隐蔽网络中基于个体威胁指数的关键人物评价研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
社会网络分析(Social Networks Analysis,简称SNA),又称为网络分析,结构分析或人际关系研究,是指一种以社会行动者之间的互动研究为基础的结构性方法,它以图论数学为基础,用点来表示社会行动者,用点和点间的连线来表示行动者间的某种社会关系,从而对这些社会关系可以进行量化分析。自“9 11”以来,反恐成为全球范围内的热点话题,学术界开始关注于将社会网络分析应用于反恐领域。随着全球反恐的不断深入,恐怖组织的结构发生了重大变化,传统的阶层式组织结构逐渐被隐蔽式网络组织结构替代,成为恐怖分子生存和实施恐怖破坏活动的重要支撑。由于该网络组织结构松散,成员间联系隐蔽,等级结构不明显,因此,寻找网络中关键人物及群组变得极为困难。为了寻找确定关键人物,打击恐怖网络的有效方法,各国学者利用社会网络分析方法,尝试从数据挖掘及模型构建等方面,对世界范围内发生的恐怖事件进行了大量的研究。
     本文首先基于恐怖分子自身特点构建社会属性指标体系,并基于中心度等网络测算指标构建网络属性指标体系。其次,从社会网络理论的视角分析恐怖组织及其行为,介绍了构建恐怖网络个体威胁指数体系的基本方法。最后,对与“东突”有关的恐怖事件进行了实证研究,构建了恐怖分子网络模型,应用个体威胁指数评价体系对恐怖分子进行分析评价,确定了网络中的关键人物,以期寻找打击恐怖网络的有效方法。
Social network analysis (SNA), also known as network analysis, structural analysis or interpersonal relationship research, is a methodological form of analysis that is based on mathematical, psychological, anthropological, and sociological applications of interaction and communication. This framework used dots indicates social entities and lines represent their social relations, it aims to connect the dots between entities and“map and measure complex, sometimes covert, human groups and organizations .
     Sine 9-11,counter-terrorism has been the main topic in the world,while academia has focused on applying Social Network Analysis to it. With the development of global counter-terrorism, the structure of terrorist organization has changed dramatically, the traditional hierarchy being replaced by covert network, which has become the basic to terrorists survive and acting destructions. Due to the loose structure, cover links between members, and hidden hierarchy, it s difficult to detect the key members of terrorist network. To find an effect way to destroy the terrorist network, academics use data collection and models, doing large quantity of researches to the terrorist events happened worldwide.
     Firstly, this essay constructed the social attribute system based on the terrorists characteristics, and proposing the approach to construct the network attribute system based on the concept of centrality. Secondly, we discussed the construction of the Individual Threat Index in the perspective of Social Network Analysis. Finally, we empirically study the cases related to East Turkistan, constructing the terrorists network, applying Individual Threat Index to estimate the terrorists, and detecting the key members of the network, in the hope of finding the effective way to destroy the terrorist network.
引文
[1]孙宝财,吴志飞.谈恐怖主义的形成发展及反恐对策,武警学院学报,2009.05.
    [2]李少军.恐怖主义概念的界定.恐怖主义溯源,社会科学文献出版社,2002.09.
    [3]孙先伟,翟金鹏.“东突”恐怖主义活动发展特点及防范打击对策,中国人民公安大学学报,2008.
    [4] 2008 Report on Terrorism.The National Counterterrorism Center(US).2009.
    [5] Country Reports on Terrorism 2008. United States Department of State Publication Office of the Coordinator for Counterterrorism. 2009 .
    [6] Drazen Penzar, Armano Srbljinovic.About Modeling of complex networks with application to terrorist group modeling,Interdisciplinary Description of Complex Systems 3(1),27-43,2005.
    [7]董士昙,李忠.中国恐怖活动发展趋势分析,山东公安专科学校学报,2004.04.
