Application of a profile similarity methodology for identifying terrorist groups that use or pursue CBRN weapons

Ronald L. Breiger, Gary A. Ackerman, Victor Asal, David Melamed, H. Brinton Milward, R. Karl Rethemeyer, Eric Schoon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

No single profile fits all CBRN-active groups, and therefore it is important to identify multiple profiles. In the analysis of terrorist organizations, linear and generalized regression modeling provide a set of tools to apply to data that is in the form of cases (named groups) by variables (traits and behaviors of the groups). We turn the conventional regression modeling "inside out" to reveal a network of relations among the cases on the basis of their attribute and behavioral similarity. We show that a network of profile similarity among the cases is built in to standard regression modeling, and that the exploitation of this aspect leads to new insights helpful in the identification of multiple profiles for actors. Our application builds on a study of 108 Islamic jihadist organizations that predicts use or pursuit of CBRN weapons.

Original languageEnglish (US)
Title of host publicationSocial Computing, Behavioral-Cultural Modeling and Prediction - 4th International Conference, SBP 2011, Proceedings
Pages26-33
Number of pages8
DOIs
StatePublished - 2011
Event4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2011 - College Park, MD, United States
Duration: Mar 29 2011Mar 31 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6589 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2011
Country/TerritoryUnited States
CityCollege Park, MD
Period3/29/113/31/11

Keywords

  • CBRN use or pursuit
  • Networks
  • profile similarity
  • terrorism

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Application of a profile similarity methodology for identifying terrorist groups that use or pursue CBRN weapons'. Together they form a unique fingerprint.

Cite this