IDEAS home Printed from https://ideas.repec.org/a/spr/annopr/v234y2015i1p17-3510.1007-s10479-013-1444-y.html
   My bibliography  Save this article

The “six-element” analysis method for the research on the characteristics of terrorist activities

Author

Listed:
  • Julei Fu
  • Duoyong Sun
  • Jian Chai
  • Jin Xiao
  • Shouyang Wang

Abstract

The rapid development of social network theory provides a new perspective for the research on counter-terrorism, however, current research mostly relates to terrorists and terrorist organizations. Firstly, the “six-element” analysis method for terrorist activities based on social network is proposed in this paper, namely, a variety of sub-networks are constructed according to the correlation among the six elements—people, organization, time, location, manner and event. These sub-networks are assessed through using centrality analysis, cohesive subgroup analysis, spatial correlation analysis, invulnerability analysis and descriptive statistic analysis; the characteristics and laws of terrorist activities are revealed from several different perspectives. Then, the “six-element” analysis method is applied to conduct empirical research on “East Turkistan” terrorist activities since the founding of the People’s Republic of China, so as to effectively identify core people and key organizations of the “East Turkistan” terrorist activity network, to assess the invulnerability of the “East Turkistan” terrorist network and to reveal the temporal and spatial distribution rules as well as the characteristics of the means and manners adopted in all previous terrorist activities. Lastly, the analysis results are interpreted qualitatively. This research can provide a basis for decision making and an analysis method for the identification of core terrorists and key terrorist organizations, determination of the key alert period, location of counter-terrorism and the early warning of the means of major terrorist activities. Copyright Springer Science+Business Media New York 2015

Suggested Citation

  • Julei Fu & Duoyong Sun & Jian Chai & Jin Xiao & Shouyang Wang, 2015. "The “six-element” analysis method for the research on the characteristics of terrorist activities," Annals of Operations Research, Springer, vol. 234(1), pages 17-35, November.
  • Handle: RePEc:spr:annopr:v:234:y:2015:i:1:p:17-35:10.1007/s10479-013-1444-y
    DOI: 10.1007/s10479-013-1444-y
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10479-013-1444-y
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10479-013-1444-y?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    2. Réka Albert & Hawoong Jeong & Albert-László Barabási, 2000. "Error and attack tolerance of complex networks," Nature, Nature, vol. 406(6794), pages 378-382, July.
    3. Hsinchun Chen & Wingyan Chung & Jialun Qin & Edna Reid & Marc Sageman & Gabriel Weimann, 2008. "Uncovering the dark Web: A case study of Jihad on the Web," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 59(8), pages 1347-1359, June.
    4. Daniel Gómez & Enrique González–Arangüena & Conrado Manuel & Guillermo Owen & Mónica Pozo & Martha Saboyá, 2008. "The cohesiveness of subgroups in social networks: A view from game theory," Annals of Operations Research, Springer, vol. 158(1), pages 33-46, February.
    5. Eva Lee & Siddhartha Maheshwary & Jacquelyn Mason & William Glisson, 2006. "Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks," Annals of Operations Research, Springer, vol. 148(1), pages 25-53, November.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Wang, Zhuoyang & Chen, Guo & Hill, David J. & Dong, Zhao Yang, 2016. "A power flow based model for the analysis of vulnerability in power networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 460(C), pages 105-115.
    2. Ryan M. Hynes & Bernardo S. Buarque & Ronald B. Davies & Dieter F. Kogler, 2020. "Hops, Skip & a Jump - The Regional Uniqueness of Beer Styles," Working Papers 202013, Geary Institute, University College Dublin.
    3. Lenore Newman & Ann Dale, 2007. "Homophily and Agency: Creating Effective Sustainable Development Networks," Environment, Development and Sustainability: A Multidisciplinary Approach to the Theory and Practice of Sustainable Development, Springer, vol. 9(1), pages 79-90, February.
    4. Aybike Ulusan & Ozlem Ergun, 2018. "Restoration of services in disrupted infrastructure systems: A network science approach," PLOS ONE, Public Library of Science, vol. 13(2), pages 1-28, February.
    5. David Simchi-Levi & Nikolaos Trichakis & Peter Yun Zhang, 2019. "Designing Response Supply Chain Against Bioattacks," Operations Research, INFORMS, vol. 67(5), pages 1246-1268, September.
    6. Yang, Hyeonchae & Jung, Woo-Sung, 2016. "Structural efficiency to manipulate public research institution networks," Technological Forecasting and Social Change, Elsevier, vol. 110(C), pages 21-32.
    7. Alexander Shiroky & Andrey Kalashnikov, 2021. "Mathematical Problems of Managing the Risks of Complex Systems under Targeted Attacks with Known Structures," Mathematics, MDPI, vol. 9(19), pages 1-11, October.
    8. Anand, Kartik & Gai, Prasanna & Marsili, Matteo, 2012. "Rollover risk, network structure and systemic financial crises," Journal of Economic Dynamics and Control, Elsevier, vol. 36(8), pages 1088-1100.
    9. Yao, Jialing & Sun, Bingbin & Xi, lifeng, 2019. "Fractality of evolving self-similar networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 515(C), pages 211-216.
    10. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," Review of Economic Studies, Oxford University Press, vol. 81(4), pages 1518-1542.
    11. Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.
    12. Zhou, Yaoming & Wang, Junwei, 2018. "Efficiency of complex networks under failures and attacks: A percolation approach," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 512(C), pages 658-664.
    13. Eva K. Lee & Siddhartha Maheshwary & Jacquelyn Mason & William Glisson, 2006. "Large-Scale Dispensing for Emergency Response to Bioterrorism and Infectious-Disease Outbreak," Interfaces, INFORMS, vol. 36(6), pages 591-607, December.
    14. Lordan, Oriol & Sallan, Jose M., 2019. "Core and critical cities of global region airport networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 513(C), pages 724-733.
    15. Diana Tampu & Carmen Costea, 2013. "Why society is a complex problem? A review of Philip Ball's book: Meeting Twentyfirst Century Challenges with a New Kind of Science," Journal of Economic Development, Environment and People, Alliance of Central-Eastern European Universities, vol. 2(1), pages 80-89, March.
    16. Elosegui, Pedro & Forte, Federico D. & Montes-Rojas, Gabriel, 2022. "Network structure and fragmentation of the Argentinean interbank markets," Latin American Journal of Central Banking (previously Monetaria), Elsevier, vol. 3(3).
    17. Liu, Run-Ran & Chu, Changchang & Meng, Fanyuan, 2023. "Higher-order interdependent percolation on hypergraphs," Chaos, Solitons & Fractals, Elsevier, vol. 177(C).
    18. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    19. Ohsung Kwon & Sung-guan Yun & Seung Hun Han & Yang Hon Chung & Duk Hee Lee, 2018. "Network Topology and Systemically Important Firms in the Interfirm Credit Network," Computational Economics, Springer;Society for Computational Economics, vol. 51(4), pages 847-864, April.
    20. Ho-Chun Herbert Chang & Brooke Harrington & Feng Fu & Daniel Rockmore, 2023. "Complex Systems of Secrecy: The Offshore Networks of Oligarchs," Papers 2303.03371, arXiv.org.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:annopr:v:234:y:2015:i:1:p:17-35:10.1007/s10479-013-1444-y. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.