Reference Hub2
Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the “Hearts and Minds”

Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the “Hearts and Minds”

Chris Arney, Zachary Silvis, Matthew Thielen, Jeff Yao
Copyright: © 2013 |Volume: 4 |Issue: 3 |Pages: 16
ISSN: 1947-9328|EISSN: 1947-9336|EISBN13: 9781466634442|DOI: 10.4018/joris.2013070103
Cite Article Cite Article

MLA

Arney, Chris, et al. "Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the “Hearts and Minds”." IJORIS vol.4, no.3 2013: pp.31-46. http://doi.org/10.4018/joris.2013070103

APA

Arney, C., Silvis, Z., Thielen, M., & Yao, J. (2013). Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the “Hearts and Minds”. International Journal of Operations Research and Information Systems (IJORIS), 4(3), 31-46. http://doi.org/10.4018/joris.2013070103

Chicago

Arney, Chris, et al. "Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the “Hearts and Minds”," International Journal of Operations Research and Information Systems (IJORIS) 4, no.3: 31-46. http://doi.org/10.4018/joris.2013070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The United States armed forces could be considered the world’s most powerful military force. However, in modern conflicts, techniques of asymmetric warfare (terrorism) wreak havoc on the inflexible, regardless of technological or numerical advantage. In order to be more effective, the US military must improve its counter-terrorism (CT) capabilities and flexibility. In this light, the authors model the terrorism-counter-terrorism (T-CT) struggle with a detailed and complex mathematical model and analyze the model’s components of leadership, promotion, recruitment, resources, operational techniques, cooperation, logistics, security, intelligence, science, and psychology in the T-CT struggle, with the goal of informing today’s decision makers of the options available in counter-terrorism strategy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.