The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2007 vol.22)
pp: 40-49
Il-Chul Moon , Carnegie Mellon University
Kathleen M. Carley , Carnegie Mellon University
ABSTRACT
Over time, people change whom they interact with and where they are. Understanding how changes in social and geospatial relations interact is critical to a number of areas--from general social change to counternarcotics and counterterrorism. For instance, as terrorists attempt different tasks, they move to new locations and interact with different groups. This article introduces a simple theoretical multiagent model for reasoning about the criticality of agents and locations as agent interactions coevolve in geographical and social spaces. The model simulates social changes in whom agents interact with and spatial changes in where they relocate to as a function of learning and social-network evolutions. The analysis suggests that terrorists will disperse around the world rather than gather at a specific location. However, terrorists who have been the center of social networks will stay the same. This model helps us gain insights into the complexities of organizations evolving in the social and the geospatial dimensions simultaneously. This article is part of a special issue on social computing.
INDEX TERMS
distributed artificial intelligence, coherence and coordination, multiagent systems, social networks
CITATION
Il-Chul Moon, Kathleen M. Carley, "Modeling and Simulating Terrorist Networks in Social and Geospatial Dimensions", IEEE Intelligent Systems, vol.22, no. 5, pp. 40-49, September/October 2007, doi:10.1109/MIS.2007.91
REFERENCES
1. D.C. Feldman and H.B. Tompson, "Expatriation, Repatriation, and Domestic Geographical Relocation: An Empirical Investigation of Adjustment to New Job Assignments," J. Int'l Business Studies, vol. 24, 1993, pp. 507–529.
2. D.M. Wegner, "Transactive Memory: A Contemporary Analysis of the Group Mind," Theories of Group Behavior, B. Mullen and G.R. Goethals, eds., Springer, 1986, pp. 185–205.
3. J. Arquilla and D. Ronfeldt, eds., Networks and Netwars: The Future of Terror, Crime, and Militancy, tech. report MR-1382-OSD, Rand, 2001; www.rand.org/publications/MRMR1382.
4. K.M. Carley, J.S. Lee, and D. Krackhardt, "Destabilizing Networks," Connections, vol. 24, no. 3, 2001, pp. 31–44, 2001.
5. T.A.B. Snijders, C. Steglich, and M. Schweinberger, "Modeling the Co-evolution of Networks and Behavior," Longitudinal Models in the Behavioral and Related Sciences, K. Van Montfort, H. Oud, and A. Satorra, eds., Lawrence Erlbaum, 2006, pp. 41–71.
6. J. Epstein, J.D. Steinbruner, and M.T. Parker, "Modeling Civil Violence: An Agent-Based Computational Approach," working paper no. 20, Center on Social and Economic Dynamics, Brookings Inst., 2001.
7. M. Bergkvist et al., "A Hybrid Micro-Simulator for Determining the Effects of Governmental Control Policies on Transport Chains," Proc. Joint Workshop Multiagent and Multiagent-Based Simulation, LNAI 3415, Springer, 2005, pp. 236–247.
8. J. Diesner and K.M. Carley, "Revealing and Comparing the Organizational Structure of Covert Networks with Network Text Analysis," Program and Abstracts: XXV Int'l Sunbelt Social Network Conf. Program, 2005, p. 138; www.socsci.uci.edu/~ssnconf/confSunbeltXXVProgram.pdf .
9. K.M. Carley et al., "Toward an Interoperable Dynamic Network Analysis Toolkit," to be published in Decision Support Systems, vol. 43, no. 4, 2007, pp. 1324–1347.
10. M. McPherson, L. Smith-Lovin, and J.M. Cook, "Birds of a Feather: Homophily in Social Networks," Ann. Rev. Sociology, vol. 27, 2001, pp. 415–444.
11. D.J. Watts, P.S. Dodds, and M.E.J. Newman, "Identity and Search in Social Networks," Science, vol. 296, no. 5571, 2002, pp. 1302–1305.
12. O. Sorenson and T.E. Stuart, "Syndication Networks and the Spatial Distribution of Venture Capital Investments," Am. J. Sociology, vol. 106, 2001, pp. 1546–1588.
13. C.T. Butts, "Spatial Models of Large-Scale Interpersonal Networks," doctoral dissertation, Dept. Social and Decision Sciences, Carnegie Mellon Univ., 2002.
14. M. Sageman, Understanding Terror Networks, Univ. Pennsylvania Press, 2004, pp. 142–146.
15. S. Keller-McNulty et al., Defense Modeling, Simulation, and Analysis: Meeting the Challenge, Nat'l Academies Press, 2006, pp. 64–73.
455 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool