Fandom

VroniPlag Wiki

Nm2/432

< Nm2

31.374Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Teilen

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks

von Nasrullah Memon, David L. Hicks, Henrik Legind Larsen

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm2/Fragment 432 24 - Diskussion
Zuletzt bearbeitet: 2014-01-11 21:10:47 Hindemith
BauernOpfer, DeRosa 2004, Fragment, Gesichtet, Nm2, SMWFragment, Schutzlevel sysop

Typus
BauernOpfer
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 432, Zeilen: 24-30
Quelle: DeRosa 2004
Seite(n): v, Zeilen: 32ff
Although these techniques are powerful, it is a mistake to view investigative data mining techniques as a complete solution to security problems. The strength of IDM is to assist analysts and investigators. IDM can automate some functions that analysts would otherwise have to perform manually. It can help to prioritize attention and focus an inquiry, and can even do some early analysis and sorting of masses of data. Nevertheless, in the complex world of counterterrorism, it is not likely to be useful as the only source for a conclusion or decision. Although these techniques are powerful, it is a mistake to view data mining and automated data analysis as complete solutions to security problems. Their strength is as tools to assist analysts and investigators. They can automate some functions that analysts would otherwise have to perform manually, they can help prioritize attention and focus an inquiry, and they can even do some early analysis and sorting of masses of data. But in the complex world of counterterrorism, they are not likely to be useful as the only source for a conclusion or decision.
Anmerkungen

The source in mentioned one paragraph above, which is also very much inspired from it. However, there is no indication, implicit or explicit, that this paragraph is also taken from De Rosa (2004).

Sichter
(Hindemith), WiseWoman

[2.] Nm2/Fragment 432 31 - Diskussion
Zuletzt bearbeitet: 2014-01-11 21:10:22 Hindemith
Fragment, Gesichtet, Nm2, SMWFragment, Schutzlevel sysop, Thuraisingham 2003, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 432, Zeilen: 31-40
Quelle: Thuraisingham_2003
Seite(n): 213, 214, Zeilen: 213: 41-44; 214: 1-8
In the counterterrorism domain, much of the data could be classified. If we are to truly get the benefits of the techniques we need to test with actual data. But not all researchers have the clearances to work on classified data. The challenge is to find unclassified data that is, representative of the classified data. It is not straightforward to do this, as one has to make sure that all classified information, even through implications, is removed. Another alternative is to find as good data as possible in an unclassified setting for researchers to work on. However, the researchers have to work not only with counterterrorism experts but also with data mining specialists who have the clearances to work in classified environments. That is, the research carried out in an unclassified setting has to be transferred to a classified setting later to test the [applicability of data mining algorithms. Only then do we get the true benefit of investigative data mining.] [page 213]

However for the domain that we are considering much of the data could be classified. If we are to truly get the benefits of the techniques we need to test with actual data. But not all of the researchers have the clearances to work on classified data. The challenge is to find unclassified data that is a representative sample of the classified

[page 214]

data. It is not straightforward to do this, as one has to make sure that all classified information, even through implications, is removed. Another alternative is to find as good data as possible in an unclassified setting for the researchers to work on. However, the researchers have to work not only with counter-terrorism experts but also with data mining specialists who have the clearances to work in classified environments. That is, the research carried out in an unclassified setting has to be transferred to a classified setting later to test the applicability of the data mining algorithms. Only then can we get the true benefits of data mining.

Anmerkungen

The source is mentioned nowhere in the paper.

Sichter
(Hindemith), WiseWoman


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20140111211719


Auch bei Fandom

Zufälliges Wiki