{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T03:40:06Z","timestamp":1751686806949,"version":"3.41.0"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319933719"},{"type":"electronic","value":"9783319933726"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93372-6_35","type":"book-chapter","created":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T11:08:26Z","timestamp":1528888106000},"page":"315-328","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Turning Narrative Descriptions of Individual Behavior into Network Visualization and Analysis: Example of Terrorist Group Dynamics"],"prefix":"10.1007","author":[{"given":"Georgiy","family":"Bobashev","sequence":"first","affiliation":[]},{"given":"Marc","family":"Sageman","sequence":"additional","affiliation":[]},{"given":"Amanda Lewis","family":"Evans","sequence":"additional","affiliation":[]},{"given":"John","family":"Wittenborn","sequence":"additional","affiliation":[]},{"given":"Robert F.","family":"Chew","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"35_CR1","first-page":"174","volume-title":"Dynamic Social Network Modeling and Analysis","author":"M Morris","year":"2003","unstructured":"Morris, M.: Local rules and global properties: modeling the emergence of network structure. In: Breiger, R., Carley, K., Pattison, P. (eds.) Dynamic Social Network Modeling and Analysis, pp. 174\u2013186. National Academy Press, Washington, DC (2003)"},{"issue":"4","key":"35_CR2","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.18637\/jss.v024.i04","volume":"24","author":"M Morris","year":"2008","unstructured":"Morris, M., Handcock, M.S., Hunter, D.R.: Specification of exponential-family random graph models: terms and computational aspects. J. Stat. Softw. 24(4), 1548 (2008)","journal-title":"J. Stat. Softw."},{"key":"35_CR3","unstructured":"Carley, K.M.: Destabilizing dynamic terrorist networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium. Conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 3, Electronic Publication (2003). http:\/\/www.dodccrp.org\/events\/2003\/8th_ICCRTS\/pdf\/021.pdf"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Carley, K.M., Pfeffer, J., Liu, H., Morstatter, F., Goolsby, R.: Near real time assessment of social media using geo-temporal network analytics. In: 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 517\u2013524. IEEE (2013)","DOI":"10.1145\/2492517.2492561"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1007\/978-1-4614-6170-8","volume-title":"Encyclopedia of Social Network Analysis and Mining","author":"KM Carley","year":"2014","unstructured":"Carley, K.M.: ORA: a toolkit for dynamic network analysis and visualization. In: Alhajj, R., Rokne, J. (eds.) Encyclopedia of Social Network Analysis and Mining, pp. 1219\u20131228. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-1-4614-6170-8"},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10588-006-7084-x","volume":"12","author":"SP Borgatti","year":"2006","unstructured":"Borgatti, S.P.: Identifying sets of key players in a network. Comput. Math. Organ. Theory 12, 21\u201334 (2006)","journal-title":"Comput. Math. Organ. Theory"},{"issue":"5916","key":"35_CR7","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1126\/science.1165821","volume":"323","author":"SP Borgatti","year":"2009","unstructured":"Borgatti, S.P., Mehra, A., Brass, D.J., Labianca, G.: Network analysis in the social sciences. Science 323(5916), 892\u2013895 (2009)","journal-title":"Science"},{"issue":"1","key":"35_CR8","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1111\/ajps.12263","volume":"61","author":"SJ Cranmer","year":"2017","unstructured":"Cranmer, S.J., Leifeld, P., McClurg, S.D., Rolfe, M.: Navigating the range of statistical tools for inferential network analysis. Am. J. Polit. Sci. 61(1), 237\u2013251 (2017)","journal-title":"Am. J. Polit. Sci."