Home | Contents | Search | Group | Blog | Portal | Contact | Feedback

 

 

Syllabus
Schedule
Labs
Exercises
Modules
Glossary
Participants
Professor
Software
Groups
Datasets
Portal
News Media

Terrorism


 

Applying network analysis think to the fight against terrorism.

 

Topics
  • fighting terrorism and organized crime

Key Readings
 

  • Borgatti S. 2003. The key player problem. [html]

  • Borgatti, S.P. 2006. Identifying sets of key players in a network. Computational, Mathematical and Organizational Theory. 12(1): 21-34 [pdf]

  • Moody, James. “Fighting a Hydra: A Note on the Network Embeddedness of the War on Terror”, Structure and Dynamics: eJournal of Anthropological and Related Sciences: 1(2): Article 9. (local version of the web calculator here).
  • Krebs, Valdis. Social Network Analysis of the 9-11 Terrorist Network [html]

 

Additional Readings

  • Borgatti, S.P., Carley, K., and Krackhardt, D. 2006. Robustness of Centrality Measures under Conditions of Imperfect Data. Social Networks 28: 124–136. [pdf]

 

Tutorials

Exercises

Slides

 

Visits: 

Hit Counter