The Small World of 9/11 and the Implications for Network Dismantlement Strategies
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Terrill L. Frantz & Marcelo Cataldo & Kathleen M. Carley, 2009. "Robustness of centrality measures under uncertainty: Examining the role of network topology," Computational and Mathematical Organization Theory, Springer, vol. 15(4), pages 303-328, December.
- Scott Helfstein & Dominick Wright, 2011. "Covert or Convenient? Evolution of Terror Attack Networks," Journal of Conflict Resolution, Peace Science Society (International), vol. 55(5), pages 785-813, October.
- Kathleen M. Carley, 2006. "Destabilization of covert networks," Computational and Mathematical Organization Theory, Springer, vol. 12(1), pages 51-66, April.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jianjun Lu & Shozo Tokinaga, 2016. "Cluster fluctuation in two-dimensional lattices with local interactions," Computational and Mathematical Organization Theory, Springer, vol. 22(2), pages 237-259, June.
- Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2009.
"Understanding Terrorist Network Topologies and Their Resilience Against Disruption,"
Discussion Paper
2009-85, Tilburg University, Center for Economic Research.
- Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2009. "Understanding Terrorist Network Topologies and Their Resilience Against Disruption," Other publications TiSEM 0469c068-22ad-4521-8d87-9, Tilburg University, School of Economics and Management.
- Brandy L. Aven, 2015. "The Paradox of Corrupt Networks: An Analysis of Organizational Crime at Enron," Organization Science, INFORMS, vol. 26(4), pages 980-996, August.
- Terrill L. Frantz & Kathleen M. Carley, 2017. "Reporting a network’s most-central actor with a confidence level," Computational and Mathematical Organization Theory, Springer, vol. 23(2), pages 301-312, June.
- Andrea Landherr & Bettina Friedl & Julia Heidemann, 2010. "A Critical Review of Centrality Measures in Social Networks," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 2(6), pages 371-385, December.
- A. Fronzetti Colladon & E. Remondi, 2021. "Using social network analysis to prevent money laundering," Papers 2105.05793, arXiv.org.
- Morgan Burcher & Chad Whelan, 2015. "Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries," Global Crime, Taylor & Francis Journals, vol. 16(2), pages 104-122, April.
- Junhui Cai & Dan Yang & Wu Zhu & Haipeng Shen & Linda Zhao, 2021. "Network regression and supervised centrality estimation," Papers 2111.12921, arXiv.org.
- Sara Jeza Alotaibi, 2022. "A New Internet of Things (IoT) Framework for Public Sectors," International Journal of Information Technology and Web Engineering (IJITWE), IGI Global, vol. 17(1), pages 1-15, January.
- Alexandra-Maria Bocse, 0. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 0, pages 1-19.
- Sho Tsugawa & Yukihiro Matsumoto & Hiroyuki Ohsaki, 2015. "On the robustness of centrality measures against link weight quantization in social networks," Computational and Mathematical Organization Theory, Springer, vol. 21(3), pages 318-339, September.
- Jianjun Lu & Shozo Tokinaga, 2013. "Analysis of cluster formations on planer cells based on genetic programming," Computational and Mathematical Organization Theory, Springer, vol. 19(4), pages 426-445, December.
- Arun Advani & Bansi Malde, 2014. "Empirical methods for networks data: social effects, network formation and measurement error," IFS Working Papers W14/34, Institute for Fiscal Studies.
- Kathleen M. Carley & Michael W. Bigrigg & Boubacar Diallo, 2012. "Data-to-model: a mixed initiative approach for rapid ethnographic assessment," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 300-327, September.
- Zhang, Xin-Jie & Tang, Yong & Xiong, Jason & Wang, Wei-Jia & Zhang, Yi-Cheng, 2020. "Ranking game on networks: The evolution of hierarchical society," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 540(C).
- Manzi, Deborah & Calderoni, Francesco, 2024. "The resilience of drug trafficking organizations: Simulating the impact of police arresting key roles," Journal of Criminal Justice, Elsevier, vol. 91(C).
- Yu Zhang & Yu Wu, 2012. "How behaviors spread in dynamic social networks," Computational and Mathematical Organization Theory, Springer, vol. 18(4), pages 419-444, December.
- Dunn, Adam G. & Westbrook, Johanna I., 2011. "Interpreting social network metrics in healthcare organisations: A review and guide to validating small networks," Social Science & Medicine, Elsevier, vol. 72(7), pages 1064-1068, April.
- Stella, Massimo, 2020. "Multiplex networks quantify robustness of the mental lexicon to catastrophic concept failures, aphasic degradation and ageing," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 554(C).
- Tsugawa, Sho & Kimura, Kazuma, 2018. "Identifying influencers from sampled social networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 507(C), pages 294-303.
More about this item
Keywords
Terrorism; Counterterrorism; Social Network Analysis.;All these keywords.
JEL classification:
- F52 - International Economics - - International Relations, National Security, and International Political Economy - - - National Security; Economic Nationalism
- D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions
- D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation
NEP fields
This paper has been announced in the following NEP Reports:- NEP-ICT-2013-06-04 (Information and Communication Technologies)
- NEP-NET-2013-06-04 (Network Economics)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:adl:wpaper:2013-08. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Qazi Haque (email available below). General contact details of provider: https://edirc.repec.org/data/decadau.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.