On Heterogeneous Covert Networks

R. Lindelauf, P. Borm, H. Hamers
{"title":"On Heterogeneous Covert Networks","authors":"R. Lindelauf, P. Borm, H. Hamers","doi":"10.2139/ssrn.1135211","DOIUrl":null,"url":null,"abstract":"Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this framework is put to the test by applying it to the 2002 Jemaah Islamiyah Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is established. It is shown that the pair of individuals in the organization that should conduct the interaction that presents the highest risk to the organization, is the pair that is the least connected to the remainder of the network. Furthermore, optimal networks given a single risky interaction are approximated and compared. When choosing among a path, star and ring graph it is found that for low order graphs the path graph is best. When increasing the order of graphs under consideration a transition occurs such that the star graph becomes best. It is found that the higher the risk a single interaction presents to the covert network the later this transition from path to star graph occurs.","PeriodicalId":343564,"journal":{"name":"Economics of Networks","volume":"328 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Economics of Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.1135211","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28

Abstract

Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this framework is put to the test by applying it to the 2002 Jemaah Islamiyah Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is established. It is shown that the pair of individuals in the organization that should conduct the interaction that presents the highest risk to the organization, is the pair that is the least connected to the remainder of the network. Furthermore, optimal networks given a single risky interaction are approximated and compared. When choosing among a path, star and ring graph it is found that for low order graphs the path graph is best. When increasing the order of graphs under consideration a transition occurs such that the star graph becomes best. It is found that the higher the risk a single interaction presents to the covert network the later this transition from path to star graph occurs.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
异构隐蔽网络研究
秘密组织经常面临着在保密性和运作效率之间进行权衡的问题。Lindelauf, Borm和Hamers(2008)开发了一个理论框架,明确考虑到上述考虑因素,以确定最优同质网络。本文通过将该框架应用于2002年伊斯兰祈祷团巴厘岛爆炸事件,对其进行了检验。研究发现,这种隐蔽网络的大多数方面都可以用理论框架来解释。然而,有些交互比其他交互对网络的风险更高。对隐蔽网络的理论框架进行了扩展,以适应这种异构的相互作用。给定一个网络结构,建立一个风险交互的最优位置。结果表明,组织中应该进行对组织构成最高风险的交互的个体对,是与网络其余部分联系最少的个体对。在此基础上,对给定单个风险交互的最优网络进行了近似和比较。在路径图、星图和环图中进行选择时,发现对于低阶图,路径图是最好的。当考虑增加图的顺序时,会发生一个过渡,使星图成为最好的。研究发现,从路径图到星图的过渡越晚,单个相互作用对隐蔽网络的风险越高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Recommended for You: The Effect of Word of Mouth on Sales Concentration Vertical Integration and Exclusivity in Platform and Two-Sided Markets Pricing Digital Goods: Discontinuous Costs and Shared Infrastructure Compatibility and Proprietary Standards: The Impact of Conversion Technologies in IT Markets with Network Effects Stuck in the Adoption Funnel: The Effect of Interruptions in the Adoption Process on Usage
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1