VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm/Fragment 091 11 - Diskussion
Zuletzt bearbeitet: 2012-04-21 22:12:36 Hindemith
Fragment, Gesichtet, Nm, Ressler 2006, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Untersuchte Arbeit:
Seite: 91, Zeilen: 11-20
Quelle: Ressler 2006
Seite(n): 4, Zeilen: 8-13
Moreover, as described earlier, data collection is difficult for any network analysis because it is hard to create a complete network. It is difficult especially to gain information on terrorist networks. Terrorist organizations do not provide information on their membership structure, and the intelligence agencies rarely allow researchers to use their intelligence data. A number of academic researchers focus primarily on data collection on terrorist

organizations, analyzing the information through descriptive and straight forward methods (for example, Krebs V., 2002, Sageman, M., 2004) as described earlier.

Data collection is difficult for any network analysis because it is hard to create a complete network. It is especially difficult to gain information on terrorist networks. Terrorist organizations do not provide information on their members, and the government rarely allows researchers to use their intelligence data. A number of academic researchers focus primarily on data collection on terrorist organizations, analyzing the information through description and straightforward modeling.
Anmerkungen

Unbelievable: For the third time (see Nm/Fragment_033_15 and Nm/Fragment_040_22) we are confronted with the same six lines from Ressler (2006) with only slight modifications. Still no mention of the source.

Sichter
(Graf Isolan), Hindemith


[2.] Nm/Fragment 091 21 - Diskussion
Zuletzt bearbeitet: 2012-04-21 22:16:39 Hindemith
Fragment, Gesichtet, Nm, Ressler 2006, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Untersuchte Arbeit:
Seite: 91, Zeilen: 21-28
Quelle: Ressler 2006
Seite(n): 4, 5, Zeilen: p.4,44-46 - p.5,1-3
One promising activity is the development of a major terrorism web portal at the University of Arizona’s Artificial Intelligence Lab. The website makes social network tools and data related to terrorism publicly available (Reid, E., et al., 2004). One example is the Terrorism Knowledge Portal, a database consisting of over 360,000 terrorism news articles and related Web pages coming from various high-quality terrorism websites, major search engines,

and new portals.

[p. 6]

One promising activity is the development of a major terrorism web portal at the University of Arizona’s Artificial Intelligence Center. This website makes social network tools and data related to terrorism publicly available. [EN 18] One example is the Terrorism

[p.7]

Knowledge Portal, a database consisting of over 360,000 terrorism news articles and related Web pages coming from various high-quality terrorism Web sites, major search engines, and news portals.

[EN 18] Edna Reid, Jialun Quin, Wingyan Chung, Jennifer Xu, Yilu Zhou, Rob Schumaker, Marc Sageman, and Hsinchun Chen, “Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Address the Threats of Terrorism,” (Working paper, 2004).

Anmerkungen

Nothing marked as a citation, no source named.

Sichter
(Graf Isolan), Hindemith



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120421221722