Fandom

VroniPlag Wiki

Nm6/485

< Nm6

31.385Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Teilen

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies

von Nasrullah Memon, Henrik Legind Larsen, David L. Hicks, and Nicholas Harkiolakis

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm6/Fragment 485 13 - Diskussion
Zuletzt bearbeitet: 2014-02-09 08:59:03 Hindemith
BauernOpfer, Fragment, Gesichtet, Nm6, Ressler 2006, SMWFragment, Schutzlevel sysop

Typus
BauernOpfer
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 485, Zeilen: 13-31
Quelle: Ressler_2006
Seite(n): 4, 5, Zeilen: 4: 8ff; 5: 1ff
Data collection is difficult for any network analysis because it is difficult to create a complete network. It is not easy to gain information on terrorist networks. It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data [15]. A number of academic researchers [16] [17] [18] focus primarily on data collection on terrorist organizations, analyzing the information through description and straightforward modeling.

One promising activity is the development of a major terrorism web portal at the University of Arizona’s Artificial Intelligence Center. This website makes social network tools and data related to terrorism publicly available. One example is the Terrorism Knowledge Portal [19], a database consisting of over 360,000 terrorism news articles and related Web pages coming from various high-quality terrorism Web sites, major search engines, and news portals. By providing publicly available network tools and data, the research opens itself to a number of new scholars. Academics can double-check the work of others to ensure quality. New scholars can enter the field without the lengthy time commitment and financial cost of developing basic tools and getting data. Such activities, combined with the federal government’s support, will help push the field of terrorism-related social network analysis to new heights in the future.


15. Ressler, S.: Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research (2006)

16. Krebs, V.E.: Mapping Networks of Terrorist Cells. Connections 24(3), 43–52 (2002) Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies 489

17. Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press, Philadelphia (2004)

18. Rodriquez, J.A.: The March 11th Terrorist Network: In its weakness lies its strength. In: Proc. XXV International Sunbelt Conference, Los Angeles (2005)

19. Reid, E., et al.: Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 125–145. Springer, Heidelberg (2004)

Data collection is difficult for any network analysis because it is hard to create a complete network. It is especially difficult to gain information on terrorist networks. Terrorist organizations do not provide information on their members, and the government rarely allows researchers to use their intelligence data. A number of academic researchers focus primarily on data collection on terrorist organizations, analyzing the information through description and straightforward modeling.

[...]

[...] One promising activity is the development of a major terrorism web portal at the University of Arizona’s Artificial Intelligence Center. This website makes social network tools and data related to terrorism publicly available.18 One example is the Terrorism

[page 5]

Knowledge Portal, a database consisting of over 360,000 terrorism news articles and related Web pages coming from various high-quality terrorism Web sites, major search engines, and news portals. By providing publicly available network tools and data, the research opens itself to a number of new scholars. Academics can double-check the work of others to ensure quality. New scholars can enter the field without the lengthy time commitment and financial cost of developing basic tools and getting data. Such activities, combined with the federal government’s support, will help push the field of terrorism-related social network analysis to new heights in the future.


18 Edna Reid, Jialun Quin, Wingyan Chung, Jennifer Xu, Yilu Zhou, Rob Schumaker, Marc Sageman, and Hsinchun Chen, “Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Address the Threats of Terrorism,” (Working paper, 2004).

Anmerkungen

The source is given, but the reference doesn't give any indication that any text at all has been taken from it. It is given as reference for the insight: "It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data"

Sichter
(Hindemith) Singulus


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20140207025303

Auch bei Fandom

Zufälliges Wiki