社会网络理论的快速发展为反恐研究提供了新的视角,已有的研究多数只涉及恐怖活动的人员与组织.本文将社会网络应用于恐怖活动的时空特征分析,搜集了近60年来有关“东突”恐怖活动的文本资料,从中抽取出事件、时间、地点等信息,并以此构建了“事件-时间-空间”关系网络模型.基于社会网络分析工具ORA,结合地理信息系统技术,从不同角度对“东突”恐怖活动的时空特征进行了分析,并对分析的结果予以解释.本研究表明,“东突”恐怖活动呈现出明显的时空分布特征,这些特征对于防范恐怖活动的发生具有现实意义.
Abstract
Fast development in social network analysis provides a new perspective for the research on counter-terrorism, and most of the previous researches mainly focus on the personnel and organization of terrorist activities. This paper applied social network analysis to the field of spatial-temporal characteristics analysis in terrorist activities. A large number of text data from Internet related to "East Turkistan" activities in the past of 60 years were collected and the information about event, time and location were extracted. Then some network models describing the relationships among events, time and space were constructed. Further, some spatial-temporal characteristics of "East Turkistan" terrorist activities were analyzed from different viewpoints by social network analysis tool ORA, combining with geographic information system technology. Finally, the analysis results were explained. Research results show that the "East Turkistan" terrorist activities have obvious spatial-temporal characteristics. These characteristics are very important to prevent the terrorist activities.
关键词
社会网络分析 /
恐怖活动 /
时空特征
{{custom_keyword}} /
Key words
social network analysis /
terrorist activities /
spatial-temporal characteristics
{{custom_keyword}} /
中图分类号:
N94
N99
{{custom_clc.code}}
({{custom_clc.text}})
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
参考文献
[1] 林聚任. 社会网络分析: 理论、方法与应用[M].北京: 北京师范大学出版社, 2009.Lin Juren. Social network analysis: Theory, methods and applications[M]. Beijing: Beijing Normal University Press, 2009.
[2] 种鹏云, 帅斌. 连环恐怖袭击下危险品运输网络级联失效建模[J].系统工程理论与实践, 2014, 34(4): 1059-1065.Chong Pengyun, Shuai Bin. Model of cascading failure in hazardous materials transportation network under series of terrorist attacks[J]. Systems Engineering——Theory & Practice, 2014, 34(4): 1059-1065.
[3] 韩传峰, 孟令鹏, 张超, 等. 基于完全信息动态博弈的反恐设施选址模型[J]. 系统工程理论与实践, 2012, 32(2): 366-372.Han Chuanfeng, Meng Lingpeng, Zhang Chao, et al. Location of terror response facilities based on dynamic game of complete information[J]. Systems Engineering——Theory & Practice, 2012, 32(2): 366-372.
[4] 付举磊, 孙多勇, 肖进, 等. 基于社会网络分析理论的恐怖组织网络研究综述[J]. 系统工程理论与实践, 2013, 33(9): 2177-2186.Fu Julei, Sun Duoyong, Xiao Jin, et al. Review of the research on the terrorist networks based on social network analysis[J]. Systems Engineering——Theory & Practice, 2013, 33(9): 2177-2186.
[5] Bohannon J. Counter-terrorism's new tool: ‘Metanetwork’ analysis[J]. Science, 2009, 325(405): 409-411.
[6] Krebs V E. Mapping networks of terrorist cells[J]. Connections, 2001, 24(3): 43-52.
[7] Basu A. Social network analysis of terrorist organizations in India[C]//Conference of the North American Association for Computation Social and Organizational Science, 2005.
[8] Rodriguez J A. The March 11th terrorist network: In its weakness lies its strength[C]//XXV. International Sunbelt Conference, Los Angeles, 2003.
[9] Memon N, Harkiolakis N, Hicks D L. Detecting high-value individuals in covert networks: 7/7 London bombing case study[C]//AICCSA 08-6th IEEE/ACS International Conference on Computer Systems and Applications, 2008: 206-215.
[10] Sageman M. Understanding terror networks[M]. Philadelphia: University of Pennsylvania Press, 2004.
[11] Tsvetovat M, Reminga J, Carley K M. DyNetML: Interchange format for rich social network data[R]. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, 2004.
[12] Carley K M, Dereno M. ORA: Organization risk analyzer, ORA user's guide[R]. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, 2011.
[13] 张海. 基于社会网络理论的恐怖组织隐蔽网络研究[D]. 长沙: 国防科学技术大学, 2010.Zhang Hai. Study on terrorist organization from the perspective of social network analysis[D]. Changsha: National University of Defense Technology, 2010.
[14] 刘军.整体网分析讲义: UCINET软件实用指南[M]. 上海: 上海人民出版社, 2009: 222-233.Liu Jun. Lectures on whole network approach: A practical guide to ucinet[M]. Shanghai: Shanghai People's Publishing House, 2009: 222-233.
[15] 郑晓艳.中国反恐的基本态势与战略措施[C]//第三届全球化时代犯罪与刑法国际论坛, 北京, 2011.Zheng Xiaoyan. The basic situation and strategic measures of counter-terrorism about China[C]//The Third Session of the International Forum on Crime and Criminal Law in the Global Era, Beijing, 2011.
{{custom_fnGroup.title_cn}}
脚注
{{custom_fn.content}}
基金
国家自然科学基金(71473263,71471124);教育部高等学校博士学科点专项科研基金(20134307110020)
{{custom_fund}}