Destabilization of terrorist networks

被引:13
|
作者
Eiselt, H. A. [1 ]
机构
[1] Univ New Brunswick, Fac Business Adm, POB 4400, Fredericton, NB E3B 5A3, Canada
关键词
Counterterrorism; Social network analysis; Traffic analysis; Terrorist networks; Destabilization; SOCIAL NETWORKS; COUNTERTERRORISM; CENTRALITY; MODELS; POWER;
D O I
10.1016/j.chaos.2018.01.018
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper uses a three-phase process to first describe the development of a network to describe different types of relations between terrorists and their supporters. It continues to review some of the usual measures of social network analysis to evaluate different positions in the network. Finally, the work describes different methods to destabilize the terrorist network, and, based on sensitivity analyses, determines the potential of certain actions and the vulnerability of the network. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 50 条
  • [1] A novel method for destabilization of terrorist network
    Singh, Saurabh
    Verma, Shashi Kant
    Tiwari, Akhilesh
    MODERN PHYSICS LETTERS B, 2020, 34 (27):
  • [2] Terrorist Networks as Social Networks
    Stanculescu, Diana
    INNOVATIVE MODELS TO REVIVE THE GLOBAL ECONOMY, 2020, : 917 - 925
  • [3] Destabilization of covert networks
    Carley K.M.
    Computational and Mathematical Organization Theory, 2006, 12 (01) : 51 - 66
  • [4] The complexity of terrorist networks
    Fellman P.V.
    International Journal of Networking and Virtual Organisations, 2011, 8 (1-2) : 4 - 14
  • [5] The complexity of terrorist networks
    Fellman, Philip Vos
    PROCEEDINGS OF THE 12TH INTERNATIONAL INFORMATION VISUALISATION, 2008, : 338 - 340
  • [6] Connecting terrorist networks
    Magouirk, Justin
    Atran, Scott
    Sageman, Marc
    STUDIES IN CONFLICT & TERRORISM, 2008, 31 (01) : 1 - 16
  • [7] Researching Terrorist Networks
    Asal, Victor
    Rethemeyer, R. Karl
    JOURNAL OF APPLIED SECURITY RESEARCH, 2006, 1 (04) : 65 - 74
  • [8] Reshaping Terrorist Networks
    Spezzano, Francesca
    Subrahmanian, V. S.
    Mannes, Aaron
    COMMUNICATIONS OF THE ACM, 2014, 57 (08) : 60 - 69
  • [9] Terrorist networks, support, and delegation
    Kevin Siqueira
    Todd Sandler
    Public Choice, 2010, 142 : 237 - 253
  • [10] A Novel Genetic Based Framework for the Detection and Destabilization of Influencing Nodes in Terrorist Network
    Maheshwari, Saumil
    Tiwari, Akhilesh
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 1, 2015, 31 : 573 - 582