A Social Network Analysis on Abu Sayyaf Kidnappings
PDF

Keywords

social network analysis
Abu Sayyaf Group
kidnappings
patterns
terrorism

How to Cite

Hababag, B. G., Alcantara, L. P., Tale, B., & Rogers, J. K. (2024). A Social Network Analysis on Abu Sayyaf Kidnappings. Southeastern Philippines Journal of Research and Development, 29(2), 211-228. https://doi.org/10.53899/spjrd.v29i2.258

Abstract

The Abu Sayyaf Group (ASG) is a Philippine-based extremist organization globally known for engaging in terrorism, kidnappings, and various criminal activities. This study sought to comprehensively analyze Abu Sayyaf ’s kidnapping incidents using social network analysis to better understand their operational structures, patterns, and dynamics. The researchers applied centrality measurements to assess the significance of nodes in the network, along with the GirvanNewman algorithm for community detection to identify groups sharing similar characteristics and extract groups for various purposes. The findings revealed one kidnapping node to have the highest centrality score and holding the most significant influence and numerous incoming connections within the network. Another kidnapper node in the analysis of out-degree centrality displayed a proactive role, initiating multiple connections and shaping the network’s dynamic. The community detection uncovered seven distinct communities within the network, each demonstrating unique patterns and characteristics. The findings imply that kidnappings were conducted through groups rather than individuals. The majority of networks involving ASG members participating in multiple kidnapping events hold significant implications for national security strategies.

https://doi.org/10.53899/spjrd.v29i2.258
PDF

References

Ahmed, A., Khan, M.F., Usman, M., & Saleem, K. (2018). Analysis of coauthorship network in Political Science using centrality measures. International Journal of Advanced Computer Science and Applications (IJACSA), 9(10), 329–344. https://doi.org/10.14569/IJACSA.2018.091040

Borgatti, S. (2021). Philippine kidnappings. UCINET Software. Chiang, J. (2021, October). Girvan–Newman-The clustering technique in network analysis. Medium. https://tinyurl.com/2e8fvvwc

Columbia University Irving Medical Center. (2023). Social network analysis. https://tinyurl.com/kcd45bbn

Derpanopoulos, G. (2018, May). Modeling inter-rebel group conflict with network analysis: The case of Lebanon’s civil war. https://tinyurl.com/4x4zz55k

Disney, A. (2020, January). PageRank centrality & EigenCentrality. https://tinyurl.com/32fxhk84

Disney, A. (2022). Social network analysis: Understanding centrality measures. Cambridge Intelligence. https://tinyurl.com/mrx4ydef

Eaton, T. (2021, June). A network analysis of Haftar’s military alliance (4). https://tinyurl.com/5b2hd4km

Ficara, A., Cavallaro, L., Curreri, F., Fiumara, G., De Meo, P., Bagdasar, O., Song, W., & Liotta, A. (2021). Criminal networks analysis in missing data scenarios through graph distances. PLOS ONE, 16(8). https://doi.org/10.1371/journal.pone.0255067

Fonbuena, C. (2019). British national and his wife kidnapped in Southern Philippines. The Guardian. https://tinyurl.com/mr7af2r3

Gephi (2022). Gephi Features. Gephi. https://gephi.org/features

Hansen, D. L., Shneiderman, B., Smith, M. A., & Himelboim, I. (2020). Social network analysis: Measuring, mapping, and modeling collections of connections. Analyzing Social Media Networks with NodeXL (Second Edition), 31–51. https://doi.org/10.1016/B978-0-12-817756-3.00003-0

International Crisis Group. (2022, March). Addressing islamist militancy in the Southern Philippines. https://tinyurl.com/mpkw4eet

Johnson, E. M., & Chew, R. (2021). Social network analysis methods for international development. RTI Press. https://doi.org/10.3768/rtipress.2021.rb.0026.2105

Kalicharan, V. S. (2019). An evaluation of the Islamic State’s influence over the Abu Sayyaf. Perspectives on Terrorism, 13(5), 90–101. https://tinyurl.com/5n9beshj

Katagiri, N. (2019). Organized insurgency, lethality, and target selection: Abu Sayyaf Group and Jemaah Islamiyah. Small Wars & Insurgencies, 30(3), 518–542. https://doi.org/10.1080/09592318.2019.1601838

Margiati, T., Halkis, M., & Sutanto, R. (2023). Indonesia’s defense strategy against transnational crimes of the Abu Sayyaf Group in the Sulu Archipelago. International Journal Of Humanities Education and Social Sciences (IJHESS), 2(6), 1930–1942. https://doi.org/10.55227/ijhess.v2i6.516

Nagdive, A.S., Tugnayat, R., & Peshkar, A. (2020). Social network analysis of terrorist networks. International Journal of Engineering and Advanced Technology (IJEAT), 9(3), 2553–2559. https://doi.org/10.35940/ijeat.C5431.029320

National Counterterrorism Center (2022, October). Abu Sayyaf Group (ASG). Counter terrorism guide. https://tinyurl.com/2f2uz7cd

O’Brien, M. (2012). Fluctuations between crime and terror: The case of Abu Sayyaf ’s kidnapping activities. Terrorism and Political Violence, 24(2), 320–336. https://doi.org/10.1080/09546553.2011.648679

Rödder, W., Dellnitz, A., & Litzinger, S. (2021). Analysing terrorist networks—An entropy‐driven method. Expert Systems, 39(10). https://doi.org/10.1111/exsy.12720

Saqr, M., & López-Pernas, S. (2022). The curious case of centrality measures: A large-scale empirical investigation. Journal of Learning Analytics, 9(1), 13–31. https://doi.org/10.18608/jla.2022.7415

Satriawan, I., & Mustofa, M. (2023). A genealogical study of the history of Philippine terrorism. Journal of Social and Political Sciences, 6(2), 162–171. https://doi.org/10.31014/aior.1991.06.02.417

Singh, B., & Singh, J. (2019). From “bandit” to “Amir”—The rise of the Abu Sayyaf Group as a Jihadi organization in the Philippines. Asian Politics & Policy, 11(3), 399–416. https://doi.org/10.1111/aspp.12480

Umadevi, V. (2013). Case study— Centrality measure analysis on co-authorship network. Journal of Global Research in Computer Science, 4(1), 67–70. https://tinyurl.com/yr4x44kr

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Downloads

Download data is not yet available.