VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Exploring the Evolution of Terrorist Networks

von Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, Panagiotis Karampelas

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm5/Fragment 414 20 - Diskussion
Zuletzt bearbeitet: 2014-02-05 10:41:46 WiseWoman
Fragment, Gesichtet, Han Kamber 2006, Nm5, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes
Untersuchte Arbeit:
Seite: 414, Zeilen: 20-25
Quelle: Han_Kamber_2006
Seite(n): 560, 561, Zeilen: 560: last lines; 561: 1ff
How can we mine terrorist networks? Traditional methods of machine learning and data mining, taking a random sample of homogeneous objects from a single relation as input, may not be appropriate. The data comprising terrorist networks tend to be heterogeneous, multi-relational, and semi-structured. IDM embodies descriptive and predictive modeling. By considering links (relationships between the entities), more information is made available to the mining process. “How can we mine social networks?” Traditional methods of machine learning and data mining, taking, as input, a random sample of homogenous [sic] objects from a single

[page 561]

relation, may not be appropriate here. The data comprising social networks tend to be heterogeneous, multirelational, and semi-structured.[...] It embodies descriptive and predictive modeling. By considering links (the relationships between objects), more information is made available to the mining process.

Anmerkungen

The source is not mentioned anywhere in the paper.

Also the formatting with italics is parallel.

Sichter
(Hindemith), WiseWoman


[2.] Nm5/Fragment 414 25 - Diskussion
Zuletzt bearbeitet: 2014-02-07 19:42:59 Hindemith
Fragment, Gesichtet, Nm5, SMWFragment, Schutzlevel sysop, Svenson et al 2006, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes
Untersuchte Arbeit:
Seite: 414, Zeilen: 25-31
Quelle: Svenson et al 2006
Seite(n): 3, Zeilen: 1ff
Mathematical methods used in the research on IDM [12–15] are clearly relevant to intelligence analysis and may provide tools and techniques to discover terrorist networks in their planning phase and thereby prevent terrorist acts from being carried out. Relevant patterns to investigate include connections between actors (meetings, messages), activities of the involved actors (specialized training, purchasing of equipment), and information gathering (time tables, visiting sites).

12. Memon, N., Larsen H.L.: Practical approaches for analysis, visualization and destabilizing terrorist networks. In: The proceedings of ARES 2006: The First International Conference on Availability, Reliability and Security, Vienna, Austria, IEEE Computer Society, pp. 906–913 (2006)

13. Memon, N., Larsen, H.L.: Practical algorithms of destabilizing terrorist networks. In the proceedings of IEEE Intelligence Security Conference, San Diego, Lecture Notes in Computer Science, Vol. 3976: pp. 398–411. Springer, Berlin (2006)

14. Memon, N., Larsen, H.L.: Detecting Terrorist Activity Patterns using Investigative Data Mining Tool. International Journal of Knowledge and System Sciences, 3(1), 43–52 (2006)

15. Memon, N., Qureshi, A.R.: Destabilizing terrorist networks. In WSEAS Transactions on Computers. 11(4), 1649–1656 (2005)

Social network analysis methods are clearly relevant to law enforcement intelligence work and may provide tools to discover criminal networks in their planning phase and thereby prevent terrorist acts and other large-scale crimes from being carried out. Relevant patterns to investigate include connections between actors (meetings, messages), activities of the involved actors (specialized training, purchasing of equipment) and information gathering (time tables, visiting sites).
Anmerkungen

The source is not mentioned anywhere in the paper.

Sichter
(Hindemith) Singulus


[3.] Nm5/Fragment 414 32 - Diskussion
Zuletzt bearbeitet: 2014-02-07 19:43:20 Hindemith
Fragment, Gesichtet, Koschade 2005, Nm5, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes
Untersuchte Arbeit:
Seite: 414, Zeilen: 32-37
Quelle: Koschade 2005
Seite(n): 2, 3, Zeilen: 2: 6-8; 3: 31ff
IDM offers the ability to firstly map a covert cell, and to measure the specific structural and interactional criteria of such a cell. IDM aims to connect the dots between individuals and map and measure complex, covert, human groups, and organizations. The methods focus on uncovering the patterns of interaction, and correctly interpreting these networks to predict behaviors and decision-making within the network. Social network analysis offers the ability to firstly map a covert cell, and to secondly measure the specific structural and interactional criteria of such a cell.

[page 3]

This framework aims to connect the dots between individuals and “map and measure complex, sometimes covert, human groups and organisations”.8 The method focuses on uncovering the patterning of people’s interaction,9 and correctly interpreting these networks assists “in predicting behaviour and decision-making within the network”.10


8 Krebs, V. (2002) “Mapping Networks of Terrorist Cells”, Connections, Vol. 24, 3, pp. 43-52.

9 Freeman, L. (nd) ‘The Study of Social Networks’, The International Network for Social Network Analysis, Retrieved May 17, 2004, from http://www.sfu.ca/~insna/INSNA/na_inf.html.

10 Renfro, R. & Deckro, R. (2001). “A Social Network Analysis of the Iranian Government”, paper presented at 69th MORS Symposium, 12-14 June, 2001, p. 4.

Anmerkungen

The source is not mentioned anywhere in the paper.

Sichter
(Hindemith) Singulus



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20140202230119