Lethal Connections: The Determinants of Network Connections in the Provisional Irish Republican Army, 1970–1998
暂无分享,去创建一个
Victor Asal | John Horgan | Paul Gill | Karl Rethemeyer | J. Horgan | Victor Asal | P. Gill | Jeongyoon Lee | Jeongyoon Lee | Karl R. Rethemeyer
[1] Assessing Contemporary Trends and Future Prospects in the Study of the Suicide Bomber , 2012 .
[2] Gerard Delanty. The Foundations of Social Theory , 2009 .
[3] Shaul Mishal,et al. Al Qaeda as a Dune Organization: Toward a Typology of Islamic Terrorist Organizations , 2005 .
[4] Samuel T. Hunter,et al. Malevolent Creativity in Terrorist Organizations , 2013 .
[5] Ragnhild Silkoset,et al. The Dark Side of Social Capital , 2008 .
[6] Paul Gill,et al. Improvised Explosive Devices – The Problem of Definition , 2011 .
[7] B. Nooteboom. Forms, Sources and Processes of Trust , 2006 .
[8] James A. Piazza,et al. Counterterrorism Killings and Provisional IRA Bombings, 1970–1998 , 2016 .
[9] Hein de Vries,et al. Article in Press G Model Social Networks Dynamics of Adolescent Friendship Networks and Smoking Behavior , 2022 .
[10] Patricia E. Tweet. Brokerage and Closure: An Introduction to Social Capital , 2006 .
[11] T. Snijders. The statistical evaluation of social network dynamics , 2001 .
[12] T. Snijders,et al. Modeling the Coevolution of Networks and Behavior , 2007 .
[13] Garry Robins,et al. An introduction to exponential random graph (p*) models for social networks , 2007, Soc. Networks.
[14] J. Coleman,et al. Social Capital in the Creation of Human Capital , 1988, American Journal of Sociology.
[15] S. Wasserman,et al. Logit models and logistic regressions for social networks: II. Multivariate relations. , 1999, The British journal of mathematical and statistical psychology.
[16] Gary LaFree,et al. Spatial and Temporal Patterns of Terrorist Attacks by ETA 1970 to 2007 , 2012 .
[17] Peng Wang,et al. Recent developments in exponential random graph (p*) models for social networks , 2007, Soc. Networks.
[18] Max Taylor,et al. The provisional Irish republican army: Command and functional structure , 1997 .
[19] H. Patterson. The politics of illusion : a political history of the IRA , 1997 .
[20] J. Coleman,et al. Public and Private High Schools: The Impact of Communities , 1987 .
[21] David Tucker,et al. What is New about the New Terrorism and How Dangerous is It? , 2001 .
[22] Herbert Hamers,et al. The influence of secrecy on the communication structure of covert networks , 2009, Soc. Networks.
[23] S. Wasserman,et al. Logit models and logistic regressions for social networks: III. Valued relations , 1999 .
[24] H. Ibarra. Personal Networks of Women and Minorities in Management: A Conceptual Framework , 1993 .
[25] T. Snijders,et al. Conditional maximum likelihood estimation under various specifications of exponential random graph models , 2002 .
[26] H. Ibarra. Homophily and differential returns: Sex differences in network structure and access in an advertising firm. , 1992 .
[27] J. Horgan,et al. Who Were the Volunteers? 1 The Shifting Sociological and Operational Profile of 1240 Provisional Irish Republican Army Members , 2013 .
[28] Kathleen M. Carley,et al. Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..
[29] T. Snijders. Models for longitudinal network datain , 2005 .
[30] John Scott. What is social network analysis , 2010 .
[31] John Arquilla,et al. Networks, netwar, and information-age terrorism , 1999 .
[32] R. Karl Rethemeyer,et al. Killing Range: Explaining Lethality Variance Within a Terrorist Organization , 2014 .
[33] Kathleen M. Carley. A Theory of Group Stability , 1991 .
[34] John Arquilla,et al. Netwar Revisited: The Fight for the Future Continues , 2002 .
[35] M. Hopkinson. :Armed Struggle: The History of the IRA , 2006 .
[36] M.L.R. Smith. Fighting for Ireland? : the military strategy of the Irish Republican movement , 1997 .
[37] Varvara Mitliaga,et al. Networks and Netwars - The Future of Terror, Crime, and Militancy , 2002, Int. J. Law Inf. Technol..
[38] Walter Enders,et al. Rational Terrorists and Optimal Network Structure , 2007 .
[39] Ed Moloney,et al. A Secret History of the IRA , 2002 .
[40] John Horgan,et al. Improvised Explosive Device: The Problem of Definition , 2011 .
[41] J. Bowyer Bell. The IRA, 1968-2000: An Analysis of a Secret Army , 2000 .
[42] James D. Thompson. Organizations in Action , 1967 .
[43] Walter Enders,et al. The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis , 1993, American Political Science Review.
[44] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[45] Shane D. Johnson,et al. Space–Time Modeling of Insurgency and Counterinsurgency in Iraq , 2012 .
[46] T. Sandler,et al. What do we know about the substitution effect in transnational terrorism , 2003 .