Educause Security Discussion mailing list archives
Social Network Analysis (SNA)
From: savanted1© <savanted1 () YAHOO COM>
Date: Tue, 15 Jan 2008 11:43:38 -0800
Dear, Esteemed Forum Professionals After researching a bit I have come up with this ideal of ideologies associated with social network analysis (SNA). I am still lokking for more reference material to finish some research documentation I am currently working on while in attendance at the Towson University computer science department in relation to becoming a computer virologist. please feel free to comment on the gist of this electronic mail and thank you for the invitation to the UCINET group on the Yahoo network as well. Social Network Analysis (SNA) In relation to intelligence and reconnaissance social network analysis (SNA) implements mathematical calculations based on algorithmic sequences and patterns of human behavior which link person, groups, entities, and organizations to each other. This is what encompasses the process of social network analysis (SNA). Since, virtual extremists have taken on the role of globally utilize a hegemonic perspective to mobilize via independent networking to give the appearance and false sense of presence in relation to being a vast group or organization to incite fear on any developed nation. Social network analysis (SNA) has been incorporated in counter-measuring virtual threats by normalizing sects, cells, and or groups through the identification of shortest network traversal paths. This delineation of such linear paths to targets visualizes networking topographies associated with virtual extremism or virtual attackers whom, maybe attempting preemptive attacks or acquiring target acquisition for future networking warfare or netwar as some would call it on any particular national networking infrastructure. The relationships identified by such analysis is used to create targets of interests (TOI) which are filtered for specifically denoting personnel, remote outposts or depots called hiras, and pivotal nodes or service hosts either decentralized or centralized. This new and innovative form of intelligence and reconnaissance is becoming more available to the law enforcement communities on the international level especially information assurance professionals who have justified the need to know how organizations, persons, sects, and factions are functioning operationally on the internet When virtual extremists groups such as the mujahedin or cyber-jihad are analyzed the datum gained from this form of networking interrogation is highly unreliable however; this form of analysis is kept on a historical account to track trends and social metrics associated with the changes of the targets. Social network analysis has been successful in identifying weapons of mass destruction (WMD) to further scrutinize for deploying ability. As I begin the next paragraph I will explain how social network analysis (SNA) functions and or utilizes algorithms to identify targets associated with virtual extremism? Information assurance professionals use tools such as simulation programs which recreate known instances of activities which are social metric social network analysis (SNA) incorporates and utilizes bayat or allegiances of groups and people to identify trends and historical references of the targets being interrogated or modeled for assessment of both threat and importance to their respective factions.This form of modeling can generate a statistical populace of habits and networking environment traits that are always present to social groups, fundamentalists, and organizations. The trends and characteristic behaviors associated with the statistical historical populace of datum are then assessed to identify precursor mannerisms associated with an imminent virtual attack of extremism. In relation towards the interdependence of both social network analysis (SNA) and the Microsoft Corporations .Net Framework methodologies I will identify and explain how the .Net Framework denotes a social system. Hierarchal reference models in particular the Microsoft Corporations .Net Framework fifth generation object-oriented programming syntax any social system or socioeconomic class or group can be defined as an object of syntax the social class or system has scope to perform many roles. This is done by integrating or disambiguously linking documents or tables from Microsoft software applications such as Excel, Access, and Visual Studio .Net through the process of normalization of both the primary and foreign key to collect and organize datum contained in the document or table. This is what creates a database of information which can be eavesdropped through social networking analysis (SNA). Algorithms contained in heuristics are utilized to identify potential threats or targets of acquisition on the internet or any virtual frontier that contains heuristics associated with social groups or networking nodes. In closing, an information assurance professional may be wondering how syntax is indicative of a socioeconomic system not just in relation towards social network analysis but, within the wireless fidelity (Wi-Fi) environment furthermore; how can Global Positioning Systems (GPS) help monitor social network analysis (SNA) of virtual extremism through the usage of integrated expert networking professional career field and or skill set? Very Respectfully Savanted1® Mr. Garrett Hord ACFE Associate Member ACP International Infragard Baltimore Chapter __|__ -@--@--(_)--@--X-- savanted1 () yahoo com savanted1 () hotmail com savanted1 () netscape com Innovations At The Speed Of A Thought® You Cannot Do Today's Work With Yesterday's Skills® It Is Wise To Educate A Child Than To Raise An Adult® Knowledge is power so do not abuse the priviledge of knowing some of it and not all of it® http://www.securitytalks.com http://spaces.msn.com/members/savantedlyspeaking/ ======================================================================= This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Looking for last minute shopping deals? Find them fast with Yahoo! Search.
Current thread:
- Social Network Analysis (SNA) savanted1© (Jan 15)