Showing 1 - 10 of 13
Persistent link: https://www.econbiz.de/10003907319
Persistent link: https://www.econbiz.de/10003987175
Persistent link: https://www.econbiz.de/10003736604
Persistent link: https://www.econbiz.de/10010395521
Persistent link: https://www.econbiz.de/10003752309
Covert organizations are constantly faced with a tradeoff between secrecy and operational effciency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to determine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this...
Persistent link: https://www.econbiz.de/10014218001
All over the world intelligence services are collecting data concerning possible terrorist threats. This information is usually transformed into network structures in which the nodes represent the individuals in the data set and the links possible connections between these individuals....
Persistent link: https://www.econbiz.de/10014146450
Decision makers in the field of national security, counterterrorism and counterinsurgency are faced with an uncertain, adaptive and asymmetrical threat. It should come as no surprise that a great need exists to understand covert organizations, the structure of which becomes known partially only...
Persistent link: https://www.econbiz.de/10013143055
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10009308025
Persistent link: https://www.econbiz.de/10009759689