LEADER 03262nam 22006972 450 001 9910453012003321 005 20160129113012.0 010 $a1-316-08986-X 010 $a1-139-79408-6 010 $a1-139-77669-X 010 $a1-139-78272-X 010 $a1-107-25452-3 010 $a1-139-13687-9 010 $a1-139-77973-7 010 $a1-283-81802-7 010 $a1-139-77821-8 035 $a(CKB)2550000000708841 035 $a(EBL)1042502 035 $a(OCoLC)833769794 035 $a(SSID)ssj0000755498 035 $a(PQKBManifestationID)11433695 035 $a(PQKBTitleCode)TC0000755498 035 $a(PQKBWorkID)10730744 035 $a(PQKB)10493429 035 $a(UkCbUP)CR9781139136877 035 $a(MiAaPQ)EBC1042502 035 $a(PPN)192276131 035 $a(Au-PeEL)EBL1042502 035 $a(CaPaEBR)ebr10623126 035 $a(CaONFJC)MIL413052 035 $a(OCoLC)819341663 035 $a(EXLCZ)992550000000708841 100 $a20110815d2012|||| uy| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDisrupting dark networks /$fSean F. Everton$b[electronic resource] 210 1$aCambridge :$cCambridge University Press,$d2012. 215 $a1 online resource (xxxvi, 451 pages) $cdigital, PDF file(s) 225 1 $aStructural analysis in the social sciences ;$v34 300 $aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). 311 $a1-107-02259-2 311 $a1-107-60668-3 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Social network analysis: techniques -- Social network analysis: metrics -- Social network analysis: advances -- Conclusion. 330 $aDisrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholars and analysts an array of approaches for disrupting dark networks. 410 0$aStructural analysis in the social sciences ;$v34. 606 $aSocial networks$xResearch 606 $aSocial sciences$xNetwork analysis 615 0$aSocial networks$xResearch. 615 0$aSocial sciences$xNetwork analysis. 676 $a302.30285 700 $aEverton$b Sean F.$01045187 801 0$bUkCbUP 801 1$bUkCbUP 906 $aBOOK 912 $a9910453012003321 996 $aDisrupting dark networks$92471255 997 $aUNINA