- Subject index
Choice Outstanding Academic Title, 2011
Social network analysis has been one of the fastest growing and most influential areas of recent times. Why has this happened? What are the key features of social network analysis?
This sparkling Handbook offers an unrivalled resource. Systematically, it introduces readers to the key concepts, substantive topics, central methods, and prime debates. Among the specific areas covered are: Network theory; Interdisciplinary applications; Online networks; Corporate networks; Lobbying networks; Deviant networks; Measuring devices; Key Methodologies; Software applications
The result is a peerless resource for teachers and students. It offers a critical survey of the origins, basic issues and major debates. Instead of consulting a variety of books and journal articles, the Handbook offers a one-stop guide that will be used by readers for decades to come.
Chapter 18: Terrorist Networks: The Threat of Connectivity
Terrorist Networks: The Threat of Connectivity
Extremism and terrorism are ever evolving problems in our society. Terror is used as a weapon to achieve goals and, not surprisingly, the associated opportunity structures often reside in socially embedded networks. It has become top priority all over the world to make every effort to prevent future terrorist attacks. To further this cause, the systematic analysis of (terrorist) networks, the associated relational structures and exchange of resources (e.g. information, skills, money or weapons) are assumed to provide key leads. Contrary to most social networks that are the objects of study in this field, however, the networks associated with terrorism are inherently covert. This calls for a sophisticated array of research ...