位置:成果数据库 > 期刊 > 期刊详情页
社会网络分析在恐怖袭击风险控制中的应用
  • ISSN号:1009-6094
  • 期刊名称:《安全与环境学报》
  • 时间:0
  • 分类:X913.4[环境科学与工程—安全科学]
  • 作者机构:[1]北京市劳动保护科学研究所,北京100054, [2]南开大学城市公共安全中心,天津300071, [3]北京理工大学爆炸科学与技术国家重点实验室,北京100081, [4]军事经济学院勤务指挥系,武汉430223
  • 相关基金:“十一五”课题科技支撑计划课题(2006BAK08B01);863课题(2006AA01Z336)
中文摘要:

针对恐怖袭击风险控制的问题,提出运用社会网络分析对恐怖袭击风险进行控制的方法。首先根据社会网络与恐怖组织之间的相似性,运用社会网路分析技术对恐怖组织网络进行建模,构建恐怖组织的社会网络原型;然后运用有序集理论,计算抓捕一定数量的恐怖分子后整个恐怖组织被破坏的概率。研究表明,在完全二叉树的恐怖组织网络巾,控制恐怖组织一半以上的成员,就可以达到削弱恐怖组织的攻击能力的目的。

英文摘要:

This paper is engaged in the study of the terrorist risk contrel in the minimum input way by using social network analysis and the mathematics method order set. In proceeding with our study, first of all, based on the characteristic analysis of the terrorist organization, attempt is made to disclose the similarity between the general social networks and the terrorist organizations, and, then, we have tried to apply the social network analysis technology to the study the model of the terrorist organizations by creating the prototype of terrorist organization network in three steps: firstly, determine the terrorist organization network nodes; secondly, determine the mutual relations among the network nodes; and, thirdly, collect and process the data collected. Of the three steps, the third step is the most complicated one, because most nodes and their mutual relations, the most data needed, as well as the data to be adopted seem often to be incomplete, which is likely to lead to unsuccessful analysis of the whole investigation. Therefore, it is also necessary to prepare a high-quality database, including the timely information of the terrorist activities and the corresponding pages indicating the ever-changing situation of their activities. Secondly, with the terrorist organization network at hand, the terrorist organization can be analyzed quantitatively by using the mathematics method ordered set. In our practice, we have tested the ordered set analysis for the terrorist organization network, trying to find all the lines (great chin) between the leader node and the terminal node so as to destroy it. The set in which the nodes are related to every great chin is professionally known as cutest. The probability can be worked out when the terrorist network was destrayed by arresting some terrorists by using it. In this paper, we have also provided the cut set calculating method of the complete binary tree terrorist network. Thus, it can be concluded that if half or more of the terrorists can be found, the capabi

同期刊论文项目
同项目期刊论文
期刊信息
  • 《安全与环境学报》
  • 北大核心期刊(2011版)
  • 主管单位:中国兵器工业集团公司
  • 主办单位:北京理工大学 中国环境科学学会 中国职业安全健康协会
  • 主编:冯长根
  • 地址:北京市海淀区中关村南大街5号
  • 邮编:100081
  • 邮箱:aqyhjxb@263.net;aqyhjxb@wuma.com.cn
  • 电话:010-68913997
  • 国际标准刊号:ISSN:1009-6094
  • 国内统一刊号:ISSN:11-4537/X
  • 邮发代号:2-770
  • 获奖情况:
  • 获首届《CAJ-CD》执行优秀期刊奖,中国科技论文统计源期刊
  • 国内外数据库收录:
  • 美国化学文摘(网络版),中国中国科技核心期刊,中国北大核心期刊(2008版),中国北大核心期刊(2011版),中国北大核心期刊(2014版)
  • 被引量:17182