Abstract
In this paper, we focus on computational modeling of adversarial activities and asymmetric warfare in a tactical setting. As a topic for simulation study, asymmetric warfare is an odd and ill-conditioned problem. Empirical data is scarce or one-sided, while the subject itself presents a constantly adapting and moving target that makes it a strategic priority to conceal its inner workings from the observers.
To provide an insight into the dynamics of the asymmetric conflicts, one needs to constrain the model in rigorous social-scientific concepts, including those of organization theory, theory of collective action, and social network analysis.
Our model, called NetMason, enables controlled experiments to replicate and analyze alternative policies of disruption of activities of terrorist organizations. In addition, sensitivity analysis with respect to behavioral assumptions can be easily performed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Canuto, A.M.P., Campos, A.M.C., Santos, A.M., Moura, E.C.M., Santos, E.B., Soares, R.G., Dantas, K.A.A.: Simulating working environments through the use of personality-based agents. In: Sichman, J.S., Coelho, H., Rezende, S.O. (eds.) IBERAMIA 2006 and SBIA 2006. LNCS, vol. 4140, pp. 108–117. Springer, Heidelberg (2006)
Carley, K.M.: Smart agents and organizations of the future. In: Lievrouw, L., Livingstone, S. (eds.) The Handbook of New Media, ch. 12, pp. 206–220. Sage, Thousand Oaks (2002)
Carley, K.M.: Dynamic network analysis. In: Breiger, K.C.R., Pattison, P. (eds.) Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, pp. 361–370. Committee on Human Factors, National Research Council (2003)
Carley, K.M., Reminga, J.: Ora: Organization risk analyzer. Technical Report Technical Report CMU-ISRI-04-101, Carnegie Mellon University, School of Computer Science, Institute for Software Research International (2004)
Carley, K.M., Reminga, J., Borgatti, S.: Destabilizing dynamic networks under conditions of uncertainty. In: IEEE KIMAS, Boston, MA (2003)
Falkenrath, R.: Analytic models and policy prescription: Understanding recent innovation in counterterrorism. Technical Report BCSIA Discussion Paper 2000-31, John F. Kennedy School of Government, Harvard University (2000)
Galan, J., Latek, M., Tsvetovat, M., Rizi, S.: Axelrod’s metanorm games on complex networks. In: AGENT 2007 (2007)
Gerwehr, S., Daly, S.: Al-Quaida: Terrorist Selection and Recruitment, ch. 5, pp. 73–89. Rand Corporation (2005)
Gomez, M., Carbo, J., Earle, C.B.: Honesty and trust revisited: the advantages of being neutral about others cognitive models. Auton. Agent Multi-Agent Syst. 15, 313–335 (2007)
Ilachinski, A.: Artificial War: Multi-Agent Based Simulation of Combat. World Scientific, Singapore (2004)
Lawrence, P., Lorsch, J.: Differentiation and integration in complex organizations. Administrative Science Quarterly (12), 1–47 (1967)
Luke, S., Cioffi-Revilla, C., Panait, L., Sullivan, K., Balan, G.C.: Mason: A multi-agent simulation environment. Simulation 81(7), 517–527 (2005)
O’Madadhain, J., Fisher, D., White, S., Boey, Y.-B.: The JUNG (Java Universal Network/Graph) Framework. Technical report, School of Information and Computer Science, University of California, Irvine (2006)
Rao, A.S., Georgeff, M.P.: Modeling rational agents within a BDI-architecture. In: Allen, J., Fikes, R., Sandewall, E. (eds.) Proceedings of the 2nd International Conference on Principles of Knowledge Representation and Reasoning (KR 1991), pp. 473–484. Morgan Kaufmann publishers Inc., San Mateo (1991)
Rothenberg, R.: From whole cloth: Making up the terrorist netwrok. Connections 24(3), 36–42 (2002)
Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press (2004)
Tate, A.: Generating project networks. In: Proceedings of IJCAI 1977, pp. 888–893 (1977)
Thomson, J.: Organizations in Action. McGraw-Hill, New York (1967)
Tsvetovat, M., Carley, K.M.: Simulation of human systems requires multiple levels of complexity. In: Deguchi, H. (ed.) Proceedings of World Congress on Social Simulation, vol. 1 (2006)
Tsvetovat, M., Reminga, J., Carley, K.M.: Dynetml: Interchange format for rich social network data. Technical Report CMU-ISRI-04-105, Carnegie Mellon University (2004)
Wegner, D.M.: Transactive memory: A contemporary analysis of the group mind. In: Mullen, B., Goethals, G.R. (eds.) Theories of group behavior, pp. 185–208 (1987)
Ye, M., Carley, K.: Radar-soar: Towards an artificial orgnization composed of intelligent agents 20(2-3), 219–246 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tsvetovat, M., Łatek, M. (2009). Dynamics of Agent Organizations: Application to Modeling Irregular Warfare. In: David, N., Sichman, J.S. (eds) Multi-Agent-Based Simulation IX. MABS 2008. Lecture Notes in Computer Science(), vol 5269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01991-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-01991-3_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01990-6
Online ISBN: 978-3-642-01991-3
eBook Packages: Computer ScienceComputer Science (R0)