Skip to main content

Currently Skimming:

4 WORKSHOP THEMES
Pages 48-52

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 48...
... WORKSHOP 1: DISRUPTING IED CAMPAIGNS: FINDING THE WEAK LINKS Data and Approaches Available for Analysis The first workshop focused on the human dimension of IED campaigns. One theme that was evident in workshop participants' discussions was the need for both data and approaches to analyze data.
From page 49...
... Although the 2007 National Research Council report noted the ability of the adversary to learn and adapt, the workshop highlighted the learning and adaptability of not just the adversary but the counter-IED forces. The importance of recognizing that learning occurs on both sides of an IED conflict is reflected in proposed approaches, questions, and issues raised by workshop participants.
From page 50...
... Another theme that was evident in discussions was the importance of network modeling, especially modeling efforts that are able to capture the dynamic nature of networks in the face of partial and uncertain data. Availability of Data As in the first workshop, discussions in the second brought up the need for publicly available databases so that researchers can readily test models, methods, and hypotheses.
From page 51...
... Participants stated that DOD could take a number of creative approaches to making datasets available to researchers. Data from other conflicts, such as the Troubles in Northern Ireland and the Algerian War of Independence, or other contexts, such as counternarcotics operations and efforts to detect and counter insider trading, could provide valuable datasets for researchers to use in testing models, methods, and hypotheses.
From page 52...
... For example, research to develop methods for detecting telephone fraud benefited from interactions between computer scientists, statisticians, and members of the law-enforcement community. Similarly, although research in the nature of insurgencies and other armed conflicts started with a physics and mathematics perspective (Johnson 2006, 2008)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.