INFORMAZIONI SU QUESTO ARTICOLO

Cita

Abuza, Z. (2003). Militant Islam in Southeast Asia: Crucible of Terror. Boulder, CO: Lynne Reinner Publishers.10.1515/9781685851200Search in Google Scholar

Anonymous (2009). “Deception 2.0: Deceiving in the Netwar Age.” Unpublished Paper. Task Force Iron, Iraq.Search in Google Scholar

Arreguin-Toft, I. (2001). “How the Weak Win Wars: A Theory of Asymmetric Conflict.” International Security 26, 1: 93-128.10.1162/016228801753212868Search in Google Scholar

Arreguin-Toft, I. (2005). How the Weak Win Wars: A Theory of Asymmetric Conflict. Cambridge, UK: Cambridge University Press.10.1017/CBO9780511521645Search in Google Scholar

Asal, V., & Rethemeyer, R. K. (2006). “Researching Terrorist Networks.” Journal of Security Education 1, 4: 65-74.10.1300/J460v01n04_06Search in Google Scholar

Asal, V., & Rethemeyer, R. K. (2008). “The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks.” The Journal of Politics 70, 2: 437-449.10.1017/S0022381608080419Search in Google Scholar

Azarian, G. R. (2005). The General Sociology of Harrison C. White: Chaos and Order in Networks. New York: Palgrave Macmillan.10.1057/9780230596719Search in Google Scholar

Baker, W. E., & Faulkner, R. R. (1993). The Social-Organization of Conspiracy: Illegal Networks in the Heavy Electrical-Equipment Industry. American Sociological Review 58, 6: 837-860.Search in Google Scholar

Banlaoi, R. C. (2009). Counter Terrorism Measures in Southeast Asia: How Effective Are They? Manilla, Philippines: Yuchengco Center: De La Salle University.Search in Google Scholar

Batagelj, V., & Mrvar, A. (2010). Pajek 1.27. Lubjlijana, Slovenia: University of Ljubljana.Search in Google Scholar

Borgatti, S. P. (2006). “Identifying Sets of Key Players in a Social Network.” Computational, Mathematical and Organizational Theory 12: 21-34.Search in Google Scholar

Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). “On the Robustness of Centrality Measures under Conditions of Imperfect Data.” Social Networks 28: 124-136.Search in Google Scholar

Boucek, C. (2008a). “The Sakinah Campaign and Internet Counter-Radicalization in Saudi Arabia.” CTC Sentinel 1, 9: 1-4. Available: http://carnegieendowment.org/files/CTCSentinelVol1Iss9.pdf [January 5, 2011].Search in Google Scholar

Boucek, C. (2008b). “Saudi Arabia’s ‘Soft’ Counterterrorism Strategy: Prevention, Rehabilitation, and Aftercare.” Carnegie Papers, No. 97. Available: http://carnegieendowment.org/files/cp97boucek saudi final.pdf[January 5, 2011].Search in Google Scholar

Breiger, R. L. (1975). “Dual and Multiple Networks of Social Structures: A Study of Affiliation and Interaction.” Unpublished Doctoral Dissertation, Harvard University, Boston.Search in Google Scholar

Brimley, S., & Singh, V. (2008). “Stumbling into the Future? The Indirect Approach and American Strategy.” Orbis 52, 2: 312-331.10.1016/j.orbis.2008.01.009Search in Google Scholar

Cooper, H. (2009). “Dreaming of Splitting the Taliban.” The New York Times. Available: http://www.nvtimes.com/2009/03/08/weekinreview/08COOPER.html? r=1 [January 5, 2011].Search in Google Scholar

Davis, L. E., & Sisson, M. W. (2009). A Strategic Planning Approach: Defining Alternative Counterterrorism Strategies as an Illustration. Santa Monica, CA: RAND Corporation.Search in Google Scholar

de Nooy, W., Mrvar, A., & Batagelj, V. (2005). Exploratory Social Network Analysis with Pajek. Cambridge, UK: Cambridge University Press.10.1017/CBO9780511806452Search in Google Scholar

