Al Qaeda's Grounded Theory Study

3671 Words8 Pages

Concept Paper: ?Grounded Theory Study Comparing Al Qaeda?s Multi-Layered Social Network to Emerging Online Jihadist Networks? 1. Introduction In a post-9/11 environment where terrorists have been isolated, driven into remote, lawless areas such as Somalia, Pakistan, and Yemen, the Al Qaeda network has been cut off from gathering for fear of military action or covert drone strikes. Al Qaeda?s leadership and operational assets have been driven underground. However, the ideological bonds that united those within Al Qaeda have found traction in a new generation of online jihadists, inspiring those who wish to continue the Salafist struggle. There is still much to learn about Al Qaeda, how it was formed, evolved, took action against the United …show more content…

"Social Network Analysis in the Study of Terrorism and Political Violence." Southern Illinois University Carbondale. Political Networks Paper Archive. 2010. http://opensiuc.lib.siu.edu/cgi/viewcontent.cgi?article=1048&context=pn_wp, accessed 20 Jun 2011. Rasool, Pir Abdul, Qureshi, Nasrullah Memon, and Uffe Kock Wiil. "EWAS: Modeling Application for Early Detection of Terrorist Threats." From Sociology to Computing in Social Networks (2010), pp. 135-156. http://www.mip.sdu.dk/~memon/EWaS.pdf, accessed 25 Jun 2011. Ressler, Steve. "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research." Homeland Security Affairs. (The Journal of the Naval Postgraduate Center for Homeland Defense and Security.) Volume II No. 2: July 2006. http://www.hsaj.org/?download&mode=dl&h&w&drm=resources%2Fvolume2%2Fissue2%2Fpdfs%2F&f=2.2.8.pdf&altf=2.2.8.pdf, accessed 19 Jun 2011. Skillicorn, D.B. "Social Network Analysis via Matrix Decompositions: al Qaeda." Queen?s University School of Computing. August 2004. http://www.cs.queensu.ca/~skill/alqaeda.pdf, accessed 21 Jun 2011. Vos Fellman, Philip. "The Complexity of Terrorist Networks." Southern New Hampshire University School of Business. http://necsi.org/events/iccs6/viewpaper.php?id=189, accessed 19 Jun …show more content…

"Analyzing the Terrorist Social Networks with Visualization Tools." The Chinese University of Hong Kong. Department of Systems Engineering and Engineering Management. 2006. http://www.se.cuhk.edu.hk/~yang/papers/yang2006f.pdf, accessed 19 Jun 2011. Yang, Ming, Melody Kiang, Yungchang Ku, Chaochang Chiu and Yijun Li. "Social Media Analytics for Radical Opinion Mining in Hate Group Web Forums." Journal of Homeland Security and Emergency Management. Volume 8, Issue 1, 2011 Article 38. http://www.bepress.com/jhsem/vol8/iss1/38, accessed 17 Sep 2011. 2.2 Related Research Published research within the field of SNA and counterterrorism has largely relied upon open source information. Valdis Krebs continues to study social networks, their structure and how they evolve. Marc Sageman has focused his research on Al Qaeda, its network structure, and how it has evolved since 9/11. Furthermore Fahad Shah, a research assistant at the University of Central Florida, has focused his academic studies on constructing social networks from unstructured, online communications. Several notable papers by Fahad

Open Document