Empirical Study on Spatiotemporal Evolution of Terrorism Organization Network
-
摘要: 为了理解恐怖组织网络的时空演化特性及形成机理,本文运用统计物理学方法,结合Multi-agent,提出了一个恐怖组织网络的时空演化模型, 并对恐怖组织网络的演化规律进行了数值模拟研究.模拟过程中考虑了恐怖组织网络在时间与空间上节点与边的动态联结变化.研究发现:网络演化过程中, 恐怖组织的网络演化不仅兼具小世界、无标度特性和等级结构,不同级别的中心节点将网络连为一体,而且存在促进恐怖网络不断演化的主要因素, 即与恐怖分子信念的增加及环境资源的增长有关; 反恐方的选择性打击对网络的增长具有抑制作用和一定的控制效果.Abstract: To understand spatiotemporal evolution of terrorism organization network and reveal its information mechanism. In this paper, from the view of network science, statistical physics and multi-agent method are proposed to explore time-space evolution of terrorism organization network. The model of time-space evolution is presented to understand terrorism organization network. In the evolution process, dynamical (correction) changes of nodes and edges with time and space for terrorism organization network are considered by designing algorithm. It is found in numerical simulation that, the evolution of terrorism organization network possess small-world effect and scale-free property at the same time, and the whole network have hierarchical structure with different level centre nodes. Increasing factors of belief and resource can also effect on continuous evolution of network. If government around the world take effectively selected measures to attack the terrorism organization, which can be inhibited to a certain extent or under control. But the counter terrorism is the future still a long-term arduous.
-
[1] Hu Xiao-Feng. A brief survey on war complex networks studies. Complex System and Complexity Science, 2010, 7(2): 24-28(胡晓峰. 战争复杂网络研究概述. 复杂系统与复杂性科学, 2010, 7(2): 24-28) [2] Krebs V E. Mapping networks of terrorist cells. Connections, 2002, 24(3): 43-52 [3] Carley K M. Destabilization of covert networks. Computational and Mathematical Organization Theory, 2006, 12(1): 51-56 [4] Xu Xiao-Ke, Fang Jin-Qing. Applications of complex network theory in war on terrorism. Complex System and Complexity Science, 2010, 7(2): 116-119(许小可, 方锦清. 复杂网络理论在反恐战争中的应用. 复杂系统与复杂性科学, 2010, 7(2): 116-119) [5] Borgatti S P, Mehra A, Brass D J, Labianca G. Network analysis in the social sciences. Science, 2009, 323(5916): 892-895 [6] Bohannon J. Counterterrorism's new tool: "metanetwork" analysis. Science, 2009, 325(5939): 409-411 [7] Weinberger S. Web of war. Nature, 2011, 471: 566-568 [8] Carpenter T, Karakostas G, Shallcross D. Practical issues and algorithms for analyzing terrorist networks. In: Proceedings of the 2nd International Workshop on Mobile Commerce (WMC). New York, USA: ACM, 2002. 49 [9] Carley K M, Dombroski M, Tsvetovat M, Reminga J, Kamneva N. Destabilizing dynamic covert networks. In: Proceedings of the 8th International Command and Control Defense Research and Technology Symposium. Washington, DC, 2003. 45-89 [10] Morselli C, Giguére C, Petit K. The efficiency/security trade-off in criminal networks. Social Networks, 2007, 29(1): 143-153 [11] Barabasi A L. Linked: The New Science of Networks. Cambridge: Perseus Press, 2002. 222-224 [12] Sageman M. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press, 2004. 1-147 [13] Chen Peng, Yuan Hong-Yong. Social network analysis of crime organization structures. Journal of Tsinghua University (Science and Technology), 2011, 51(8): 15-25 (陈鹏, 袁宏永. 犯罪组织结构的社会网络分析. 