Comparing operational terrorist networks

被引:9
|
作者
Gregori, Matteo [1 ]
Merlone, Ugo [2 ]
机构
[1] St Johns Univ, Dept Criminal Justice Legal Studies & Homeland Se, Queens Campus, New York, NY USA
[2] Univ Torino, Ctr Log Language & Cognit, Dept Psychol, Via Verdi 10, Turin, Italy
关键词
Social network analysis; Terrorist networks; Lethality; Structure of terrorist networks; SOCIAL NETWORK; DARK NETWORKS; COVERT;
D O I
10.1007/s12117-020-09381-z
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
In this paper we provide a presentation of the most popular metrics and systematically apply them to seven terrorist networks studied in the literature and to three new ISIS-affiliated networks. This study then investigates the correlates between structural network characteristics and severity of the attack carried out by the terrorists. Such approach allows us to analyze these networks from several perspectives and to use them to discuss about the security/efficiency trade-off.
引用
收藏
页码:263 / 288
页数:26
相关论文
共 50 条
  • [21] Dynamical Adaptation in Terrorist Cells/Networks
    Hussain, D. M. Akbar
    Ahmed, Zaki
    ADVANCES TECHNIQUES IN COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2010, : 557 - +
  • [22] Combating terrorist networks: An evolutionary approach
    Goolsby R.
    Computational & Mathematical Organization Theory, 2006, 12 (1): : 7 - 20
  • [23] Defeating Terrorist Networks with Game Theory
    Michalak, Tomasz P.
    Rahwan, Talal
    Skibski, Oskar
    Wooldridge, Michael
    IEEE INTELLIGENT SYSTEMS, 2015, 30 (01) : 53 - 61
  • [24] Discovering hierarchical structure in terrorist networks
    Shaikh, Muhammad Akram
    Wang, Jiaxin
    SECOND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2006, PROCEEDINGS, 2006, : 238 - +
  • [25] Complex Networks for Terrorist Target Prediction
    Campedelli, Gian Maria
    Cruickshank, Iain
    Carley, Kathleen M.
    SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 348 - 353
  • [26] Classification of Terrorist Networks and Their Key Players
    Ozgul, Fatih
    MULTIDISCIPLINARY SOCIAL NETWORKS RESEARCH, MISNC 2014, 2014, 473 : 145 - 157
  • [27] Graph structural mining in terrorist networks
    Shaikh, Muhammad Akram
    Wang, Jiaxin
    Yang, Zehong
    Song, Yixu
    ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2007, 4632 : 570 - +
  • [28] Methodological Triangulation in the Analysis of Terrorist Networks
    Horne, Cale
    Horgan, John
    STUDIES IN CONFLICT & TERRORISM, 2012, 35 (02) : 182 - 192
  • [29] Practical algorithms for destabilizing terrorist networks
    Memon, Nasrullah
    Larsen, Henrik Legind
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 389 - 400
  • [30] Comparing two models for terrorist group detection: GDM or OGDM?
    Ozgul, Fatih
    Erdem, Zeki
    Aksoy, Hakan
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 149 - +