Abstracts - faqs.org

Abstracts

Sociology and social work

Search abstracts:
Abstracts » Sociology and social work

Influence in terrorist networks: From undirected to directed graphsInfluence in terrorist networks: From undirected to directed graphs

Article Abstract:

Terrorist networks pose a very serious threat and a heightened understanding of their structure would aid in the diffusion of such threats. A data-reduction methodology for a network that is based on an 'influence assumption' and which converts terrorist networks from undirected graphs to simplified directed graphs is illustrated by its application to two terrorist networks constructed after 9/1, 2006.

Author: Brams, Steven J., Mutlu, Hande, Ramirez, Shawn Ling
Publisher: Taylor & Francis Ltd.
Publication Name: Studies in Conflict and Terrorism
Subject: Sociology and social work
ISSN: 1057-610X
Year: 2006
Analysis, Evaluation, Graphic methods, Hierarchical organization (Computers), Influence (Psychology)

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Technology acquisition by terrorist groups: threat assessment informed by lessons from private sector technology adoption

Article Abstract:

This article examines the utilization of modern technology by extreme terrorist groups and the efforts they make in seeking out new technological innovations. The author argues that by understanding the terrorist groups' decision-making processes of technology adoption, especially regarding weapons of mass destruction, counter-terrorist operations can work more efficiently.

Author: Jackson, Brian A.
Publisher: Taylor & Francis Ltd.
Publication Name: Studies in Conflict and Terrorism
Subject: Sociology and social work
ISSN: 1057-610X
Year: 2001
Innovations, Prevention, Science and technology policy, Technological innovations, Terrorism, Terrorists, Weapons of mass destruction

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Connectivity among terrorist groups: a two models business maturity approach

Article Abstract:

Successful terrorist organizations do not operate in isolation and examples of how terrorists groups have learnt to create networks via the two business models of alliance and resource are provided.

Author: Hensgen, Tobin, DeSouza, Kevin C.
Publisher: Taylor & Francis Ltd.
Publication Name: Studies in Conflict and Terrorism
Subject: Sociology and social work
ISSN: 1057-610X
Year: 2007
Management dynamics, Terrorist Organizations, Other Social Advocacy Organizations, Management, Business, Company business management, Business models

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: United States, Usage
Similar abstracts:
  • Abstracts: Current research on terrorism and low-intensity conflict. Cults, violence and religious terrorism: An international perspective
  • Abstracts: Current research on terrorism: the academic perspective. Military deterrence of international terrorism: an evaluation of Operation El Dorado Canyon
  • Abstracts: The determinants of delivery care in Kenya. Reproductive change in Zimbabwe and Kenya: the role of proximate determinants in recent fertility trends
  • Abstracts: Perceived intragroup variability as a function of group status and identification. Black experimenters and the intellectual test performance of white participants: the tables are turned
  • Abstracts: Are psychosocial factors related to smoking in grade-6 students? Smoking in adolescence: do attitudes matter?
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.