清华大学学报(自然科学版), 2011, 51(8): 15-25) [14] Gong Kai, Tang Ming, Shang Ming-Sheng, Zhou Tao. Empirical study on spatiotemporal evolution of online public opinion. Acta Physica Sinica, 2012, 61(9): 526-532(龚凯, 唐明, 尚明生, 周涛. 在线热点事件的时空演变规律. 物理学报, 2012, 61(9): 526-532) [15] Zhu J F, Han X P, Wang B H. Statistical property and model for the inter-event time of terrorism attacks. Chinese Physics Letters, 2010, 27(6): 273-276 [16] Jin Di, Liu Jie, Yang Bo, He Dong-Xiao, Liu Da-You. Genetic algorithm with local search for community detection in large-scale complex networks. Acta Automatica Sinica, 2011, 37(7): 873-882(金弟, 刘杰, 杨博, 何东晓, 刘大有. 局部搜索与遗传算法结合的大规模复杂网络社区探测. 自动化学报, 2011, 37(7): 873-882) [17] Liu Xu, Yi Dong-Yun. Complex network community detection by local similarity. Acta Automatica Sinica, 2011, 37(12): 1520-1529(刘旭, 易东云. 基于局部相似性的复杂网络社区发现方法. 自动化学报, 2011, 37(12): 1520-1529) [18] Leweling T A, Nissen M E. Defining and exploring the terrorism field: toward an intertheoretic, agent-based approach. Technological Forecasting and Social Change, 2007, 74(2): 165-192 [19] Deng Bi-Bo. Terrorism organization elements, activity and prevention. Journal of PLA Nanjing Institute of Politics, 2009, 25(5): 78-80(邓碧波. 恐怖主义组织的要素、活动及其预防. 南京政治学院学报, 2009, 25(5): 78-80) [20] Li Zhi-Hui. Counter-terrorism Study. Beijing: People's Press, 2003. 35-41(李智慧. 反恐学. 北京: 人民出版社, 2003. 35-41) [21] Crutchfield J P. Between order and chaos. Nature Physics, 2002, 8: 17-24 [22] Gan Min, Peng Hui, Huang Yun-Zhi, Dong Xue-Ping. Initial distribution search algorithm for self-organizing state space model. Acta Automatica Sinica, 2012, 38(9): 1538-1543(甘敏, 彭辉, 黄云志, 董学平. 自组织状态空间模型参数初始分布搜索算法. 自动化学报, 2012, 38(9): 1538-1543) [23] Cui Ai-Xiang, Fu Yan, Shang Ming-Sheng, Chen Duan-Bing, Zhou Tao. Emergence of local structures in complex network: common neighborhood drives the network evolution. Acta Physica Sinica, 2011, 60(3): 803-808(崔爱香, 傅彦, 尚明生, 陈端兵, 周涛. 复杂网络局部结构的涌现: 共同邻居驱动网络演化. 物理学报, 2011, 60(3): 803-808) [24] Barabási A L, Albert R. Emergence of scaling in random networks. Science, 1999, 286(5439): 509-512 [25] Albert R, Barabási A L. Topology of evolving networks: local events and universality. Physical Review Letters, 2000, 85(24): 5234-5237 [26] Albert R, Barabási A L. Statistical mechanics of complex networks. Reviews of Modern Physics, 2002, 74(1): 76-85 [27] Enders W, Su X J. Rational terrorists and optimal network structure. Journal of Conflict Resolution, 2007, 51(1): 33-57 [28] Fenstermacher L, Kuznar C L, Rieger T. Protecting the homeland from international and domestic terrorism threats: individual and group mechanisms. RAND, 2010: 82-91 [29] Kossinets G, Watts D J. Empirical analysis of an evolving social network. Science, 2006, 311(5757): 88-90 [30] Wasserman S, Faust K. Social Network Analysis: Methods and Applications. England: Cambridge University Press, 1994. 178-179 [31] White J R. Terrorism: An Introduction. White Californian: Wadsworth Thomson Learning, 2002. 21-135 [32] Mei Jian-Ming. Counterterrorism Intelligence and Crisis Management. Beijing: Qunzhong Press, 2007. 66-67(梅建明. 反恐情报与危机管理. 北京: 群众出版社, 2007. 66-67) [33] Zawodny J K. Infrastructure of Terrorist Organizations. In: Freedman L Z, Alexander Y. Perspectives on Terrorism. Delaware, Wilmington: Scholarly Resources, 1983 [34] Krebs V E. Uncloaking terrorist network. First Monday, 2002, 7(4): 1-4
点击查看大图
计量
- 文章访问数: 1588
- HTML全文浏览量: 46
- PDF下载量: 2101
- 被引次数: 0