National Academies Press: OpenBook
« Previous: APPENDIX C: LIST OF WORKSHOP PARTICIPANTS
Suggested Citation:"GLOSSARY." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
×
Page 68
Suggested Citation:"GLOSSARY." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
×
Page 69

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

GLOSSARY Agent-based modeling: An adaptive modeling method that simulates the behaviors of individuals to generate data for the analysis of the behaviors of groups Bayesian networks: A probabilistic graphical model that represents the functional dependencies between a collection of variables of interest Biometrics: Automated methods of analysis of physical or behavior characteristics for the purpose of identification Blue forces: A common term referring to “friendly” personnel in an area where conflict is occurring Data fusion: The formal synthesis of many distinct types of information (audio, visual, written, etc.) to support decision making Decision theory: A sub-discipline of both game theory and statistics, this is the determination of optimal actions in the presence of uncertainty, when the consequences of those actions are known and depend on various unknown states of nature, which are addressed through the use of probabilistic modeling Game theory: The study of optimal decision-making in situations that involve a number of players, stipulating either competitive or cooperative interactions between the players, in which their individual payoffs are a function of both their actions and those of the other players, and that involve states of nature which may be only incompletely known Green forces: A common term referring to the civilians in an area where conflict is occurring IED: Improvised explosive device IRA: Provisional Irish Republican Army JDLR: “Just doesn’t look right” Market-sentiment data: An analysis method used to assess the attitude of a group of consumers 68

Mixed-initiative decision making: A cyclical method of data training where a user guides a computer program during analysis with the aim of teaching the program how to perform the analysis with greater accuracy Network tomography: The field of inferential network monitoring, in which internal characteristics of a network are inferred by using information derived from end-point data Pashtun: The Pashto-speaking people who constitute the majority of the population in Afghanistan Principal-component analysis: A method used on a set of variables that identifies the primary linear combinations of those variables which account for the majority of the variance in the full set of variables. Its goal is to reduce the dimensionality of a complex data set with many related variables Probabalistic neural networks: A non-linear statistical model used to fit a response whose structure derives from a model of how information can be combined through the use of a collection of independent sensory nodes Red forces: A common term referring to the personnel of adversaries in an area where conflict is occurring Viral marketing: A system of marketing that uses pre-existing social networks to spread a marketing message by encouraging recipients to pass on information Wiki: A collection of web pages that allows all users to contribute and modify data 69

Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report Get This Book
×
Buy Paperback | $29.00 Buy Ebook | $23.99
MyNAP members save 10% online.
Login or Register to save!

Countering the threat of improvised explosive devices (IED)s is a challenging, multilayered problem. The IED itself is just the most publicly visible part of an underlying campaign of violence, the IED threat chain. Improving the technical ability to detect the device is a primary objective, but understanding of the goals of the adversary; its sources of materiel, personnel, and money; the sociopolitical environment in which it operates; and other factors, such as the cultural mores that it must observe or override for support, may also be critical for impeding or halting the effective use of IEDs.

Disrupting Improvised Explosive Device Terror Campaigns focuses on the human dimension of terror campaigns and also on improving the ability to predict these activities using collected and interpreted data from a variety of sources.

A follow-up to the 2007 book, Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities, this book summarizes two workshops held in 2008.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!