نتایج جستجو برای: terrorist groups

تعداد نتایج: 732772  

Journal: :JASIST 2010
Yuval Elovici Bracha Shapira Mark Last Omer Zaafrany Menahem Friedman Moti Schneider Abraham Kandel

Terrorist groups use the Web as their infrastructure for various purposes. One example is the forming of new local cells that may later become active and perform acts of terror. The Advanced Terrorist Detection System (ATDS), is aimed at tracking down online access to abnormal content, which may include terrorist-generated sites, by analyzing the content of information accessed by the Web users...

2008
Alex Godwin Remco Chang Robert Kosara William Ribarsky

With the increase of terrorist activity around the world, it has become more important than ever to analyze and understand these activities over time. Although the data on terrorist activities are detailed and relevant, the complexity of the data has rendered the understanding and analysis difficult. We present a visual analytical approach to effectively identify related entities such as terror...

2012
Nisha Chaurasia Mradul Dhakar Astha Chharia Akhilesh Tiwari R. K. Gupta

In today’s era of hi-tech technologies, criminals are easily fulfilling their inhuman goals against the mankind. Thus, the security of civilians has significantly become important. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed using data mining techniques. One such technique is Social network analysis which...

Journal: :International Studies Review 2021

Abstract The post–Cold War environment has ushered in an era of threats from terrorism, organized crime, and their intersections giving rise to the growing literature on so-called crime–terror nexus. This article takes stock this literature, assesses its accomplishments limitations, considers ways deepen it conceptually, theoretically, empirically. To challenge assumptions informing studies sug...

2014
Michael Jetter

Terrorism and the Media This paper systematically analyzes media attention devoted to terrorist attacks worldwide between 1998 and 2012. Several aspects are related to predicting media attention. First, suicide missions receive significantly more coverage, which could explain their increased popularity among terrorist groups. This result is further supported by Oaxaca-Blinder decompositions, su...

Journal: :Trans. GIS 2011
Richard M. Medina George F. Hepner

Terrorist networks operate in hybrid space where activities in social and geographic spaces are necessary for logistics and security. The Islamist terrorist network is analyzed as a sociospatial system using social network analysis, Geographic Information Science (GISc), and novel techniques designed for hybrid space analyses. This research focuses on identifying distance and sociospatial depen...

2011
Belinda A. Chiera

Hidden terrorist cells in high dimensional communications networks arise when terrorists camouflage connectivity to appear randomly connected to the background network. We investigate hidden network detectability when the background network does not support terrorist activities. Using two September 11 terrorist networks as the test bed and a network measure called assortativity, we suggest hidd...

2013
Nisha Chaurasia Akhilesh Tiwari

The advisory feasibility of Social Network Analysis (SNA) to study social networks have encouraged the law enforcement and security agencies to investigate the terrorist network and its behavior along with key players hidden in the web. The study of the terrorist network, utilizing SNA approach and Graph Theory where the network is visualized as a graph, is termed as Investigative Data Mining o...

Journal: :European Journal of Operational Research 2013
Xiaojun Shan Jun Zhuang

Many models have been developed to study homeland security games between governments (defender) and terrorists (attacker, adversary, enemy), with the limiting assumption of the terrorists being rational or strategic. In this paper, we develop a novel hybrid model in which a centralized government allocates defensive resources among multiple potential targets to minimize total expected loss, in ...

Journal: :Journal of interpersonal violence 2011
Peter Fischer Tom Postmes Julia Koeppl Lianne Conway Tom Fredriksson

This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat. Concretely, the authors investigated the effect of intellectual meaning (induced by providing addit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید