Show simple item record

Files in this item

Thumbnail

Item metadata

dc.contributor.authorEiselt, H. A.
dc.contributor.authorBhadbury, J.
dc.date.accessioned2015-05-19T10:44:21Z
dc.date.available2015-05-19T10:44:21Z
dc.date.issued2015-02-04
dc.identifier.citationEiselt, H., & Bhadury, J. (2015). The use of structures in communication networks to track membership in terrorist groups. Journal of Terrorism Research, 6(1), pp. 1-18.en_US
dc.identifier.issn2049-7040en_US
dc.identifier.urihttp://ojs.st-andrews.ac.uk/index.php/jtr/article/view/1073en_US
dc.identifier.urihttps://hdl.handle.net/10023/6658
dc.description.abstractThis concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any) legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.en_US
dc.language.isoenen_US
dc.publisherCentre for the Study of Terrorism and Political Violence, University of St Andrewsen_US
dc.relation.ispartofJournal of Terrorism Researchen_US
dc.rightsThis is an open access article published in Journal of Terrorism Research. This work is licensed under a Creative Commons Attribution 3.0 License (http://creativecommons.org/licenses/by/3.0/)en_US
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/
dc.subjectCounterterrorismen_US
dc.subjectTerrorist cell detectionen_US
dc.subjectCommand structureen_US
dc.subjectGraph structuresen_US
dc.subjectSocial network analysisen_US
dc.subject.lccHV6431en_US
dc.subject.lcshTerrorismen_US
dc.titleThe use of structures in communication networks to track membership in terrorist groupsen_US
dc.typeJournal articleen_US
dc.description.versionPublisher PDFen_US
dc.publicationstatusPublisheden_US
dc.statusPeer revieweden_US
dc.identifier.doihttp://doi.org/10.15664/jtr.1073en


The following licence files are associated with this item:

  • Creative Commons

This item appears in the following Collection(s)

Show simple item record

This is an open access article published in Journal of Terrorism Research. This work is licensed under a Creative Commons Attribution 3.0 License (http://creativecommons.org/licenses/by/3.0/)
Except where otherwise noted within the work, this item's licence for re-use is described as This is an open access article published in Journal of Terrorism Research. This work is licensed under a Creative Commons Attribution 3.0 License (http://creativecommons.org/licenses/by/3.0/)