Fandom

VroniPlag Wiki

Nm2/433

< Nm2

31.268Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Share

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks

von Nasrullah Memon, David L. Hicks, Henrik Legind Larsen

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm2/Fragment 433 14 - Diskussion
Zuletzt bearbeitet: 2014-01-11 22:36:43 Singulus
Fragment, Gesichtet, Koschade 2005, Nm2, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 433, Zeilen: 14-19
Quelle: Koschade 2005
Seite(n): 2, 3, Zeilen: 2: 6ff; 3: 31ff
IDM offers the ability to map a covert cell, and to measure the specific structural and interactional criteria of such a cell. This framework aims to connect the dots between individuals and to map and measure complex, covert, human groups and organizations [13]. The method focuses on uncovering the patterning of people’s interaction, and correctly interpreting these networks assists in predicting behaviour and decision-making within the network [13].

13. Memon, N., Larsen, H.L.: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks. In: Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 1037–1048. Springer, Heidelberg (2006)

Social network analysis offers the ability to firstly map a covert cell, and to secondly measure the specific structural and interactional criteria of such a cell.

[page 3]

This framework aims to connect the dots between individuals and “map and measure complex, sometimes covert, human groups and organisations”.8 The method focuses on uncovering the patterning of people’s interaction,9 and correctly interpreting these networks assists “in predicting behaviour and decision-making within the network”.10


8 Krebs, V. (2002) “Mapping Networks of Terrorist Cells”, Connections, Vol. 24, 3, pp. 43-52.

9 Freeman, L. (nd) ‘The Study of Social Networks’, The International Network for Social Network Analysis, Retrieved May 17, 2004, from http://www.sfu.ca/~insna/INSNA/na_inf.html.

10 Renfro, R. & Deckro, R. (2001). “A Social Network Analysis of the Iranian Government”, paper presented at 69th MORS Symposium, 12-14 June, 2001, p. 4.

Anmerkungen

The authors refer to one of their own earlier papers (see SpringerLink). There the passage can indeed be found, but Koschade (2005) was published even before the Memon/Larson paper. Thus, the Memon/Larson paper cannot be the original source.

The authors also removed three citations.

Sichter
(Hindemith), WiseWoman

[2.] Nm2/Fragment 433 24 - Diskussion
Zuletzt bearbeitet: 2014-01-11 23:19:19 Hindemith
Fragment, Gesichtet, Koschade 2005, Nm2, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 433, Zeilen: 24-31
Quelle: Koschade 2005
Seite(n): 2, 3, Zeilen: 2: 8-14; 3: 38ff
IDM also endows the analyst with the ability to measure the level of covertness and efficiency of the cell as a whole, and the level of activity, ability to access others, and the level of control over a network each individual possesses. The measurement of these criteria allows specific counter-terrorism applications to be drawn, and assists in the assessment of the most effective methods of disrupting and neutralising a terrorist cell [13]. In short, IDM provides a useful way of structuring knowledge and framing further research. Ideally it can also enhance an analyst’s predictive capability [13].

13. Memon, N., Larsen, H.L.: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks. In: Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 1037–1048. Springer, Heidelberg (2006)

The method also endows the analyst the ability to measure the level of covertness and efficiency of the cell as a whole, and also the level of activity, ability to access others, and the level of control over a network each individual possesses. The measurement of these criteria allows specific counter-terrorism applications to be drawn, and assists in the assessment of the most effective methods of disrupting and neutralising a terrorist cell.

[page 3]

In short, social network analysis “provides a useful way of structuring knowledge and framing further research. Ideally it can also enhance an analyst’s predictive capability”.12


12 Aftergood, S. (2004) ‘Secrecy News: Social Network Analysis and Intelligence’ [online], Federation of American Scientists Project on Government Secrecy, Vol. 2004, 15. Retrieved May 17, 2004, from http://www.fas.org/sgp/news /secrecy/2004/02/020904.html.

Anmerkungen

The authors refer to one of their own earlier papers (see SpringerLink). There the passage can indeed be found, but Koschade (2005) was published even before the Memon/Larson paper. Thus, it cannot be the original source.

The authors also removed a citation and attribute the quote to themselves.

Sichter
(Hindemith), WiseWoman

[3.] Nm2/Fragment 433 32 - Diskussion
Zuletzt bearbeitet: 2014-01-11 21:10:59 Hindemith
Fragment, Gesichtet, Nm2, Popp and Poindexter 2006, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 433, Zeilen: 32-39
Quelle: Popp and Poindexter 2006
Seite(n): 23, Zeilen: left col. 5ff
On the other hand, traditional data mining commonly refers to using techniques rooted in statistics, rule-based logic, or artificial intelligence to comb through large amounts of data to discover previously unknown but statistically significant patterns. However, in the application of IDM in the counterterrorism domain, the problem is much harder, because unlike traditional data mining applications, we must, find an extremely wide variety of activities and hidden relationships among individuals. Table 1 gives a series of reasons for why traditional data mining isn’t the same as investigative data mining. Data mining commonly refers to using techniques rooted in statistics, rule-based logic, or artificial intelligence to comb through large amounts of data to discover previously unknown but statistically significant patterns. However, the general counterterrorism problem is much harder because unlike commercial data mining applications, we must find extremely rare instances of patterns across an extremely wide variety of activities and hidden relationships among individuals. Table 2 gives a series of reasons for why commercial data mining isn’t the same as terrorism detection in this context.
Anmerkungen

The source is not mentioned anywhere in the paper.

Sichter
(Hindemith), WiseWoman


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20140111211628

Auch bei Fandom

Zufälliges Wiki