    [8] Baker W.E.,R.R.Faulkner.1993.The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review 58(6)837-860.
    [9] Mark Huisman. Imputation of missing network data: Some simple procedures. Dept. of Psychology University of Groningen.
    [10] Matthew Dombroski,Paul Fischbeck,Kathleen M.Carley. Estimating the Shape of Covert Networks. Proceedings of the 8th International Command and Control Research and Technology Symposium, Washington, DC. 2003.
    [11] Valdis E. Krebs. Mapping Networks of Terrorist Cells, Connections 24(3):43-52.
    [12] Nasrullah Memon, David L. Hicks, Henrik Legind Larsen. Harvesting Terrorists Information from Web. 11th International Conference Information Visualization. 2007.
    [13] Luke M. Gerdes. Codebook for Network Data on Individuals Involved with Terrorism and Counterterrorism.Center for the Computational Analysis of Social and Organizational Systems CASOS technical report. 2008.
    [14] H. Chen, W. Chung, J. Qin, E. Reid. M. Sageman,and G. Weimann. Uncovering the DarkWeb: A Case Study of Jihad on theWeb.Journal of the American Society for Information Science and Technology.Volume59.Number 8. 2008.
    [15] Tianjun Fu ,Hsinchun Chen. Analysis of Cyberactivism: A Case Study ofOnline Free Tibet Activities.ISI 2008.
    [16] Muhammad Akram Shaikh, Wang Jiaxin. Investigative Data Mining: Identifying Key Nodes in Terrorist Networks. IEEE. 2006.
    [17] Nasrullah Memon,Kim C. Kristoffersen,David L. Hicks. Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. Second International Conference on Availability, Reliability and Security. 2007.
    [18] Nasrullah Memon,David L. Hicks. Detecting Key Players in 11-M Terrorist Network: A Case Study. The Third International Conference on Availability, Reliability and Security . IEEE computer society. 2008.
    [19] Nasrullah Memon, Nicholas Harkiolakis , David L. Hicks.Detecting High-Value Individuals in Covert Networks: 7/7 London Bombing Case Study。2008 IEEE.
    [20] D. M. Akbar Hussain. Terrorist Networks Analysis through Argument Driven Hypotheses Model. Second International Conference on Availability, Reliability and Security.IEEE computer society. 2007.
    [21] Dil Muhammad Akbar Hussain. Destabilization of Terrorist Networks through Argument Driven Hypothesis Model.Journal of Software, VOL. 2, NO. 6.2007.
    [22]周春光,曲鹏程,王曦,王建宇,王喆.DSNE :一个新的动态社会网络分析算法,吉林大学学报(工学版),2008.03.
    [23]郭绍忠,段丹,刘晓楠,甄涛.邮件挖掘技术在社会网络分析中的研究与应用,计算机工程与设计,2008.05.
    [24]眭俊明.数据挖掘在社会网络分析中的应用概述,For Assignment of Data Mining Course,2006.
    [25]乔少杰,唐长杰等.基于属性筛选支持向量机挖掘虚拟社团结构,计算机科学(增A),2005,32(7):208—212.
    [26]刘威,唐常杰,乔少杰,温粉莲,左劼.基于概念邮件系统的犯罪数据挖掘新方法,计算机科学,2007.
    [27]胡贵强.一种基于Agent模拟的犯罪网络分析方法,硕士论文,西南大学,2009.04.01.
    [28] ChenXiaodong, LiJianfeng, Huang Yanbo. Network analysis using organizational risk analyzer. Journal of Southeast University (English Edition). 2008.
    [29]杨和平,何卫峰,吴应明,付瑜,李剑峰,姚晓晖.基于社会网络分析的恐怖袭击风险控制,安全与环境学报,2009.06.
    [30] Wu Zongzhi, Zhang Zheng,Liu Mao. Terror Attack Risk Analysis: Study on Eastern Turkistan Issue. China Academic Journal. 2001.
