Angaben zur Quelle [Bearbeiten]
Autor | Mary DeRosa |
Titel | Data Mining and Data Analysis for Counterterrorism |
Herausgeber | Center for Strategic and International Studies |
Ort | New York |
Verlag | The CSIS Press |
Jahr | 2004 |
ISBN | 0-89206-443-9 |
URL | http://csis.org/files/media/csis/pubs/040301_data_mining_report.pdf |
Literaturverz. |
yes |
Fußnoten | yes |
Fragmente | 1 |
Fragmente der Quelle:
[1.] Nm2/Fragment 432 24 - Diskussion Zuletzt bearbeitet: 2014-01-11 21:10:47 Hindemith | BauernOpfer, DeRosa 2004, Fragment, Gesichtet, Nm2, SMWFragment, Schutzlevel sysop |
|
|
Untersuchte Arbeit: Seite: 432, Zeilen: 24-30 |
Quelle: DeRosa 2004 Seite(n): v, Zeilen: 32ff |
---|---|
Although these techniques are powerful, it is a mistake to view investigative data mining techniques as a complete solution to security problems. The strength of IDM is to assist analysts and investigators. IDM can automate some functions that analysts would otherwise have to perform manually. It can help to prioritize attention and focus an inquiry, and can even do some early analysis and sorting of masses of data. Nevertheless, in the complex world of counterterrorism, it is not likely to be useful as the only source for a conclusion or decision. | Although these techniques are powerful, it is a mistake to view data mining and automated data analysis as complete solutions to security problems. Their strength is as tools to assist analysts and investigators. They can automate some functions that analysts would otherwise have to perform manually, they can help prioritize attention and focus an inquiry, and they can even do some early analysis and sorting of masses of data. But in the complex world of counterterrorism, they are not likely to be useful as the only source for a conclusion or decision. |
The source in mentioned one paragraph above, which is also very much inspired from it. However, there is no indication, implicit or explicit, that this paragraph is also taken from De Rosa (2004). |
|