On the topology of the dark web of terrorist groups

Jennifer Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Abstract

In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand the characteristics of these websites and predict terrorist activities. In this paper, we propose to apply network topological analysis methods on systematically collected the terrorist website data and to study the structural characteristics at the Web page level. We conducted a case study using the methods on three collections of Middle-Eastern, US domestic, and Latin-American terrorist websites, We found that these three networks have the small-world and scale-free characteristics. We also found that smaller size websites which share same interests tend to make stronger inter-website linkage relationships.

Original languageEnglish (US)
Title of host publicationIntelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings
PublisherSpringer-Verlag
Pages367-376
Number of pages10
ISBN (Print)3540344780, 9783540344780
DOIs
StatePublished - 2006
EventIEEE International Conference on Intelligence and Security Informatics, ISI 2006 - San Diego, CA, United States
Duration: May 23 2006May 24 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3975 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherIEEE International Conference on Intelligence and Security Informatics, ISI 2006
Country/TerritoryUnited States
CitySan Diego, CA
Period5/23/065/24/06

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'On the topology of the dark web of terrorist groups'. Together they form a unique fingerprint.

Cite this