Fandom

VroniPlag Wiki

Nm/083

< Nm

31.358Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Share

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 083 01 - Diskussion
Zuletzt bearbeitet: 2012-05-01 18:39:35 Hindemith
Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu etal 2004

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 83, Zeilen: 1-3
Quelle: Xu_etal_2004
Seite(n): 6, Zeilen: 15-17
[By calculating this index between two similar clusters in two successive time periods, it is] possible to measure the stability or continuity of a scientific field as represented by a group of authors (Braam, R.R., H.F. Moed, and A.F.J. van Raan, 1991). By calculating this index between two similar clusters in two successive time periods, it is possible to quantify the stability or continuity of a scientific field as represented by a group of authors [2].

[2]. Braam, R.R., H.F. Moed, & A.F.J. van Raan (1991). [...]

Anmerkungen

Continued from previous page

Sichter
(Hindemith), Bummelchen

[2.] Nm/Fragment 083 04 - Diskussion
Zuletzt bearbeitet: 2012-05-07 16:20:21 Hindemith
CNS 2002, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 83, Zeilen: 4-30
Quelle: CNS_2002
Seite(n): 80, 95, 172, Zeilen: 80: 7ff; 95: 12ff; 172: 10ff
Valdis Krebs [FN 12] worked in analyzing organizations, especially adaptive organizations. He has applied real-world data and model “social network processes”. He has done some work on analyzing the terrorist network surrounding the 9/11 attacks (Krebs, V.; 2001, 2002). He states that one can also apply his analysis to counterterrorist organization and believes it takes a network to fight a network; he therefore prescribes the use of small anti-terror teams.

In his approach, Krebs (2002) takes a snapshot of a network. After many such snapshots, he can see how networks evolve. He argues that one can see patterns at the planning stage of terrorist attacks - a terrorist planning team looks like any other planning team. So, once they get into active planning mode, terrorists’ project map looks like anyone else’s. One can use this knowledge to analyze groups and see where they are in the operational process.

Krebs (2002) also emphasizes that terrorists, like other organizations, do have leaders, so one does not necessarily need all the data – we can obtain a lot of information without it. There has been a great deal of work in link analysis in law enforcement. Link analysis focuses more on objects and people, whereas Krebs’ software concentrates on people and uses social network metrics. Roger Smith (Smith, R., 2001) presented a definition of social cohesion based on network connectivity that leads to an operationalization of social embeddedness. He defined cohesiveness as the minimum number of actors who, if removed from a group, would disconnect the group.

Borgatti Stephen P. (2003) discussed how to identify sets of structurally key players, particularly in the context of attacking [terrorist networks.]

[FN 12] http://www.orgnet.com/VKbio.html

- Mr. Krebs works in analyzing organizations, especially adaptive organizations. He would like to apply what

he does to real-world data and model ‘social network processes’.

- He has done some work on analyzing the terrorist network surrounding the 9/11 attacks. He states that one can also apply his analysis to counterterrorist organization and believes it takes a network to fight a network; he therefore prescribes the use of small anti-terror teams.

- In his approach, Mr. Krebs takes a snapshot of a network. After many such snapshots, he can see how networks evolve. He argues that one can see patterns at the planning stage of terrorist attacks - a terrorist planning team looks like any other planning team. So, once they get into active planning mode, terrorists’ project map looks like anyone else’s. One can use this knowledge to analyze groups and see where they are in the operational process. Mr. Krebs also emphasizes that terrorists, like other organizations, do have leaders, so one does not necessarily need all the data – we can obtain a lot of information without it.

- There has been a lot of work in link analysis in law enforcement. Link analysis focuses more on objects and people, whereas Mr. Krebs’ software concentrates on people and uses social network metrics.

[page 95]

We present a definition of social cohesion based on network connectivity that leads to an operationalization of social embeddedness. We define cohesiveness as the minimum number of actors who, if removed from a group, would disconnect the group.

[page 172]

This paper discusses how to identify sets of structurally key players, particularly in the context of attacking terrorist networks.

Anmerkungen

The given internet link does (and did not) give the same information let alone in the same formulations as the source.

Sichter
(Hindemith), Bummelchen


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120507162626

Auch bei Fandom

Zufälliges Wiki