Abstract
Due to the interest by public audience and academic research, there has been a great interest in Terrorist Networks by the academicians, analysts and criminologists. Either to learn how to disrupt or to prevent their activities, structure of these networks are investigated. The final conclusion about their structure and topology came to the fact that they do not resemble each other, but there are categories of them. In this paper, we categorized these networks into six because of their ideologies and common practices. Topologies of these six categories are observed and importance of key players (leaders, financiers, propaganda units and armed units) are compared based on these categories.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Morselli, C.: Inside Criminal Networks. Springer Science+Business Media LLC, New York (2009)
Scott, J.: Social Network Analysis: A Handbook. Sage Publications (2000)
Finckenauer, J.O.: Mafia and Organized Crime A Beginner’s Guide, p. 11. Oneworld Publication, Oxford (2007)
Everett, M.G., Borgatti, S.P.: The Centrality of Groups and Classes. Journal of Mathematical Sociology (1999)
Klerks, P.: The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3), 53–65 (2001)
Wasserman, S., Faust, K.: Social Network Analysis Methods and Applications. Cambridge University Press, Cambridge (1994)
Krebs, V.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)
Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Philadelphia (2004)
Sageman, M.: Leaderless jihad: Terror networks in the twenty-first century. University of Pennsylvania Press (2011)
Memon, N., Larsen, H.L.: Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. In: Proceedings of the First International Conference on Availability, Reliability and Security, pp. 906–913. IEEE Computer Society (2006)
Carley, K., Dombrowski, M.: Destabilizing Dynamic Covert Networks, 8th International Command and Control Research and Technology, National Defence War College, Washington, DC (2003)
Rapoport, D.C.: The four waves of modern terrorism. In: Attacking Terrorism: Elements of a Grand Strategy, pp. 46–73 (2004)
van der Hulst, R.C.: Introduction to Social Network Analysis as an investigative tool. Trends in Organised Crime (12), 101–121 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ozgul, F. (2014). Classification of Terrorist Networks and Their Key Players. In: Wang, L.SL., June, J.J., Lee, CH., Okuhara, K., Yang, HC. (eds) Multidisciplinary Social Networks Research. MISNC 2014. Communications in Computer and Information Science, vol 473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45071-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-662-45071-0_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45070-3
Online ISBN: 978-3-662-45071-0
eBook Packages: Computer ScienceComputer Science (R0)