Fandom

VroniPlag Wiki

Quelle:Nm2/DeRosa 2004

< Quelle:Nm2

31.385Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Angaben zur Quelle [Bearbeiten]

Autor     Mary DeRosa
Titel    Data Mining and Data Analysis for Counterterrorism
Herausgeber    Center for Strategic and International Studies
Ort    New York
Verlag    The CSIS Press
Jahr    2004
ISBN    0-89206-443-9
URL    http://csis.org/files/media/csis/pubs/040301_data_mining_report.pdf

Literaturverz.   

yes
Fußnoten    yes
Fragmente    1


Fragmente der Quelle:
[1.] Nm2/Fragment 432 24 - Diskussion
Zuletzt bearbeitet: 2014-01-11 21:10:47 Hindemith
BauernOpfer, DeRosa 2004, Fragment, Gesichtet, Nm2, SMWFragment, Schutzlevel sysop

Typus
BauernOpfer
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 432, Zeilen: 24-30
Quelle: DeRosa 2004
Seite(n): v, Zeilen: 32ff
Although these techniques are powerful, it is a mistake to view investigative data mining techniques as a complete solution to security problems. The strength of IDM is to assist analysts and investigators. IDM can automate some functions that analysts would otherwise have to perform manually. It can help to prioritize attention and focus an inquiry, and can even do some early analysis and sorting of masses of data. Nevertheless, in the complex world of counterterrorism, it is not likely to be useful as the only source for a conclusion or decision. Although these techniques are powerful, it is a mistake to view data mining and automated data analysis as complete solutions to security problems. Their strength is as tools to assist analysts and investigators. They can automate some functions that analysts would otherwise have to perform manually, they can help prioritize attention and focus an inquiry, and they can even do some early analysis and sorting of masses of data. But in the complex world of counterterrorism, they are not likely to be useful as the only source for a conclusion or decision.
Anmerkungen

The source in mentioned one paragraph above, which is also very much inspired from it. However, there is no indication, implicit or explicit, that this paragraph is also taken from De Rosa (2004).

Sichter
(Hindemith), WiseWoman

Auch bei Fandom

Zufälliges Wiki