Fandom

VroniPlag Wiki

Quelle:Nm/Saxena et al. 2004

< Quelle:Nm

31.368Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Angaben zur Quelle [Bearbeiten]

Autor     Sudhir Saxena, K. Santhanam, Aparna Basu
Titel    Application of Social Network Analysis (SNA) to Terrorist Networks in Jammu & Kashmir
Zeitschrift    Strategic Analysis
Herausgeber    Institute for Defence Studies and Analyses
Ausgabe    28
Datum    Jan-Mar 2004
Nummer    1
Seiten    84-101
URL    http://www.idsa.in/system/files/strategicanalysis_ksanthanam_0304.pdf

Literaturverz.   

no
Fußnoten    no
Fragmente    3


Fragmente der Quelle:
[1.] Nm/Fragment 041 08 - Diskussion
Zuletzt bearbeitet: 2012-06-27 13:44:02 Sotho Tal Ker
Fragment, Gesichtet, Nm, SMWFragment, Saxena et al. 2004, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 41, Zeilen: 8-15
Quelle: Saxena et al. 2004
Seite(n): 85, Zeilen: 6-12
The increase of number of terrorism incidents in recent years has increased the feeling of insecurity and danger in many countries. In this regard, classified information with government agencies is not available to the public or academic research institutions. However, the Internet revolution has opened up a new ways by providing huge volume of information on these incidents. Such information in open domain can be a used to create a knowledge base which, after proper cleaning could be useful for intelligence analysis. The increase in violent terrorist incidents, in recent years, has heightened the feeling of insecurity in many countries. In this regard, privileged information with government agencies is not available to the public or academic research institutes. However, the IT revolution has opened up a growing volume of information on these incidents. This information in the open domain can be a valuable resource in creating a data base which, after proper capture, cleaning and classification could be useful in strategic analysis
Anmerkungen

The source is not mentioned in the entire thesis.

Sichter
(Hindemith), Bummelchen

[2.] Nm/Fragment 042 12 - Diskussion
Zuletzt bearbeitet: 2012-06-27 13:44:39 Sotho Tal Ker
Fragment, Gesichtet, Nm, SMWFragment, Saxena et al. 2004, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 42, Zeilen: 12-18
Quelle: Saxena et al. 2004
Seite(n): 85, Zeilen: 17-21
Terrorist and criminal organizations, generally organize themselves as secret networks with distributed work share. It is difficult to obtain information in the open domain on their membership, links and management or confirm the validity of such information. Still then, due to the need of publicity for the terrorists, for their cause, the open source information becomes relevant in exploring terrorist networks. Terrorist and criminal organisations, generally, organise themselves as secret networks with distributed work share. It is not easy to obtain confirmed information in the open domain on their membership, ties and management. However, terrorists need the oxygen of publicity for their ‘cause’; and, hence, open source information [EN 1] becomes relevant in exploring such networks.
Anmerkungen

No source is given for this short paragraph.

Sichter
(Hindemith), Bummelchen

[3.] Nm/Fragment 243 23 - Diskussion
Zuletzt bearbeitet: 2012-06-27 13:45:31 Sotho Tal Ker
Fragment, Gesichtet, Nm, SMWFragment, Saxena et al. 2004, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 243, Zeilen: 23-26
Quelle: Saxena et al. 2004
Seite(n): 94, Zeilen: 11-15
Further real-time or near real-time information from a multiplicity of databases could have the potential to generate early warning signals of utility in detecting and deterring terrorist attacks. It is necessary, of course, to have experts in the loop. It has not escaped our notice that SNA, duly validated and used with real-time or near real-time information from a multiplicity of databases could have the potential to generate early warning signals of utility in detecting and deterring terrorist attacks. It is necessary, of course, to have ‘experts’ in the loop.
Anmerkungen

Some conclusion is also taken from Saxena et al. 2004

Sichter
(Hindemith), bummelchen

Auch bei Fandom

Zufälliges Wiki