ShopSpell

Disrupting Dark Netorks [Paperback]

$58.99       (Free Shipping)
100 available
  • Category: Books (Social Science)
  • Author:  Everton, Sean F.
  • Author:  Everton, Sean F.
  • ISBN-10:  1107606683
  • ISBN-10:  1107606683
  • ISBN-13:  9781107606685
  • ISBN-13:  9781107606685
  • Publisher:  Cambridge University Press
  • Publisher:  Cambridge University Press
  • Pages:  490
  • Pages:  490
  • Binding:  Paperback
  • Binding:  Paperback
  • Pub Date:  01-May-2012
  • Pub Date:  01-May-2012
  • SKU:  1107606683-11-MPOD
  • SKU:  1107606683-11-MPOD
  • Item ID: 100184299
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Dec 27 to Dec 29
  • Notes: Brand New Book. Order Now.
This book focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert, illegal networks.Sean F. Everton focuses on how social network analysis can be used to craft strategies to track, destabilize, and disrupt covert, illegal networks. He illustrates these methods through worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek, and ORA), using standard network data sets as well as data from an actual terrorist network to serve as a running example throughout the book.Sean F. Everton focuses on how social network analysis can be used to craft strategies to track, destabilize, and disrupt covert, illegal networks. He illustrates these methods through worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek, and ORA), using standard network data sets as well as data from an actual terrorist network to serve as a running example throughout the book.This is the first book in which counterinsurgency theory and social network analysis are coupled. Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize, and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek, and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholalÓ”
Add Review