IDEAS home Printed from https://ideas.repec.org/p/adl/wpaper/2013-08.html
   My bibliography  Save this paper

The Small World of 9/11 and the Implications for Network Dismantlement Strategies

Author

Listed:
  • Virginie Masson

    (School of Economics, University of Adelaide)

  • Kelsey Wilkins

Abstract

We retraced the development of the network of those who participated in the 9/11 attacks through four stages: 1998-99, December 2000, May 2001 and August 2001. We established that throughout its development, the network had the characteristics of a small world. The implications of this result pointed towards an easily detectable but difficult to dismantle network due to its large clusters. We then assessed the performances of traditional measures of network strength and node centrality. We found that although betweenness surpasses all other measures for all stages, we could improve its performance. The new measure, termed the Jenga index, proved to perform best through all stages.

Suggested Citation

  • Virginie Masson & Kelsey Wilkins, 2013. "The Small World of 9/11 and the Implications for Network Dismantlement Strategies," School of Economics and Public Policy Working Papers 2013-08, University of Adelaide, School of Economics and Public Policy.
  • Handle: RePEc:adl:wpaper:2013-08
    as

    Download full text from publisher

    File URL: https://media.adelaide.edu.au/economics/papers/doc/wp2013-08.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Terrill L. Frantz & Marcelo Cataldo & Kathleen M. Carley, 2009. "Robustness of centrality measures under uncertainty: Examining the role of network topology," Computational and Mathematical Organization Theory, Springer, vol. 15(4), pages 303-328, December.
    2. Scott Helfstein & Dominick Wright, 2011. "Covert or Convenient? Evolution of Terror Attack Networks," Journal of Conflict Resolution, Peace Science Society (International), vol. 55(5), pages 785-813, October.
    3. Kathleen M. Carley, 2006. "Destabilization of covert networks," Computational and Mathematical Organization Theory, Springer, vol. 12(1), pages 51-66, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jianjun Lu & Shozo Tokinaga, 2016. "Cluster fluctuation in two-dimensional lattices with local interactions," Computational and Mathematical Organization Theory, Springer, vol. 22(2), pages 237-259, June.
    2. Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2009. "Understanding Terrorist Network Topologies and Their Resilience Against Disruption," Discussion Paper 2009-85, Tilburg University, Center for Economic Research.
    3. Brandy L. Aven, 2015. "The Paradox of Corrupt Networks: An Analysis of Organizational Crime at Enron," Organization Science, INFORMS, vol. 26(4), pages 980-996, August.
    4. Terrill L. Frantz & Kathleen M. Carley, 2017. "Reporting a network’s most-central actor with a confidence level," Computational and Mathematical Organization Theory, Springer, vol. 23(2), pages 301-312, June.
    5. Andrea Landherr & Bettina Friedl & Julia Heidemann, 2010. "A Critical Review of Centrality Measures in Social Networks," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 2(6), pages 371-385, December.
    6. A. Fronzetti Colladon & E. Remondi, 2021. "Using social network analysis to prevent money laundering," Papers 2105.05793, arXiv.org.
    7. Morgan Burcher & Chad Whelan, 2015. "Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries," Global Crime, Taylor & Francis Journals, vol. 16(2), pages 104-122, April.
    8. Junhui Cai & Dan Yang & Wu Zhu & Haipeng Shen & Linda Zhao, 2021. "Network regression and supervised centrality estimation," Papers 2111.12921, arXiv.org.
    9. Sara Jeza Alotaibi, 2022. "A New Internet of Things (IoT) Framework for Public Sectors," International Journal of Information Technology and Web Engineering (IJITWE), IGI Global, vol. 17(1), pages 1-15, January.
    10. Alexandra-Maria Bocse, 0. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 0, pages 1-19.
    11. Sho Tsugawa & Yukihiro Matsumoto & Hiroyuki Ohsaki, 2015. "On the robustness of centrality measures against link weight quantization in social networks," Computational and Mathematical Organization Theory, Springer, vol. 21(3), pages 318-339, September.
    12. Jianjun Lu & Shozo Tokinaga, 2013. "Analysis of cluster formations on planer cells based on genetic programming," Computational and Mathematical Organization Theory, Springer, vol. 19(4), pages 426-445, December.
    13. Arun Advani & Bansi Malde, 2014. "Empirical methods for networks data: social effects, network formation and measurement error," IFS Working Papers W14/34, Institute for Fiscal Studies.
    14. Kathleen M. Carley & Michael W. Bigrigg & Boubacar Diallo, 2012. "Data-to-model: a mixed initiative approach for rapid ethnographic assessment," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 300-327, September.
    15. Zhang, Xin-Jie & Tang, Yong & Xiong, Jason & Wang, Wei-Jia & Zhang, Yi-Cheng, 2020. "Ranking game on networks: The evolution of hierarchical society," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 540(C).
    16. Manzi, Deborah & Calderoni, Francesco, 2024. "The resilience of drug trafficking organizations: Simulating the impact of police arresting key roles," Journal of Criminal Justice, Elsevier, vol. 91(C).
    17. Yu Zhang & Yu Wu, 2012. "How behaviors spread in dynamic social networks," Computational and Mathematical Organization Theory, Springer, vol. 18(4), pages 419-444, December.
    18. Dunn, Adam G. & Westbrook, Johanna I., 2011. "Interpreting social network metrics in healthcare organisations: A review and guide to validating small networks," Social Science & Medicine, Elsevier, vol. 72(7), pages 1064-1068, April.
    19. Stella, Massimo, 2020. "Multiplex networks quantify robustness of the mental lexicon to catastrophic concept failures, aphasic degradation and ageing," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 554(C).
    20. Tsugawa, Sho & Kimura, Kazuma, 2018. "Identifying influencers from sampled social networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 507(C), pages 294-303.

    More about this item

    Keywords

    Terrorism; Counterterrorism; Social Network Analysis.;
    All these keywords.

    JEL classification:

    • F52 - International Economics - - International Relations, National Security, and International Political Economy - - - National Security; Economic Nationalism
    • D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions
    • D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:adl:wpaper:2013-08. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Qazi Haque (email available below). General contact details of provider: https://edirc.repec.org/data/decadau.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.