{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:24:37Z","timestamp":1725467077178},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T00:00:00Z","timestamp":1379548800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s10479-013-1444-y","type":"journal-article","created":{"date-parts":[[2013,9,18]],"date-time":"2013-09-18T10:17:40Z","timestamp":1379499460000},"page":"17-35","source":"Crossref","is-referenced-by-count":3,"title":["The \u201csix-element\u201d analysis method for the research on the characteristics of terrorist activities"],"prefix":"10.1007","volume":"234","author":[{"given":"Julei","family":"Fu","sequence":"first","affiliation":[]},{"given":"Duoyong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Shouyang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,19]]},"reference":[{"issue":"3","key":"1444_CR1","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1016\/j.dss.2011.02.014","volume":"51","author":"E. M. Airoldi","year":"2011","unstructured":"Airoldi, E. M., Bai, X., & Carley, K. M. (2011). Network sampling and classification: an investigation of network model representations. Decision Support Systems, 51(3), 506\u2013518.","journal-title":"Decision Support Systems"},{"issue":"6794","key":"1444_CR2","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R. Albert","year":"2000","unstructured":"Albert, R., Jeong, H., & Barab\u00e1si, A. L. (2000). Error and attack tolerance of complex networks. Nature, 406(6794), 378\u2013382.","journal-title":"Nature"},{"key":"1444_CR3","volume-title":"Conference of the North American association for computational social and organizational science","author":"A. Basu","year":"2005","unstructured":"Basu, A. (2005). Social network analysis of terrorist organizations in India. In Conference of the North American association for computational social and organizational science."},{"issue":"1","key":"1444_CR4","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s10479-010-0833-8","volume":"186","author":"V. M. Bier","year":"2011","unstructured":"Bier, V. M., & Hausken, K. (2011). Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures. Annals of Operations Research, 186(1), 39\u201359.","journal-title":"Annals of Operations Research"},{"issue":"5939","key":"1444_CR5","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1126\/science.325_409","volume":"325","author":"J. Bohannon","year":"2009","unstructured":"Bohannon, J. (2009a). Counterterrorism\u2019s new tool: \u2018metanetwork\u2019 analysis. Science, 325(5939), 409.","journal-title":"Science"},{"issue":"5939","key":"1444_CR6","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1126\/science.325_410","volume":"325","author":"J. Bohannon","year":"2009","unstructured":"Bohannon, J. (2009b). Investigating networks: the dark side. Science, 325(5939), 410\u2013411.","journal-title":"Science"},{"key":"1444_CR7","volume-title":"Ucinet for windows: software for social network analysis","author":"S. P. Borgatti","year":"2002","unstructured":"Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). Ucinet for windows: software for social network analysis. Harvard: Analytic Technologies."},{"issue":"2","key":"1444_CR8","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.socnet.2005.05.001","volume":"28","author":"S. P. Borgatti","year":"2006","unstructured":"Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). On the robustness of centrality measures under conditions of imperfect data. Social Networks, 28(2), 124\u2013136.","journal-title":"Social Networks"},{"issue":"5916","key":"1444_CR9","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1126\/science.1165821","volume":"323","author":"S. P. Borgatti","year":"2009","unstructured":"Borgatti, S. P., Mehra, A., Brass, D. J., & Labianca, G. (2009). Network analysis in the social sciences. Science, 323(5916), 892\u2013895.","journal-title":"Science"},{"key":"1444_CR10","unstructured":"Carley, K. M., & Dereno, M. (2011). ORA: organization risk analyzer, ORA user\u2019s guide (Technical Report). Carnegie Mellon University, School of Computer Science, Institute for Software Research."},{"issue":"3","key":"1444_CR11","first-page":"79","volume":"24","author":"K. M. Carley","year":"2002","unstructured":"Carley, K. M., Lee, J., & Krackhardt, D. (2002). Destabilizing terrorist networks. Connections, 24(3), 79\u201392.","journal-title":"Connections"},{"issue":"4","key":"1444_CR12","doi-asserted-by":"crossref","first-page":"1324","DOI":"10.1016\/j.dss.2006.04.003","volume":"43","author":"K. M. Carley","year":"2006","unstructured":"Carley, K. M., Diesner, J., & Reminga, J. (2006). Toward an interoperable dynamic analysis toolkit. Decision Support Systems, 43(4), 1324\u20131347.","journal-title":"Decision Support Systems"},{"key":"1444_CR13","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511811395","volume-title":"Models and methods in social network analysis","author":"P. J. Carrington","year":"2005","unstructured":"Carrington, P. J., Scott, J., & Wasserman, S. (2005). Models and methods in social network analysis. New York: Cambridge University Press."},{"issue":"8","key":"1444_CR14","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1002\/asi.20838","volume":"59","author":"H. Chen","year":"2008","unstructured":"Chen, H., Chung, W., & Qin, J. (2008). Uncovering the dark Web: a case study of Jihad on the web. Journal of the American Society for Information Science and Technology, 59(8), 1347\u20131359.","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"3","key":"1444_CR15","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.socnet.2008.03.001","volume":"30","author":"G. B. Davis","year":"2008","unstructured":"Davis, G. B., & Carley, K. M. (2008). Clearing the FOG: fuzzy, overlapping groups for social networks. Social Networks, 30(3), 201\u2013212.","journal-title":"Social Networks"},{"issue":"3","key":"1444_CR16","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L. C. Freeman","year":"1979","unstructured":"Freeman, L. C. (1979). