• Login
    View Item 
    •   Home
    • WODC Repository
    • WODC Publications
    • View Item
    •   Home
    • WODC Repository
    • WODC Publications
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of WODC RepositoryCommunitiesPublication DateAuthorsTitlesKeywordsProjectSeriesThis CollectionPublication DateAuthorsTitlesKeywordsProjectSeries

    My Account

    LoginRegister

    WODC links

    Website WODCWebsite WODC (English)Zoekhulp/Search Help

    Statistics

    Display statistics

    Centraliteitsanalyses van terroristische netwerken

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    volledige-tekst_tcm28-71479.pdf
    Size:
    378.2Kb
    Format:
    PDF
    Download
    Thumbnail
    Name:
    samenvatting_tcm28-71478.pdf
    Size:
    46.61Kb
    Format:
    PDF
    Download
    Thumbnail
    Name:
    summary_tcm28-71480.pdf
    Size:
    34.36Kb
    Format:
    PDF
    Download
    Auteur / Author
    Hamers, H.J.M.
    Husslage, B.G.M.
    Lindelauf, R.H.A.
    Organisatie / Institution
    Universiteit van Tilburg
    Nederlandse Defensie Academie (NLDA)
    WODC
    Serie / Series
    WODC Rapport 1975
    Trefwoorden / Keywords
    Terrorisme
    Effectiviteit en efficiency
    Terroristische groepering
    Misdaadanalyse
    Terrorismebestrijding
    Netwerk
    Sociaal netwerk
    Project
    1975
    URI
    http://hdl.handle.net/20.500.12832/1877
    
    Metadata
    Show full item record
    Titel / Title
    Centraliteitsanalyses van terroristische netwerken
    Samenvatting
    In dit rapport worden de bevindingen gepresenteerd van een literatuurstudie naar kwantitatieve, met name speltheoretische, methoden om belangrijke actoren in terroristische netwerken te identificeren. Daarnaast wordt een tweetal casussen gepresenteerd om toepassing van deze methodologie te illustreren.

    INHOUD: 1. Inleiding 2. Centraliteit en destabilisatie 3. Casus 1: Jemaah Islamiyah in Bali 4. Casus 2: Al Qa'ida en 9/11 5. Conclusies en slotbeschouwing
    Summary
    In this report the researchers focus on identifying important individuals in terrorist networks. First because such individuals pose a threat to Dutch society. Second, due to the scarceness of resources of intelligence and security agencies it is possible to focus only on a limited part of a network.
    Uitgever / Publisher
    Tilburg University
    Publicatiedatum / publication date
    2011
    Collections
    WODC Publications

    entitlement

     
    DSpace software (copyright © 2002 - 2023)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.