Diani, M., & McAdam, D. (Eds.). (2003). Social Movements and Networks: Relational Approaches to Collective Action. Oxford and New York: Oxford University Press.10.1093/0199251789.001.0001Search in Google Scholar

Doreian, P., Batagelj, V., & Ferligoj, A. (2005). Generalized Blockmodeling. New York and Cambridge: Cambridge University Press.Search in Google Scholar

Ettlinger, N., & Bosco, F. (2004). “Thinking through Networks and their Spatiality: A Critique of the U.S. (Public) War on Terrorism and its Geographic Discourse.” Antipode 36, 2: 249-271.10.1111/j.1467-8330.2004.00405.xSearch in Google Scholar

Everton, S. F. (Forthcoming). “Network Topography, Key Players and Terrorist Networks.” Connections.Search in Google Scholar

Felter, J., & Fishman, B. (2007). “Al-Qa’ida’s Foreign Fighters in Iraq: A First Look at the Sinjar Records.” Available: http://www.ctc.usma.edu/harmony/pdf/CTCForeignFighter.19.Dec07.pdf [January 5, 2011].Search in Google Scholar

Fink, N. C., & Hearne, E. B. (2008). “Beyond Terrorism: Deradicalization and Disengagement from Violent Extremism.” Available: http://www.ipacademy.org/media/pdf/publications/beter.pdf [January 5, 2011].Search in Google Scholar

Flynn, M. T., Pottinger, M., & Batchelor, P. D. (2010). Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan. Washington DC: Center for a New American Security.Search in Google Scholar

Fridovich, D. P., & Krawchuk, F. T. (2007). “Special Operations Forces: Indirect Approach.” Joint Forces Quarterly 44, 1: 24-27.Search in Google Scholar

Granovetter, M. (1973). “The Strength of Weak Ties.” American Journal of Sociology 73, 6: 13601380.Search in Google Scholar

Horgan, J. (2009). Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements. New York: Routledge.10.4324/9780203874738Search in Google Scholar

International Crisis Group (2006). Terrorism in Indonesia: Noordin’s Networks (No. Asia Report #114). Brussels, Belgium: International Crisis Group.Search in Google Scholar

International Crisis Group (2008). Indonesia: Jemaah Islamiyah’s Publishing Industry. Brussels, Belgium: International Crisis Group.Search in Google Scholar

Jones, S. G., & Libicki, M. C. (2008). How Terrorist Groups End: Lessons for Countering al Qa’ida. Santa Monica, CA: RAND Corporation.Search in Google Scholar

Jordan, J., Mañas, F. M., & Horsburgh, N. (2008). “Strengths and Weaknesses of Grassroot Jihadist Networks: The Madrid Bombings.” Studies in Conflict & Terrorism 31: 17-21.Search in Google Scholar

Keefe, P. (2006). “Can Network Theory Thwart Terrorists?” The New York Times. Available: http://www.nvtimes.com/2006/0.3/12/magazine/.312wwlnessay.html [January 5, 2011].Search in Google Scholar

Krawchuk, F. T. (ND). “Winning the Global War on Terrorism in the Pacific Region: Special Operations Forces’ Indirect Approach to Success.” Available: http://igcc.ucsd.edu/research/security/DACOR/presentations/krawchuk.pdf [January 5, 2011].Search in Google Scholar

Krebs, V. (2001). “Mapping Networks of Terrorist Cells.” Connections 24, 3: 43-52.Search in Google Scholar

Lempert, R. J., Trujillo, H. R., Aaron, D., Dewar, J. A., Berry, S. H., & Popper, S. W. (2008). “Comparing Alternative U.S. Counterterrorism Strategies: Can Assumption-Based Planning Help Elevate the Debate?” Available: http://www.rand.org/pubs/documented briefings/2008/RAND DB548.pdf [January 5, 2011; large document].Search in Google Scholar

