VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm/Fragment 029 03 - Diskussion
Zuletzt bearbeitet: 2012-06-27 13:21:35 Sotho Tal Ker
Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Tsvetovat et al. 2005, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Untersuchte Arbeit:
Seite: 29, Zeilen: 3-8
Quelle: Tsvetovat et al. 2005
Seite(n): cover, Zeilen: 10ff
There is a pressing need to automatically collect data of terrorist networks, analyze such networks to find hidden relations and groups, prune datasets to locate regions of interest, detect key players, characterize the structure, trace points of vulnerability, and find efficiency (how fast communication is being made) of the network. There is a pressing need to automatically collect data on social systems as rich network data, analyze such systems to find hidden relations and groups, prune the datasets to locate regions of interest, locate key actors, characterize the structure, locate points of vulnerability, and simulate change in a system as it evolves naturally or in response to strategic interventions over time or under certain impacts, including modifcation of data.
Anmerkungen

Only the last half-sentence is substantially different to the source, which is not mentioned anywhere in the thesis.

Sichter
(Hindemith), Bummelchen


[2.] Nm/Fragment 029 24 - Diskussion
Zuletzt bearbeitet: 2012-04-29 22:21:39 Hindemith
BauernOpfer, DeRosa 2004, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop

Typus
BauernOpfer
Bearbeiter
Graf Isolan
Gesichtet
Untersuchte Arbeit:
Seite: 29, Zeilen: 24-27
Quelle: DeRosa 2004
Seite(n): 6, Zeilen: 33-38
Taking an example of 9/11 attack, it is possible to show, that simple IDM techniques discussed above can be used to assist terrorist investigation. IDM techniques using government watch list information, airline reservation records, and aggregated public [record data, could have identified all 19 hijackers of 9/11 terrorists attacks before the attack. (DeRosa Mary, 2004):] A hindsight analysis of the September 11 attacks provides an example of how simple, subject-based link analysis could be used effectively to assist investigations or analysis of terrorist plans. By using government watch list information, airline reservation records, and aggregated public record data, link analysis could have identified all 19 September 11 terrorists — for follow-up investigation — before September 11. [FN 16]

[FN 16] Of course, this kind of analysis will always appear neater and easier with hindsight, but it is a useful demonstration nonetheless.

Anmerkungen

Only a cursory reference to the source is made, and it is not clear if it refers to what has come before or to what will come; nothing is marked as a citation.

Sichter
(Graf Isolan), Bummelchen



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120422204859