{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T23:24:28Z","timestamp":1769815468481,"version":"3.49.0"},"reference-count":51,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"abstract":"<p>This article arose while working on the rhino poaching problem in South Africa and having to deal with the large number of stakeholders and complexity. The purpose of actor modelling is to develop a deeper understanding of how stakeholders and threats contribute to the complex security problems. This article is the author's reflection on two different attempts at modelling actors in the rhino problem. A framework is developed and a number of issues are raised with respect to actor modelling: First, values and perspectives are driven by actor needs. The knowledge acquired by actors is determined by perspectives. With a diversity of actors, there is a \u201cfragmentation of perspective\u201d that hampers addressing the problem. Thus, dealing with fragmentation of perspective, requires an approach that is inclusive of actors and different ways of knowing. The validity of actor modelling is limited by what can be determined about the values and interests of actors and this varies across actors. Second, actors have multiple identifications with multiple levels of relationality. For high levels of identification combined with low levels of relationality, there is a challenge for a researcher to understand actor behaviour. Third, actors operate in an autonomy-heteronomy space. This is not a continuum, but both autonomy and heteronomy experienced at the same time. When actors are autonomous they live out their values and interests and are most creative. When creativity is applied, there are many ways (what) of satisfying interests and living out values (why), but actors do not behave randomly. Under autonomy, understanding motivation (why) is more important than what because why is more stable and what cannot be predicted. Actors are dynamic, non-deterministic and non-linear. Fourth, the model represents not only structure but also motivation or purpose and resources; thus, addressing certain aspects of subjective and objective fragmentation. Based on the argument advanced in the paper, the sources of actor complexity leading to novel emerging behaviour in social systems are actor needs and the corresponding values and perspectives, high levels of identification with low levels of relationality and autonomy.<\/p>","DOI":"10.4018\/ijsds.2018040101","type":"journal-article","created":{"date-parts":[[2018,3,27]],"date-time":"2018-03-27T18:44:15Z","timestamp":1522176255000},"page":"1-18","source":"Crossref","is-referenced-by-count":1,"title":["Understanding Actors in Complex Security Problems"],"prefix":"10.4018","volume":"9","author":[{"given":"Duarte","family":"Gon\u00e7alves","sequence":"first","affiliation":[{"name":"Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa"}]}],"member":"2432","reference":[{"key":"IJSDS.2018040101-0","author":"R.Ackoff","year":"1974","journal-title":"Redesigning the Futures: A Systems Approach to Societal Problems"},{"key":"IJSDS.2018040101-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2014.07.003"},{"issue":"1","key":"IJSDS.2018040101-2","first-page":"1","article-title":"Accessing hidden and hard-to-reach populations: Snowball research strategies.","volume":"33","author":"R.Atkinson","year":"2001","journal-title":"Social Research Update"},{"key":"IJSDS.2018040101-3","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818305050010"},{"key":"IJSDS.2018040101-4","unstructured":"Beck, D., & Cowan, C. (2002). Spiral Dynamics: Mastering Values, Leadership, and Change: Exploring the New Science of Memetics (5th ed.). Blackwell Publishing."},{"key":"IJSDS.2018040101-5","doi-asserted-by":"crossref","DOI":"10.4324\/9780203995150","author":"D.Bohm","year":"2005","journal-title":"Wholeness and the implicate order"},{"key":"IJSDS.2018040101-6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007068714468"},{"key":"IJSDS.2018040101-7","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.84.1.97"},{"key":"IJSDS.2018040101-8","doi-asserted-by":"crossref","DOI":"10.4324\/9780203012253","author":"P.Cilliers","year":"2002","journal-title":"Complexity and postmodernism: Understanding complex systems"},{"key":"IJSDS.2018040101-9","doi-asserted-by":"publisher","DOI":"10.1177\/0263276405058052"},{"key":"IJSDS.2018040101-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2004.11.001"},{"key":"IJSDS.2018040101-11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1571-9979.2005.00063.x"},{"key":"IJSDS.2018040101-12","doi-asserted-by":"publisher","DOI":"10.2307\/2023177"},{"key":"IJSDS.2018040101-13","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2346.12142"},{"key":"IJSDS.2018040101-14","author":"L.Duncker","year":"2016","journal-title":"A Whole-of-Society approach to Addressing Wildlife Crime in South Africa: KZN Stakeholder and Community Study. Tech. rep"},{"key":"IJSDS.2018040101-15","unstructured":"Emslie, R., Milliken, T., Talukdar, B., Ellis, S., Adcock, K., & Knight, M. (2016). African and Asian Rhinoceroses \u2013 Status, Conservation and Trade. A report from the IUCN Species Survival Commission (IUCN SSC) African and Asian Rhino Specialist Groups and TRAFFIC to the CITES Secretariat pursuant to Resolution Conf. 9.14 (Rev. CoP15). Retrieved from https:\/\/rhinos.org\/wp-content\/uploads\/2016\/09\/E-CoP17-68-A5.pdf"},{"key":"IJSDS.2018040101-16","unstructured":"Everton, S. F. (2009). Network topography, key players and terrorist networks."