
using a Flow Model representation. Multiple objectives in an influencing
effort targeted at a social network are modeled using Goal Programming. Value
Focused Thinking is applied to model influence and predict decisions based
on the reaction of the psychological state of individuals to environmental
stimuli.
-
A Social
Network Analysis of the Iranian Government (local
copy), by Renfro and Deckro, AFIT, June 2001
-
Competition
in Social Networks: Emergence of a Scale-free Leadership Structure and Collective
Efficiency (local copy), by Anghel et al, Los
Alamos National Laboratory, July 2003
-
Team
Seldon: Simulation of Extreme Transitions in Social Dynamic
(local copy), Sandia National Labs, July 2003
-
Modeling
Terrorist Networks - Complex Systems at the Mid-Range, by Fellman and
Wright
|
|