The efficiency/security trade-off in criminal networks

نویسندگان

  • Carlo Morselli
  • Cynthia Giguère
  • Katia Petit
چکیده

A consistent trade-off facing participants in any criminal network is that between organizing for efficiency or security—participants collectively pursue an objective while keeping the action leading to that goal concealed. Which side of the trade-off is prioritized depends on the objective that is pursued by the criminal group. The distinction is most salient when comparing terrorist with criminal enterprise networks. Terrorist networks are ideologically driven, while criminal enterprises pursue monetary ends. Time-to-task is shorter in the criminal enterprise and group efficiency is therefore prioritized over group security. Terrorist networks, in contrast, have longer horizons and security is prioritized over the execution of any single attack. Using Krebs’ exploratory research on networks of terrorist cells and electronic surveillance transcripts of a drug importation network, our analyses demonstrate how these opposing trade-offs emerge in criminal group structures. © 2006 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

Cases of Limitations and Violations of the Principles of Moral and Criminal Law in the Study of Reasons for Crimes Against Security Based on Expediency

Background: In specific criminal law, security crimes are of special importance due to their harmful effects on the whole society and the country. One of the reasons for studying crimes against security is that the way and method of discovering and investigating the perpetrators of crimes against security is different from other crimes. The purpose of explaining the limitations and deviations f...

متن کامل

Secure Energy Tradeoffs with Low Power Consumption in Data Transmission of Wireless Sensor Networks

Sensitivity of the Wireless Sensor Networks (WSN) is the main emerging concept in real time application for data transmission and other operations in process of networks. Security in WSN is challenging issue in recent network applications in design and implementation. A new extremely scalable key organization plan for Wireless Sensor Network. For that objective, we create use, for the very firs...

متن کامل

A JOINT DUTY CYCLE SCHEDULING AND ENERGY AWARE ROUTING APPROACH BASED ON EVOLUTIONARY GAME FOR WIRELESS SENSOR NETWORKS

Network throughput and energy conservation are two conflicting important performance metrics for wireless sensor networks. Since these two objectives are in conflict with each other, it is difficult to achieve them simultaneously. In this paper, a joint duty cycle scheduling and energy aware routing approach is proposed based on evolutionary game theory which is called DREG. Making a trade-off ...

متن کامل

A Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks

Due to the fact that security and energy efficiency are investigated separately in the conventional Primary User Emulation Attack (PUEA) countermeasure strategy in Cooperative Spectrum Sensing (CSS) process, the tradeoff between security and energy efficiency is discussed in this paper. CSS can improve detection performance whereas energy consumption will dramatically boost up with the increasi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Social Networks

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2007