31 research outputs found

    Guns, Babies and Labor: Campaign Finance Networks in the 2000 Elections (working draft)

    Get PDF
    This paper seeks to expand upon what we know regarding the structure of interest group networks. To explore the potential for Social Network Analysis in the larger context of group behavior and information sharing, we make use of existing federal contribution data to explore how non-corporate political action committees are linked to one another at the federal level via regulated campaign finance. Thus, we explore the density of networks, who the central players are and group relationships with respect to investment behavior. Here, we make use of FEC contribution data from the 2000 electoral cycle to describe and explore the relationships between the different types of contributions made to federal candidates

    Toward an Interoperable Dynamic Network Analysis Toolkit

    Get PDF
    To facilitate the analysis of real and simulated data on groups, organizations and societies, tools and measures are needed that can handle relational or network data that is multi-mode, multi-link and multi-time period in which nodes and edges have attributes with possible data errors and missing data. The integrated CASOS dynamic network analysis toolkit described in this paper is an interoperable set of scalable software tools. These tools form a toolchain that facilitate the dynamic extraction, analysis, visualization and reasoning about key actors, hidden groups, vulnerabilities and changes in such data at varying levels of fidelity. We present these tools and illustrate their capabilities using data collected from a series of 368 texts on an organizational system interfaced with covert networks in the Middle East

    Understanding Terrorist Organizations with a Dynamic Model

    Full text link
    Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a more quantitative and integrated understanding, we constructed a simple dynamic model where equations describe how these processes change an organization's membership. Analysis of the model yields a number of intuitive as well as novel findings. Most importantly it becomes possible to predict whether counter-terrorism measures would be sufficient to defeat the organization. Furthermore, we can prove in general that an organization would collapse if its strength and its pool of foot soldiers decline simultaneously. In contrast, a simultaneous decline in its strength and its pool of leaders is often insufficient and short-termed. These results and other like them demonstrate the great potential of dynamic models for informing terrorism scholarship and counter-terrorism policy making.Comment: To appear as Springer Lecture Notes in Computer Science v2: vectorized 4 figures, fixed two typos, more detailed bibliograph

    Simulating Social Systems Requires Multiple Levels of Complexity ∗

    No full text
    We raise a question of whether it is appropriate to simulate human and social systems using simple ”ant-like ” agents, and argue that in order to simulate emergence and evolution of social order, complexity must reside not only on system level (i.e. simple agents with complex relations), but also on the level of an individual agent, in the form of boundedly rational reasoning and planning capabilities. Further, we show that agent’s ability to socialize with other agents and form informal friendships is key to the emergence of robust organizational structures. These theses are supported by an implemented system that uses a large number of intelligent agents to simulate emergence of terrorist cells and planning and execution of a bomb plot. We demonstrate these emergent behaviours with a detective story that is plausible enough to be published in a newspaper, yet is a completely fictional scenario created and performed by a cast of intelligent agents by means of self-motivation and self-organization. We argue that addition of individual-level realism to the model significantly boosts face validity of the simulation results.

    Bouncing back: Recovery mechanisms of covert networks

    No full text
    In study of covert networks and destabilization strategies thereof, much attention has been paid to the task of locating and isolating key individuals within the organization. Metrics such as centrality, betweenness, cognitive load, and others, have all been used for that purpose. The isolation act was considered successful i
    corecore