    [31]中国现代国际关系研究所反恐怖研究中心.中国现代国际研究所反恐研究中心反恐译丛之一:恐怖主义与反恐怖斗争理论探索[M].时事出版社,2002.08,P398.
    [32]赖铭传.试论“恐怖主义”概念的界定[J].国防大学学报,2002.03.
    [33]中国现代国际关系研究所反恐怖研究中心.中国现代国际研究所反恐研究中心反恐译丛之二:世界主要国家和地区反恐怖政策与措施[M].时事出版社,2002.08,P416.
    [34] U.S. Department of State, Patterns of Terrorism-1999[M], April 2000.
    [35]卡尔?多伊奇.国际关系分析[M].世界知识出版社,1992,P92.
    [36] Benjamin Netanyahu. Fighting Terrorism[M]. New York: Farrar Straus Giroux, 1995,P84.
    [37] Alex P. Schmid, Albert J. Jongman et al., Political Terrorism: A New Guide to Actors, Authors, Conceps, Data Bases, Theories, and Literature[M]. New Brunswick, Transaction Books, 1988,P210.
    [38]孙辉.对美国遭受恐怖主义袭击的分析与思考[D].和平与发展.2001.4.
    [39]余建华.民族主义:历史遗产与时代风云的交汇[M].学林出版社,1999,P85.
    [40]乔纳森弗?雷德兰,迈克尔?伊格纳杰夫.反恐不能靠轰炸解决问题.恐怖主义与反恐怖斗争理论探索[M],时事出版社,2002.7,P286.
    [41] http://www.people.com.cn/GB/shizheng/3586/20020121/652705.html.
    [42] U.S. Army. A Military Guide to Terrorism in the Twenty-First Century[M]. Cosimo Reports ,2010.7,P3-5—3-7.
    [43]邵峰.国际恐怖主义的新特点和新趋势[J].中国社会科学院院报,2004.6.15.
    [44]王逸舟.恐怖主义溯源[M].北京:社会科学文献出版社,2002年版.
    [45] Valdis E. Krebs. Mapping Networks of Terrorist Cells[J]. Connections 24(3),P43-52.
    [46] Elizabeth Bott. Family and social network: roles, norms, and external relationships in ordinary urban families[M]. Routledge, 2003,P52-96.
    [47] Mark S. Granovetter. The Strength of Weak Ties[J]. American Journal of Sociology ,1973.5,Vol.78,No.6.
    [48] http://www.sociologyol.org/yanjiubankuai/fenleisuoyin/shehuixuelilun/ 2007-05-07/1778.html.
    [49] Marc Sageman. Understanding Terror Networks[M].University of Pennsylvania Press, 2004,P38-116.
    [50] Steve Ressler. Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research[J]. Homeland Security Affairs, Vol.Ⅱ,No.2(July 2006),P1-10.
    [51] Freeman Linton C. Centrality in social networks: I. Conceptual clarification. Social Networks 1,Page 215-239,1979.
    [52] Phillip Bonacich. Factoring and weighting approaches to clique identification[J]. Journal of Mathematical Sociology. 1972;2,P113–120.
    [53] Langville A, Meyer C. Google's PageRank and Beyond: The Science of Search Engine Rankings[M]. Princeton University Press; 2006. ISBN 0-691-12202-4.
    [54] Phillip Bonacich. Power and Centrality: A Family of Measures[J]. The American Journal of Sociology, Vol.92, No.5.1987.3, P1170-1182.
    [55] Duncan J. Watts, Steven H. Strogatz. Collective Dynamics of Small-world Networks[J]. Nature,Vol.393,1998.6, P440-442.
    [56] M?库特鲁克夫.自由的东突厥斯坦[M].苏联科学院中国研究所,1945.1,P27
    [57]欧阳叔睿.“东突”恐怖主义犯罪分析[D].硕士学位论文,西南大学,2010.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700