Predicting target selection by terrorists: a network analysis of the 2005 London underground attacks
نویسنده
چکیده
A vulnerability analysis of possible use in security studies is presented. The analysis of the London underground network suggests that the stations bombed on 7 July, 2005 may not have been chosen randomly. From the viewpoint of effectively disturbing the transport system, nearly the best choice was made out of roughly 3 million possible combinations for attacking three stations. By comparing the underground networks of London, Tokyo and Budapest, we discuss the vulnerability of their underground networks. It seems to be plausible that such calculations can be made by softwares used widely in social network analysis. The predictive power of network analysis can be helpful in setting priorities in defence.
منابع مشابه
Exploring reductions in London Underground passenger journeys following the July 2005 bombings.
We examine the reduction in London Underground passenger journeys in response to the July 2005 bombings. Using entrance data for London Underground stations between 2001 and 2007, we incorporate demand and supply factors in a multivariate time-series regression model to estimate changes in passenger journeys between different Underground lines. We find that passenger journeys fell by an average...
متن کاملSite selection for underground dam using the water balance simulation (SWAT model) and analytical network process (ANP) (case study: Jamyshan watershed)
A large part of Iran is considered a semi-arid regions and water is a limiting factor for human activities in these areas. One of the ways to eliminate seasonal shortages of water is using groundwater. Underground dams can be used for storing and using underground water, which can be used to improve the management of existing water resources and increase the productivity of these resources.1 . ...
متن کاملProtecting Cultural Monuments Against Terrorism
Famous cultural monuments are often regarded as unique icons, making them an attractive target for terrorists. Despite huge military and police outlays, terrorist attacks on important monuments can hardly be avoided. We argue that an effective strategy for discouraging terrorist attacks on iconic monuments is for the government to show a firm commitment to swift reconstruction. Using a simple g...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملDie to kill: psychological and sociological study of suicide terrorism
One of the principal challenges now days, especially in the countries which are engaged in inland riots, is suicide attack which spreads fear broadly in human societies. More than the legal and political reactions to this social phenomenon, one of the preventive ways, is to analyze the suicide terrorists personally. No doubt, achievement to this understanding can be influential in preventing th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCIS
دوره 4 شماره
صفحات -
تاریخ انتشار 2008