메뉴 건너뛰기




Volumn 229, Issue 1, 2013, Pages 230-238

Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda

Author keywords

Centrality; Cooperative game theory; Network analysis; Terrorism

Indexed keywords

CENTRALITY; COMMUNICATION AND INTERACTION; COOPERATIVE GAME; COOPERATIVE GAME THEORY; EFFICIENT ALLOCATIONS; OPERATIONAL NETWORK; TERRORIST NETWORKS; TERRORIST ORGANIZATION;

EID: 84876410926     PISSN: 03772217     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ejor.2013.02.032     Document Type: Article
Times cited : (85)

References (34)
  • 5
    • 84876409138 scopus 로고    scopus 로고
    • UCINET 6
    • Analytic Technologies, 2010. UCINET 6. < www.analytictech.com/ucinet >.
    • (2010) Analytic Technologies
  • 6
    • 33746192198 scopus 로고    scopus 로고
    • A graph-theoretic framework for classifying centrality measures
    • S.P. Borgatti, and M.G. Everett A graph-theoretic framework for classifying centrality measures Social Networks 28 2006 466 484
    • (2006) Social Networks , vol.28 , pp. 466-484
    • Borgatti, S.P.1    Everett, M.G.2
  • 9
    • 34248045384 scopus 로고    scopus 로고
    • Breaking Al Qaeda cells: A mathematical analysis of counterterrorism operations
    • J.D. Farley Breaking Al Qaeda cells: a mathematical analysis of counterterrorism operations Studies in Conflict and Terrorism 26 2003 399 411
    • (2003) Studies in Conflict and Terrorism , vol.26 , pp. 399-411
    • Farley, J.D.1
  • 10
    • 84865730611 scopus 로고
    • A set of measures of centrality based on betweenness
    • L.C. Freeman A set of measures of centrality based on betweenness Sociometry 40 1977 35 41
    • (1977) Sociometry , vol.40 , pp. 35-41
    • Freeman, L.C.1
  • 14
    • 77951685570 scopus 로고    scopus 로고
    • When heads roll: Assessing the effectiveness of leadership decapitation
    • J. Jordan When heads roll: assessing the effectiveness of leadership decapitation Security Studies 18 2009 719 755
    • (2009) Security Studies , vol.18 , pp. 719-755
    • Jordan, J.1
  • 16
    • 0242465495 scopus 로고    scopus 로고
    • The network paradigm applied to criminal organizations
    • P. Klerks The network paradigm applied to criminal organizations Connections 24 2001 53 65
    • (2001) Connections , vol.24 , pp. 53-65
    • Klerks, P.1
  • 17
    • 33748497129 scopus 로고    scopus 로고
    • A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence
    • S. Koschade A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence Studies in Conflict and Terrorism 29 2006 559 575
    • (2006) Studies in Conflict and Terrorism , vol.29 , pp. 559-575
    • Koschade, S.1
  • 18
    • 7644224668 scopus 로고    scopus 로고
    • Uncloaking terrorist networks
    • V.E. Krebs Uncloaking terrorist networks First Monday 7 2002 1 10
    • (2002) First Monday , vol.7 , pp. 1-10
    • Krebs, V.E.1
  • 19
    • 62549142647 scopus 로고    scopus 로고
    • The influence of secrecy on the communication structure of covert networks
    • R.H.A. Lindelauf, P. Borm, and H. Hamers The influence of secrecy on the communication structure of covert networks Social Networks 31 2009 126 137
    • (2009) Social Networks , vol.31 , pp. 126-137
    • Lindelauf, R.H.A.1    Borm, P.2    Hamers, H.3
  • 21
    • 84876407467 scopus 로고    scopus 로고
    • Los Angeles Times 9/11-plotter. September 27, 2002
    • Los Angeles Times, 2002. Document Links al Qaeda Paymaster, 9/11-plotter. September 27, 2002.
    • (2002) Document Links Al Qaeda Paymaster
  • 23
    • 41349096036 scopus 로고    scopus 로고
    • Analysis of weighted networks
    • M.E.J. Newman Analysis of weighted networks Physical Review E 70 2004 56 131
    • (2004) Physical Review e , vol.70 , pp. 56-131
    • Newman, M.E.J.1
  • 25
    • 0347513792 scopus 로고
    • Analysis of sociometric data
    • P.W. Holland, S. Leinhardt, Dryden Press New York
    • C.H. Proctor, and C.P. Loomis Analysis of sociometric data P.W. Holland, S. Leinhardt, Research Methods in Social Relations 1951 Dryden Press New York 561 586
    • (1951) Research Methods in Social Relations , pp. 561-586
    • Proctor, C.H.1    Loomis, C.P.2
  • 26
    • 36348994955 scopus 로고    scopus 로고
    • Social network analysis as an approach to combat terrorism: Past, present and future research
    • S. Ressler Social network analysis as an approach to combat terrorism: past, present and future research Homeland Security Affairs 2 2006 1 10
    • (2006) Homeland Security Affairs , vol.2 , pp. 1-10
    • Ressler, S.1
  • 28
    • 0012254042 scopus 로고
    • The application of network analysis to criminal intelligence: An assessment of the prospects
    • M. Sparrow The application of network analysis to criminal intelligence: an assessment of the prospects Social Networks 13 1991 251 274
    • (1991) Social Networks , vol.13 , pp. 251-274
    • Sparrow, M.1
  • 30
    • 84876409626 scopus 로고    scopus 로고
    • The Washington Post U.S. intends to keep adding names to kill lists. October 24, 2012
    • The Washington Post (2012). Plan for hunting terrorists signals, U.S. intends to keep adding names to kill lists. October 24, 2012.
    • (2012) Plan for Hunting Terrorists Signals
  • 31
    • 85044913143 scopus 로고    scopus 로고
    • Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence
    • M. Tsvetovat, and K.M. Carley Structural knowledge and success of anti-terrorist activity: the downside of structural equivalence Journal of Social Structure 6 2005 268 276
    • (2005) Journal of Social Structure , vol.6 , pp. 268-276
    • Tsvetovat, M.1    Carley, K.M.2
  • 34
    • 20344376408 scopus 로고    scopus 로고
    • Criminal network analysis and visualization: A data mining perspective
    • J. Xu, and H. Chen Criminal network analysis and visualization: a data mining perspective Communications of the ACM 48 6 2005 101 107
    • (2005) Communications of the ACM , vol.48 , Issue.6 , pp. 101-107
    • Xu, J.1    Chen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.