Saturday, May 30, 2015

Social Network Analysis

One of the fundamental problems facing the modern world is terrorism. This is a global threat that requires a significant new approach to address. One of the ways this can be examined is through social network analysis (SNA). This is the mapping and measurement of the relationships and flows that exist between people, groups and organizations (Perliger and Pedahzur, 2011). The people and groups are the nodes in the network while the relationships and flows are the links in the networks. To solve a problem using social network analysis, there is need to collect data. This might be difficult or easy to acquire depending on its nature. There is also a need to implement network measures that help evaluate the success of the analysis. Specifically, social network analysis helps in diagnosing problems that can help in the development of solutions. This can be applied to a variety of issues. As this paper demonstrates, social network analysis can be used in addressing the issue of terrorism.
Using SNA to Address Terrorism
The importance of using social network analysis when dealing with terrorism came to the fore after the 9/11 terrorist attacks in the United States (Ressler, 2006). Terrorist organizations mostly use networks to carry out their activities. This is opposed to the conventional enemy states that use hierarchical and formal methods of engagement. Instead, the terrorist groups now have networked organizational structures (Ressler, 2006). This allows them to have the ability to plan and launch attacks more quickly. Social network analysis can be an important tool that can help in fighting terrorism. They help the authorities in mapping out the terrorist networks with a view to dismantling them (Perliger and Pedahzur, 2011).
Data Needed and the Ability to Get It
The most important data in the social network analysis is to combat terror in information records (Ressler, 2006). The technological advancements mean that terrorists are also advancing on communication technology. Since they are spread out thinly in small groupings rather than the formal armies that have barracks and other identified installations, telephony communication is important (Perliger and Pedahzur, 2011). There has also been a rise in the use of social media among the terrorists. Groups such as the Al-Shabaab, Boko Haram, and ISIS have frequently used social media sites such as Facebook, Twitter and YouTube to spread their messages (Perliger and Pedahzur, 2011). If the authorities can get data from the communications companies, they would be a step ahead in creating the analyzes that can help dealing with the problem of terrorism.
However, there are some difficulties in getting this data. While the government can devise ways of tapping into communication, it would be easier if the companies just voluntarily gave the information. Opponents sharing this information raise the issue of ethics as a reason companies should not breach the privacy of their customers (Ressler, 2006). The opponents argue that governments should respect the privacy of citizens to communicate freely since it is within their rights. However, a counter-argument can be made that the practice of analysis happens daily in commercial life. Online retailers use the information they get from customers to analyze their trends with an aim of predicting their future behavior. This means that while the privacy concerns are genuine, the pros brought about by winning the war against terrorism far outweigh the cons (Ressler, 2006).
Most Important Network Measures
When dealing with the graphical representation of human relationships, it is important to have some measures that enhance the level of insight. In the social network analysis for fighting terrorism, the most important measures are the centrality measures. In this regard, the degree centrality measure and the between centrality measure are most important (Perliger&Pedahzur, 2011). The degree centrality measure is useful in identifying the nodes that have the most links to other nodes in the network. The nodes that have high degree centrality are often influential or have strategic important in communication for the network (Perliger and Pedahzur, 2011). The betweenness centrality measure shows the nodes that frequently act as connectors to other nodes in the network. These nodes are often the crucial gatekeepers of information within the network (Perliger and Pedahzur, 2011).
How the SNA Helps
The social network analysis helps in the diagnosis of the challenges that exist. With regards to fighting terrorism, it can help in a variety of ways. A proper analysis can identify some of the major characteristics that increase the likelihood of terrorist organizations being lethal(Ressler, 2006). For instance, there are some ideologies that increase this likelihood. If an organization that is highly religious or it combines its religious ideology with ethnic or nationalist ideology, then it is more likely to engage in lethal activities. On the other hand, organizations that hold environmental, human rights or anarchist convictions are less likely to engage in lethal activities. Young and fledgling organizations are also less likely lethal as compared to large, well-established and networked organizations(Ressler, 2006).
The analysis can also help in mapping terrorist networks. This can be explained by an example of two known terror suspects. If the authorities monitor these two individuals, the process might be too slow for it to achieve the results that would enable the saving of lives. This is where social network analysis comes in. The authorities would need the communication information of the two men. If these records are analyzed, it is possible to get contacts that the two individuals have in common. The next step would be an analysis of the contact information of the shared contacts to establish another level of common contacts. This analysis by now would have established a triad that represents the network. This process is repeated till the network expands to reveal an adequate picture of a terror network (Perliger and Pedahzur, 2011).
Once the network has been mapped, the next step is the mathematical analysis. This helps to identify the important insights such as the most central figure, the most connected individual, or who is the most crucial link in the network. This information can then be used by the authorities to target the individuals. For instance, a terror plot can be dismantled if the most important leaders are eliminated. This shows that the network analysis can be effective in giving the authorities a clear picture of a terror network that is not hierarchical.

In conclusion, social network analysis is an important technique in helping map out the relationships between people, groups, and organizations. If used properly, it can help address some of the challenges that face the society. For this to happen, however, the relevant data must be availed. The accuracy of the data influences the accuracy of the analysis. The analysis can then be used in diagnosing the problem; thus, enabling the relevant parties to bring about change. Therefore, this paper has shown that with proper analysis and the availability of adequate and accurate data, terrorist organizations can be mapped; thus, allowing the authorities to take the relevant action.
                                                                                                         ————by Hui Zhao
From MIB

1 comment:

Christopher Tunnard said...

This is an adequate description of how SNA can be used to detect terrorist activity, but it comes from a recycling of what we covered in class and a bit of the literature; the purpose of this post was to come up with an SNA idea of your own and show how you would apply it and its measures.