SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Geffre JL, Deckro RF, Knighton SA. J. Def. Model. Simul. Appl. Methodol. Technol. 2009; 6(2): 97-109.

Copyright

(Copyright © 2009, Society for Modeling and Simulation International, Publisher SAGE Publishing)

DOI

10.1177/1548512909348383

PMID

unavailable

Abstract

This study provides a quantitative method for destabilizing clandestine network operations, by determining which critical members to remove or influence in order to impact operations.The quantitative value of criticality is established by three measures: (1) the members’ social connectedness across multi-layered affiliations, (2) their involvement in operations, and (3) their emergence during periods and at locations of interest.Various techniques, including centrality, risk analysis, system reliability, and decision analysis, are incorporated to determine a member’s criticality to the group’s operations. The advantage of synergistically leveraging the social, operational, and temporal local criticality of group members allows for the maximum disruption of the group’s structure and operations, thus diminishing its effectiveness.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print