期刊文献+

社会网络分析在恐怖袭击风险控制中的应用 被引量:3

Application of social network analysis in anti-terrorist attack control
下载PDF
导出
摘要 针对恐怖袭击风险控制的问题,提出运用社会网络分析对恐怖袭击风险进行控制的方法。首先根据社会网络与恐怖组织之间的相似性,运用社会网路分析技术对恐怖组织网络进行建模,构建恐怖组织的社会网络原型;然后运用有序集理论,计算抓捕一定数量的恐怖分子后整个恐怖组织被破坏的概率。研究表明,在完全二叉树的恐怖组织网络中,控制恐怖组织一半以上的成员,就可以达到削弱恐怖组织的攻击能力的目的。 This paper is engaged in the study of the terrorist risk contrel in the minimum input way by using social network analysis and the mathematics method order set. In proceeding with our study, first of all, based on the characteristic analysis of the terrorist organization, attempt is made to disclose the similarity between the general social networks and the terrorist organizations, and, then, we have tried to apply the social network analysis technology to the study the model of the terrorist organizations by creating the prototype of terrorist organization network in three steps: firstly, determine the terrorist organization network nodes; secondly, determine the mutual relations among the network nodes; and, thirdly, collect and process the data collected. Of the three steps, the third step is the most complicated one, because most nodes and their mutual relations, the most data needed, as well as the data to be adopted seem often to be incomplete, which is likely to lead to unsuccessful analysis of the whole investigation. Therefore, it is also necessary to prepare a high-quality database, including the timely information of the terrorist activities and the corresponding pages indicating the ever-changing situation of their activities. Secondly, with the terrorist organization network at hand, the terrorist organization can be analyzed quantitatively by using the mathematics method ordered set. In our practice, we have tested the ordered set analysis for the terrorist organization network, trying to find all the lines (great chin) between the leader node and the terminal node so as to destroy it. The set in which the nodes are related to every great chin is professionally known as cutest. The probability can be worked out when the terrorist network was destrayed by arresting some terrorists by using it. In this paper, we have also provided the cut set calculating method of the complete binary tree terrorist network. Thus, it can be concluded that if half or more of the terrorists can be found, the capabi
出处 《安全与环境学报》 CAS CSCD 北大核心 2009年第4期164-167,共4页 Journal of Safety and Environment
基金 "十一五"课题科技支撑计划课题(2006BAK08B01) 863课题(2006AA01Z336)
关键词 安全工程 风险控制 社会网络分析 有序集 恐怖袭击 safety engineering risk control social network analysis the ordered set counter-terrorist attack
  • 相关文献

参考文献9

  • 1PENZAR D, SRBLJINOVIC A. About modeling of complex networks with applications to terrorist group modeling [ J ]. Interdisciplinary Description of Complex Systems, 2005, 3( 1 ) : 27 - 43. 被引量:1
  • 2WOO G. Insuring against al-Qaeda [R]. Newark: Risk Management Solutions Ltd, 2003. 被引量:1
  • 3LESSEER I O. The new terrorism(反新恐怖主义) [M]. CHENG Kexiong(程克雄), tran. Beijing: Xinhua Press, 2002. 被引量:1
  • 4HAMZA A. Allah' s governance on earth [ M ]. Deluxe Primers, 2002. 被引量:1
  • 5KENNEDY J F, EBERHART R C. Swarm intelligence [ M ]. NewYork: Morgan Kaufmann Publishers San Francisco (USA), 2001. 被引量:1
  • 6RONFELDT D, ARQUILLA J. Networks and netwars : the future of terror, crime and militancy [M]. Santa Monica: RAND Corporation, 2001. 被引量:1
  • 7LIUJun(刘军).Anintroductiontosocialnetworkanalysis(社会网络分析导论)[M].Beijing:SocialSciencesAcademicPress,2004. 被引量:1
  • 8CARLEY K M, SVOBODA D M. Modeling organizational adaptation as a simulated annealing process[J]. Sociological Methods and Research, 1996, 25( 1 ) : 138 - 168. 被引量:1
  • 9FARLEY J D. Breaking A1 Qaeda cells: a mathematical analysis of eounterterrorism operations (a guide for risk assessment and decision making)[J]. Studies in Conflict & Terrorism, 2003, 26(13): 399- 411. 被引量:1

同被引文献34

  • 1STEWART T A.Six degrees of mohamed atta .Business 2.0,2001(9):63 .http://www.business2.com/Articles/mag/print/0,1643,35253,FF.html. 被引量:1
  • 2RONFELDT D,ARQUILLA J.Networks and netwars:the future of terror,crime and militancy[M].Santa Monica:RAND,2001. 被引量:1
  • 3KREBS V E.Mapping networks of terrorist cells[J].Connections,2002,24(3):43-52. 被引量:1
  • 4LESSEER I O,HOFFMAN B,ARQUILLA J,et al,CHENG Kexiong(程克雄).Counterring the new terrorism(反新恐怖主义)[M]tran.Beijing:Xinhua Press,2002.. 被引量:1
  • 5PENZAR D,SRBLJINOVI C ' A.About modelling of complex networks with applications to terrorist group modeling[J].Interdisciplinary Description of Complex System,2005,3(1):27-43. 被引量:1
  • 6FBI.Counterterrorism analytical lexicon.http://cryptome.org/fbi-ct-lexicon.pdf. 被引量:1
  • 7CARLEY K M.Estimating vulnerabilities in large covert networks // Proceedings of the 9th International Command and Control Research and Technology Symposium,2004.http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.150.3786 &rep=rep1&type=pdf. 被引量:1
  • 8MCCULLOH I M,WEBB M,CARLEY K M,et al.Change detection in social networks .Arlington,VA:U.S.Army Research Institute Technical Report 1235 .http://www.hqda.army.mil/ari/pdf/TR_1235.pdf. 被引量:1
  • 9WASSERMAN S,FAUST K.Social network analysis:methods and applications[M].Cambridge:Cambridge University Press,1994. 被引量:1
  • 10CARLEY K M,LEE J,KRACKHARDT D.Destabilizing networks[J].Connections,2002,24(3):31-34. 被引量:1

引证文献3

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部