2019
DOI: 10.1007/s41109-019-0184-6
|View full text |Cite
|
Sign up to set email alerts
|

A complex networks approach to find latent clusters of terrorist groups

Abstract: Given the extreme heterogeneity of actors and groups participating in terrorist actions, investigating and assessing their characteristics can be important to extract relevant information and enhance the knowledge on their behaviors. The present work will seek to achieve this goal via a complex networks approach. This approach will allow finding latent clusters of similar terror groups using information on their operational characteristics. Specifically, using open access data of terrorist attacks occurred wor… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 61 publications
0
18
0
Order By: Relevance
“…An additional study that explores 28 years of bill-voting in Brazil shows that the dynamics of co-occurrence networks of similar-voting congressmen reveal patterns that allow for the identification of convicted corrupt politicians and also, for the possibility of predicting or identifying other possible corrupt individuals within the network (Colliri & Zhao, 2019). Noteworthy, the identification of latent criminal groups (Campedelli, Cruickshank & Carley, 2019) and the effective dismantling of their organizational structure (Wandelt, Sun, Feng, Zanin & Havlin, 2018) are relevant and non-trivial subjects in criminal investigations and law enforcement, since empirical evidence has shown that the dismantling process might potentially make these criminal organizations stronger (Duijn, Kashirin & Sloot, 2014). In addition, when it comes to fighting corruption the goal is clear: one not only is looking to describe it post factum, but to predict it (Rumi, Deng & Salim, 2018;Alves, Ribeiro & Rodrigues, 2018;López-Iturriaga & Sanz, 2018;Colonnelli et al, 2019;Colliri & Zhao, 2019).…”
Section: Complex Networkmentioning
confidence: 99%
“…An additional study that explores 28 years of bill-voting in Brazil shows that the dynamics of co-occurrence networks of similar-voting congressmen reveal patterns that allow for the identification of convicted corrupt politicians and also, for the possibility of predicting or identifying other possible corrupt individuals within the network (Colliri & Zhao, 2019). Noteworthy, the identification of latent criminal groups (Campedelli, Cruickshank & Carley, 2019) and the effective dismantling of their organizational structure (Wandelt, Sun, Feng, Zanin & Havlin, 2018) are relevant and non-trivial subjects in criminal investigations and law enforcement, since empirical evidence has shown that the dismantling process might potentially make these criminal organizations stronger (Duijn, Kashirin & Sloot, 2014). In addition, when it comes to fighting corruption the goal is clear: one not only is looking to describe it post factum, but to predict it (Rumi, Deng & Salim, 2018;Alves, Ribeiro & Rodrigues, 2018;López-Iturriaga & Sanz, 2018;Colonnelli et al, 2019;Colliri & Zhao, 2019).…”
Section: Complex Networkmentioning
confidence: 99%
“…The methods for collectively clustering the modal graphs are often either diffusion processes (see [17], [19], [20] for examples) or tensor decompositions (see [15], [21]- [24] for examples). Outside of these two main graph-based methods, there are also graph-based methods that use weighted metrics to combine graphs for clustering [25], [26] as well as weight-learning techniques in spectral paradigms to cluster the modal graphs [27] or combining graph decompositions from across modes to then cluster unimodally [16], [28]. While the graph-based methods are often considered the predominant means of multi-modal clustering its not clear how well they can do on more general types of data outside of images or social networks, where the graphs of each mode have similar properties to each other.…”
Section: Related Workmentioning
confidence: 99%
“…Since modularity is a measure of how much cluster structure is present in a graph, we are selecting graphs that maximize the cluster structure that may be present in the data. We further incorporate the changes to the original algorithm from other works, namely to use asymmetric k-NN graphs for each value of k (wherein an edge exists between two nodes, u and v, if either u ∈ kNN (v) or v ∈ kNN (u)) and the Louvain method for clustering the kNNs [25], [26], [32]. Finally, we note that the Louvain algorithm, while very fast for clustering a graph, is also a greedy, stochastic algorithm that can lead to different clustering outcomes for a graph depending on the initialization of the algorithm.…”
Section: ) Obtaining K-nearest Neighbor Graphs and Cluster Assignments For Each Modementioning
confidence: 99%
“…For instance, spatial signatures of the operation (e.g. where crimes take place) may illuminate how criminal activities are developed, and across which physical and cultural structures they depend upon, among other characteristics (see, Campedelli et al 2019;Graif et al 2014).…”
Section: Multiplex Features Of Wildlife Traffickingmentioning
confidence: 99%