Why Terror Networks are Dissimilar: How Structure Relates to Function
暂无分享,去创建一个
[1] J. Eck. When is a bologna sandwich better than sex? A defense of small-n case study evaluations , 2006 .
[2] R. White. Provisional Irish Republicans: An Oral and Interpretive History , 1993 .
[3] R. Clutterbuck,et al. The Heart Attacked: Terrorism and Conflict in the Italian State , 1989 .
[4] G. Shambaugh,et al. The Limits of Terrorism: A Network Perspective , 2005 .
[5] Cynthia Lum,et al. Evidence-Based Counterterrorism Policy , 2012 .
[6] G. LaFree. Generating Terrorism Event Databases: Results from the Global Terrorism Database, 1970 to 2008 , 2012 .
[7] S. Bruce. The Red Hand: Protestant Paramilitaries in Northern Ireland , 1992 .
[8] W. Tupman. Ten myths about terrorist financing , 2009 .
[9] J. Gunning,et al. Critical Terrorism Studies. A new research agenda. , 2009 .
[10] Todd Sandler,et al. Terrorist networks, support, and delegation , 2009 .
[11] David Shinn. Al Shabaab's Foreign Threat to Somalia , 2011 .
[12] Hsinchun Chen,et al. Uncovering the dark Web: A case study of Jihad on the Web , 2008 .
[13] Harold A. Trinkunas,et al. Terrorism financing and state responses : a comparative perspective , 2014 .
[14] Andrew Ilachinski,et al. Modelling insurgent and terrorist networks as self-organised complex adaptive systems , 2012, Int. J. Parallel Emergent Distributed Syst..
[15] Carlo Morselli,et al. BROKERAGE QUALIFICATIONS IN RINGING OPERATIONS , 2008 .
[16] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[17] Hsinchun Chen,et al. Case Study of Jihad on the Web , 2008 .
[18] J. Bowyer Bell. The IRA, 1968-2000: An Analysis of a Secret Army , 2000 .
[19] Victor Asal,et al. Terrorism as Transnational Advocacy: An Organizational and Tactical Examination , 2007 .
[20] Victor Asal,et al. Researching Terrorist Networks , 2006 .
[21] Jeroen K. Vermunt,et al. What is special about social network analysis , 2006 .
[22] R. Burt. Structural Holes and Good Ideas1 , 2004, American Journal of Sociology.
[23] C. Christine Fair,et al. Who Are Pakistan's Militants and Their Families? , 2007 .
[24] James A. Piazza. Is Islamist Terrorism More Dangerous?: An Empirical Study of Group Ideology, Organization, and Goal Structure , 2009 .
[25] J. Gunning. Social movement theory and the study of terrorism. , 2009 .
[26] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[27] M. Ogun. Terrorist Use of Internet: Possible Suggestions to Prevent the Usage for Terrorist Purposes , 2012 .
[28] C. Stohl,et al. Networks of Terror: Theoretical Assumptions and Pragmatic Consequences , 2007 .
[29] Rene M. Bakker,et al. A preliminary theory of dark network resilience , 2012 .
[30] Marieke de Goede,et al. Hawala Discourses and the War on Terrorist Finance , 2003 .
[31] J. Horgan,et al. Methodological Triangulation in the Analysis of Terrorist Networks , 2012 .
[32] Thomas Hegghammer,et al. Terrorist Recruitment and Radicalization in Saudi Arabia , 2006 .
[33] R. Burt. The Network Structure Of Social Capital , 2000 .
[34] Kevin C. Desouza,et al. Dismantling terrorist networks: Evaluating strategic options using agent-based modeling , 2010 .
[35] Mette Eilstrup-Sangiovanni,et al. Assessing the Dangers of Illicit Networks: Why al-Qaida May Be Less Threatening Than Many Think , 2008, International Security.
[36] Zachary Abuza,et al. Funding Terrorism in Southeast Asia: The Financial Network of Al Qaeda and Jemaah Islamiya , 2003 .
[37] Marc Sageman,et al. Connecting Terrorist Networks , 2008 .
[38] S. Leistedt,et al. Behavioural aspects of terrorism. , 2013, Forensic science international.
[39] Joshua D. Freilich,et al. American Terrorism and Extremist Crime Data Sources and Selectivity Bias: An Investigation Focusing on Homicide Events Committed by Far-Right Extremists , 2012 .
[40] M. Razavy. Hawala: An underground haven for terrorists or social phenomenon? , 2005 .
[41] D. Porta,et al. Social movements, political violence, and the state: Notes , 1995 .
[42] C. Leuprecht,et al. Networks as strategic repertoires: Functional differentiation among Al-Shabaab terror cells , 2013 .
[43] Carlo Morselli,et al. Assessing Vulnerable and Strategic Positions in a Criminal Network , 2010 .
[44] Steven R. Corman,et al. Using activity focus networks to pressure terrorist organizations , 2006, Comput. Math. Organ. Theory.
[45] David A. Siegel,et al. Underfunding in Terrorist Organizations , 2007 .
[46] Steven B. Andrews,et al. Structural Holes: The Social Structure of Competition , 1995, The SAGE Encyclopedia of Research Design.
[47] R. Looney. Hawala: The Terrorist's Informal Financial Mechanism , 2003 .
[48] Christopher C. Yang,et al. Analysis of terrorist social networks with fractal views , 2009, J. Inf. Sci..
[49] Michael Stohl,et al. Networks, terrorists and criminals: the implications for community policing , 2008 .
[50] S. Eckert,et al. Countering the financing of terrorism , 2008 .
[51] Nataša Golubovi,et al. NETWORK STRUCTURE OF SOCIAL CAPITAL , 2010 .
[52] Victor Asal,et al. Nonstate Actors, Terrorism, and Weapons of Mass Destruction , 2005 .