Destabilization of terrorist networks

被引:13
作者
Eiselt, H. A. [1 ]
机构
[1] Univ New Brunswick, Fac Business Adm, POB 4400, Fredericton, NB E3B 5A3, Canada
关键词
Counterterrorism; Social network analysis; Traffic analysis; Terrorist networks; Destabilization; SOCIAL NETWORKS; COUNTERTERRORISM; CENTRALITY; MODELS; POWER;
D O I
10.1016/j.chaos.2018.01.018
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper uses a three-phase process to first describe the development of a network to describe different types of relations between terrorists and their supporters. It continues to review some of the usual measures of social network analysis to evaluate different positions in the network. Finally, the work describes different methods to destabilize the terrorist network, and, based on sensitivity analyses, determines the potential of certain actions and the vulnerability of the network. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 66 条
[1]   What terrorists really want [J].
Abrahms, Max .
INTERNATIONAL SECURITY, 2008, 32 (04) :78-+
[2]  
Abril G, 2017, EL PAIS SUNDAY 0416
[3]  
[Anonymous], 2011, MAURITIUS MIRACLE
[4]  
[Anonymous], 2002, Connections
[5]  
[Anonymous], 2003, PRELIMINARY BENEFIT
[6]  
[Anonymous], INTEGER PROGRAMMING
[7]  
[Anonymous], 2016, Global-Terrorism-Index
[8]  
[Anonymous], 1962, Flows in Networks
[9]  
[Anonymous], 2006, COMPUT MATH ORG THEO
[10]  
Bellavita C., 2011, THE 9 11 ESSAYS SEP, P7