},{"key":"IJSDS.2018040101-17","doi-asserted-by":"publisher","DOI":"10.1177\/002234338502200205"},{"key":"IJSDS.2018040101-18","doi-asserted-by":"publisher","DOI":"10.1002\/j.2334-5837.2014.00008.x"},{"key":"IJSDS.2018040101-19","article-title":"Dual, use-based definition of \u201csystem\u201d.","author":"D.Gon\u00e7alves","year":"2015","journal-title":"Proceedings of the INCOSE SA Conference 2015"},{"key":"IJSDS.2018040101-20","doi-asserted-by":"publisher","DOI":"10.17159\/2413-3108\/2017\/v0n60a1747"},{"key":"IJSDS.2018040101-21","author":"D.Gon\u00e7alves","year":"2016","journal-title":"A Whole-of-Society Approach to Wildlife Crime in South Africa. Tech. rep"},{"key":"IJSDS.2018040101-22","unstructured":"Graves, C. W. (1970). System Theory of Values."},{"key":"IJSDS.2018040101-23","doi-asserted-by":"publisher","DOI":"10.5465\/AME.2004.12691227"},{"key":"IJSDS.2018040101-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2008.03.040"},{"key":"IJSDS.2018040101-25","doi-asserted-by":"crossref","unstructured":"Hoogervorst, J. (2009). Enterprise governance and enterprise engineering.","DOI":"10.1007\/978-3-540-92671-9"},{"key":"IJSDS.2018040101-26","unstructured":"Hubschle-Finch, A. (2016). A Game of Horns: Transnational Flows of Rhino Horn. In A Game of Horns: Transnational Flows of Rhino Horn."},{"key":"IJSDS.2018040101-27","year":"2013","journal-title":"Criminal Nature: The Global Security Implications of the Illegal Wildlife Trade"},{"key":"IJSDS.2018040101-28","author":"T.Kean","year":"2011","journal-title":"The 9\/11 commission report: Final report of the national commission on terrorist attacks upon the United States"},{"key":"IJSDS.2018040101-29","unstructured":"Kohlberg, L. (1981). The philosophy of moral development: Moral stages and the idea of justice."},{"key":"IJSDS.2018040101-30","unstructured":"Kotze, I. K. (2009). Spiral dynamics: An expression of world views [Ph.D. dissertation]. University of Pretoria."},{"key":"IJSDS.2018040101-31","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199256044.001.0001","author":"B.Latour","year":"2005","journal-title":"Reassembling the social: An introduction to actor-network-theory"},{"key":"IJSDS.2018040101-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolecon.2005.01.014"},{"key":"IJSDS.2018040101-33","doi-asserted-by":"publisher","DOI":"10.1177\/1354066108097553"},{"key":"IJSDS.2018040101-34","article-title":"Proposed model on stakeholder ranking.","author":"A.Mendelow","year":"1991","journal-title":"Second International Conference on Information Systems"},{"key":"IJSDS.2018040101-35","author":"H.Mintzberg","year":"1989","journal-title":"Mintzberg on management: Inside our strange world of organizations"},{"issue":"4","key":"IJSDS.2018040101-36","doi-asserted-by":"crossref","first-page":"853","DOI":"10.2307\/259247","article-title":"Toward a theory of stakeholder identification and salience: Defining the principle of who and what really counts.","volume":"22","author":"R. K.Mitchell","year":"1997","journal-title":"Academy of Management Review"},{"key":"IJSDS.2018040101-37","doi-asserted-by":"publisher","DOI":"10.1080\/02604027.2013.803349"},{"key":"IJSDS.2018040101-38","author":"E.Morin","year":"2007","journal-title":"Restricted complexity, general complexity. In Worldviews, science and us: Philosophy and complexity"},{"key":"IJSDS.2018040101-39","author":"E.Morin","year":"2008","journal-title":"On complexity"},{"key":"IJSDS.2018040101-40","doi-asserted-by":"publisher","DOI":"10.2307\/2183914"},{"issue":"1","key":"IJSDS.2018040101-41","doi-asserted-by":"crossref","first-page":"19","DOI":"10.22545\/2010\/0009","article-title":"Methodology of Transdisciplinarity \u2013 Levels of Reality, Logic of the Included Middle and Complexity.","volume":"1","author":"B.Nicolescu","year":"2010","journal-title":"Transdisciplinary Journal of Engineering & Science"},{"key":"IJSDS.2018040101-42","unstructured":"Nietzsche, F. W., Kaufmann, W. A., & Hollingdale, R. J. (1967). The Will to Power [by] Friedrich Nietzsche. A New Translation by Walter Kaufmann and RJ Hollingdale. Edited, with Commentary, by Walter Kaufmann, with Facsims. of the Original Manuscript. New York: Random House."},{"key":"IJSDS.2018040101-43","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1999.1020"},{"key":"IJSDS.2018040101-44","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.55.1.68"},{"key":"IJSDS.2018040101-45","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.2006.00420.x"},{"key":"IJSDS.2018040101-46","doi-asserted-by":"publisher","DOI":"10.1086\/686221"},{"key":"IJSDS.2018040101-47","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-9521-1_17"},{"key":"IJSDS.2018040101-48","doi-asserted-by":"crossref","DOI":"10.1201\/b12457","author":"K. J.Vicente","year":"1999","journal-title":"Cognitive work analysis: Toward safe, productive, and healthy computer-based work"},{"key":"IJSDS.2018040101-49","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1743(199905\/06)16:3<221::AID-SRES245>3.0.CO;2-G"},{"key":"IJSDS.2018040101-50","author":"K.Wilber","year":"2007","journal-title":"Integral spirituality"}],"container-title":["International Journal of Strategic Decision Sciences"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=203634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T11:04:38Z","timestamp":1719918278000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSDS.2018040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,4,1]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijsds.2018040101","relation":{},"ISSN":["1947-8569","1947-8577"],"issn-type":[{"value":"1947-8569","type":"print"},{"value":"1947-8577","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,1]]}}}