Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks
von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 042 01 - Diskussion Zuletzt bearbeitet: 2014-03-06 15:29:14 WiseWoman | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Visualcomplexity 2006 |
|
|
Untersuchte Arbeit: Seite: 42, Zeilen: 1-2 |
Quelle: Visualcomplexity 2006 Seite(n): 1, Zeilen: - |
---|---|
[The goal of creating this database is to apply new technologies and software engineering] approaches to open source intelligence while providing researchers and analysts with information about Al Qaeda. | The goal is to apply new technologies and software engineering approaches to open source intelligence while providing researchers and analysts with information about Al Qaeda. |
Source is not given. Copied text starts on the previous page. |
|
[2.] Nm/Fragment 042 03 - Diskussion Zuletzt bearbeitet: 2014-03-06 16:01:59 WiseWoman | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, TrackingTheThreat.com 2006, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 42, Zeilen: 3-9 |
Quelle: TrackingTheThreat.com 2006 Seite(n): 1 (internet version), Zeilen: 26-30 |
---|---|
In order to create a huge database, FMS Advanced Systems Group collected real-world data—information about the people, places, events, connections, and other metadata about Al Qaeda in general, and 9/11 in particular. Several months of research using opensource materials, such as articles on the web, books, magazines, and other information yielded Al Qaeda dataset—a large collection of structured entity and relationship information. | In order to test the prototype system, we needed real-world data—information about the people, places, events, connections, and other metadata about Al Qaeda in general, and 9/11 in particular. Several months of research using open-source materials, such as articles on the web, books, magazines, and other information yielded our initial Al Qaeda dataset—a large collection of structured entity and relationship information. |
not marked as a citation, no source given |
|
[3.] Nm/Fragment 042 12 - Diskussion Zuletzt bearbeitet: 2012-06-27 13:44:39 Sotho Tal Ker | Fragment, Gesichtet, Nm, SMWFragment, Saxena et al. 2004, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 42, Zeilen: 12-18 |
Quelle: Saxena et al. 2004 Seite(n): 85, Zeilen: 17-21 |
---|---|
Terrorist and criminal organizations, generally organize themselves as secret networks with distributed work share. It is difficult to obtain information in the open domain on their membership, links and management or confirm the validity of such information. Still then, due to the need of publicity for the terrorists, for their cause, the open source information becomes relevant in exploring terrorist networks. | Terrorist and criminal organisations, generally, organise themselves as secret networks with distributed work share. It is not easy to obtain confirmed information in the open domain on their membership, ties and management. However, terrorists need the oxygen of publicity for their ‘cause’; and, hence, open source information [EN 1] becomes relevant in exploring such networks. |
No source is given for this short paragraph. |
|
vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120501080704
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120501080704