Conflict Expansion in an Information Rich Society: Feasibility of Corrective Actions

  • Jaak Tepandi
Conference paper


The probability, power, and influence of terrorist attacks are increasing with growing access to information and material resources. This paper investigates the character of this relationship. Is it evolutionary, allowing to take measures when the situation indicates that the level of resources is too high and it is time to take a more restrictive approach? Or could it be an outbreak that would leave no way back after a certain level of resources would have been exceeded? The paper presents a simulation framework and experiments designed to answer these questions. The findings indicate that the results of terrorism activities can potentially start spreading very fast with the growing amount of information and material resources in individuals’ hands, allowing no point of return. These results may be useful when designing political, social and technical systems to prevent terrorism.


Simulation Environment Material Resource Terrorist Attack Simulation Sequence Agent Property 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    G. Chowell, A. Cintron-Arias, S. Del Valle, F. Sanchez, B. Song et al, “Mathematical applications associated with the deliberate release of infectious agents,”Modeling The Dynamics of Human Diseases: Emerging Paradigms and Challenges. AMS Cotemporary Mathematics Series, Vol. 410, 2006, pp. 51-71.Google Scholar
  2. [2]
    K.A. Bertsche and G. Schwarz, “Agent based simulation of terrorist attacks” protection of potential targets.Cornwallis Group IX: Analysis For Stabilization And Counter-Terrorist Operations, 9, 2005, pp. 439-456.Google Scholar
  3. [3]
    R. Smith, “Counter Terrorism Simulation: A New Breed of Federation,” inSpring 2002 Simulation Interoperability Workshop, Titan Systems Corporation, Orlando, 2002.Google Scholar
  4. [4]
    S. Raczynski, “Simulation of the dynamic interactions between terror and anti-terror organizational structures,”The Journal of Artificial Societies and Social Simulation, Vol. 7, No. 2, 2004.Google Scholar
  5. [5]
    D. Stauffer and M. Sahimi, “Discrete simulation of the dynamics of spread of extreme opinions in a society,”Physica A: Statistical Mechanics and its Applications,Vol. 364, 2006, pp. 537-543.CrossRefGoogle Scholar
  6. [6]
    E.G. Im, J. T. Seo, D.S. Kim, Y. H. Song, and Y. Park, “Hybrid modeling for large-scale worm propagation simulations,”Intelligence And Security Informatics, LNCS 3975, 2006, pp. 572-577.CrossRefGoogle Scholar
  7. [7]
    B. Edmonds, “Towards an ideal social simulation language,” inMulti-Agent-Based Simulation II. LNAI, Springer-Verlag Berlin, 2581, 2003, 105-124.CrossRefGoogle Scholar
  8. [8]
    J. Tepandi, “Simulation of Conflict in an Agent World: Access to Resources and Possibility of Termination of the Population,”Informatica, Vol. 13, No. 4, 2002, pp. 501-512.Google Scholar
  9. [9]
    J. Tepandi and S. Vassiljev, “Modelling Terrorism Expansion in a Virtual World,” In:Proc. East-West Vision 2002 (EWV’02), Graz, September 12-13, 2002, pp. 109-114.Google Scholar
  10. [10]
    J. Tepandi and S. Vassiljev, “Relationships Between Access To Information And The Effect Of The Terrorist Behavior,”In: Proc. of the 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004), Orlando, USA, July 18-21, 2004, Vol. 1, pp. 341-346.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2008

Authors and Affiliations

  • Jaak Tepandi
    • 1
  1. 1.Member, IEEE, Stanislav VassiljevTallinn University of TechnologyEhitajate tee 5Estonia

Personalised recommendations