Educause Security Discussion mailing list archives

Social Network Analysis (SNA)


From: savanted1© <savanted1 () YAHOO COM>
Date: Tue, 15 Jan 2008 11:43:38 -0800

Dear, Esteemed Forum Professionals

  After researching a bit I have come up with this ideal of ideologies associated with social network analysis (SNA).  
I am still lokking for more reference material to finish some research documentation I am currently working on while in 
attendance at the Towson University computer science department in relation to becoming a computer virologist.  please 
feel free to comment on the gist of this electronic mail and thank you for the invitation to the UCINET group on the 
Yahoo network as well.


  Social Network Analysis (SNA)
  In relation to intelligence and reconnaissance social network analysis (SNA) implements mathematical calculations 
based on algorithmic sequences and patterns of human behavior which link person, groups, entities, and organizations to 
each other.  This is what encompasses the process of social network analysis (SNA).  Since, virtual extremists have 
taken on the role of globally utilize a hegemonic perspective to mobilize via independent networking to give the 
appearance and false sense of presence in relation to being a vast group or organization to incite fear on any 
developed nation.  Social network analysis (SNA) has been incorporated in counter-measuring virtual threats by 
normalizing sects, cells, and or groups through the identification of shortest network traversal paths.  This 
delineation of such linear paths to targets visualizes networking topographies associated with virtual extremism or 
virtual attackers whom, maybe attempting preemptive attacks or acquiring
 target acquisition for future networking warfare or netwar as some would call it on any particular national networking 
infrastructure.  The relationships identified by such analysis is used to create targets of interests (TOI) which are 
filtered for specifically denoting personnel, remote outposts or depots called ‘hiras’, and pivotal nodes or service 
hosts either decentralized or centralized.  This new and innovative form of intelligence and reconnaissance is becoming 
more available to the law enforcement communities on the international level especially information assurance 
professionals who have justified the ‘need to know’ how organizations, persons, sects, and factions are functioning 
operationally on the internet
  When virtual extremist’s groups such as the mujahedin or cyber-jihad are analyzed the datum gained from this form of 
networking interrogation is highly unreliable however; this form of analysis is kept on a historical account to track 
trends and social metrics associated with the changes of the targets.  Social network analysis has been successful in 
identifying weapons of mass destruction (WMD) to further scrutinize for deploying ability.
  As I begin the next paragraph I will explain how social network analysis (SNA) functions and or utilizes algorithms 
to identify targets associated with virtual extremism?  Information assurance professionals use tools such as 
simulation programs which recreate known instances of activities which are social metric social network analysis (SNA) 
incorporates and utilizes ‘bayat’ or allegiances of groups and people to identify trends and historical references of 
the targets being interrogated or modeled for assessment of both threat and importance to their respective 
factions.This form of modeling can generate a statistical populace of habits and networking environment traits that are 
always present to social groups, fundamentalists, and organizations.  The trends and characteristic behaviors 
associated with the statistical historical populace of datum are then assessed to identify precursor mannerisms 
associated with an imminent virtual attack of extremism.  In relation
 towards the interdependence of both social network analysis (SNA) and the Microsoft Corporation’s .Net Framework 
methodologies I will identify and explain how the .Net Framework denotes a social system.  Hierarchal reference models 
in particular the Microsoft Corporation’s .Net Framework fifth generation object-oriented programming syntax any social 
system or socioeconomic class or group can be defined as an object of syntax the social class or system has scope to 
perform many roles.  This is done by integrating or disambiguously linking documents or tables from Microsoft software 
applications such as Excel, Access, and Visual Studio .Net through the process of normalization of both the primary and 
foreign key to collect and organize datum contained in the document or table.  This is what creates a database of 
information which can be eavesdropped through social networking analysis (SNA).  Algorithms contained in heuristics’ 
are utilized to identify potential threats or
 targets of acquisition on the internet or any virtual frontier that contains heuristics associated with social groups 
or networking nodes.
  In closing, an information assurance professional may be wondering how syntax is indicative of a socioeconomic system 
not just in relation towards social network analysis but, within the wireless fidelity (Wi-Fi) environment furthermore; 
how can Global Positioning Systems (GPS) help monitor social network analysis (SNA) of virtual extremism through the 
usage of integrated expert networking professional career field and or skill set?

  Very Respectfully


Savanted1®
Mr. Garrett Hord
ACFE Associate Member
ACP International
Infragard Baltimore Chapter

      __|__
-@--@--(_)--@--X--
savanted1 () yahoo com
savanted1 () hotmail com
savanted1 () netscape com
Innovations At The Speed Of A Thought®
You Cannot Do Today's Work With Yesterday's Skills®
It Is Wise To Educate A Child Than To Raise An Adult®
Knowledge is power so do not abuse the priviledge of knowing some of it and not all of it®
http://www.securitytalks.com
http://spaces.msn.com/members/savantedlyspeaking/
 =======================================================================
This electronic message contains information which may be privileged and/or confidential. The information is intended 
for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be 
aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited.

---------------------------------
Looking for last minute shopping deals?  Find them fast with Yahoo! Search.

Current thread: