Terrorism, Networks, and Strategy: Why the Conventional Wisdom is Wrong
Abstract
This is an article from the June 2008 [v.4 no.2] edition of the Homeland Security Affairs Journal. In this report, the author considers first some basic differences among organizations and the strengths and weaknesses of two different organizational forms [networks and hierarchies]; then apply this organizational analysis to terrorist organizations and the governmental network in the United States; and, finally, suggest optimal strategies for countering the terrorist threats we face. The initial discussion of organizational forms will be somewhat simplified [e.g., it assumes a clear distinction between networks and hierarchies that is ultimately untenable] in order to emphasize certain organizational characteristics or tendencies.
Description
This article appeared in Homeland Security Affairs (June 2008), v.4 no. 2
Related items
Showing items related by title, author, creator and subject.
-
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Demand Assigned Channel Allocation Applied to Full Duplex Underwater Acoustic Networking
Gibson, J.; Kaminski, A.; Xie, Geoffrey (2005-06);Acoustic communications provide a viable means for underwater networking. However, extreme propagation delays, limited bandwidth, and half duplex communications, with its inherent use of delay inducing collision avoidance ...