메뉴 건너뛰기




Volumn 21, Issue 3, 2012, Pages 115-126

Can Social Network Analysis be Effective at Improving the Intelligence Community While Ensuring Civil Rights?

Author keywords

DARPA; intelligence community; social network analysis; terrorism

Indexed keywords

HISTORY; NETWORK SECURITY; SOCIAL NETWORKING (ONLINE);

EID: 84862160139     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393555.2011.647251     Document Type: Article
Times cited : (2)

References (39)
  • 2
    • 85171948912 scopus 로고    scopus 로고
    • Washington, DC: Congressional Research Service
    • Best, R. (2009). Intelligence issues for Congress. Washington, DC: Congressional Research Service. http://www.fas.org/sgp/crs/intel/RL33539.pdf (http://www.fas.org/sgp/crs/intel/RL33539.pdf)
    • (2009) Intelligence issues for Congress
    • Best, R.1
  • 3
    • 43949139273 scopus 로고    scopus 로고
    • Swimming against the current: The hidden developmental state in the U.S
    • Block, F. (2007). Swimming against the current: The hidden developmental state in the U.S. Politics and Society. 36, pp. 169-206. http://sociology.ucdavis.edu/people/fzblock/pdf/swimming.pdf (http://sociology.ucdavis.edu/people/fzblock/pdf/swimming.pdf)
    • (2007) Politics and Society , vol.36 , pp. 169-206
    • Block, F.1
  • 4
  • 6
    • 47049107175 scopus 로고    scopus 로고
    • Government data mining: The need for a legal framework
    • Cate, F. (2008). Government data mining: The need for a legal framework. Harvard Civil Rights-Civil Liberties Law Review, 43(2), pp. 435-489. http://www.law.harvard.edu/students/orgs/crcl/vol43_2/435-490_Cate.pdf (http://www.law.harvard.edu/students/orgs/crcl/vol43_2/435-490_Cate.pdf)
    • (2008) Harvard Civil Rights-Civil Liberties Law Review , vol.43 , Issue.2 , pp. 435-489
    • Cate, F.1
  • 7
    • 0010454419 scopus 로고    scopus 로고
    • University Park, PA: The Pennsylvania State University Press
    • Crenshaw, M. 2005. Terrorism in context, University Park, PA: The Pennsylvania State University Press.
    • (2005) Terrorism in context
    • Crenshaw, M.1
  • 8
    • 27844571691 scopus 로고    scopus 로고
    • Washington, DC: The CSIC Press
    • DeRosa, M. (2004). Data mining and data analysis for counterterrorism. Washington, DC: The CSIC Press. http://csis.org/files/media/csis/pubs/040301_data_mining_report.pdf (http://csis.org/files/media/csis/pubs/040301_data_mining_report.pdf)
    • (2004) Data mining and data analysis for counterterrorism
    • DeRosa, M.1
  • 9
    • 84862235611 scopus 로고    scopus 로고
    • Data mining system and applications: A review
    • September
    • Deshpande, S. P., & Thakare, V. M. (2010, September). Data mining system and applications: A review. International Journal of Distributed and Parallel Systems, 1(1), pp. 32-44. http://airccse.org/journal/ijdps/papers/0910ijdps03.pdf (http://airccse.org/journal/ijdps/papers/0910ijdps03.pdf)
    • (2010) International Journal of Distributed and Parallel Systems , vol.1 , Issue.1 , pp. 32-44
    • Deshpande, S.P.1    Thakare, V.M.2
  • 10
    • 85171911855 scopus 로고    scopus 로고
    • Defense Advanced Research Projects Agency, Arlington, VA: Author
    • Defense Advanced Research Projects Agency. (2009). Strategic plan May 2009. Arlington, VA: Author. http://www.scribd.com/doc/15833928/Defense-Advanced-Research-Projects-Agencys-DARPA-Strategic-Plan-May-2009 (http://www.scribd.com/doc/15833928/Defense-Advanced-Research-Projects-Agencys-DARPA-Strategic-Plan-May-2009)
    • (2009) Strategic plan May 2009
  • 11
  • 13
    • 4243180814 scopus 로고    scopus 로고
    • Riverside, CA: University of California
    • Hanneman, R., & Riddle, M. (2005). Introduction to social network methods. Riverside, CA: University of California. http://faculty.ucr.edu/~hanneman/nettext/C1_Social_Network_Data.html (http://faculty.ucr.edu/~hanneman/nettext/C1_Social_Network_Data.html)
    • (2005) Introduction to social network methods
    • Hanneman, R.1    Riddle, M.2
  • 14
    • 85171933675 scopus 로고    scopus 로고
    • The privacy implications of government data mining programs: Hearing before the United States Senate Committee on the Judiciary, (testimony of Kim Taipale)
