Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
5126767 | Social Networks | 2017 | 11 Pages |
â¢Graph database theory is applied to map covert networksâ¢Open source media data is collected for the Islamic State (IS) network in Europeâ¢The network is mapped and compared to other covert networksâ¢Robust differences are found between IS and Al-Qaida networks
This paper proposes a new framework, based on graph database theory, for encoding complex data on covert networks, mapping their structure, and conducting a sensitivity analysis. The framework is then applied to reconstruct the terrorist network of the 2015-2016 attacks in Paris and Brussels, and related plots in Europe by the Islamic State group. The resulting network was found to be qualitatively different from the ideologically-related Al-Qaeda network, having a lower secrecy and a lower mean degree, under different network-generating assumptions.