{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:38:17Z","timestamp":1743093497530,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642217401"},{"type":"electronic","value":"9783642217418"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21741-8_41","type":"book-chapter","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T18:43:13Z","timestamp":1309113793000},"page":"384-393","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Behavior in Complex Adaptive Systems: An Overview of ICST\u2019s Research on Competitive Adaptation in Militant Networks"],"prefix":"10.1007","author":[{"given":"John","family":"Horgan","sequence":"first","affiliation":[]},{"given":"Michael","family":"Kenney","sequence":"additional","affiliation":[]},{"given":"Mia","family":"Bloom","sequence":"additional","affiliation":[]},{"given":"Cale","family":"Horne","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Braddock","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Vining","sequence":"additional","affiliation":[]},{"given":"Nicole","family":"Zinni","sequence":"additional","affiliation":[]},{"given":"Kathleen","family":"Carley","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Bigrigg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","unstructured":"Horgan, J.: Interviewing the Terrorists: Reflections on Fieldwork and Implications for Psychological Research. Political Psychology (forthcoming 2011)"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Jackson, B.A., Baker, J.C., Chalk, P., Cragin, K., Parachini, J.V., Trujillo, H.R.: Aptitude for Destruction Volume 1: Organizational Learning in Terrorist Groups and its Implication for Combating Terrorism. RAND, Santa Monica (2005)","DOI":"10.1037\/e654692010-001"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Hamm, M.: Crimes Committed by Terrorist Groups: Theory. Research and Prevention. U.S. Department of Justice, Washington (2005)","DOI":"10.1007\/s12117-005-1023-y"},{"key":"41_CR4","volume-title":"Terrorism as Crime: From Oklahoma City to Al-Qaeda and Beyond","author":"M. Hamm","year":"2007","unstructured":"Hamm, M.: Terrorism as Crime: From Oklahoma City to Al-Qaeda and Beyond. New York University Press, New York (2007)"},{"key":"41_CR5","volume-title":"From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation","author":"M. Kenney","year":"2007","unstructured":"Kenney, M.: From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation. Penn State Press, University Park (2007)"},{"key":"41_CR6","doi-asserted-by":"crossref","DOI":"10.5771\/9781461641711","volume-title":"Radical Islam Rising: Muslim Extremism in the West","author":"Q. Wiktorowicz","year":"2005","unstructured":"Wiktorowicz, Q.: Radical Islam Rising: Muslim Extremism in the West. Rowman & Littlefield, Lanham (2005)"},{"key":"41_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/09546559708427413","volume":"9","author":"J. Horgan","year":"1997","unstructured":"Horgan, J., Taylor, M.: The Provisional Irish Republican Army: Command and Functional Structure. Terrorism and Political Violence\u00a09, 1\u201332 (1997)","journal-title":"Terrorism and Political Violence"},{"key":"41_CR8","volume-title":"Introduction to Social Network Methods","author":"R.A. Hanneman","year":"2005","unstructured":"Hanneman, R.A., Riddle, M.: Introduction to Social Network Methods. University of California Riverside, Riverside (2005)"},{"key":"41_CR9","first-page":"3","volume-title":"Networks In and Around Organizations: Special Issue of Research in the Sociology of Organizations","author":"K.M. Carley","year":"1999","unstructured":"Carley, K.M.: On the Evolution of Social and Organizational Networks. In: Andrews, S.B., Knoke, D. (eds.) Networks In and Around Organizations: Special Issue of Research in the Sociology of Organizations, vol.\u00a016, pp. 3\u201330. JAI Press, Inc., Stamford, Greenwich, CN (1999)"},{"key":"41_CR10","unstructured":"Jackson, B.A., Baker, J.C., Chalk, P., Cragin, K., Parachini, J.V., Trujillo, H.R.: Aptitude for Destruction: Case Studies of Organizational Learning in Five Terrorist Groups, vol. 2. RAND, Santa Monica (2005)"},{"key":"41_CR11","volume-title":"Islamist Terrorism: The British Connections","author":"R. Simcox","year":"2010","unstructured":"Simcox, R., Stuart, H., Ahmed, H.: Islamist Terrorism: The British Connections. The Centre for Social Cohesion, London (2010)"},{"key":"41_CR12","unstructured":"Raymond, C.Z.: Al Muhajiroun and Islam4UK: The group behind the ban. Working paper. International Centre for the Study of Radicalisation and Political Violence (May 2010)"},{"key":"41_CR13","unstructured":"Kenney, M.: Organizational Learning and Islamist Militancy. National Institute of Justice, U.S. Department of Justice, Washington, DC (2009)"},{"key":"41_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/1057610X.2010.508508","volume":"33","author":"M. Kenney","year":"2010","unstructured":"Kenney, M.: \u201cDumb\u201d yet Deadly: Local Knowledge and Poor Tradecraft among Islamist Militants in Britain and Spain. Studies in Conflict and Terrorism\u00a033, 1\u201322 (2010)","journal-title":"Studies in Conflict and Terrorism"},{"key":"41_CR15","doi-asserted-by":"publisher","first-page":"1324","DOI":"10.1016\/j.dss.2006.04.003","volume":"43","author":"K.M. Carley","year":"2007","unstructured":"Carley, K.M., Diesner, J., Reminga, J., Tsvetovat, M.: Toward an Interoperable Dynamic Network Analysis Toolkit. Decision Support Systems\u00a043, 1324\u20131337 (2007)","journal-title":"Decision Support Systems"}],"container-title":["Lecture Notes in Computer Science","Engineering Psychology and Cognitive Ergonomics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21741-8_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T18:39:28Z","timestamp":1741286368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21741-8_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642217401","9783642217418"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21741-8_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}