Vulnerability Assessment on Adversarial Organization: Unifying Command and Control Structure Analysis and Social Network Analysis

People often look at social networks as a way of explaining and understanding the design of an organization. The structure of an organization, in terms of workflow, can itself be assessed for feasibility, strength and robustness. Currently, tools for assessing organizations from a social network and from a workflow perspective are completely separate. Thus, we show how you can infer the workflow from the social network and what additional information can be extracted. This enables you to assess organizations from multiple perspectives at once and to gain a depth of understanding of this organization.

[1]  John Arquilla,et al.  Networks and Netwars: The Future of Terror, Crime and Militancy , 2001 .

[2]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[3]  Brian Michael Jenkins,et al.  Countering Al Qaeda , 2002 .

[4]  Kathleen M. Carley,et al.  On the robustness of centrality measures under conditions of imperfect data , 2006, Soc. Networks.

[5]  Kathleen M. Carley,et al.  ORA: Organization Risk Analyzer , 2004 .

[6]  Rebecca Goolsby,et al.  Combating terrorist networks: An evolutionary approach , 2006, Comput. Math. Organ. Theory.

[7]  Varvara Mitliaga,et al.  Networks and Netwars - The Future of Terror, Crime, and Militancy , 2002, Int. J. Law Inf. Technol..

[8]  Haiying Tu,et al.  Detecting, tracking, and counteracting terrorist networks via hidden Markov models , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[9]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[10]  Nancy Bedison Shaping the Adaptive Organization: Landscapes, Learning, and Leadership in Volatile Times , 2004 .

[11]  Kathleen M. Carley Destabilization of covert networks , 2006, Comput. Math. Organ. Theory.

[12]  Alexander H. Levis,et al.  Computationally Derived Models of Adversary Organizations , 2007, 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications.

[13]  Alexander H. Levis Executable Models of Decision Making Organizations , 2005 .

[14]  Benoit Morel,et al.  Through the Looking Glass of Complexity: the Dynamics of Organizations As Adaptive and Evolving Systems , 1999 .

[15]  William L. Weber,et al.  Application of Complexity Theory to Organization Science , 1999 .

[16]  Kathleen M. Carley,et al.  A PCANS Model of Structure in Organizations , 1998 .

[17]  H. Milward,et al.  Dark Networks as Problems , 2003 .

[18]  Renate Mayntz,et al.  Organizational forms of terrorism : hierarchy, network, or a type sui generis? , 2004 .

[19]  John Urry,et al.  The Global Complexities of September 11th , 2002 .

[20]  William E. Fulmer Shaping the Adaptive Organization: Landscapes, Learning, and Leadership in Volatile Times , 2000 .