VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki


Typus
BauernOpfer
Bearbeiter
Hindemith
Gesichtet
Yes
Untersuchte Arbeit:
Seite: 485, Zeilen: 13-31
Quelle: Ressler_2006
Seite(n): 4, 5, Zeilen: 4: 8ff; 5: 1ff
Data collection is difficult for any network analysis because it is difficult to create a complete network. It is not easy to gain information on terrorist networks. It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data [15]. A number of academic researchers [16] [17] [18] focus primarily on data collection on terrorist organizations, analyzing the information through description and straightforward modeling.

One promising activity is the development of a major terrorism web portal at the University of Arizona’s Artificial Intelligence Center. This website makes social network tools and data related to terrorism publicly available. One example is the Terrorism Knowledge Portal [19], a database consisting of over 360,000 terrorism news articles and related Web pages coming from various high-quality terrorism Web sites, major search engines, and news portals. By providing publicly available network tools and data, the research opens itself to a number of new scholars. Academics can double-check the work of others to ensure quality. New scholars can enter the field without the lengthy time commitment and financial cost of developing basic tools and getting data. Such activities, combined with the federal government’s support, will help push the field of terrorism-related social network analysis to new heights in the future.


15. Ressler, S.: Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research (2006)

16. Krebs, V.E.: Mapping Networks of Terrorist Cells. Connections 24(3), 43–52 (2002) Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies 489

17. Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press, Philadelphia (2004)

18. Rodriquez, J.A.: The March 11th Terrorist Network: In its weakness lies its strength. In: Proc. XXV International Sunbelt Conference, Los Angeles (2005)

19. Reid, E., et al.: Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 125–145. Springer, Heidelberg (2004)

Data collection is difficult for any network analysis because it is hard to create a complete network. It is especially difficult to gain information on terrorist networks. Terrorist organizations do not provide information on their members, and the government rarely allows researchers to use their intelligence data. A number of academic researchers focus primarily on data collection on terrorist organizations, analyzing the information through description and straightforward modeling.

[...]

[...] One promising activity is the development of a major terrorism web portal at the University of Arizona’s Artificial Intelligence Center. This website makes social network tools and data related to terrorism publicly available.18 One example is the Terrorism

[page 5]

Knowledge Portal, a database consisting of over 360,000 terrorism news articles and related Web pages coming from various high-quality terrorism Web sites, major search engines, and news portals. By providing publicly available network tools and data, the research opens itself to a number of new scholars. Academics can double-check the work of others to ensure quality. New scholars can enter the field without the lengthy time commitment and financial cost of developing basic tools and getting data. Such activities, combined with the federal government’s support, will help push the field of terrorism-related social network analysis to new heights in the future.


18 Edna Reid, Jialun Quin, Wingyan Chung, Jennifer Xu, Yilu Zhou, Rob Schumaker, Marc Sageman, and Hsinchun Chen, “Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Address the Threats of Terrorism,” (Working paper, 2004).

Anmerkungen

The source is given, but the reference doesn't give any indication that any text at all has been taken from it. It is given as reference for the insight: "It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data"

Sichter
(Hindemith) Singulus