This book examines two key themes in terrorism studies, the radicalization process and counter-terrorism policies, through the lens of social networks. The book
Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decad
Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures â€" transportation, information and telecommunications systems
Traditionally, resources on terrorism and counterterrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on t