Fandom

VroniPlag Wiki

Quelle:Nm/Dugan etal 2006

< Quelle:Nm

31.368Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Angaben zur Quelle [Bearbeiten]

Autor     Laura Dugan, Gary LaFree, Heather Fogg
Titel    A First Look at Domestic and International Global Terrorism Events, 1970–1997
Sammlung    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006 : Proceedings
Herausgeber    Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang
Ort    Berlin Heidelberg
Verlag    Springer-Verlag
Jahr    2006
Seiten    407-419
ISBN    3-540-34478-0
ISSN    0302-9743
URL    [1] and Google books

Literaturverz.   

no
Fußnoten    no
Fragmente    2


Fragmente der Quelle:
[1.] Nm/Fragment 215 01 - Diskussion
Zuletzt bearbeitet: 2012-04-23 11:18:44 Hindemith
Dugan etal 2006, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 215, Zeilen: 1-4
Quelle: Dugan_etal_2006
Seite(n): 409, Zeilen: 29-32
[The weakness of the] knowledge base includes potential media bias and misinformation, lack of information beyond incident specific details alone, and missing data which was not available in the media. We review some of these strength and weaknesses in the next section of this article. Weaknesses of the database include potential media bias and misinformation, lack of information beyond incident specific details alone, and missing data from a set of cards that were lost during an office move of PGIS. We review some of these strengths and weaknesses in the next section of this report.
Anmerkungen

The source is not mentioned anywhere in the thesis

Sichter
(Hindemith), Bummelchen

[2.] Nm/Fragment 216 05 - Diskussion
Zuletzt bearbeitet: 2012-04-23 11:27:25 Hindemith
Dugan etal 2006, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 216, Zeilen: 5-30
Quelle: Dugan_etal_2006
Seite(n): 410-411, Zeilen: p 410: 39ff; p 411: 1ff
7.4.2 Weaknesses of Open Source Knowledge bases

As discussed above, the original knowledge base has some important strength; this study also recognizes that it also has significant weaknesses that need to be understood when drawing conclusions from data. Two types of weaknesses are especially important. First, all major open source databases rely on data culled from news resources; they are likely biased toward the most newsworthy forms of terrorism (Fowler, W. W., 1981).

Although the original knowledge base under discussion, includes events that were prevented by authorities (for example the Bojinka terrorists plan), it is certain that some potential terrorist attacks never came to the attention of the media and are thus excluded. A related issue is that the original knowledge base includes incidents covered by media where criminals/ terrorists remain undisclosed. Without information concerning a criminal/ terrorist it may be difficult to accurately classify an incident as terrorism. Also, various media accounts of similar terrorist incidents may contain conflicting information. Without measures of reliability in news reporting, it is difficult for researchers to distinguish, which source supplies the most perfect account.

The second issue is that the original knowledge base lacks information on other important issues associated with each terrorism incident. Open source databases also lack information on the psychological characteristics, recruitment, and careers of members of terrorist movements. A lack of data on terrorist networks is mainly explained by their covert nature.

4.2 Weaknesses of Open Source Terrorism Databases

But while the PGIS data has some important strengths, we also recognize that it also has important weaknesses that need to be understood when drawing conclusions from the data. Three types of weaknesses are especially important. First, all the major open source terrorism databases (ITERATE, MIPT-RAND and PGIS) rely on data culled from news sources, thus they are likely biased toward the most newsworthy forms of terrorism [6]. Although the PGIS database includes events that were prevented by [page 411] authorities, it is certain that some potential terrorist attacks never came to the attention of the media and are thus excluded. A related issue is that the PGIS database includes incidents covered by the media where the perpetrator remains unidentified. Without information concerning the perpetrator it may be difficult to accurately classify the incident as terrorism, since the definition relies on the motive of the attacker. Finally, various media accounts of similar terrorist incidents may contain conflicting information. Without measures of reliability in news reporting, it is difficult for researchers to discern which source supplies the most accurate account.

The second issue is that the dataset lacks information on other important issues associated with each terrorism incident. Open source databases, including the one created by PGIS also lack information on the “psychological characteristics, recruitment, and careers of members of terrorist movements” [9:28]. [...] Of course, the lack of data on terrorist groups is mainly explained by their clandestine nature.


[6]. Fowler, W. W. (1981). [...]

Anmerkungen

The text has been copied with only slight adaptations, the source is not mentioned in the thesis anywhere

Sichter
(Hindemith), Bummelchen

Auch bei Fandom

Zufälliges Wiki