{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:07:04Z","timestamp":1758874024421,"version":"3.38.0"},"publisher-location":"Vienna","reference-count":33,"publisher":"Springer Vienna","isbn-type":[{"type":"print","value":"9783709103876"},{"type":"electronic","value":"9783709103883"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-7091-0388-3_11","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T22:29:55Z","timestamp":1309213795000},"page":"189-222","source":"Crossref","is-referenced-by-count":1,"title":["A Global Measure for Estimating the Degree of Organization and Effectiveness of Individual Actors with Application to Terrorist Networks"],"prefix":"10.1007","author":[{"given":"Sara","family":"Aghakhani","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Dawoud","sequence":"additional","affiliation":[]},{"given":"Reda","family":"Alhajj","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Rokne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,26]]},"reference":[{"key":"11_CR1","volume-title":"Identifying key contributors to performance in organizations: The case for knowledge-based measures","author":"MJ Ashworth","year":"2003","unstructured":"Ashworth, M.J.: Identifying key contributors to performance in organizations: The case for knowledge-based measures. In: NAACSOS Conference Proceedings (2003)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 837\u2013860 (1993)","DOI":"10.2307\/2095954"},{"key":"11_CR3","unstructured":"Carley, K.M.: Dynamic network analysis. In: Breiger, R., Carely, K.M. (eds.) In the Summary of the NRC Workshop on Social Network Modeling and Analysis. National Research Council (2003)"},{"key":"11_CR4","unstructured":"Carley, K.M., Reminga, J., Kamneva, N.: Destabilizing terrorist networks. In: NAACSOS Conference Proceedings. Pittsburgh, PA (2003)"},{"key":"11_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811395","volume-title":"Models and Methods in Social Network Analysis","author":"PJ Carrington","year":"2005","unstructured":"Carrington P.J., Scott J., Wasserman S.: Models and Methods in Social Network Analysis. Cambridge university press, Cambridge (2005)"},{"key":"11_CR6","unstructured":"Criminal Network Analysis Training Course. Defense Intelligence Agency (2000)"},{"key":"11_CR7","doi-asserted-by":"crossref","DOI":"10.4135\/9781849209373","volume-title":"Introducing social networks","author":"A Degenne","year":"1999","unstructured":"Degenne, A., Fors\u00e9, M.: Introducing social networks. Sage, London (1999)"},{"key":"11_CR8","volume-title":"Evolution of Social Network","author":"P Doreian","year":"1997","unstructured":"Doreian, P., Stokman, F.N.: Evolution of Social Network. Gordon and Breach Publishers, Amsterdam (1997)"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1080\/10576100390242857","volume":"26","author":"DJ Farely","year":"2003","unstructured":"Farely, D.J.: Breaking Al Qaeda cells: A mathematical analysis of counterterrorism operations. Stud. Confl. Terrorism 26, 399\u2013411 (2003)","journal-title":"Stud. Confl. Terrorism"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1977","unstructured":"Freeman, L.C.: A set of measures of centrality based on betweenness. Sociometry 40, 35\u201341 (1977)","journal-title":"Sociometry"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1979","unstructured":"Freeman, L.C.: Centrality in social networks I: Conceptual clarification. Soc. Netw. 1, 215\u2013239 (1979)","journal-title":"Soc. Netw."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Freeman, L.C.: The gatekeeper, pair-dependency and structural centrality. Qual. Quant. 585\u2013592 (1980)","DOI":"10.1007\/BF00184720"},{"key":"11_CR13","volume-title":"Research Methods in Social Network Analysis","author":"LC Freeman","year":"1992","unstructured":"Freeman, L.C., White, D.R., Romney, A.K.: Research Methods in Social Network Analysis. Transaction Publishers, New Brunswick, N.J. (1992)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Jialun, Q., Xu, J.J., Daning, H., Sageman, M., Chen, H.: Analyzing terrorist networks: A case study of the global Salafi Jihad network. In: Proceedings ofIEEE International Conference on Intelligence and Security Informatics, pp. 287\u2013304. Atlanta, GA (2005)","DOI":"10.1007\/11427995_24"},{"key":"11_CR15","unstructured":"Jung, J.J.: Query transformation based on semantic centrality in semantic social network. J. Univers. Comput. Sci. 14(7) (2008)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Kanungo, T., Mount, D.M., Netanyahu, N.S., Piatko, C., Silverman, R., Wu, A.Y.: The analysis of a simple k-mean clustering algorithm. In: Proceedings of 16th Annual