Value of intelligence applied to networks
详细信息    查看全文
  • 作者:Christopher M. Smith ; William T. Scherer ; Stephen Carr
  • 关键词:Value of intelligence ; Networks and network analysis ; Intelligence analysis ; Intelligence studies/education
  • 刊名:Environment Systems and Decisions
  • 出版年:2016
  • 出版时间:March 2016
  • 年:2016
  • 卷:36
  • 期:1
  • 页码:85-91
  • 全文大小:624 KB
  • 参考文献:Albert R, Barabási A-L (2002) Statistical mechanics of complex networks. Rev Mod Phys 74(1):47CrossRef
    Barabási A-L, Bonabeau E (2003) Scale-free networks. Sci Am 288(5):50–59CrossRef
    Boccaletti S et al (2006) Complex networks: structure and dynamics. Phys Rep 424(4):175–308CrossRef
    Borgatti SP, Halgin DS (2011) On network theory. Organ Sci 22(5):1168–1181CrossRef
    Borgatti SP, Carley KM, Krackhardt D (2006) On the robustness of centrality measures under conditions of imperfect data. Soc Netw 28(2):124–136CrossRef
    Cheong F, Cheong C (2011) Social media data mining: a social network analysis of tweets during the Australian 2010–2011 Floods. In: Seddon PB, Gregor S (eds) PACIS 2011—15th Pacific Asia conference on information systems: quality research in Pacific, Brisbane, Australia, 7–11 July 2011, pp 1–16
    Coffman T, Greenblatt S, Marcus S (2004) Graph-based technologies for intelligence analysis. Commun ACM 47(3):45–47CrossRef
    de Solla Price D (2007) A general theory of bibliometric and other cumulative advantage processes. J Am Soc Inf Sci 27(5):292–306CrossRef
    Devore JL (2015) Probability and statistics for engineering and the sciences, 7th edn. Cengage Learning
    Dorogovtsev SN, Mendes JFF (2002) Evolution of networks. Adv Phys 51(4):1079–1187CrossRef
    Ediger D et al (2010) Massive social network analysis: mining twitter for social good. In: IEEE 2010 39th international conference on parallel processing (ICPP)
    Gill P, Marrin S, Phythian M (eds) (2008) Intelligence theory: key questions and debates. Routledge, New York
    Glacet C, Hanusse N, Ilcinkas D (2011) The impact of edge deletions on the number of errors in networks. In: Proceedings of the 15th International Conference on Principles of distributed systems, Lecture notes in computer science, vol 7109. Springer, Berlin, Heidelberg, pp 378–391
    Gruzd A, Wellman B, Takhteyev Y (2011) Imagining Twitter as an imagined community. Am Behav Sci 55(10):1294–1318CrossRef
    Heuer RJ, Pherson RH (2011) Structured analytical techniques for intelligence analysts. CQ Press, Washington, DC, p 68
    Kaplan EH (2012) OR forum—intelligence operations research: the 2010 Philip McCord Morse Lecture. Oper Res 1–13 (Articles in Advance). Published ahead of print July 3, 2012. Accessed 4 October 2012. Located at http://​or.​journal.​informs.​org/​content/​early/​2012/​07/​03/​opre.​1120.​1059.​full.​pdf+html
    Keisler JM et al (2014) Value of information analysis: the state of application. Environ Syst Decis 34(1):3–23 CrossRef
    Kennedy KT, Deckro RF, Moore JT, Hopkinson KM (2011) Nodal interdiction. Math Comput Model 54(11):3116–3125CrossRef
    Knightley P (1988) The second oldest profession: spies and spying in the twentieth century. Penguin, New York
    Linkov I et al (2013) Resilience metrics for cyber systems. Environ Syst Decis 33(4):471–476CrossRef
    Massaro E, Bagnoli F (2014) Epidemic spreading and risk perception in multiplex networks: a self-organized percolation method. Phys Rev E 90(5):052817CrossRef
    Massaro E et al (2012) Information dynamics algorithm for detecting communities in networks. Commun Nonlinear Sci Numer Simul 17(11):4294–4303CrossRef
    Nepusz T, Vicsek T (2012) Controlling edge dynamics in complex networks. Nat Phys 8(7):568–573CrossRef
    Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45(2):167–256CrossRef
    Newman MEJ (2005) A measure of betweenness centrality based on random walks. Soc Netw 27(1):39–54CrossRef
    Newman M (2010) Networks: an introduction. Oxford University Press, OxfordCrossRef
    Overbey LA, Paribello C, Jackson T (2013) Identifying influential Twitter users in the 2011 Egyptian revolution. Social computing, behavioral-cultural modeling and prediction. Springer, Berlin, pp 377–385
    Rogers S, Sedghi A, Evans L (2011) UK riots: every verified incident—interactive map. The Guardian. 29 December 2011. http://​www.​guardian.​co.​uk/​news/​datablog/​interactive/​2011/​aug/​09/​uk-riots-incident-map . Accessed 9 Feb 2012
    Sparrow MK (1991) The application of network analysis to criminal intelligence; an assessment of the prospects. Soc Netw 13:261–263CrossRef
    Sterling SE (2004) Aggregation techniques to characterize social networks. No. AFIT/GOR/ENS/04-12. Air Force Inst of Tech Wright-Patterson AFB OH, School of Engineering and Management
    Travis A (2011) National archives reveals historic parallels between 2011 and 1981 riots. The Guardian. 29 December 2011. http://​www.​guardian.​co.​uk/​uk/​2011/​dec/​30/​national-archives-1981-riots-parallels . Accessed 9 Feb 2012
    Watts DJ, Strogatz SH (1998) Collective dynamics of ‘small-world’ networks. Nature 393(6684):440–442CrossRef
  • 作者单位:Christopher M. Smith (1)
    William T. Scherer (2)
    Stephen Carr (3)

    1. TRADOC Analysis Center, Monterey, CA, USA
    2. Department of Systems and Information Engineering, University of Virginia, Charlottesville, VA, 22904, USA
    3. Johns Hopkins University Applied Physics Lab, Baltimore, MD, 20723, USA
  • 刊物类别:Environment, general; Environmental Management; Sustainable Development; Environmental Engineering/B
  • 刊物主题:Environment, general; Environmental Management; Sustainable Development; Environmental Engineering/Biotechnology; Environmental Economics;
  • 出版者:Springer US
  • ISSN:2194-5411
文摘
A methodology is proposed to complement the subjective “value” of intelligence with an objective metric of “impact” of information on network models. This is a deterministic one-way sensitivity analysis similar to value of information used in inference diagrams. It would measure the impact of a piece of information on a network’s metric, in this case being used to answer intelligence analyst questions. This methodology suggests that the sensitivity of each link to existing analysis implies that the link has an impact on the analysis. The impact of these links can be measured quantitatively. In this paper, we explore data of tweets and apply the methodology to the links between twitter users and use the network measure of betweenness centrality to determine their quantitative impact on the overall network.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700