Welcome to Central Library, SUST
Amazon cover image
Image from Amazon.com
Image from Google Jackets

Disrupting Dark Networks / Sean F. Everton.

By: Material type: TextTextSeries: Structural Analysis in the Social Sciences ; 34 | Structural Analysis in the Social Sciences ; 34.Publisher: Cambridge : Cambridge University Press, 2012Description: 1 online resource (490 pages) : digital, PDF file(s)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781139136877 (ebook)
Additional physical formats: Print version: : No titleDDC classification:
  • 302.30285 23
LOC classification:
  • HM711 .E94 2012
Online resources: Summary: Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholars and analysts an array of approaches for disrupting dark networks.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Title from publisher's bibliographic system (viewed on 04 Apr 2016).

Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholars and analysts an array of approaches for disrupting dark networks.

There are no comments on this title.

to post a comment.