Destabilization of terrorist networks

被引:13
作者
Eiselt, H. A. [1 ]
机构
[1] Univ New Brunswick, Fac Business Adm, POB 4400, Fredericton, NB E3B 5A3, Canada
关键词
Counterterrorism; Social network analysis; Traffic analysis; Terrorist networks; Destabilization; SOCIAL NETWORKS; COUNTERTERRORISM; CENTRALITY; MODELS; POWER;
D O I
10.1016/j.chaos.2018.01.018
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper uses a three-phase process to first describe the development of a network to describe different types of relations between terrorists and their supporters. It continues to review some of the usual measures of social network analysis to evaluate different positions in the network. Finally, the work describes different methods to destabilize the terrorist network, and, based on sensitivity analyses, determines the potential of certain actions and the vulnerability of the network. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 66 条
[11]   Counterterrorism's New Tool: 'Metanetwork' Analysis [J].
Bohannon, John .
SCIENCE, 2009, 325 (5939) :409-411
[12]  
BONACICH P, 1987, AM J SOCIOL, V92, P1170, DOI 10.1086/228631
[13]  
Bonacich P., 1972, Sociological Methodology
[14]  
Borgatti S.P., 2018, Analyzing social networks
[15]  
Carley K.M., 2001, Connections, V24, P79
[16]  
Choudhary Pankaj., 2015, International Journal of Computer Applications, V112, P24
[17]   THE DISTRIBUTION OF POWER IN EXCHANGE NETWORKS - THEORY AND EXPERIMENTAL RESULTS [J].
COOK, KS ;
EMERSON, RM ;
GILLMORE, MR ;
YAMAGISHI, T .
AMERICAN JOURNAL OF SOCIOLOGY, 1983, 89 (02) :275-305
[18]  
Downey G, 2015, SCOTT ATRAN YOUTH VI
[19]  
Eiselt H.A., 2015, J TERROR RES, V6, P1, DOI [10.15664/jtr.1073, DOI 10.15664/JTR.1073]
[20]  
Farley J., 2003, STUDIES CONFLICT TER, V26, P399