首页 | 本学科首页   官方微博 | 高级检索  
     

基于社会网络分析理论的恐怖组织网络研究综述
引用本文:付举磊,孙多勇,肖进,汪寿阳. 基于社会网络分析理论的恐怖组织网络研究综述[J]. 系统工程理论与实践, 2013, 33(9): 2177-2186. DOI: 10.12011/1000-6788(2013)9-2177
作者姓名:付举磊  孙多勇  肖进  汪寿阳
作者单位:1. 国防科技大学 信息系统与管理学院, 长沙 410073;2. 四川大学 商学院, 成都 610064;3. 中国科学院 数学与系统科学研究院, 北京 100190
摘    要:恐怖组织网络研究对于了解恐怖组织结构、有效打击恐怖活动具有十分重要的意义. 近年来, 社会 网络分析方法在恐怖组织网络研究中得到广泛关注和成功应用. 本文对恐怖组织网络模型的构建方法和分析方法进行了综述. 首先, 从建模视角、建模工具及数据获取方法三个方面对恐怖组织网络模型的构建方法进行了讨论和评价. 然后, 将恐怖组织网络分析方法归纳为静态分析和动态分析两大类. 在静态 分析中, 重点分析和评价了网络拓扑结构及特征、核心目标识别、抗毁性评估及瓦解策略三种方法; 在动 态分析中, 主要对恐怖活动态势评估、组织结构演化与绩效评估、空间关联分析三种方法进行了论述. 最 后, 指出现有研究存在的不足以及未来值得研究的问题.

关 键 词:恐怖组织网络  社会网络分析  建模方法  静态分析  动态分析  
收稿时间:2012-01-06

Review of the research on the terrorist networks based on social network analysis
FU Ju-lei , SUN Duo-yong , XIAO Jin , WANG Shou-yang. Review of the research on the terrorist networks based on social network analysis[J]. Systems Engineering —Theory & Practice, 2013, 33(9): 2177-2186. DOI: 10.12011/1000-6788(2013)9-2177
Authors:FU Ju-lei    SUN Duo-yong    XIAO Jin    WANG Shou-yang
Affiliation:1. College of Information System and Management, National University of Defense Technology, Changsha 410073, China;2. Business School, Sichuan University, Chengdu 610064, China;3. Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China
Abstract:Terrorist networks research is of great significance to understand terrorist organization structure and effectively fight terrorism. In recent years, social network analysis (SNA) has gained extensive attention and successful application in studying the terrorist networks. In this paper, the modeling methods and analysis methods of the terrorist networks are reviewed respectively. Firstly, different viewpoints, tools and data acquisition approaches for modeling terrorist networks are discussed and evaluated. Secondly, the methods on terrorist networks analysis are classified into two categories: static and dynamic analysis. In static analysis, three methods including network topology and features, key target identification, and terrorist networks invulnerability analysis and its disintegrating strategies are analyzed and evaluated emphatically. As for dynamic analysis, three methods are discussed, including terrorist activities situation assessment, organizational structure evolution and performance assessment, and spatial correlation analysis. Finally, the shortcomings in previous studies are pointed out, and some problems worthy of studying in the future are also addressed.
Keywords:terrorist networks  social network analysis  modeling method  static analysis  dynamic analysis
本文献已被 万方数据 等数据库收录!
点击此处可从《系统工程理论与实践》浏览原始摘要信息
点击此处可从《系统工程理论与实践》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号