Publications
Early warning analysis for social diffusion events
ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security
Transnational Islamic activism and radicalization : patterns, trends, and prognosticators
The research described in this report developed the theoretical and conceptual framework for understanding, recognizing, and anticipating the origins, dynamic mechanisms, perceptions, and social structures of Islamic social reform movements in the Muslim homeland and in diaspora communities. This research has revealed valuable insights into the dynamic mechanisms associated with reform movements and, as such, offers the potential to provide indications and warnings of impending violence. This study produced the following significant findings: (1) A framework for understanding Islamic radicalization in the context of Social Movement Theory was developed and implemented. This framework provides a causal structure for the interrelationships among the myriad features of a social movement. (2) The degree to which movement-related activity shows early diffusion across multiple social contexts is a powerful distinguisher of successful and unsuccessful social movements. Indeed, this measurable appears to have significantly more predictive power than volume of such activity and also more power than various system intrinsics. (3) Significant social movements can occur only if both the intra-context 'infectivity' of the movement exceeds a certain threshold and the inter-context interactions associated with the movement occur with a frequency that is larger than another threshold. Note that this is reminiscent of, and significantly extends, well-known results for epidemic thresholds in disease propagation models. (4) More in-depth content analysis of blogs through the lens of Argumentation Theory has the potential to reveal new insights into radicalization in the context of Social Movement Theory. This connection has the potential to be of value from two important perspectives - first, this connection has the potential to provide more in depth insights into the forces underlying the emergence of radical behavior and second, this connection may provide insights into how to use the blogosphere to influence the emergent dialog to effectively impact the resulting actions taken by the potential radicals. The authors of this report recognize that Islamic communities are not the only source of radicalism; indeed many other groups, religious and otherwise, have used and continue to use, radicalism to achieve their ends. Further, the authors also recognize that not all Muslims use, or condone the use of, radical behavior. Indeed, only a very small segment of the Muslim communities throughout the world use and/or support such behavior. Nevertheless, the focus of this research is, indeed, on understanding, recognizing, and anticipating the origins, dynamic mechanisms, perceptions, and social structures of Islamic radicalism.
Sandia Capabilities In support of Influence Operations And Strategic Communications
Abstract not provided.
Predictive analysis for social processes
Analysis of complex networks using aggressive abstraction
This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.
Deep Information from Limited Observation of Robust Yet Fragile Systems: The Forest Fire Model
Abstract not provided.