111,95 €
124,39 €
-10% with code: EXTRA
A Layered Social and Operational Network Analysis
A Layered Social and Operational Network Analysis
111,95
124,39 €
  • We will send in 10–14 business days.
To provide maximal disruption to a clandestine/terrorist network's ability to conduct missions, we must develop a means to determine the individuals' importance to the network and operations. In a network centric world, this importance is represented as an additive value of their criticality across the convergence of multiple layers of network connections. The connections layers of the network are comprised of social layers (Acquaintance, Friendship, Nuclear Family, Relatives, Student-Teacher,…
  • SAVE -10% with code: EXTRA

A Layered Social and Operational Network Analysis (e-book) (used book) | bookbook.eu

Reviews

Description

To provide maximal disruption to a clandestine/terrorist network's ability to conduct missions, we must develop a means to determine the individuals' importance to the network and operations. In a network centric world, this importance is represented as an additive value of their criticality across the convergence of multiple layers of network connections. The connections layers of the network are comprised of social layers (Acquaintance, Friendship, Nuclear Family, Relatives, Student-Teacher, and Religious Mentors, Reverent Power and others), as well as layers representing interactions involving Resources, Knowledge/Skills and Temporal Local. The social criticality of an individual is measured by centrality. Event Trees and Risk Importance Measures are often used in a system reliability analysis to determine critical elements in the success or failure of operations. The inclusion of time and location importance will be determined by the observation of various group members at that local. The synergy gained from the application of these concepts to terror groups can be used to identify critical locations, resources and knowledge to their operations and can then be attributed to individuals connected to those essential elements. The combination of social and operational criticality can then be used to identify individuals whose removal or influence would disrupt or diminish network operations.

EXTRA 10 % discount with code: EXTRA

111,95
124,39 €
We will send in 10–14 business days.

The promotion ends in 18d.07:44:31

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,24 Book Euros!?
  • Author: Jennifer L Geffre
  • Publisher:
  • ISBN-10: 1249584574
  • ISBN-13: 9781249584575
  • Format: 18.9 x 24.6 x 0.6 cm, softcover
  • Language: English English

To provide maximal disruption to a clandestine/terrorist network's ability to conduct missions, we must develop a means to determine the individuals' importance to the network and operations. In a network centric world, this importance is represented as an additive value of their criticality across the convergence of multiple layers of network connections. The connections layers of the network are comprised of social layers (Acquaintance, Friendship, Nuclear Family, Relatives, Student-Teacher, and Religious Mentors, Reverent Power and others), as well as layers representing interactions involving Resources, Knowledge/Skills and Temporal Local. The social criticality of an individual is measured by centrality. Event Trees and Risk Importance Measures are often used in a system reliability analysis to determine critical elements in the success or failure of operations. The inclusion of time and location importance will be determined by the observation of various group members at that local. The synergy gained from the application of these concepts to terror groups can be used to identify critical locations, resources and knowledge to their operations and can then be attributed to individuals connected to those essential elements. The combination of social and operational criticality can then be used to identify individuals whose removal or influence would disrupt or diminish network operations.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)