A significant challenge in intelligence analysis involves knowing when a social network description is ‘complete’, i.e., when sufficient connections have been found to render the network complete. In this paper, a combination of methods is used to predict covert network structures for specific missions. The intention is to support hypothesis-generation in the Social Network Analysis of covert organisations. The project employs a four phase approach to modelling social networks, working from task descriptions rather than from contacts between individual: phase one involves the collation of intelligence covering types of mission, in terms of actors and goals; phase two involves the building of task models, based on Cognitive Work Analysis, to...
Social network analysis (SNA) focuses on the structure of ties within a set of social actors, e.g., ...
Social network analysis has been used for quite some time to analyze and understand the behavior of ...
Prevention of near-term terrorist attacks requires an understanding of current terrorist organizatio...
In this paper, we propose that it is possible to combine conventional Human Factors approaches to ta...
This volume provides the audience with an updated, in-depth and highly coherent material on the conc...
Betweenness centrality refers to the measure of a node’s influence on the transfer of items within a...
Various phenomena within the information systems discipline can be studied using the social network ...
This paper categories and compares various works done in the field of social networking for covert n...
Nowadays people and organizations are more and more interconnected in the forms of social networks: ...
The article of record as published may be found at http://dx.doi.org/10.1057/jors.2015.84As a result...
Cognitive Work Analysis (CWA) allows complex, sociotechnical systems to be explored in terms of thei...
How can individuals and communities protect their privacy against social network analysis tools? How...
A sharp rise in terrorist activities has motivated many researchers to device techniques of identifi...
The group-level findings in classical experimental studies of communication networks may be consider...
ocial innovation requires research regarding the profit potential of human interaction, in various s...
Social network analysis (SNA) focuses on the structure of ties within a set of social actors, e.g., ...
Social network analysis has been used for quite some time to analyze and understand the behavior of ...
Prevention of near-term terrorist attacks requires an understanding of current terrorist organizatio...
In this paper, we propose that it is possible to combine conventional Human Factors approaches to ta...
This volume provides the audience with an updated, in-depth and highly coherent material on the conc...
Betweenness centrality refers to the measure of a node’s influence on the transfer of items within a...
Various phenomena within the information systems discipline can be studied using the social network ...
This paper categories and compares various works done in the field of social networking for covert n...
Nowadays people and organizations are more and more interconnected in the forms of social networks: ...
The article of record as published may be found at http://dx.doi.org/10.1057/jors.2015.84As a result...
Cognitive Work Analysis (CWA) allows complex, sociotechnical systems to be explored in terms of thei...
How can individuals and communities protect their privacy against social network analysis tools? How...
A sharp rise in terrorist activities has motivated many researchers to device techniques of identifi...
The group-level findings in classical experimental studies of communication networks may be consider...
ocial innovation requires research regarding the profit potential of human interaction, in various s...
Social network analysis (SNA) focuses on the structure of ties within a set of social actors, e.g., ...
Social network analysis has been used for quite some time to analyze and understand the behavior of ...
Prevention of near-term terrorist attacks requires an understanding of current terrorist organizatio...