Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks
von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 244 21 - Diskussion Zuletzt bearbeitet: 2012-04-21 22:29:29 Hindemith | BauernOpfer, Fragment, Gesichtet, Nm, Ressler 2006, SMWFragment, Schutzlevel sysop |
|
|
Untersuchte Arbeit: Seite: 244, Zeilen: 21-32 |
Quelle: Ressler 2006 Seite(n): 7, Zeilen: 25-34 |
---|---|
Investigative data mining is just one tool that can be used to understand terrorism, and one piece of the puzzle. Domain experts are needed to provide a context for the research. Furthermore, the basic assumption of investigative data mining regarding terrorism may not be completely valid. Despite their non-hierarchical approach, terrorist organizations are not completely organized in a network structure (Ressler, S., 2006). There are still central headquarters and training camps for most terrorist organizations. Investigative data mining must attempt to address the underlying root cause of terrorism. It is helpful to understand how a network evolves and how to destabilize a network. It is more helpful, however, to understand how a network recruits human bombs and [why people wish to join terrorist networks.] | social network analysis is just one tool that can be used to understand terrorism, and is just one piece of the puzzle. Subject matter experts are needed to provide a context for the research. Furthermore, the basic assumption of network analysis regarding terrorism may not be completely valid. Despite their nonhierarchical approach, terrorist organizations are not completely organized in a network structure. There are still central headquarters and training facilities for most terrorist organizations. Also, social network analysis must attempt to address the underlying root cause of terrorism. It is helpful to understand how a network evolves and how to destabilize a network. It is more helpful, however, to understand how networks recruit participants and why people wish to join terrorist networks. |
Even at the end, when Nm tries to summarize his own results - we are talking about the section "9.2 DISSERTATION CONTRIBUTIONS" - there is a whole section from another work without it being marked as a citation. This paragraph originally belonged to the final - discussion - section of Ressler (2006). The source Ressler (2006) is given, but no citation is marked (and the copied text continues after the reference to Ressler (2006)). |
|
vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120421222658
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120421222658