Fandom

VroniPlag Wiki

Nm/Fragment 024 01

< Nm

31.371Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Teilen

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.


Typus
BauernOpfer
Bearbeiter
Graf Isolan
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 24, Zeilen: 4-20
Quelle: DeRosa 2004
Seite(n): v, Zeilen: 19-25, 32-38
Data mining actually has relatively narrow meaning: the approach that uses algorithms to determine analytical patterns in datasets. Subject-based automated data analysis applies models to data to predict behaviour, assess risk, determine associations, or do other type of analysis (DeRosa Mary, 2004). The models used for automated data analysis can be used on patterns discovered by data mining techniques.

Although these techniques are powerful, it is a mistake to view investigative data mining techniques as complete solution to security problems. The strength of investigative data mining (IDM) is to assist analysts and investigators. IDM can automate some tasks that analysts would otherwise have to accomplish manually. It can help to place in order attention and focus an inquiry, and can even do some early analysis and sorting of masses of data. Nevertheless, in the multifaceted world of counterterrorism, it is not likely to be useful as the only source for a conclusion or decision.

“Data mining” actually has a relatively narrow meaning: it is a process that uses algorithms to discover predictive patterns in data sets. “Automated data analysis” applies models to data to predict behavior, assess risk, determine associations, or do other types of analysis. The models used for automated data analysis can be based on patterns (from data mining or discovered by other methods) or subject based, which start with a specific known subject. [...]

Although these techniques are powerful, it is a mistake to view data mining and automated data analysis as complete solutions to security problems. Their strength is as tools to assist analysts and investigators. They can automate some functions that analysts would otherwise have to perform manually, they can help prioritize attention and focus an inquiry, and they can even do some early analysis and sorting of masses of data. But in the complex world of counterterrorism, they are not likely to be useful as the only source for a conclusion or decision.

Anmerkungen

Every now and then a reference to the source is thrown in. Nevertheless nothing of the cited text is marked as such.

Sichter
(Graf Isolan), Bummelchen

Auch bei Fandom

Zufälliges Wiki