    • The privacy implications of government data mining programs: Hearing before the United States Senate Committee on the Judiciary, (2007) (testimony of Kim Taipale). http://data-mining-testimony.info/ (http://data-mining-testimony.info/)
    • (2007)
  • 15
    • 0004114009 scopus 로고    scopus 로고
    • Washington, DC: Central Intelligence Agency, Center for the Study of Intelligence
    • Heuer, R. (1999). Psychology of intelligence analysis. Washington, DC: Central Intelligence Agency, Center for the Study of Intelligence. http://https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/index.html (http://https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/index.html)
    • (1999) Psychology of intelligence analysist
    • Heuer, R.1
  • 16
    • 85171936808 scopus 로고    scopus 로고
    • Introduction to social network analysis as an investigative tool
    • the Netherlands: Research and Documentation Centre, Ministry of Justice
    • Hulst, R. (2009). Introduction to social network analysis as an investigative tool. The Hague, the Netherlands: Research and Documentation Centre, Ministry of Justice. http://web.ebscohost.com.ezproxy2.apus.edu/ehost/detail?vid=1&hid=10&sid=d013775abb12405cb8dd70f6c135091f%40sessionmgr13&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=tsh&AN=40529769.
    • (2009) The Hague
    • Hulst, R.1
  • 17
    • 33746671934 scopus 로고    scopus 로고
    • Groningen, the Netherlands: University of Groningen
    • Huisman, M., & van Duijn, M. (2003). Software for social network analysis. Groningen, the Netherlands: University of Groningen. http://stat.gamma.rug.nl/Software%20for%20Social%20Network%20Analysis%20CUP_ch13_Oct2003.pdf (http://stat.gamma.rug.nl/Software%20for%20Social%20Network%20Analysis%20CUP_ch13_Oct2003.pdf)
    • (2003) Software for social network analysis
    • Huisman, M.1    van Duijn, M.2
  • 19
    • 85171902873 scopus 로고    scopus 로고
    • Katz, v. 1967. U.S. 347,361: United States. 389
    • Katz, v. 1967. U.S. 347,361: United States. 389.
  • 20
    • 85171905996 scopus 로고    scopus 로고
    • London, England: RTO SCI Symposium on Systems, Concepts and Integration Methods and Technologies for Defence Against Terrorism
    • Koltko-Rivera, M. (2004). Detection of terrorist preparations by an artificial intelligence expert system employing fuzzy signal detection theory. London, England: RTO SCI Symposium on Systems, Concepts and Integration Methods and Technologies for Defence Against Terrorism. http://psg-fl.com/downloads/NATO%20-%20Detection%20of%20Terrorist%20Preparations.pdf (http://psg-fl.com/downloads/NATO%20-%20Detection%20of%20Terrorist%20Preparations.pdf)
    • (2004) Detection of terrorist preparations by an artificial intelligence expert system employing fuzzy signal detection theory
    • Koltko-Rivera, M.1
  • 22
    • 7644224668 scopus 로고    scopus 로고
    • Uncloaking terrorist networks
    • Krebs, V. (2002). Uncloaking terrorist networks. First Monday, 7(4). http://131.193.153.231/www/issues/issue7_4/krebs/ (http://131.193.153.231/www/issues/issue7_4/krebs/)
    • (2002) First Monday , vol.7 , Issue.4
    • Krebs, V.1
  • 24
    • 85171904429 scopus 로고    scopus 로고
    • Social network analysis-linking foreign terrorist organizations
    • Kutcher, C. (2008). Social network analysis-linking foreign terrorist organizations. International Analyst Network. http://www.analyst-network.com/article.php?art_id=1590 (http://www.analyst-network.com/article.php?art_id=1590)
    • (2008) International Analyst Network
    • Kutcher, C.1
  • 25
    • 77952513298 scopus 로고    scopus 로고
    • (FFI/RAPPORT-2004/04307). Kjeller, Norway: Norwegian Defense Research Establishment
    • Lia, B., & Skjolberg, K. (2004). Causes of terrorism: An expanded and updated review of the literature (FFI/RAPPORT-2004/04307). Kjeller, Norway: Norwegian Defense Research Establishment. http://rapporter.ffi.no/rapporter/2004/04307.pdf (http://rapporter.ffi.no/rapporter/2004/04307.pdf)
    • (2004) Causes of terrorism: An expanded and updated review of the literature
    • Lia, B.1    Skjolberg, K.2
  • 26
    • 33644682591 scopus 로고    scopus 로고
    • Markle Foundation, New York, NY: Author
    • Markle Foundation. (2003). Creating a trusted network for homeland security. New York, NY: Author. http://www.markle.org/publications/666-creating-trusted-network-homeland-security (http://www.markle.org/publications/666-creating-trusted-network-homeland-security)
