Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

On the centrality analysis of covert networks using games with externalities

Abstract

The identification of the most potentially hazardous agents in a terrorist organisation helps to prevent further attacks by effectively allocating surveillance resources and destabilising the covert network to which they belong. In this paper, several mechanisms for the overall ranking of covert networks members in a general framework are addressed based on their contribution to the overall relative effectiveness in the event of a merger. In addition, the possible organisation of agents outside of each possible merger naturally influences their relative effectiveness score, which motivates the innovative use of games in partition function form and specific ranking indices for individuals. Finally, we apply these methods to analyse the effectiveness of the hijackers of the covert network supporting the 9/11 attacksThis work is part of the R+D+I project grants MTM2017-87197-C3-3-P and PID2021-124030NB-C32, funded byMCIN/AEI/10.13039/501100011033/ and by “ERDF A way of making Europe”/EU. This research was also funded by Grupos de Referencia Competitiva ED431C-2021/24 from the Consellería de Cultura, Educación e Universidades, Xunta de Galicia.S

Similar works

Full text

thumbnail-image

Repositorio Institucional da Universidade de Santiago de Compostela

redirect
Last time updated on 30/06/2023

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.