Destabilization of terrorist networks

被引:13
|
作者
Eiselt, H. A. [1 ]
机构
[1] Univ New Brunswick, Fac Business Adm, POB 4400, Fredericton, NB E3B 5A3, Canada
关键词
Counterterrorism; Social network analysis; Traffic analysis; Terrorist networks; Destabilization; SOCIAL NETWORKS; COUNTERTERRORISM; CENTRALITY; MODELS; POWER;
D O I
10.1016/j.chaos.2018.01.018
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper uses a three-phase process to first describe the development of a network to describe different types of relations between terrorists and their supporters. It continues to review some of the usual measures of social network analysis to evaluate different positions in the network. Finally, the work describes different methods to destabilize the terrorist network, and, based on sensitivity analyses, determines the potential of certain actions and the vulnerability of the network. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 50 条
  • [31] Terrorist Use of Communication Technology and Social Networks
    Espeseth, Craig
    Gibson, Jessica
    Jones, Andy
    Goodman, Seymour
    TECHNOLOGICAL DIMENSIONS OF DEFENCE AGAINST TERRORISM, 2013, 115 : 91 - 105
  • [32] Hospital networks in the event of a terrorist act or catastrophe
    Lackner, C. K.
    Burghofer, K.
    Moecke, H.
    NOTFALL & RETTUNGSMEDIZIN, 2007, 10 (08): : 547 - 549
  • [33] Analyzing the terrorist social networks with visualization tools
    Yang, Christopher C.
    Liu, Nan
    Sageman, Marc
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 331 - 342
  • [34] Evaluation on the effectiveness of information transmission in terrorist networks
    Li Zhanfeng
    Sun Duoyong
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2015, : 457 - 460
  • [35] Evolutionary dynamics of organised crime and terrorist networks
    Martinez-Vaquero, Luis A.
    Dolci, Valerio
    Trianni, Vito
    SCIENTIFIC REPORTS, 2019, 9 (1)
  • [36] Evolutionary dynamics of organised crime and terrorist networks
    Luis A. Martinez-Vaquero
    Valerio Dolci
    Vito Trianni
    Scientific Reports, 9
  • [37] Evaluation of Role Detection Approaches in Terrorist Networks
    Kazmi, Farwa
    Butt, Wasi Haider
    Saeed, Ayesha
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON MANAGEMENT ENGINEERING, SOFTWARE ENGINEERING AND SERVICE SCIENCES (ICMSS 2018), 2018, : 245 - 249
  • [38] Analysis of terrorist social networks with fractal views
    Yang, Christopher C.
    Sageman, Marc
    JOURNAL OF INFORMATION SCIENCE, 2009, 35 (03) : 299 - 320
  • [39] Modeling and simulating terrorist networks in social and geospatial
    Moon, Il-Chul
    Carley, Kathleen M.
    IEEE INTELLIGENT SYSTEMS, 2007, 22 (05) : 40 - 49