|
|
Untersuchte Arbeit: Seite: 79, Zeilen: 19-29 |
Quelle: Clark etal 2005 Seite(n): 4, Zeilen: 7-14 |
---|---|
Researchers (for example; Simmel, 1906; Gross, 1980; Geis and Stotland, 1980; Erickson, 1981; Baker and Faulkner, 1993; Klerks, 2001) have conducted psychological and sociological analyses of covert networks for the past century, however since Sept. 11, 2001 there has been a dramatic increase in the number of publications (ex. Krebs, 2001; Carley et al, 2003, Sageman, 2004) on covert networks, specifically terror networks. These recent researchers have chosen Social Network Analysis (SNA) to help them “map,” (Krebs, 2001) “uncloak,” (Krebs, 2002) “identify key players,” (Borgatti, 2002) “destabilize,” (Carley et al., 2003) and “understand” (Sageman, 2004) terror networks. | Researchers (ex. Simmel, 1906; Gross, 1980; Geis and Stotland, 1980; Erickson,
1981; Baker and Faulkner, 1993; Klerks, 2001) have conducted analyses of clandestine networks for the past century, however since Sept. 11, 2001 there has been a dramatic increase in the number of publications (ex. Krebs, 2001; Carley et al, 2003, Sageman, 2004) on clandestine networks, specifically terror networks. These recent researchers have chosen SNA to help them "map," (Krebs, 2001) "uncloak," (Krebs, 2002) "identify key players," (Borgatti, 2002) "destabilize," (Carley et al., 2003) and "understand" (Sageman, 2004) terror networks. |
No source given |
|