Understanding South Asian Violent Extremist Group-group interactions

  • D. B. Skillicorn
  • , F. Spezzano
  • , V. S. Subrahmanian
  • , M. Garber

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

The South Asian Violent Extremist Group (SAVE) dataset describes 500 interactions between 30 South Asian terrorist groups over a 20-year period. We analyze 4 types of interactions between these groups (financial, logistical, operational, and political) via 4 network-theoretic techniques: spectral decomposition and Simmelian ties in an undirected version of the network, and PageRank and betweenness centrality on directed versions of the network. We identify the major players in both the provision and the flows through this network for each type of support. Our analysis shows that the five entities most involved in providing and facilitating all forms of support are Al Qaeda, the Pakistani Inter-Services Intelligence Agency, the Taliban, Lashkar-e-Taiba, and Tehreek-e-Taliban Pakistan.

Original languageEnglish
Title of host publicationASONAM 2014 - Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
EditorsXindong Wu, Xindong Wu, Martin Ester, Guandong Xu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages687-694
Number of pages8
ISBN (Electronic)9781479958771
DOIs
StatePublished - 10 Oct 2014
Event2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2014 - Beijing, China
Duration: 17 Aug 201420 Aug 2014

Publication series

NameASONAM 2014 - Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining

Conference

Conference2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2014
Country/TerritoryChina
CityBeijing
Period17/08/1420/08/14

Fingerprint

Dive into the research topics of 'Understanding South Asian Violent Extremist Group-group interactions'. Together they form a unique fingerprint.

Cite this