LEADER 05447nam 22007695 450 001 9910300371003321 005 20200703041118.0 010 $a3-319-04147-9 024 7 $a10.1007/978-3-319-04147-6 035 $a(CKB)3710000000088172 035 $a(EBL)1698335 035 $a(OCoLC)880404462 035 $a(SSID)ssj0001179022 035 $a(PQKBManifestationID)11764607 035 $a(PQKBTitleCode)TC0001179022 035 $a(PQKBWorkID)11169421 035 $a(PQKB)10089373 035 $a(MiAaPQ)EBC1698335 035 $a(DE-He213)978-3-319-04147-6 035 $a(PPN)176750703 035 $a(EXLCZ)993710000000088172 100 $a20140210d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aNetworks and Network Analysis for Defence and Security /$fedited by Anthony J. Masys 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (298 p.) 225 1 $aLecture Notes in Social Networks,$x2190-5428 300 $aDescription based upon print version of record. 311 $a3-319-04146-0 320 $aIncludes bibliographical references at the end of each chapters. 327 $aNetwork Analysis in Criminal Intelligence -- Identifying mafia Bosses from Meeting Attendance -- Macrosocial Network Analysis: the Case of Transnational Drug Trafficking -- Policing the Hackers by Hacking them: Studying Online Deviants in IRC Chat Rooms -- Why Terror Networks are Dissimilar: How Structure Relates to Functions -- Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement -- The Networked Mind- Collective Identities and the Cognitive-Affective Nature of Conflict -- Conflict Cessation and the Emergence of Weapons Supermarkets -- A Conspiracy of Bastards? -- Decision Support through Strongest Path Method Risk Analysis -- Critical Infrastructure and Vulnerability- a Relational Analysis through Actor Network Theory -- Dealing with Complexity: Thinking about Networks and the Comprehensive Approach. 330 $aNetworks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of ?big data? and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches. 410 0$aLecture Notes in Social Networks,$x2190-5428 606 $aPhysics 606 $aApplication software 606 $aCriminology 606 $aGame theory 606 $aSystem safety 606 $aApplications of Graph Theory and Complex Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/P33010 606 $aComputer Appl. in Social and Behavioral Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/I23028 606 $aCriminology and Criminal Justice, general$3https://scigraph.springernature.com/ontologies/product-market-codes/1B0000 606 $aGame Theory, Economics, Social and Behav. Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/M13011 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 615 0$aPhysics. 615 0$aApplication software. 615 0$aCriminology. 615 0$aGame theory. 615 0$aSystem safety. 615 14$aApplications of Graph Theory and Complex Networks. 615 24$aComputer Appl. in Social and Behavioral Sciences. 615 24$aCriminology and Criminal Justice, general. 615 24$aGame Theory, Economics, Social and Behav. Sciences. 615 24$aSecurity Science and Technology. 676 $a005.8 702 $aMasys$b Anthony J$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910300371003321 996 $aNetworks and Network Analysis for Defence and Security$91770407 997 $aUNINA