the physics arXiv blog
Technology Review Feed - arXiv blog
howdy at arxivblog.com
Mon Jun 22 05:21:37 PDT 2009
[1]the physics arXiv blog
_________________________________________________________________
[2]How terrorists groups resemble manufacturing firms
Posted: 21 Jun 2009 09:10 PM PDT
Terrorist organisations may be best understood as companies whose
principle product is violence, suggests a new study of terror attacks
Understanding how terrorist groups operate is hard, not least because
of a severe lack of information about how they recruit, organise and
plan their activities. So it's no surprise then that working out how
best to stop these organisations is tricky.
Now Aaron Clauset from the Santa Fe Institute in New Mexico and his
pal, Kristian Skrede Gleditsch, say they've found an important new
insight into terrorist activity that could help to solve this problem.
The analysis is based on the one set of reliable data that we do have:
the number and severity of terrorist attacks and rough idea of the
size and age of the groups that carried them out (they've looked at
the data from 1998 to 2005). Clauset and Gledistch say that a simple
analysis of this data shows that the frequency of attacks increases
over time in a pattern that is common to all groups: the time between
attacks plotted against the group's experience decreases according to
a power law.
That can be explained in two ways. First, terrorist groups are born
clumsy and increase their attack rate primarily because their members
learn to be more efficient. In manufacturing industry, this kind of
organisational learning is called learning by doing and is widely
studied.
Second, the terrorist groups are born small and increase their attack
rate by recruiting new, replaceable, members, a process called
organisation growth and is again well studied by economists.
Perhaps economics can help. "In this light, terrorist groups may best
be understood as firms whose principal product is political violence,
and whose production rates depend largely on organizational growth and
the availability of low-skill labor," say Clauset and Gledistch.
That may well be an important insight because it implies that certain
kinds of easily accessible organisations such as non-profit companies
and groups of political activists, might be good models of terrorist
groups from which additional insights can be gained. For example, it
may be possible to determine whether the activity a group is best
reduced by limiting its growth or by disrupting its organisation.
But there is a puzzle in this data, say Clauset and Gledistch. The
severity of terrorist attacks is independent of the size and
experience of the organisation. So contrary to what you might expect,
young and old terrorist groups are equally likely to carry out
extremely severe attacks. "Internal factors seem to play a marginal
role in the severity of any particular attack," say Clauset and
Gledistch.
Here's one explanation. Similar kinds of power laws are common in the
real world: in the size of stock market crashes, the number of deaths
in wars and the severity of forest fires. In these cases, the size of
the conflagration has nothing to do with the size event that triggered
it but everything to do with the network in which the event took
place.
Perhaps the same is true with terrorist attacks: the severity of the
attack has more to do with the properties of the system being attacked
than the organisation doing the attacking.
Ref: [3]arxiv.org/abs/0906.3287: The Developmental Dynamics of
Terrorist Organizations
[4][ISMAP:di]
[5][ISMAP:di]
[6][arXivblog?d=yIl2AUoC8zA] [7][arXivblog?d=dnMXMwOfBR0]
[8][arXivblog?i=7MnzJ1YcE9k:CCprs3blmIE:gIN9vFwOqvQ]
[9][arXivblog?d=7Q72WNTAKBA]
[10][arXivblog?i=7MnzJ1YcE9k:CCprs3blmIE:V_sGLiPBpWU]
[11][arXivblog?d=l6gmwiTKsz0] [12][arXivblog?d=qj6IDK7rITs]
You are subscribed to email updates from [13]Technology Review Feed -
arXiv blog
To stop receiving these emails, you may [14]unsubscribe now. Email
delivery powered by Google
Inbox too full? [15]Add to Google
Google Inc., 20 West Kinzie, Chicago IL USA 60610
References
Visible links
1. http://www.technologyreview.com/
2. http://feedproxy.google.com/~r/arXivblog/~3/7MnzJ1YcE9k/click.phdo
3. http://arxiv.org/abs/0906.3287
4. https://feedads.g.doubleclick.net/~a/IF-y765bnEMq_VKGmS85N7v3Llk/0/da
5. https://feedads.g.doubleclick.net/~a/IF-y765bnEMq_VKGmS85N7v3Llk/1/da
6. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:yIl2AUoC8zA
7. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:dnMXMwOfBR0
8. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:gIN9vFwOqvQ
9. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:7Q72WNTAKBA
10. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:V_sGLiPBpWU
11. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:l6gmwiTKsz0
12. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:qj6IDK7rITs
13. http://www.technologyreview.com/
14. http://feedburner.google.com/fb/a/mailunsubscribe?k=118r9-S4Z0vJg-AkQPASPmDmlGQ
15. http://fusion.google.com/add?source=atgs&feedurl=http://feeds2.feedburner.com/arXivblog
Hidden links:
16. http://fusion.google.com/add?source=atgs&feedurl=http://feeds2.feedburner.com/arXivblog
17. http://ads.pheedo.com/click.phdo?s=cd8a8d490e4f3c4a37c539869bca4129&p=1
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
More information about the cypherpunks-legacy
mailing list