Lum, C., Kennedy, L. W., & Sherley, A. J. (2006). The Effectiveness of Counter-Terrorism Strategies. Campbell Systematic Reviews 2006, 2: 51. Available: http://www.rutgerscps.org/publications/Lum Terrorism Review.pdf [January 5, 2011].Search in Google Scholar

Lum, T., & Niksch, L. A. (2006; updated 2009). “The Republic of the Philippines: Background and U.S. Relations: Congressional Research Service Report to Congress.” Available: http://www.fas.org/sgp/crs/row/RL33233.pdf [January 5, 2011].Search in Google Scholar

Magouirk, J., Atran, S., & Sageman, M. (2008). “Connecting Terrorist Networks.” Studies in Conflict & Terrorism 31: 1-16.Search in Google Scholar

Marks, S., Meer, T., & Nilson, M. (2005). “Manhunting: A Methodology for Finding Persons of National Interest.” Unpublished Master of Science, Naval Postgraduate School, Monterey, CA.Search in Google Scholar

McAdam, D. (1982). Political Process and the Development of Black Insurgency, 1930-1970. Chicago: University of Chicago Press.Search in Google Scholar

McAdam, D. (1999). Political Process and the Development of Black Insurgency, 1930-1970 (2nd ed.). Chicago: University of Chicago Press.10.7208/chicago/9780226555553.001.0001Search in Google Scholar

McCarthy, J. D., & Zald, M. N. (1977). “Resource Mobilization and Social Movements: A Partial Theory.” American Journal of Sociology 82, 6: 1212-1241.10.1086/226464Search in Google Scholar

Moody, J. (2005). Fighting a Hydra: A Note on the Network Embeddedness of the War on Terror. Structure and Dynamics 1, 2. Available: http://escholarship.org/uc/item/7x.3881bs [January 5, 2011].Search in Google Scholar

Moon, I.-C. (2008). “Destabilization of Adversarial Organizations with Strategic Interventions.” Unpublished Doctoral Thesis, Carnegie Mellon University, Pittsburgh, PA. Available: http://www.casos.cs.cmu.edu/publications/papers/CMU-ISR-08-124.pdf [January 5, 2011].Search in Google Scholar

Mortenson, G., & Bryan, M. (2009). Stones into Schools: Promoting Peace with Books, Not Bombs, in Afghanistan and Pakistan. New York: Viking.Search in Google Scholar

Mortenson, G., & Relin, D. O. (2006). Three Cups of Tea: One Man’s Mission to Fight Terrorism and Build Nations... One School at a Time. New York: Viking.Search in Google Scholar

Pedahzur, A., & Perliger, A. (2006). “The Changing Nature of Suicide Attacks: A Social Network Perspective.” Social Forces 84, 4: 1987-2008.10.1353/sof.2006.0104Search in Google Scholar

Peter, T. A. (2008). “U.S. Begins Hunting Iraq’s Bombmakers, Not Just Bombs.” The Christian Science Monitor. Available: http://www.csmonitor.com/2008/0908/p04s01-wome.html [January 5, 2011].Search in Google Scholar

Popielarz, P. A., & McPherson, J. M. (1995). “On the Edge or in Between: Niche Position, Niche Overlap, and the Duration of Voluntary Association Memberships.” American Journal of Sociology 101, 3: 698-720.10.1086/230757Search in Google Scholar

Raab, J., & Milward, H. B. (2003). “Dark Networks as Problems.” Journal of Public Administration Research and Theory 13, 4: 413-439.10.1093/jopart/mug029Search in Google Scholar

Rabasa, A. (2005). “Islamic Education in Southeast Asia.” In H. Fradkin, H. Haqqani & E. Brown (Eds.), Current Trends in Islamist Ideology (pp. 97-108). Washington, D.C.: Hudson Institute.Search in Google Scholar