Symposium of Computational Geometry, pp. 100\u2013109. (2000)","DOI":"10.21236\/ADA458738"},{"issue":"7","key":"11_CR17","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/TPAMI.2002.1017616","volume":"24","author":"T Kanungo","year":"2002","unstructured":"Kanungo, T., Mount, D.M., Netanyahu, N.S., Piatko, C.D., Silverman, R., Wu, A.Y.: An efficient k-mean clustering algorithm: Analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 881\u2013892 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"11_CR18","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. In: Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 668\u2013677. (1998)"},{"key":"11_CR19","unstructured":"Klerks, P.: The network paradigm applied to criminal organizations. Connections 24(3) (2001)"},{"key":"11_CR20","unstructured":"Klerks, P.: The network paradigm applied to criminal organizations. Connections 24(3) (2001)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Krebs, V.: Mapping terrorist networks. Connections 24(3) (2002)","DOI":"10.5210\/fm.v7i4.941"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Knoke, D., Yang, S.: Social network analysis. Series: Quantitative applications in Social Sciences. Sage publication, London (2008)","DOI":"10.4135\/9781412985864"},{"key":"11_CR23","unstructured":"MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, pp. 281\u2013297. Berkeley, University of California Press (1967)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Memon, N., Larsen, L.H.: Practical algorithm for destabilizing terrorist network. Intelligence and Security Informatics. Lecture Notes in Computer Science, vol. 3975, pp. 389\u2013400. Springer, Berlin (2006)","DOI":"10.1007\/11760146_34"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Memon, N., Wiil, U.K., Qureshi, A.R.: Design and development of an early warning system to prevent terrorist attacks. In: Proceedings of the International Conference on Artificial Intelligence and Neural Networks, pp. 222\u2013226. (2009)","DOI":"10.1109\/ICCSIT.2009.5234424"},{"issue":"1\/2","key":"11_CR26","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1504\/IJNVO.2011.037161","volume":"8","author":"N Memon","year":"2011","unstructured":"Memon, N., Wiil, U.K., Alhajj, R., Atzenbeck, C., Harkiolakis, N.: Harvesting covert networks: The case study of the iMiner database. J. Netw. Virtual Organ. 8(1\/2), 52\u201374 (2011)","journal-title":"J. Netw. Virtual Organ."},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Scott, J.: Trend report: Social network analysis. Sociology 109\u201327 (1998)","DOI":"10.1177\/0038038588022001007"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Shaikh, M.A., Wang, J.: Discovering hierarchical structure in terrorist networks. In: Proceedings of the International Conference on Emerging Technologies, pp. 238\u2013244. (2006)","DOI":"10.1109\/ICET.2006.335966"},{"issue":"3","key":"11_CR29","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","volume":"13","author":"MK Sparrow","year":"1991","unstructured":"Sparrow, M.K.: The application of network analysis to criminal intelligence: An assessment of the prospects. Soc. Netw. 13(3), 251\u2013274 (1991)","journal-title":"Soc. Netw."},{"key":"11_CR30","first-page":"268","volume":"410","author":"SH Strogatz","year":"2002","unstructured":"Strogatz, S.H.: Exploring complex networks. Nature 410, 268\u2013276 (2002)","journal-title":"Exploring complex networks. Nature"},{"key":"11_CR31","unstructured":"Tsvetovat, M., Carley, K.M.: Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. J. Soc. Struct. 6(2) (2005)"},{"key":"11_CR32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)"},{"issue":"2","key":"11_CR33","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/1059981.1059984","volume":"23","author":"J Xu","year":"2005","unstructured":"Xu, J., Chen, H.: CrimeNet explorer: A framework for criminal network knowledge discovery. ACM Trans. Inform. Syst. 23(2), 201\u2013226 (2005)","journal-title":"ACM Trans. Inform. Syst."}],"container-title":["Lecture Notes in Social Networks","Counterterrorism and Open Source Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-7091-0388-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:18:46Z","timestamp":1741288726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-7091-0388-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783709103876","9783709103883"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-7091-0388-3_11","relation":{},"ISSN":["2190-5428","2190-5436"],"issn-type":[{"type":"print","value":"2190-5428"},{"type":"electronic","value":"2190-5436"}],"subject":[],"published":{"date-parts":[[2011]]}}}