节点文献

隐蔽网络中基于个体威胁指数的关键人物评价研究

Individual Threat Index Based Key Member Detecting Research in Covert Network

【作者】 尚睿

【导师】 孙多勇;

【作者基本信息】 国防科学技术大学 , 公共管理, 2011, 硕士

【摘要】 社会网络分析(Social Networks Analysis,简称SNA),又称为网络分析,结构分析或人际关系研究,是指一种以社会行动者之间的互动研究为基础的结构性方法,它以图论数学为基础,用点来表示社会行动者,用点和点间的连线来表示行动者间的某种社会关系,从而对这些社会关系可以进行量化分析。自“9 11”以来,反恐成为全球范围内的热点话题,学术界开始关注于将社会网络分析应用于反恐领域。随着全球反恐的不断深入,恐怖组织的结构发生了重大变化,传统的阶层式组织结构逐渐被隐蔽式网络组织结构替代,成为恐怖分子生存和实施恐怖破坏活动的重要支撑。由于该网络组织结构松散,成员间联系隐蔽,等级结构不明显,因此,寻找网络中关键人物及群组变得极为困难。为了寻找确定关键人物,打击恐怖网络的有效方法,各国学者利用社会网络分析方法,尝试从数据挖掘及模型构建等方面,对世界范围内发生的恐怖事件进行了大量的研究。本文首先基于恐怖分子自身特点构建社会属性指标体系,并基于中心度等网络测算指标构建网络属性指标体系。其次,从社会网络理论的视角分析恐怖组织及其行为,介绍了构建恐怖网络个体威胁指数体系的基本方法。最后,对与“东突”有关的恐怖事件进行了实证研究,构建了恐怖分子网络模型,应用个体威胁指数评价体系对恐怖分子进行分析评价,确定了网络中的关键人物,以期寻找打击恐怖网络的有效方法。

【Abstract】 Social network analysis (SNA), also known as network analysis, structural analysis or interpersonal relationship research, is a methodological form of analysis that is based on mathematical, psychological, anthropological, and sociological applications of interaction and communication. This framework used dots indicates social entities and lines represent their social relations, it aims to connect the dots between entities and“map and measure complex, sometimes covert, human groups and organizations .Sine 9-11,counter-terrorism has been the main topic in the world,while academia has focused on applying Social Network Analysis to it. With the development of global counter-terrorism, the structure of terrorist organization has changed dramatically, the traditional hierarchy being replaced by covert network, which has become the basic to terrorists survive and acting destructions. Due to the loose structure, cover links between members, and hidden hierarchy, it s difficult to detect the key members of terrorist network. To find an effect way to destroy the terrorist network, academics use data collection and models, doing large quantity of researches to the terrorist events happened worldwide.Firstly, this essay constructed the social attribute system based on the terrorists characteristics, and proposing the approach to construct the network attribute system based on the concept of centrality. Secondly, we discussed the construction of the Individual Threat Index in the perspective of Social Network Analysis. Finally, we empirically study the cases related to East Turkistan, constructing the terrorists network, applying Individual Threat Index to estimate the terrorists, and detecting the key members of the network, in the hope of finding the effective way to destroy the terrorist network.

节点文献中: 

本文链接的文献网络图示:

本文的引文网络