意识形态网络如何影响恐怖袭击策略?实证研究

IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Business Analytics Pub Date : 2019-07-03 DOI:10.1080/2573234X.2019.1678401
Lyudmyla Starostyuk, Kay-Yut Chen, E. Prater
{"title":"意识形态网络如何影响恐怖袭击策略?实证研究","authors":"Lyudmyla Starostyuk, Kay-Yut Chen, E. Prater","doi":"10.1080/2573234X.2019.1678401","DOIUrl":null,"url":null,"abstract":"ABSTRACT Global news reflects the inefficiency of the current counterterrorism strategy. The number of terrorist attacks worldwide continues to grow. Multiple studies have not yet discovered how the configuration of links among terrorists drives their choice of attack. Using “the starfish and the spider” framework, this empirical study examines both the centralised and decentralised structures of the terrorist network. We draw the network from operational tactics of different ideologies. Focusing on the types of attacks, we explore similarities in terrorist operations, discern clusters among ideological movements, and draw the structure of terrorist networks over time. The findings contribute to an improved understanding of the operational conception of violent groups. It was found that almost half of ideological movements connect through clusters with several links stable over decades. These networks transformed from a centralised (spider) hierarchy to a decentralised (starfish) structure and eventually evolved into the combination of two – a hybrid organisation.","PeriodicalId":36417,"journal":{"name":"Journal of Business Analytics","volume":"32 1","pages":"101 - 117"},"PeriodicalIF":1.7000,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"How ideological network influences terrorist attack tactics? An empirical study\",\"authors\":\"Lyudmyla Starostyuk, Kay-Yut Chen, E. Prater\",\"doi\":\"10.1080/2573234X.2019.1678401\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT Global news reflects the inefficiency of the current counterterrorism strategy. The number of terrorist attacks worldwide continues to grow. Multiple studies have not yet discovered how the configuration of links among terrorists drives their choice of attack. Using “the starfish and the spider” framework, this empirical study examines both the centralised and decentralised structures of the terrorist network. We draw the network from operational tactics of different ideologies. Focusing on the types of attacks, we explore similarities in terrorist operations, discern clusters among ideological movements, and draw the structure of terrorist networks over time. The findings contribute to an improved understanding of the operational conception of violent groups. It was found that almost half of ideological movements connect through clusters with several links stable over decades. These networks transformed from a centralised (spider) hierarchy to a decentralised (starfish) structure and eventually evolved into the combination of two – a hybrid organisation.\",\"PeriodicalId\":36417,\"journal\":{\"name\":\"Journal of Business Analytics\",\"volume\":\"32 1\",\"pages\":\"101 - 117\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2019-07-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Business Analytics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/2573234X.2019.1678401\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Business Analytics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/2573234X.2019.1678401","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

全球新闻反映了当前反恐战略的低效。世界范围内的恐怖袭击数量继续增加。多项研究尚未发现恐怖分子之间的联系是如何影响他们选择攻击的。利用“海星和蜘蛛”的框架,本实证研究考察了恐怖主义网络的集中式和分散式结构。我们从不同意识形态的作战战术中得出网络。着眼于攻击类型,我们探索恐怖行动的相似性,辨别意识形态运动之间的集群,并绘制出恐怖网络的结构。这些发现有助于更好地理解暴力团体的运作概念。研究发现,几乎一半的意识形态运动都是通过几十年来稳定的若干联系的集群联系起来的。这些网络从一个集中的(蜘蛛)层级结构转变为一个分散的(海星)结构,并最终演变成两者的结合——一个混合型组织。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
How ideological network influences terrorist attack tactics? An empirical study
ABSTRACT Global news reflects the inefficiency of the current counterterrorism strategy. The number of terrorist attacks worldwide continues to grow. Multiple studies have not yet discovered how the configuration of links among terrorists drives their choice of attack. Using “the starfish and the spider” framework, this empirical study examines both the centralised and decentralised structures of the terrorist network. We draw the network from operational tactics of different ideologies. Focusing on the types of attacks, we explore similarities in terrorist operations, discern clusters among ideological movements, and draw the structure of terrorist networks over time. The findings contribute to an improved understanding of the operational conception of violent groups. It was found that almost half of ideological movements connect through clusters with several links stable over decades. These networks transformed from a centralised (spider) hierarchy to a decentralised (starfish) structure and eventually evolved into the combination of two – a hybrid organisation.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Business Analytics
Journal of Business Analytics Business, Management and Accounting-Management Information Systems
CiteScore
2.50
自引率
0.00%
发文量
13
期刊最新文献
Exploring the relationship between YouTube video optimisation practices and video rankings for online marketing: a machine learning approach The era of business analytics: identifying and ranking the differences between business intelligence and data science from practitioners’ perspective using the Delphi method Intelligent decision support system using nested ensemble approach for customer churn in the hotel industry Introducing technological disruption: how breaking media attention on corporate events impacts online sentiment An adaptive and enhanced framework for daily stock market prediction using feature selection and ensemble learning algorithms
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1