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215\u2013239.","journal-title":"Social Networks"},{"issue":"1","key":"1444_CR17","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s10479-007-0247-4","volume":"158","author":"D. G\u00f3mez","year":"2008","unstructured":"G\u00f3mez, D., Gonz\u00e1lez\u2013Arang\u00fcena, E., Manuel, C., Owen, G., del Pozo, M., & Saboy\u00e1, M. (2008). The cohesiveness of subgroups in social networks: a view from game theory. Annals of Operations Research, 158(1), 33\u201346.","journal-title":"Annals of Operations Research"},{"issue":"3","key":"1444_CR18","first-page":"43","volume":"24","author":"V. E. Krebs","year":"2002","unstructured":"Krebs, V. E. (2002). Mapping networks of terrorist cells. Connections, 24(3), 43\u201352.","journal-title":"Connections"},{"issue":"1","key":"1444_CR19","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s10479-006-0087-7","volume":"148","author":"K. L. Lee","year":"2006","unstructured":"Lee, K. L., Maheshwary, S., Mason, J., & Glisson, W. (2006). Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks. Annals of Operations Research, 148(1), 25\u201353.","journal-title":"Annals of Operations Research"},{"key":"1444_CR20","volume-title":"Countering the new terrorism","author":"I. O. Lesser","year":"1999","unstructured":"Lesser, I. O., Hoffman, B., & Arquilla, J. (1999). Countering the new terrorism. Santa Monica: Rand Corporation."},{"key":"1444_CR21","volume-title":"The third session of the international forum on crime and criminal law in the global ear","author":"Z. J. Li","year":"2011","unstructured":"Li, Z. J. (2011). The terrorism threat faced by China and a preview on security situation. In The third session of the international forum on crime and criminal law in the global ear, Beijing."},{"key":"1444_CR22","volume-title":"Lectures on whole network approach: a practical guide to UCINET","author":"J. Liu","year":"2009","unstructured":"Liu, J. (2009). Lectures on whole network approach: a practical guide to UCINET. Shanghai: Shanghai People\u2019s Publishing House."},{"key":"1444_CR23","first-page":"206","volume-title":"AICCSA 08-6th IEEE\/ACS international conference on computer systems and applications","author":"N. Memon","year":"2008","unstructured":"Memon, N., Harkiolakis, N., & Hicks, D. L. (2008). Detecting high-value individuals in covert networks: 7\/7 London bombing case study. In AICCSA 08-6th IEEE\/ACS international conference on computer systems and applications (pp. 206\u2013215)."},{"key":"1444_CR24","volume-title":"SIAM international conference on data mining workshop on link analysis counterterrorism and security","author":"I. C. Moon","year":"2008","unstructured":"Moon, I. C., Carley, K. M., & Levis, A. H. (2008). Vulnerability assessment on adversarial organization: unifying command and control structure analysis and social network analysis. In SIAM international conference on data mining workshop on link analysis counterterrorism and security."},{"issue":"1","key":"1444_CR25","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.socnet.2006.05.001","volume":"29","author":"C. Morselli","year":"2007","unstructured":"Morselli, C., Giguere, C., & Petit, K. (2007). The efficiency\/security trade-off in criminal networks. Social Networks, 29(1), 143\u2013153.","journal-title":"Social Networks"},{"issue":"5980","key":"1444_CR26","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1126\/science.1184819","volume":"328","author":"P. J. Mucha","year":"2010","unstructured":"Mucha, P. J., Richardson, T., Macon, K., Porter, M. A., & Onnela, J. P. (2010). Community structure in time-dependent, multiscale, and multiplex networks. Science, 328(5980), 876\u2013878.","journal-title":"Science"},{"key":"1444_CR27","volume-title":"Proc. XXV international sunbelt conference","author":"J. A. Rodr\u00edguez","year":"2005","unstructured":"Rodr\u00edguez, J. A. (2005). The March 11th terrorist network: in its weakness lies its strength. In Proc. XXV international sunbelt conference, Los Angeles."},{"key":"1444_CR28","doi-asserted-by":"crossref","DOI":"10.9783\/9780812206791","volume-title":"Understanding terror networks","author":"M. Sageman","year":"2004","unstructured":"Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press."},{"key":"1444_CR29","unstructured":"Tsvetovat, M., & Carley, K. M. (2005). Structural knowledge and success of anti-terrorist activity: the downside of structural equivalence. Journal of Social Structure, 6."},{"key":"1444_CR30","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S., & Faust, K. (1994). Social network analysis: methods and applications. Cambridge: Cambridge University Press."},{"issue":"2","key":"1444_CR31","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/1059981.1059984","volume":"23","author":"J. J. Xu","year":"2005","unstructured":"Xu, J. J., & Chen, H. (2005). CrimeNet explorer: a framework for criminal network knowledge discovery. ACM Transactions on Information Systems, 23(2), 201\u2013226.","journal-title":"ACM Transactions on Information Systems"},{"key":"1444_CR32","volume-title":"The third session of the international forum on crime and criminal law in the global ear","author":"X. Y. Zheng","year":"2011","unstructured":"Zheng, X. Y. (2011). The basic situation and strategic measures of counter-terrorism in China. In The third session of the international forum on crime and criminal law in the global ear, Beijing."}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-013-1444-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-013-1444-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-013-1444-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:09:44Z","timestamp":1559138984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-013-1444-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,19]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["1444"],"URL":"https:\/\/doi.org\/10.1007\/s10479-013-1444-y","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,19]]}}}