Fandom

VroniPlag Wiki

Nm3/1038

< Nm3

31.363Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Share

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining

von Nasrullah Memon, Henrik Legind Larsen

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm3/Fragment 1038 01 - Diskussion
Zuletzt bearbeitet: 2014-01-29 20:51:33 WiseWoman
Balasundaram et al 2006, Fragment, Gesichtet, Nm3, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 1038, Zeilen: 1-2, 5-16
Quelle: Balasundaram et al 2006
Seite(n): 2, Zeilen: 9ff
[Examples of cohesive sub-] groups include religious cults, terrorist cells, criminal gangs, military platoons, tribal groups and work groups etc.

[...]

Some direct application areas of social networks include studying terrorist networks (Sageman, M., 2004, Berry, N. et al., 2004), which is essentially an [sic] special application of criminal network analysis that is intended to study organized crimes such as terrorism, drug trafficking and money laundering (McAndrew, D., 1999, Davis, R. H., 1981). Concepts of social network analysis provide suitable data mining tools for this purpose (Chen, H., et al., 2004).

Figure 1 shows an example of a terrorist network, which maps the links between terrorists involved in the tragic events of September 11, 2001. This graph was constructed by Valdis Krebs (Krebs, V., 2002) using the public data that were available before, but collected after the event. Even though the information mapped in this network is by no means complete, its analysis may still provide valuable insights into the structure of a terrorist organization.

Examples of cohesive subgroups include religious cults, terrorist cells, criminal gangs, military platoons, sports teams and conferences, work groups etc. [...]

[...]

Some direct application areas of social networks include studying terrorist networks [43,9], which is essentially a special application of criminal network analysis that is intended to study organized crimes such as terrorism, drug trafficking and money laundering [36,21]. Concepts of social network analysis provide suitable data mining tools for this purpose [17]. Figure 1 shows an example of a terrorist network, which maps the links between terrorists involved in the tragic events of September 11, 2001. This graph was constructed in [32] using the public data that were available before, but collected after the event. Even though the information mapped in this network is by no means complete, its analysis may still provide valuable insights into the structure of a terrorist organization.


9. Berry, N., Ko, T., Moy, T., Smrcka, J., Turnley, J., Wu, B.: Emergent clique formation in terrorist recruitment. The AAAI-04 Workshop on Agent Organizations: Theory and Practice, July 25, 2004, San Jose, California (2004). Http://www.cs.uu.nl/ virginia/aotp/papers.htm [sic]

17. Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: A general framework and some examples. Computer 37(4), 50–56 (2004)

21. Davis, R.H.: Social network analysis: An aid in conspiracy investigations. FBI Law Enforcement Bulletin pp. 11–19 (1981)

32. Krebs, V.: Mapping networks of terrorist cells. Connections 24, 45–52 (2002)

36. McAndrew, D.: The structural analysis of criminal networks. In: D. Canter, L. Alison (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. Aldershot, Dartmouth (1999)

43. Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press (2004)

Anmerkungen

The source is not given. The copied text starts on the previous page: Nm3/Fragment_1037_35. Figure 1 is different in each text.

Sichter
(Hindemith), WiseWoman


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20140129165917

Auch bei Fandom

Zufälliges Wiki