The efficiency/security trade-off in criminal networks
نویسندگان
چکیده
A consistent trade-off facing participants in any criminal network is that between organizing for efficiency or security—participants collectively pursue an objective while keeping the action leading to that goal concealed. Which side of the trade-off is prioritized depends on the objective that is pursued by the criminal group. The distinction is most salient when comparing terrorist with criminal enterprise networks. Terrorist networks are ideologically driven, while criminal enterprises pursue monetary ends. Time-to-task is shorter in the criminal enterprise and group efficiency is therefore prioritized over group security. Terrorist networks, in contrast, have longer horizons and security is prioritized over the execution of any single attack. Using Krebs’ exploratory research on networks of terrorist cells and electronic surveillance transcripts of a drug importation network, our analyses demonstrate how these opposing trade-offs emerge in criminal group structures. © 2006 Elsevier B.V. All rights reserved.
منابع مشابه
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملCases of Limitations and Violations of the Principles of Moral and Criminal Law in the Study of Reasons for Crimes Against Security Based on Expediency
Background: In specific criminal law, security crimes are of special importance due to their harmful effects on the whole society and the country. One of the reasons for studying crimes against security is that the way and method of discovering and investigating the perpetrators of crimes against security is different from other crimes. The purpose of explaining the limitations and deviations f...
متن کاملSecure Energy Tradeoffs with Low Power Consumption in Data Transmission of Wireless Sensor Networks
Sensitivity of the Wireless Sensor Networks (WSN) is the main emerging concept in real time application for data transmission and other operations in process of networks. Security in WSN is challenging issue in recent network applications in design and implementation. A new extremely scalable key organization plan for Wireless Sensor Network. For that objective, we create use, for the very firs...
متن کاملA JOINT DUTY CYCLE SCHEDULING AND ENERGY AWARE ROUTING APPROACH BASED ON EVOLUTIONARY GAME FOR WIRELESS SENSOR NETWORKS
Network throughput and energy conservation are two conflicting important performance metrics for wireless sensor networks. Since these two objectives are in conflict with each other, it is difficult to achieve them simultaneously. In this paper, a joint duty cycle scheduling and energy aware routing approach is proposed based on evolutionary game theory which is called DREG. Making a trade-off ...
متن کاملA Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks
Due to the fact that security and energy efficiency are investigated separately in the conventional Primary User Emulation Attack (PUEA) countermeasure strategy in Cooperative Spectrum Sensing (CSS) process, the tradeoff between security and energy efficiency is discussed in this paper. CSS can improve detection performance whereas energy consumption will dramatically boost up with the increasi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Social Networks
دوره 29 شماره
صفحات -
تاریخ انتشار 2007