期刊文献+

基于社会网络分析的恐怖袭击风险控制 被引量:2

Ways of controlling the risks of the terrorist attack through social network analysis
下载PDF
导出
摘要 应用社会网络分析技术研究恐怖分子网络的脆弱性,为破坏恐怖组织提供技术建议。选择组织风险分析软件ORA (OrganizationalRisk Analyzer)工具对恐怖分子网络进行研究,采用宏矩阵对组织中的人员、知识、资源和任务实体进行建模,对该组织存在的风险和脆弱性进行量化分析,得到该组织最终的脆弱性和风险。以"东突恐怖分子网络"为背景的案例研究表明,在打击恐怖组织的实际行动中,识别并消灭恐怖组织中的核心人物是有效瓦解恐怖分子网络结构的捷径。 This paper is to present the study results on how to use social network analysis technology to analyze the vulnerability of the ter wrist attacks and possibilities to bring destructive counter-attack against the terrorist organizations. For our purpose, we have applied our computer tool of Organizational Risk Analyzer (ORA) to analyze the network of "East Turkistan" terrorists in China. The models of the relationship among its organization members, knowledge, resources and tasks entities are all represented by the meta-matrix in ORA, which helps to analyze the risks and vulnerabilities of their organizational structure from the point of view of bringing them deadly attack and destruction of their effective strength by making ourselves well-in- formed of the actual terrorist intentions and plots of their organization. In doing so, it is necessary for us to get the ORA reports to analyze the entire core force quantitatively, including their total degree centrality, their cognitive demand, their task exclusivity, and resource exclusivity, all of which are closely tied to their network structure and distribution. A case study we have done has shown that great change has taken place before and after their head, the central figure, A was killed. It was a matter of fact that, before the event, the core of the terrorist organization was strong. The situation shows that there had been existing cohesive power of the whole organization. However, when their back-born member was killed in our counter-terrorist attack, the cohesive function of the organization left over tends to get weakened, which made them more difficult to go on with their tasks. The case study we have done covers the background of the "East Turkistan" terrorist network in China, which indicates that there should be some kind of shortcuts to destroy effectively the terrorist organization by detecting the core figures in the terrorist network and annihilating them in counter-terrorist battles. Therefore, it is vital to improve the probability to control the risk of terrorist attacks by successful application of less military resources.
出处 《安全与环境学报》 CAS CSCD 北大核心 2009年第3期161-165,共5页 Journal of Safety and Environment
基金 "十一五"科技支撑计划项目(200603746006 2006BAK08B01) 863课题(2006AA012336-2) 北京市科技新星计划项目(2006A36)
关键词 安全管理工程 风险控制 社会网络分析 宏矩阵 组织风险 safety management engineering risk control social network analysis meta-matrix organization risk
  • 相关文献

参考文献7

  • 1朱庆华,李亮.社会网络分析法及其在情报学中的应用[J].情报理论与实践,2008,31(2):179-183. 被引量:298
  • 2张存刚,李明,陆德梅.社会网络分析——一种重要的社会学研究方法[J].甘肃社会科学,2004(2):109-111. 被引量:155
  • 3POPP R, PATTIPATI K, WILLETT P, et al. Collaboration and modeling tools for counter-terrorism analysis[C]//Springer. Proceedings of the 2004 IEEE International Conference. Berlin: Springer, 2004: 46- 52.
  • 4REMINGA J, CARLEY K M. Measures for ORA ( Organizational Risk Analyzer) [ EB/OL]. [2003 - 03 - 22]. http://casos. isri. cmu. edu/ publications/papers/reminga_2003 ora. pdf.
  • 5CARLEY K M, REMINGA J. ORA : organization risk analyzer [ EB/ OL]. [2004 - 05 - 02]. http://reports-archive.adm. cs. emu. edu/ anon/isri2004/CMU- ISRI-04-106. pdf.
  • 6CARLEY K M, DERENO M. ORA 2006: user's guide [EB/OL]. [2006 - 10 - 10]. http://handle.dtic.mil/100.2/ADA457301.
  • 7LIUJun(刘军).Introduction to social network analysis ( 社会网络分析导论)[M].2nd ed. Beijing: Social Science Documentation Publishing House, 2004 : 62 - 68.

二级参考文献17

共引文献439

同被引文献16

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部