},{"key":"35_CR9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511510588","volume-title":"Computational and Mathematical Modeling in the Social Sciences","author":"S Marchi De","year":"2005","unstructured":"De Marchi, S.: Computational and Mathematical Modeling in the Social Sciences. Cambridge University Press, Cambridge (2005)"},{"issue":"8","key":"35_CR10","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1007\/s10994-016-5583-7","volume":"106","author":"VM Gunturi","year":"2017","unstructured":"Gunturi, V.M., Shekhar, S., Joseph, K., Carley, K.M.: Scalable computational techniques for centrality metrics on temporally detailed social network. Mach. Learn. 106(8), 1133\u20131169 (2017)","journal-title":"Mach. Learn."},{"issue":"1","key":"35_CR11","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.18637\/jss.v024.i01","volume":"24","author":"MS Handcock","year":"2008","unstructured":"Handcock, M.S., Hunter, D.R., Butts, C.T., Goodreau, S.M., Morris, M.: statnet: software tools for the representation, visualization, analysis and simulation of network data. J. Stat. Softw. 24(1), 1548 (2008)","journal-title":"J. Stat. Softw."},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Hunter, D.R., Handcock, M.S., Butts, C.T., Goodreau, S.M., Morris, M.: ergm: a package to fit, simulate and diagnose exponential-family models for networks. J. Stat. Softw. 24(3), nihpa54860 (2008)","DOI":"10.18637\/jss.v024.i03"},{"issue":"1","key":"35_CR13","first-page":"9","volume":"10","author":"W Wei","year":"2015","unstructured":"Wei, W., Carley, K.M.: Measuring temporal patterns in dynamic social networks. ACM Trans. Knowl. Discov. Data (TKDD) 10(1), 9 (2015)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"35_CR14","unstructured":"Carley, K.M.: A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action. In: Visualising Network Information (pp. KN1-1\u2013KN1-10). Meeting Proceedings RTO-MP-IST-063, Keynote 1. RTO, Neuilly-sur-Seine (2006). http:\/\/www.rto.nato.int\/abstracts.asp"},{"issue":"4","key":"35_CR15","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1080\/00380237.2006.10571288","volume":"39","author":"BJ Reed","year":"2006","unstructured":"Reed, B.J., Segal, D.R.: Social network analysis and counterinsurgency operations: the capture of Saddam Hussein. Sociol. Focus 39(4), 251\u2013264 (2006)","journal-title":"Sociol. Focus"},{"key":"35_CR16","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.socnet.2016.09.004","volume":"48","author":"JL Bie de","year":"2017","unstructured":"de Bie, J.L., de Poot, C.J., Freilich, J.D., Chermak, S.M.: Changing organizational structures of jihadist networks in the Netherlands. Soc. Netw. 48, 270\u2013283 (2017)","journal-title":"Soc. Netw."},{"key":"35_CR17","unstructured":"Ressler, S.: Social network analysis as an approach to combat terrorism: past, present, and future research. Homel. Secur. Aff. 2(2) (2006). https:\/\/www.hsaj.org\/articles\/171"},{"key":"35_CR18","unstructured":"Rodr\u00edguez, J.A., Rodr\u00edguez, J.A.: The March 11 th terrorist network: in its weakness lies its strength (2005)"},{"key":"35_CR19","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206791","volume-title":"Understanding Terror Networks","author":"M Sageman","year":"2004","unstructured":"Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Philadelphia (2004)"},{"issue":"3","key":"35_CR20","first-page":"43","volume":"24","author":"VE Krebs","year":"2002","unstructured":"Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43\u201352 (2002)","journal-title":"Connections"},{"key":"35_CR21","unstructured":"Dombroski, M., Fischbeck, P., Carley, K.: Estimating the shape of covert networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium, June 2003"},{"key":"35_CR22","unstructured":"Carley, K.M.: Estimating vulnerabilities in large covert networks. Institute of Software Research Internat, Carnegie-Mellon University, Pittsburgh (2004)"},{"key":"35_CR23","unstructured":"Diesner, J., Carley, K.M.: Using network text analysis to detect the organizational structure of covert networks. In: Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference, vol. 3. NAACSOS, July 2004"},{"key":"35_CR24","unstructured":"Borum, R.: Psychology of terrorism. Department of Mental Health Law and Policy, University of South Florida, Tampa (2007)"},{"issue":"4","key":"35_CR25","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1111\/j.1468-2346.2010.00918.x","volume":"86","author":"J Githens-Mazer","year":"2010","unstructured":"Githens-Mazer, J., Lambert, R.: Why conventional wisdom on radicalization fails: the persistence of a failed discourse. Int. Aff. 86(4), 889\u2013901 (2010)","journal-title":"Int. Aff."},{"key":"35_CR26","unstructured":"Crossett, C., Spitaletta, J.: Radicalization: relevant psychological and sociological concepts. The John Hopkins University (2010)"},{"key":"35_CR27","unstructured":"Wheeler, S.J.: Complex environments\u2014an alternative approach to the assessment of insurgencies and their social terrain, part 1: identifying decisive factors. National Ground Intelligence Center Assessment (2009)"},{"key":"35_CR28","volume-title":"The Mind of the Terrorist: The Psychology of Terrorism from the IRA to Al-Qaeda","author":"JM Post","year":"2007","unstructured":"Post, J.M.: The Mind of the Terrorist: The Psychology of Terrorism from the IRA to Al-Qaeda. St. Martin\u2019s Press, New York (2007)"},{"key":"35_CR29","unstructured":"Perliger, A., Milton, D.: From cradle to grave: the lifecycle of foreign fighters in Iraq and Syria. US Military Academy-Combating Terrorism Center West Point United States (2016)"},{"issue":"5","key":"35_CR30","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1111\/pops.12376","volume":"38","author":"K Jasko","year":"2017","unstructured":"Jasko, K., LaFree, G., Kruglanski, A.: Quest for significance and violent extremism: the case of domestic radicalization. Polit. Psychol. 38(5), 815\u2013831 (2017)","journal-title":"Polit. Psychol."},{"issue":"2","key":"35_CR31","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1111\/1467-9248.12182","volume":"64","author":"A Perliger","year":"2016","unstructured":"Perliger, A., Pedahzur, A.: Counter cultures, group dynamics and religious terrorism. Polit. Stud. 64(2), 297\u2013314 (2016)","journal-title":"Polit. Stud."},{"key":"35_CR32","first-page":"95","volume":"89","author":"J Stern","year":"2010","unstructured":"Stern, J.: Mind over martyr: how to deradicalize Islamist extremists. Foreign Aff. 89, 95\u2013108 (2010)","journal-title":"Foreign Aff."},{"key":"35_CR33","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1080\/07388940802219000","volume":"3","author":"V Asal","year":"2008","unstructured":"Asal, V., Rethemeyer, R.K.: Dilettantes, ideologues, and the weak: terrorists who don\u2019t kill. Confl. Manag. Peace Sci. 3, 244\u2013263 (2008)","journal-title":"Confl. Manag. Peace Sci."},{"issue":"2","key":"35_CR34","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1017\/S0022381608080419","volume":"70","author":"V Asal","year":"2008","unstructured":"Asal, V., Rethemeyer, R.K.: The nature of the beast: terrorist organizational characteristics and organizational lethality. J. Polit. 70(2), 437\u2013449 (2008)","journal-title":"J. Polit."},{"issue":"2","key":"35_CR35","doi-asserted-by":"publisher","first-page":"223","DOI":"10.5129\/001041509X12911362972070","volume":"41","author":"IO Lustick","year":"2009","unstructured":"Lustick, I.O., Miodownik, D.: Abstractions, ensembles, and virtualizations: simplicity and complexity in agent-based modeling. Comp. Polit. 41(2), 223\u2013244 (2009)","journal-title":"Comp. Polit."},{"key":"35_CR36","first-page":"184","volume":"28","author":"EP MacKerrow","year":"2003","unstructured":"MacKerrow, E.P.: Understanding why: dissecting radical Islamic terrorism with agent-based simulation. Los Alamos Sci. 28, 184\u2013191 (2003)","journal-title":"Los Alamos Sci."},{"key":"35_CR37","unstructured":"Fern\u00e1ndez, B., Murty, V.V., Chang, W.R.: DyNet: Dynamic Network, User Manual (1989)"},{"issue":"4","key":"35_CR38","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1086\/421509","volume":"110","author":"J Moody","year":"2005","unstructured":"Moody, J., McFarland, D., Bender-deMoll, S.: Dynamic network visualization. Am. J. Sociol. 110(4), 1206\u20131241 (2005)","journal-title":"Am. J. Sociol."