SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Weiss LG, Briscoe E, Whitaker E, Trewhitt E, Hayes H, Horgan J. Int. J. Intel. Defen. Supp. Syst. 2012; 5(1): 4.

Copyright

(Copyright © 2012, Inderscience Publishers)

DOI

10.1504/IJIDSS.2012.053676

PMID

unavailable

Abstract

Modelling behaviour related to the perpetration of improvised explosive devices is extremely complex. Behavioural aspects range from those who create a plan to those who gather supplies for developing the devices to those who passively look the other way. Developing computational approaches to understanding such behaviour necessitates either a decomposition of behavioural activity into smaller, manageable behaviours or generalising larger, group behaviour where gross trends are observed. This may suffice for particular applications; however, additional consideration can be given to developing more comprehensive approaches. Specifically, for those seeking to understand terrorism, a number of social, cultural and behavioural perspectives are being developed by experts worldwide. These perspectives may complement each other or they may be in conflict, but they equally contribute to a broader understanding. Our research is developing computational methods to analyse and experiment with differing views and perspectives of potential influences on adversarial behaviour at this system-level.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print