Fandom

VroniPlag Wiki

Nm/Fragment 089 03

< Nm

31.268Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Share

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.


Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 89, Zeilen: 3-25
Quelle: CNS_2002
Seite(n): 14, 18, 20, Zeilen: 14: 11-17; 18: 28-31; 20: 23-26
THREATFINDER – this tool originated in the corporate

realm. Certain individuals within an organization are more likely than others to pose threats. The research involves looking for threat indicators for who could launch an attack i.e. using a network/organizational perspective, Threatfinder identifies threats within an organization.

Tsvetovat Maksim and Kathleen Carley (2002) proposed a methodology for realistically simulating terrorist networks in order to develop network metrics to test strategies of destabilizing them, provided a model of antiterrorist policy. They have not discussed behavior or real group interaction and the model is limited in scope and depth. It may be used as a starting point to focus terrorist organization and network

Michael J. North and his colleagues (North, J. M; Nicholson, T. C; and Jerry R. V., 2006) worked on a model of terrorist networks— looking at relationships between different terrorist structures. Their models show whether or not particular terrorist group fits in a given structure.

The authors modeled terrorists as genetic algorithms. The models also look at counter forces. Social factors, such as propagation of dangerous ideas, are built into the model. The model uses REPAST tool (developed by University of Chicago) which, as opposed to SWARM (which they believe is getting old).

[page 18]

THREATFINDER – this tool originated in the corporate realm. Certain individuals within an organization are more likely than others to pose threats. The research involves looking for threat indicators for who could launch an attack i.e. using a network/organizational perspective, Threatfinder identifies threats within an organization.

[page 20]

The paper proposes a methodology for realistically simulating terrorist networks in order to develop network metrics to test strategies of destabilizing them; provides a model of anti-terrorist policy; doesn't provide behavior or real group interaction and is limited in scope and depth; may be used as a starting point; focus: terrorist organization and network

[page 14]

- He is working on a model of terrorist networks – looking at relationships between different terrorist structures.

- His models let people test whether or not a particular terrorist group fits a given structure.

- Terrorists are modeled as genetic algorithms.

- The model also looks at counterforces.

- Social factors, such as the propagation of dangerous ideas, are built into the model.

- The model uses REPAST (developed by the University of Chicago) which is written in Java, as opposed to SWARM which is written in C (and he believes is getting old).

Anmerkungen

No source given

Sichter
(Hindemith), Bummelchen

Auch bei Fandom

Zufälliges Wiki