Destabilization of terrorist networks

被引:13
|
作者
Eiselt, H. A. [1 ]
机构
[1] Univ New Brunswick, Fac Business Adm, POB 4400, Fredericton, NB E3B 5A3, Canada
关键词
Counterterrorism; Social network analysis; Traffic analysis; Terrorist networks; Destabilization; SOCIAL NETWORKS; COUNTERTERRORISM; CENTRALITY; MODELS; POWER;
D O I
10.1016/j.chaos.2018.01.018
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper uses a three-phase process to first describe the development of a network to describe different types of relations between terrorists and their supporters. It continues to review some of the usual measures of social network analysis to evaluate different positions in the network. Finally, the work describes different methods to destabilize the terrorist network, and, based on sensitivity analyses, determines the potential of certain actions and the vulnerability of the network. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 50 条
  • [41] Advancing the Understanding of Sociospatial Dependencies in Terrorist Networks
    Medina, Richard M.
    Hepner, George F.
    TRANSACTIONS IN GIS, 2011, 15 (05) : 577 - 597
  • [42] THE ANTI-TERRORIST POLICY OF THE US IN AFGHANISTAN. DESTABILIZATION OF THE SITUATION IN AFGHANISTAN (2006-2008)
    Asatryan, Georgi E.
    VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA ISTORIYA-TOMSK STATE UNIVERSITY JOURNAL OF HISTORY, 2015, (02): : 103 - 107
  • [43] Mathematical Modeling and Analysis of Destabilization Threats in Computer Networks
    Ivanushchak, Nataliia
    Kunanets, Nataliia
    Pasichnyk, Volodymyr
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 191 - 196
  • [44] Strategic implications of Internet use by transnational terrorist networks
    Masters, Roger D.
    IMSCI '07: INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL 2, PROCEEDINGS, 2007, : 428 - 433
  • [45] Using Interorganizational Communication Networks to Predict Terrorist Attacks
    Pilnyi, Andrew
    Proulx, Jeffrey D.
    COMMUNICATION RESEARCH, 2022, 49 (01) : 3 - 32
  • [46] Influence in terrorist networks: From undirected to directed graphs
    Brams, Steven J.
    Mutlu, Hande
    Ramirez, Shawn Ling
    STUDIES IN CONFLICT & TERRORISM, 2006, 29 (07) : 679 - 694
  • [47] A Global Measure for Estimating the Degree of Organization of Terrorist Networks
    Dawoud, Khaled
    Alhajj, Reda
    Rokne, Jon
    2010 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2010), 2010, : 421 - 427
  • [48] Analysing terrorist networks - An entropy-driven method
    Roedder, Wilhelm
    Dellnitz, Andreas
    Litzinger, Sebastian
    EXPERT SYSTEMS, 2022, 39 (10)
  • [49] The Terrorist Networks and Their Posing Threats: The Case of the Horn of Africa
    Maluki, Patrick
    Bashir, Anwar Abdifatah
    INSIGHT TURKEY, 2024, 26 (03)
  • [50] Determining Critical Members of Layered Operational Terrorist Networks
    Geffre, Jennifer L.
    Deckro, Richard F.
    Knighton, Shane A.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2009, 6 (02): : 97 - 109