Fandom

VroniPlag Wiki

Quelle:Nm/Carley 2006

< Quelle:Nm

31.354Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Angaben zur Quelle [Bearbeiten]

Autor     Kathleen M. Carley
Titel    Destabilization of covert networks
Zeitschrift    Comput Math Organiz Theor
Jahr    2006
Nummer    12
Seiten    51-66
DOI    DOI 10.1007/s10588-006-7083-y
URL    http://www.springerlink.com/content/p17u819571885670/

Literaturverz.   

no
Fußnoten    no
Fragmente    2


Fragmente der Quelle:
[1.] Nm/Fragment 040 01 - Diskussion
Zuletzt bearbeitet: 2012-05-22 19:44:54 Hindemith
Carley 2006, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 40, Zeilen: 1-9
Quelle: Carley 2006
Seite(n): 53, Zeilen: 31-37
In addition to the previous discussion, link analysis is basically a descriptive approach for exploring data in order to identify relationship among values in the database. In this approach, the user lays out graphically; the links between various entities; such as people, resources, and locations. A key limitation of this approach is that it is a primary a tool for visualization and organization. There are no analytic metrics attached. As such, there are no

procedures for analyzing the data estimating who or what should be targeted to achieve what effects, or for estimating [...]

Visual link analysis is basically a descriptive approach to exploring data in order to identify relationships among values in a database. In this approach, the user lays out graphically the links between various entities such as people, resources, and locations. A key limitation of this approach is that it is primarily a tool for visualization and organization. There are no analytic metrics or attached. As such, there are no procedures for analyzing the data and estimating what data is missing, who or what should be targeted to achieve what effects, or for estimating [...]
Anmerkungen

nothing is marked as a citation, source is not given.

Sichter
(Graf Isolan), Hindemith

[2.] Nm/Fragment 045 01 - Diskussion
Zuletzt bearbeitet: 2012-05-22 19:44:41 Hindemith
Carley 2006, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 45, Zeilen: 1-16
Quelle: Carley 2006
Seite(n): 51-52, Zeilen: p.51,14.15-20 - p.52,1-5
Terrorist networks are so often challenging to reason about and manage. These networks differ on many dimensions. For examples, terrorist networks range in complexity and lethalness of the weaponries they use, the level and source of their fiscal support, their core organizational structure, and their linking to organized crime, the local police and other terrorist or rebellious groups. Despite these differences, in general, these groups rely on communication groups, with and without advanced information technology, to employ, organize, design, direct, and perform terrorist attacks. As such targeting mechanisms aimed at information, channels, and actors can be used to classify those relations and nodes that are actual targets for disrupting the organizational movement or interrelation of these terrorist networks. Investigative data mining provides a means for detecting such targets and assessing the impact of different courses of action on the terrorist networks. [page 51]

Covert networks are often difficult to reason about and manage. [...] These groups[FN 1] vary on many dimensions. For example, terrorist groups range in the sophistication and deadliness of the weapons they use, the level and source of their financial support, their internal organizational structure, and their connection to organized crime, the local police and other terrorist or insurgent groups. Despite these differences, in general, these groups rely on communication networks, with and without advanced information technology, to recruit, organize, plan, direct, and

[page 52]

execute terrorist acts. As such, targeting mechanisms aimed at information, channels, and actors can be used to identify those links and nodes that are effective targets for destabilizing the organizational activity or cohesion of these covert networks. Dynamic network analysis provides a means for identifying such targets and assessing the impact of alternate courses of action on these covert networks.

Anmerkungen

Only small bits and pieces have been exchanged; otherwise the text has been left more or less intact. No reference to the source is given.

Sichter
(Graf Isolan), Hindemith

Auch bei Fandom

Zufälliges Wiki