Organizing to counter terrorism: Sensemaking amidst dynamic complexity

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Network Analysis for Counter-Terrorism

networks X X X Abstract network growth X X Xnetwork growth X X X

متن کامل

Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the "Hearts and Minds"

The United States armed forces could be considered the world's most powerful military force. However, in modern conflicts, techniques of asymmetric warfare (terrorism) wreak havoc on the inflexible, regardless of technological or numerical advantage. In order to be more effective, the US military must improve its counter-terrorism (CT) capabilities and flexibility. In this light, the authors mo...

متن کامل

A Soft Computing Model to Counter Terrorism

In the aftermath of September 11, the experts concluded that data mining could help it prevent future terrorist attacks. Experts are also concerned that in its zeal to apply technology to antiterrorism, the government could disrupt the crime-fighting processes of the agencies that are charged with finding and stopping terrorists before they act. The entire information or the evidence about a te...

متن کامل

Countering Complexity: An Analytical Framework to Guide Counter-Terrorism Policy-Making

The development of religiously motivated terrorism has increased the complexity of the terrorist phenomenon. We are currently faced with a wider range of actors with a broader set of motivations, strategies, tactics, organizational structures and goals than ever before. This increased complexity necessitates the development of analytical frameworks that can guide analysis of the terrorist pheno...

متن کامل

Data Mining for Counter-Terrorism

Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Human Relations

سال: 2013

ISSN: 0018-7267,1741-282X

DOI: 10.1177/0018726712468912