Fandom

VroniPlag Wiki

Quelle:Nm6/Ressler 2006

< Quelle:Nm6

31.373Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Angaben zur Quelle [Bearbeiten]

Autor     Steve Ressler
Titel    Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research
Zeitschrift    Homeland Security Affairs
Herausgeber    Naval Postgraduate School Center for Homeland Defense and Security
Datum    July 2006
Nummer    2 (2)
URL    http://www.hsaj.org/?fullarticle=2.2.8

Literaturverz.   

yes
Fußnoten    yes
Fragmente    2


Fragmente der Quelle:
[1.] Nm6/Fragment 485 13 - Diskussion
Zuletzt bearbeitet: 2014-02-09 08:59:03 Hindemith
BauernOpfer, Fragment, Gesichtet, Nm6, Ressler 2006, SMWFragment, Schutzlevel sysop

Typus
BauernOpfer
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 485, Zeilen: 13-31
Quelle: Ressler_2006
Seite(n): 4, 5, Zeilen: 4: 8ff; 5: 1ff
Data collection is difficult for any network analysis because it is difficult to create a complete network. It is not easy to gain information on terrorist networks. It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data [15]. A number of academic researchers [16] [17] [18] focus primarily on data collection on terrorist organizations, analyzing the information through description and straightforward modeling.

One promising activity is the development of a major terrorism web portal at the University of Arizona’s Artificial Intelligence Center. This website makes social network tools and data related to terrorism publicly available. One example is the Terrorism Knowledge Portal [19], a database consisting of over 360,000 terrorism news articles and related Web pages coming from various high-quality terrorism Web sites, major search engines, and news portals. By providing publicly available network tools and data, the research opens itself to a number of new scholars. Academics can double-check the work of others to ensure quality. New scholars can enter the field without the lengthy time commitment and financial cost of developing basic tools and getting data. Such activities, combined with the federal government’s support, will help push the field of terrorism-related social network analysis to new heights in the future.


15. Ressler, S.: Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research (2006)

16. Krebs, V.E.: Mapping Networks of Terrorist Cells. Connections 24(3), 43–52 (2002) Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies 489

17. Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press, Philadelphia (2004)

18. Rodriquez, J.A.: The March 11th Terrorist Network: In its weakness lies its strength. In: Proc. XXV International Sunbelt Conference, Los Angeles (2005)

19. Reid, E., et al.: Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 125–145. Springer, Heidelberg (2004)

Data collection is difficult for any network analysis because it is hard to create a complete network. It is especially difficult to gain information on terrorist networks. Terrorist organizations do not provide information on their members, and the government rarely allows researchers to use their intelligence data. A number of academic researchers focus primarily on data collection on terrorist organizations, analyzing the information through description and straightforward modeling.

[...]

[...] One promising activity is the development of a major terrorism web portal at the University of Arizona’s Artificial Intelligence Center. This website makes social network tools and data related to terrorism publicly available.18 One example is the Terrorism

[page 5]

Knowledge Portal, a database consisting of over 360,000 terrorism news articles and related Web pages coming from various high-quality terrorism Web sites, major search engines, and news portals. By providing publicly available network tools and data, the research opens itself to a number of new scholars. Academics can double-check the work of others to ensure quality. New scholars can enter the field without the lengthy time commitment and financial cost of developing basic tools and getting data. Such activities, combined with the federal government’s support, will help push the field of terrorism-related social network analysis to new heights in the future.


18 Edna Reid, Jialun Quin, Wingyan Chung, Jennifer Xu, Yilu Zhou, Rob Schumaker, Marc Sageman, and Hsinchun Chen, “Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Address the Threats of Terrorism,” (Working paper, 2004).

Anmerkungen

The source is given, but the reference doesn't give any indication that any text at all has been taken from it. It is given as reference for the insight: "It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data"

Sichter
(Hindemith) Singulus

[2.] Nm6/Fragment 486 01 - Diskussion
Zuletzt bearbeitet: 2014-02-09 08:58:58 Hindemith
Fragment, Gesichtet, Nm6, Ressler 2006, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 486, Zeilen: 1-12
Quelle: Ressler_2006
Seite(n): 4, Zeilen: 32ff
Despite their strength, researchers’ works have a few key drawbacks. By dealing with open sources, these authors use limited data sets. With open sources, if the author does not have information on terrorists, he or she assumes they do not exist. This can be quite problematic as the data analysis may be misleading. For example, if one cannot find an Al Qaeda operative in Denmark in publicly available sources, the researcher could assume there is no Al Qaeda network. However, it is highly probable that this is not the case, since terrorists generally try to keep a low profile before committing an attack. The data collectors can also be criticized because their work is more descriptive and lacks complex modeling tools. Fostering relationships with modelers could augment the work being conducted by data collectors, as statistical analysis might be able to take into account some of the limitations of the data and provide an additional analytical framework. Despite their many strengths, Krebs’ and Sageman’s works have a few key drawbacks. By dealing with open sources, these authors are limited in acquiring data. With open sources, if the author does not have information on terrorists, he or she assumes they do not exist. This can be quite problematic as the data analysis may be misleading. If one cannot find an al Qaeda operative in the U.S. in publicly available sources, the researcher could assume there is no al Qaeda network. However, it is highly probable this is not the case, since terrorists generally try to keep a low profile before committing an attack. The data collectors can also be criticized because their work is more descriptive and lacks complex modeling tools. Fostering relationships with modelers could augment the work being conducted by data collectors, as statistical analysis might be able to take into account some of the limitations of the data and provide an additional analytical framework.
Anmerkungen

The source is mentioned two paragraphs further up on the previous page, but without any indication that any text at all has been taken from it.

It is given as reference for the sentence: "It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data"

Sichter
(Hindemith) Singulus

Auch bei Fandom

Zufälliges Wiki