Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks
von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 249 01 - Diskussion Zuletzt bearbeitet: 2012-05-01 08:28:06 Hindemith | Fragment, Gesichtet, Hamill 2006, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 249, Zeilen: 1-8 |
Quelle: Hamill_2006 Seite(n): 285, Zeilen: 14-19 |
---|---|
In order to accomplish this, analysts must at minimum (1) improve the understanding why people would undertake such activities and mentally prepare to be used as human bombs; (2) identify vulnerabilities existing within these networks and how to exploit them; and, (3) determine what consequences may follow an operation to minimize the likelihood that actions executed unintentionally contribute to the environments that promote extremism. | In order to accomplish this, the appropriate communities must at a minimum
(1) improve the understanding of why people would undertake such activities; (2) identify limitations or vulnerabilities existing within non-cooperative networks and how to exploit them; and, (3) determine what repercussions may follow an operation to minimize the likelihood that actions executed inadvertently contribute to the environments that promote extremism. |
Not even the last words of the thesis are from the author |
|
vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120501082612
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120501082612