    • (2003) Creating a trusted network for homeland security
  • 28
    • 84862237174 scopus 로고    scopus 로고
    • Carbondale, IL: Southern Illinois University
    • Perliger, A., & Pedahzur, A. (2010). Social network analysis in the study of terrorism and political violence. Carbondale, IL: Southern Illinois University. http://utexas.academia.edu/AmiPedahzur/Papers/290973/Social_Network_Analysis_in_the_Study_of_Terrorism_and_Political_Violence (http://utexas.academia.edu/AmiPedahzur/Papers/290973/Social_Network_Analysis_in_the_Study_of_Terrorism_and_Political_Violence)
    • (2010) Social network analysis in the study of terrorism and political violence
    • Perliger, A.1    Pedahzur, A.2
  • 29
    • 85171933440 scopus 로고    scopus 로고
    • Tucson, AZ: The University of Arizona
    • Reid, E., & Chen, H. (2006). Mapping the contemporary terrorism research domain. Tucson, AZ: The University of Arizona. http://ai.arizona.edu/intranet/papers/paper-Reid-terrorism-researcher.pdf (http://ai.arizona.edu/intranet/papers/paper-Reid-terrorism-researcher.pdf)
    • (2006) Mapping the contemporary terrorism research domain
    • Reid, E.1    Chen, H.2
  • 30
    • 3042791622 scopus 로고    scopus 로고
    • You are a suspect
    • November 14
    • Safire, W. (2002, November 14). You are a suspect. The New York Times. http://www.nytimes.com/2002/11/14/opinion/you-are-a-suspect.html (http://www.nytimes.com/2002/11/14/opinion/you-are-a-suspect.html)
    • (2002) The New York Times
    • Safire, W.1
  • 31
    • 85171947490 scopus 로고    scopus 로고
    • Washington, DC: Congressional Research Service
    • Seifert, J. (2008). Data mining and homeland security: An overview. Washington, DC: Congressional Research Service. http://www.fas.org/sgp/crs/intel/RL31798.pdf (http://www.fas.org/sgp/crs/intel/RL31798.pdf)
    • (2008) Data mining and homeland security: An overview
    • Seifert, J.1
  • 34
    • 85171909464 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security,Washington, DC: Author
    • U.S. Department of Homeland Security. (2007). 2007 report to Congress on the impact of data mining technologies on privacy and civil liberties. Washington, DC: Author. http://www.dhs.gov/xlibrary/assets/privacy/privacy_rpt_datamining_2008.pdf (http://www.dhs.gov/xlibrary/assets/privacy/privacy_rpt_datamining_2008.pdf)
    • (2007) 2007 report to Congress on the impact of data mining technologies on privacy and civil liberties
  • 35
    • 85171922738 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security, Washington, DC: Author
    • U.S. Department of Homeland Security. (2010). 2010 data mining report to Congress. Washington, DC: Author. http://www.dhs.gov/xlibrary/assets/privacy/2010-dhs-data-mining-report.pdf (http://www.dhs.gov/xlibrary/assets/privacy/2010-dhs-data-mining-report.pdf)
    • (2010) 2010 data mining report to Congress
  • 36
    • 84862236079 scopus 로고    scopus 로고
    • Washington, DC: DARPA
    • Van Atta, R. (2008). Fifty years of innovation and discovery. Washington, DC: DARPA. www.darpa.mil/WorkArea/DownloadAsset.aspx?id=2553 (http://www.darpa.mil/WorkArea/DownloadAsset.aspx?id=2553)
    • (2008) Fifty years of innovation and discovery
    • van Atta, R.1
  • 37
    • 0033196289 scopus 로고    scopus 로고
    • Networks, dynamics, and the small world phenomenon
    • Watts, D. J. (1999). Networks, dynamics, and the small world phenomenon. American Journal of Sociology, 13(2), pp. 493-527. http://www.cc.gatech.edu/~mihail/D.8802readings/watts-swp.pdf (http://www.cc.gatech.edu/~mihail/D.8802readings/watts-swp.pdf)
    • (1999) American Journal of Sociology , vol.13 , Issue.2 , pp. 493-527
    • Watts, D.J.1
  • 39
    • 85047692546 scopus 로고    scopus 로고
    • September 11 and the adaptation failure of U.S. intelligence agencies
    • Zegart, A. B. (2005). September 11 and the adaptation failure of U.S. intelligence agencies. International Security, 29(4), 78-111. http://faculty.spa.ucla.edu/zegart/pdf/29.4zegart.pdf (http://faculty.spa.ucla.edu/zegart/pdf/29.4zegart.pdf)
    • (2005) International Security , vol.29 , Issue.4 , pp. 78-111
    • Zegart, A.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.