VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm/Fragment 216 05 - Diskussion
Zuletzt bearbeitet: 2012-04-23 11:27:25 Hindemith
Dugan etal 2006, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Untersuchte Arbeit:
Seite: 216, Zeilen: 5-30
Quelle: Dugan_etal_2006
Seite(n): 410-411, Zeilen: p 410: 39ff; p 411: 1ff
7.4.2 Weaknesses of Open Source Knowledge bases

As discussed above, the original knowledge base has some important strength; this study also recognizes that it also has significant weaknesses that need to be understood when drawing conclusions from data. Two types of weaknesses are especially important. First, all major open source databases rely on data culled from news resources; they are likely biased toward the most newsworthy forms of terrorism (Fowler, W. W., 1981).

Although the original knowledge base under discussion, includes events that were prevented by authorities (for example the Bojinka terrorists plan), it is certain that some potential terrorist attacks never came to the attention of the media and are thus excluded. A related issue is that the original knowledge base includes incidents covered by media where criminals/ terrorists remain undisclosed. Without information concerning a criminal/ terrorist it may be difficult to accurately classify an incident as terrorism. Also, various media accounts of similar terrorist incidents may contain conflicting information. Without measures of reliability in news reporting, it is difficult for researchers to distinguish, which source supplies the most perfect account.

The second issue is that the original knowledge base lacks information on other important issues associated with each terrorism incident. Open source databases also lack information on the psychological characteristics, recruitment, and careers of members of terrorist movements. A lack of data on terrorist networks is mainly explained by their covert nature.

4.2 Weaknesses of Open Source Terrorism Databases

But while the PGIS data has some important strengths, we also recognize that it also has important weaknesses that need to be understood when drawing conclusions from the data. Three types of weaknesses are especially important. First, all the major open source terrorism databases (ITERATE, MIPT-RAND and PGIS) rely on data culled from news sources, thus they are likely biased toward the most newsworthy forms of terrorism [6]. Although the PGIS database includes events that were prevented by [page 411] authorities, it is certain that some potential terrorist attacks never came to the attention of the media and are thus excluded. A related issue is that the PGIS database includes incidents covered by the media where the perpetrator remains unidentified. Without information concerning the perpetrator it may be difficult to accurately classify the incident as terrorism, since the definition relies on the motive of the attacker. Finally, various media accounts of similar terrorist incidents may contain conflicting information. Without measures of reliability in news reporting, it is difficult for researchers to discern which source supplies the most accurate account.

The second issue is that the dataset lacks information on other important issues associated with each terrorism incident. Open source databases, including the one created by PGIS also lack information on the “psychological characteristics, recruitment, and careers of members of terrorist movements” [9:28]. [...] Of course, the lack of data on terrorist groups is mainly explained by their clandestine nature.


[6]. Fowler, W. W. (1981). [...]

Anmerkungen

The text has been copied with only slight adaptations, the source is not mentioned in the thesis anywhere

Sichter
(Hindemith), Bummelchen



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120423112758