The influence of secrecy on the communication structure of covert networks

Social Networks - Tập 31 - Trang 126-137 - 2009
Roy Lindelauf1,2, Peter Borm2, Herbert Hamers2
1Military Operational Art & Science, Netherlands Defense Academy, P.O. Box 90002, 4800 PA Breda, The Netherlands
2CentER and Department of Econometrics and OR, Tilburg University, P.O. Box 90153, 5000 LE Tilburg, The Netherlands

Tài liệu tham khảo

Asal, 2007, Terrorism as transnational advocacy: an organizational and tactical examination, Studies in Conflict & Terrorism, 30, 15, 10.1080/10576100600959713 Baccara, M., Bar-Isaac, H., 2006. How to Organize Crime. Available at SSRN: http://ssrn.com/abstract=898007. Baker, 1993, The social organization of conspiracy: illegal networks in the heavy electrical equipment industry, American Sociological Review, 58, 837, 10.2307/2095954 Baldwin, 1997, The social fabric of a team-based MBA program: network effects on student satisfaction and team performance, Academy of Management Journal, 40, 1369, 10.2307/257037 Bavelas, 1950, Communication patterns in task-oriented groups, Journal of Acoustical Society of America, 22, 725, 10.1121/1.1906679 Bergen, 2006 Bollobas, 1998 Carley, 2002, Destabilizing networks, Connections, 24, 79 Carley, 2003, Destabilizing dynamic covert networks Carley, 2006, Destabilization of Covert Networks, Computational & Mathematical Organization Theory, 12, 51, 10.1007/s10588-006-7083-y Chung, 1987, Diameters of Graphs: Old problems and New Results, Congressus Numerantium, 60, 295 Cruickshank, 2007, Abu Musab Al Suri: architect of the New Al Qaeda, Studies in Conflict & Terrorism, 30, 1, 10.1080/10576100601049928 Enders, 2007, Rational terrorists and optimal network structure, Journal of Conflict Resolution, 51, 33, 10.1177/0022002706296155 Farley, 2003, Breaking Al Qaeda cells: a mathematical analysis of counterterrorism operations (a guide for risk management and decision making), Studies in Conflict and Terrorism, 26, 399, 10.1080/10576100390242857 Frantz, T.L., Carley, K.M., 2005. A Formal Characterization of Cellular Networks. Carnegie Mellon University, School of Computer Science (SCS), Institute for Software Research (ISR), Center for Computational Analysis of Social and Organizational Systems (CASOS) Technical Report CMU-ISRI-05–109. Guetzkow, 1955, The impact of certain communication nets upon organization and performance in Taks-oriented groups, Management Science, 1, 233, 10.1287/mnsc.1.3-4.233 Jackson, 2001, The stability and efficiency of economic and social networks, 99 Kean, 2002 Kinsella, 2008, The black market in small arms: examining a social network, Contemporary Security Policy, 27, 100, 10.1080/13523260600603105 Koschade, 2006, A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence, Studies in Conflict & Terrorism, 29, 559, 10.1080/10576100600798418 Lindelauf, R.H.A., Borm, P.E.M., Hamers, H.J.M., 2008. On Heterogeneous Covert Networks. (Center Discussion Paper, 2008-46): 1–13. Mariotti, 1998, Nash bargaining theory when the number of alternatives can be finite, Social Choice and Welfare, 15, 413, 10.1007/s003550050114 McAllister, 2004, Al Qaeda and the innovative firm: demythologizing the network, Studies in Conflict & Terrorism, 27, 297, 10.1080/10576100490461123 McCormick, 2000, Security and coordination in a clandestine organization, Mathematical and Computer Modelling, 31, 175, 10.1016/S0895-7177(00)00050-9 Mishal, 2005, Al Qaeda as a dune organization: toward a typology of Islamic Terrorist Organizations, Studies in Conflict & Terrorism, 28, 275, 10.1080/10576100590950165 Nash, 1950, The bargaining problem, Econometrica, 18, 155, 10.2307/1907266 Magouirk, 2008, Connecting terrorist networks, Studies in Conflict & Terrorism, 31, 1, 10.1080/10576100701759988 Siarry, 2003 Sparrow, 1991, The application of network analysis to criminal intelligence: an assessment of the prospects, Social Networks, 13, 251, 10.1016/0378-8733(91)90008-H Tijms, 2003 Tsvetovat, M., Carley, K., 2005. Structural knowledge and success of anti-terrorist activity: the downside of structural equivalence. Journal of Social Structure (Internet). (Cited 2007 November 1), 6 (3). Available from: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCarley/index.html. Tucker, 2001, What is new about the new terrorism and how dangerous is it?, Terrorism and Political Violence, 13, 1, 10.1080/09546550109609688