000 02708cam  2200337zi 4500
0019.876621
003CaOODSP
00520221107164744
006m     o  d f      
007cr cn|||||||||
008190718t20122012quca    ob   f000 0 eng d
040 |aCaOODSP|beng|erda|cCaOODSP
0410 |aeng|beng|bfre
0861 |aD68-6/418-2012E-PDF
1001 |aMartineau, Étienne, |d1976- |eauthor.
24510|aApplicability of social network analyses in an intelligence context / |cEtienne Martineau, DRDC Valcartier.
264 1|aQuebec (Quebec) : |bDefence R&D Canada - Valcartier, |c2012.
264 4|c©2012
300 |a1 online resource (viii, 30 pages, 2 unnumbered pages) : |bcolour illustrations.
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
4901 |aTechnical memorandum ; |vDRDC Valcartier TM 2013-418
500 |a"December 2012."
504 |aIncludes bibliographical references (page 27).
5203 |a"This document presents a classification of theoretical social network analyses to determine if they are suitable for the military intelligence context. This work was done under the project 15do, "Social network analysis in a counter insurgency context", to orient the development of a proof of context prototype. Thirty-four (34) theoretical social network analyses were selected and classified based on the implementation risk they pose. The evaluation criteria used are computational complexity, topological and flow requirements and missing data robustness. The risk tolerance of the military intelligence process was also evaluated using the same criteria. Using both results, it was possible to identify 8 suitable algorithms, 11 unusable and 15 risky ones. These results suggest that classical social network analysis methods are not sufficient to answer the military requirements stated in this project. Alternative ways to extract information and perform network analysis should be investigated. In particular, there is a need for algorithms that are robust to missing data and can extract sub-networks of interest efficiently. The impact of missing data is still not well understood and should be the focus of further research as it is largely encountered in the context of covert networks"--Abstract, page i.
546 |aIncludes abstracts and summaries in English and French.
7101 |aCanada. |bDefence R&D Canada.
7102 |aDefence R&D Canada - Valcartier.
830#0|aTechnical memorandum (Defence R&D Canada)|vDRDC Valcartier TM 2013-418.|w(CaOODSP)9.820564
85640|qPDF|s17.93 MB|uhttps://publications.gc.ca/collections/collection_2019/rddc-drdc/D68-6-418-2012-eng.pdf