000
| 02698nam 2200337zi 4500 |
---|
001 | 9.876621 |
---|
003 | CaOODSP |
---|
005 | 20240219183511 |
---|
006 | m o d f |
---|
007 | cr cn||||||||| |
---|
008 | 190718t20122012quca ob f000 0 eng d |
---|
040 | |aCaOODSP|beng|erda|cCaOODSP |
---|
041 | 0 |aeng|beng|bfre |
---|
086 | 1 |aD68-6/418-2012E-PDF |
---|
100 | 1 |aMartineau, Étienne, |d1976- |eauthor. |
---|
245 | 10|aApplicability of social network analyses in an intelligence context / |cEtienne Martineau, DRDC Valcartier. |
---|
264 | 1|aQuebec (Quebec) : |bDefence R&D Canada - Valcartier, |c2012. |
---|
264 | 4|c©2012 |
---|
300 | |a1 online resource (viii, 30 pages, 2 unnumbered pages) : |bcolour illustrations. |
---|
336 | |atext|btxt|2rdacontent |
---|
337 | |acomputer|bc|2rdamedia |
---|
338 | |aonline resource|bcr|2rdacarrier |
---|
490 | 1 |aTechnical memorandum ; |vDRDC Valcartier TM 2013-418 |
---|
500 | |a"December 2012." |
---|
504 | |aIncludes bibliographical references (page 27). |
---|
520 | 3 |a"This document presents a classification of theoretical social network analyses to determine if they are suitable for the military intelligence context. This work was done under the project 15do, "Social network analysis in a counter insurgency context", to orient the development of a proof of context prototype. Thirty-four (34) theoretical social network analyses were selected and classified based on the implementation risk they pose. The evaluation criteria used are computational complexity, topological and flow requirements and missing data robustness. The risk tolerance of the military intelligence process was also evaluated using the same criteria. Using both results, it was possible to identify 8 suitable algorithms, 11 unusable and 15 risky ones. These results suggest that classical social network analysis methods are not sufficient to answer the military requirements stated in this project. Alternative ways to extract information and perform network analysis should be investigated. In particular, there is a need for algorithms that are robust to missing data and can extract sub-networks of interest efficiently. The impact of missing data is still not well understood and should be the focus of further research as it is largely encountered in the context of covert networks"--Abstract, page i. |
---|
546 | |aIncludes abstracts and summaries in English and French. |
---|
710 | 2 |aDefence R&D Canada. |
---|
710 | 2 |aDefence R&D Canada - Valcartier. |
---|
830 | #0|aTechnical memorandum (Defence R&D Canada)|vDRDC Valcartier TM 2013-418.|w(CaOODSP)9.820564 |
---|
856 | 40|qPDF|s17.93 MB|uhttps://publications.gc.ca/collections/collection_2019/rddc-drdc/D68-6-418-2012-eng.pdf |
---|