Investigating the efficacy of terrorist network visualizations

Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, 2013.

Bibliographic Details
Main Author: Berardi, Christopher W. (Christopher Walter)
Other Authors: Mary L. Cummings and Peter Jones.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2013
Subjects:
Online Access:http://hdl.handle.net/1721.1/79509
_version_ 1826210167545397248
author Berardi, Christopher W. (Christopher Walter)
author2 Mary L. Cummings and Peter Jones.
author_facet Mary L. Cummings and Peter Jones.
Berardi, Christopher W. (Christopher Walter)
author_sort Berardi, Christopher W. (Christopher Walter)
collection MIT
description Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, 2013.
first_indexed 2024-09-23T14:44:57Z
format Thesis
id mit-1721.1/79509
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T14:44:57Z
publishDate 2013
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/795092019-04-10T13:10:58Z Investigating the efficacy of terrorist network visualizations Berardi, Christopher W. (Christopher Walter) Mary L. Cummings and Peter Jones. Massachusetts Institute of Technology. Engineering Systems Division. Massachusetts Institute of Technology. Engineering Systems Division. Engineering Systems Division. Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, 2013. Cataloged from PDF version of thesis. Includes bibliographical references (p. 153-162). Military intelligence analysts are increasingly tasked to sift through enormous volumes of data to identify the proverbial intelligence "needle in a haystack." One specific domain exemplifying this new intelligence paradigm is network analysis of terrorist organizations. This area of intelligence analysis uses mostly commercially available software applications to leverage the powers of social network theory against large terrorism data sets. An additional challenge is the fast paced development cycle for new sensors, which are capable of collecting data at unmanageable rates. As such, analysts are in dire need of new analytical techniques that give them the ability to effectively and efficiently transform the collected data into intelligible information and, subsequently, intelligence. Therefore, the primary focus of this thesis is to analyze two visualization techniques within social network analysis, with the intent to identify which mode of visualization is most effective for the intelligence tasks of: 1) identifying leaders and 2) identifying clusters. To test the effectiveness of the visualizations, an experiment was conducted in which participants exploited matrix and node-link visualizations constructed from a surrogate terror data set. The objectives of this experiment were to test the effectiveness of the node-link visualization compared to the matrix visualization, based on two criteria: 1) effectiveness at identifying leaders and clusters within a network, and 2) the time it takes to complete each task. Participants in the experiment were all Air Force intelligence analysts and the experiment utilized a 2 (Visualization) x 2 (Task) mixed design study within-subjects on the visualization task factor and between-subjects on the visualization technique factor. The node-link visualization resulted in statistically significantly better performance in all studied scenarios where the objective was identifying leaders. Although node-link also returned a better performance than the matrix for identifying clusters, there was not a statistically significant difference. The same lack of statistical significance holds true for the completion time dependent variable. In all cases, there was not enough difference between the times produced by the node-link and matrix to determine if either offers a statistically significant decrease in the time it takes to complete tasks using either visualization. At this time, the matrix should not be universally integrated into the current methodologies used by analysts to exploit terror network visualizations until more research is conducted into the respective strengths and weaknesses within the intelligence domain. However, analysts should be independently encouraged to explore and adapt new methods of visualization into their current practices and identify new or improved versions of the visualizations identified within this thesis for future testing. by Christopher W. Berardi. S.M. 2013-07-10T14:50:34Z 2013-07-10T14:50:34Z 2013 2013 Thesis http://hdl.handle.net/1721.1/79509 849744360 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 162 p. application/pdf Massachusetts Institute of Technology
spellingShingle Engineering Systems Division.
Berardi, Christopher W. (Christopher Walter)
Investigating the efficacy of terrorist network visualizations
title Investigating the efficacy of terrorist network visualizations
title_full Investigating the efficacy of terrorist network visualizations
title_fullStr Investigating the efficacy of terrorist network visualizations
title_full_unstemmed Investigating the efficacy of terrorist network visualizations
title_short Investigating the efficacy of terrorist network visualizations
title_sort investigating the efficacy of terrorist network visualizations
topic Engineering Systems Division.
url http://hdl.handle.net/1721.1/79509
work_keys_str_mv AT berardichristopherwchristopherwalter investigatingtheefficacyofterroristnetworkvisualizations