Ramakrishna, K. (2005). “Delegitimizing Global Jihadi Ideology in Southeast Asia.” Contemporary Southeast Asia 27, 3: 343-369.10.1355/CS27-3ASearch in Google Scholar

Rodriguez, J. A. (2005). The March 11th Terrorist Network: In Its Weakness Lies Its Strength.Search in Google Scholar

Barcelona, Spain: Departament de Sociologia i Anàlisi de les Organitzacions: Universitat de Barcelona.Search in Google Scholar

Sageman, M. (2004). Understanding Terror Networks. Philadelphia, PA: University of Pennsylvania Press.10.9783/9780812206791Search in Google Scholar

Schmitt, E., & Perlez, J. (2009). “Strikes Worsen Qaeda Threat, Pakistan Says.” The New York Times. Available: http://www.rņytiffiθŞ.com/2009/02/25/woŗld/aşia/25dŗoņeş.html?şç2=1&şq=Şçhmitt%20aņd%20Pe rlez.%202009&st=cse [January 5, 2011].Search in Google Scholar

Simmel, G. ([1908, 1922] 1955). Conflict & The Web of Group-Affiliations (K. H. Wolff & R. Bendix, Trans.). New York: The Free Press.Search in Google Scholar

Smith, C. S. (1991). The Emergence of Liberation Theology: Radical Religion and Social Movement Theory. Chicago: University of Chicago Press.Search in Google Scholar

Smith, C. S. (1996). Resisting Reagan: The U.S. Central America Peace Movement. Chicago: The University of Chicago Press.10.7208/chicago/9780226763330.001.0001Search in Google Scholar

Sparrow, M. K. (1991). “The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects.” Social Networks 13: 251-274.Search in Google Scholar

Stark, R., & Bainbridge, W. S. (1980). “Networks of Faith: Interpersonal Bonds and Recruitment to Cults and Sects.” American Journal of Sociology 85, 6: 1376-1395.10.1086/227169Search in Google Scholar

Tsvetovat, M., & Carley, K. M. (2005). “Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence.” Journal of Social Structure 6, 2. Available: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCariey/index.html [January 5, 2011].Search in Google Scholar

U.S. Army (2007). U.S. Army/Marine Counterinsurgency Field Manual (FM 3-24). Old Saybrook, CT: Konecky & Konecky.Search in Google Scholar

U.S. Director of Operations (2006). Information Operations: Joint Publication 3-13. Available: http://www.fas.org/irp/doddir/dod/jp3 13.pdf [January 5, 2011].Search in Google Scholar

U.S. Special Operations Command (2003). Doctrine for Joint Psychological Operations: Joint Publication 3-53. Available: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/02 psyop-jp-3-53.pdf [January 5, 2011].Search in Google Scholar

van Meter, K. M. (2001). “Terrorists/Liberators: Researching and Dealing with Adversary Social Networks.” Connections 3: 66-78.Search in Google Scholar

White, H. C. (2008). Identity and Control: How Social Formations Emerge (2nd ed.). Princeton, NJ: Princeton University Press.Search in Google Scholar

Wikipedia (2010). “Noordin Mohammed Top.” Available: http://en.wikipedia.org/wiki/Noordin Mohammad Top [January 5, 2011].Search in Google Scholar

Wiktorowicz, Q. (2004). “Introduction: Islamic Activism and Social Movement Theory.” In Q.Search in Google Scholar

Wiktorowicz (Ed.), Islamic Activism: A Social Movement Theory Approach (pp. 1-33). Bloomington: Indiana University Press.Search in Google Scholar

Wilson, G. (2006). “Anatomy of a Successful COIN Operation: OEF-Philippines and the Indirect Approach.” Military Review (November-December): 2-12. Available: http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview 2008CRII0831 art 009.pdf [January 5, 2011].Search in Google Scholar

eISSN:
1529-1227
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Social Sciences, other