Störung durch Adblocker erkannt!
Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.
Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.
Seite: 341, Zeilen: 30-40
Seite(n): 4, Zeilen: 3ff
|After the attacks of 9/11, the academic world has increased the attention paid to network research for terrorism as a result of public interest. The network analysis of terrorist organizations can be divided into two classes: the data collectors and data modelers.
3.1 Data Collectors
Data collection is difficult for any network analysis because it is difficult to create a complete network. It is not easy to gain information on terrorist networks. It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data . A number of academic researchers [12, 13 & 14] focus primarily on data collection [on terrorist organizations, analyzing the information through description and straightforward modeling.]
11. Ressler S., (2006). Social network analysis as an approach to combat terrorism: past, present, and future research. http://www.hsaj.org/pages/ volume2/issue2/pdfs/2.2.8.pdf
12. Krebs, Valdis E. Mapping networks of terrorist cells. Connections 24 (3) 43-52, 2002
13. Sageman, M. Understanding terrorist networks, Philadelphia: University of Pennsylvania Press, 2004
14. Rodriquez, JA. The March 11th terrorist network: in its weakness lies its strength, XXV International Sunbelt Conference, Los Angeles, 2005
|Since the winter of 2001, the academic world has increased the attention paid to the social network analysis of terrorism as a result of public interest and new grant money.15 Network analysis of terrorist organizations continues to grow and can be divided into two groups: the data collectors and the modelers.
Data collection is difficult for any network analysis because it is hard to create a complete network. It is especially difficult to gain information on terrorist networks. Terrorist organizations do not provide information on their members, and the government rarely allows researchers to use their intelligence data. A number of academic researchers focus primarily on data collection on terrorist organizations, analyzing the information through description and straightforward modeling.
15 See, for example, A. Abbasi and H. Chen, “Identification and Comparison of Extremist-Group Web Forum Messages using Authorship Analysis,” IEEE Intelligent Systems 20, no. 5 (2005); Kathleen Carley, M. Dombroski, M. Tsvetovat, J. Reminga and N. Kamneva, “Destabilizing Dynamic Covert Networks,” in Proceedings of the 8th International Command and Control Research and Technology Symposium (Washington, D.C.: War College, 2003); Kathleen Carley, Neal Altman, Boris Kaminsky, Démain Nave and Alex Yahja, “BioWar: A City-Scale Multi-Agent Network Model of Weaponized Biological Attacks,” CASOS Technical Report, CMU-ISRI-04-101 (2004); J.A. Rodriquez, “The March 11th Terrorist Network: In its weakness lies its strength,” XXV International Sunbelt Conference, Los Angeles, 2005; and Y. Zhou, E. Reid, J. Qin, G. Lai, and H. Chen, “U.S. Domestic Extremist Groups on the Web: Link and Content Analysis,” IEEE Intelligent Systems (Special issues on artificial intelligence for national and homeland security, forthcoming).
The source is given somewhere in the middle and among other references. There is no indication that text has been taken verbatim from the source.
To be continued on the next page: Nm4/Fragment_342_01