},{"key":"35_CR39","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1609\/icwsm.v3i1.13937","volume":"8","author":"M Bastian","year":"2009","unstructured":"Bastian, M., Heymann, S., Jacomy, M.: Gephi: an open source software for exploring and manipulating networks. ICWSM 8, 361\u2013362 (2009)","journal-title":"ICWSM"},{"key":"35_CR40","unstructured":"Bender-deMoll, S.: NDTV: Network Dynamic Temporal Visualizations. R Package Version 0.10.0 (2016)"},{"key":"35_CR41","doi-asserted-by":"publisher","first-page":"837","DOI":"10.2307\/2095954","volume":"58","author":"WE Baker","year":"1993","unstructured":"Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 58, 837\u2013860 (1993)","journal-title":"Am. Sociol. Rev."},{"issue":"2","key":"35_CR42","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10611-011-9336-z","volume":"57","author":"DA Bright","year":"2012","unstructured":"Bright, D.A., Hughes, C.E., Chalmers, J.: Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate. Crime Law Soc. Change 57(2), 151\u2013176 (2012)","journal-title":"Crime Law Soc. Change"},{"key":"35_CR43","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206784","volume-title":"Leaderless Jihad: Terror Networks in the Twenty-First Century","author":"M Sageman","year":"2008","unstructured":"Sageman, M.: Leaderless Jihad: Terror Networks in the Twenty-First Century. University of Pennsylvania Press, Philadelphia (2008)"},{"key":"35_CR44","doi-asserted-by":"crossref","DOI":"10.5771\/9781461641711","volume-title":"Radical Islam rising: Muslim extremism in the West","author":"Q Wiktorowicz","year":"2005","unstructured":"Wiktorowicz, Q.: Radical Islam rising: Muslim extremism in the West. Rowman & Littlefield Publishers, Lanham (2005)"},{"key":"35_CR45","doi-asserted-by":"crossref","unstructured":"Carley, K.M., Columbus, D., Azoulay, A.: Automap user\u2019s guide 2012 (No. CMU-ISR-12-106). Institute of Software Research Internat, Carnegie-Mellon University, Pittsburgh (2012)","DOI":"10.21236\/ADA563083"},{"key":"35_CR46","unstructured":"Niu, F., Zhang, C., R\u00e9, C., Shavlik, J.W.: DeepDive: web-scale knowledge-base construction using statistical learning and inference. In: VLDS, vol. 12, pp. 25\u201328 (2012)"},{"key":"35_CR47","doi-asserted-by":"crossref","unstructured":"Mintz, M., Bills, S., Snow, R., Jurafsky, D.: Distant supervision for relation extraction without labeled data. In: Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP, vol. 2, pp. 1003\u20131011. Association for Computational Linguistics, August 2009","DOI":"10.3115\/1690219.1690287"},{"issue":"3","key":"35_CR48","doi-asserted-by":"publisher","first-page":"269","DOI":"10.14778\/3157794.3157797","volume":"11","author":"Alexander Ratner","year":"2017","unstructured":"Ratner, A., Bach, S.H., Ehrenberg, H., Fries, J., Wu, S., R\u00e9, C.: Snorkel: rapid training data creation with weak supervision. arXiv preprint arXiv:1711.10160 (2017)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"35_CR49","unstructured":"Kumar, S.: A survey of deep learning methods for relation extraction. arXiv preprint arXiv:1705.03645 (2017)"},{"key":"35_CR50","doi-asserted-by":"crossref","unstructured":"Lin, Y., Shen, S., Liu, Z., Luan, H., Sun, M.: Neural relation extraction with selective attention over instances. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, vol. 1: Long Papers, pp. 2124\u20132133 (2016)","DOI":"10.18653\/v1\/P16-1200"},{"key":"35_CR51","doi-asserted-by":"crossref","unstructured":"Zeng, D., Liu, K., Chen, Y., Zhao, J.: Distant supervision for relation extraction via piecewise convolutional neural networks. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 1753\u20131762 (2015)","DOI":"10.18653\/v1\/D15-1203"}],"container-title":["Lecture Notes in Computer Science","Social, Cultural, and Behavioral Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93372-6_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T03:15:41Z","timestamp":1751685341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93372-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319933719","9783319933726"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93372-6_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}