0% found this document useful (0 votes)
12 views

Report Full V2

The document contains two analysis reports. Report 1 includes an introduction, five figures in the key findings section, and a conclusion. Report 2 provides a critique of a journal article that used Hadoop and statistics to analyze terrorism data. It summarizes the article's methodology and findings. However, it also identifies four limitations, such as uncertainties in the underlying datasets and a lack of details on addressing ethical concerns when analyzing sensitive terrorism data. Overall, the critique suggests the approach has potential but more information and safeguards are needed.

Uploaded by

Hazem Elseify
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Report Full V2

The document contains two analysis reports. Report 1 includes an introduction, five figures in the key findings section, and a conclusion. Report 2 provides a critique of a journal article that used Hadoop and statistics to analyze terrorism data. It summarizes the article's methodology and findings. However, it also identifies four limitations, such as uncertainties in the underlying datasets and a lack of details on addressing ethical concerns when analyzing sensitive terrorism data. Overall, the critique suggests the approach has potential but more information and safeguards are needed.

Uploaded by

Hazem Elseify
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

ANALYSIS REPORT

Table of content

TABLE OF CONTENT ............................................................................................................................................................. 1

REPORT 1 ............................................................................................................................................................................. 2

TITLE.......................................................................................................................................................................................... 2

INTRODUCTION ............................................................................................................................................................................ 3

KEY FINDINGS .............................................................................................................................................................................. 4

Figure 1 ...............................................................................................................................................................4

Figure 2 ...............................................................................................................................................................5

Figure 3 ...............................................................................................................................................................6

Figure 4 ...............................................................................................................................................................7

Figure 5 ...............................................................................................................................................................8

CONCLUSION ............................................................................................................................................................................... 9

REPORT 2 ........................................................................................................................................................................... 10

1. INTRODUCTION ................................................................................................................................................................. 10

2. SUMMARY........................................................................................................................................................................ 10

3. CRITIQUE ......................................................................................................................................................................... 11

3.1 The First Limitation .............................................................................................................................. 11

3.2 The Second Limitation ......................................................................................................................... 11

3.3 The Third Limitation ............................................................................................................................ 11

3.4 The Forth Limitation ............................................................................................................................ 11

4. CONCLUSION .................................................................................................................................................................... 12

1
Report 1

Title

2
Introduction

3
Key Findings
Figure 1

4
Figure 2

5
Figure 3

6
Figure 4

7
Figure 5

8
Conclusion

9
Report 2

1. Introduction
Terrorism is a global security concern that requires proper analysis to understand the
nature of it, trends and patterns. The journal article Analyzing Relationships in Terrorism
Big Data Using Hadoop and Statistics aims to provide a full analysis of terrorism data
using big data technologies such as Hadoop and statistical techniques. The paper
proposes a novel approach to identify hidden relationships and patterns among terrorist
activities that can lead to identify potential terrorist attacks.

2. Summary
The authors showed a methodology for analyzing terrorism big data using Hadoop and
statistical techniques. They use datasets such as the Global Terrorism Database and the
Worldwide Incidents Tracking System for analyzing terrorism data.

Hadoop is used for processing large volumes of data and Apache Hive is used for data
querying.

Also used statistical techniques such as clustering, principal component analysis (PCA)
and network analysis are used to identify hidden relationships and patterns in the data.

The results indicate that the proposed approach provides a Full analysis of terrorism
data and can lead to identify potential terrorist attacks.

10
3. Critique
While the article presents a comprehensive methodology for analyzing terrorism data,
there are some limitations that need attention.

3.1 The First Limitation



and WITS datasets are used for terrorism research but there are doubt as to its accuracy
and completeness. Therefore, it would be helpful if the authors had provided some
information about the limitations and biases of these datasets

3.2 The Second Limitation



analysis. The authors in brief mentioned the clustering, PCA, and network analysis

examples to explain how these techniques are used to identify hidden relationships and
patterns in the data

3.3 The Third Limitation



required for analyzing the terrorism data and the authors used Hadoop and Apache Hive
for processing a large volumes of the data but it is unclear how much computational
resources that needed to perform this analysis and because the big data technologies
need big computational resources so it would be helpful if the authors had provided
some information about the computational requirements of the methodology they used

3.4 The Forth Limitation



data and the analysis of terrorism data can raise several ethical concerns like privacy for
certain communities because the ’
helpful if they could provide some insights on how to avoid these ethical issues

11
4. Conclusion
in the end of the report the article showed us a way for analyzing terrorism data using
big data technologies and statistical techniques and the approach that been used
provides a full analysis of terrorism data and lead to identify potential terrorist attacks.
So that the paper has a few limitations about 4 limitations that mentioned earlier that
requires attention:

providing more details about the datasets used in the analysis explaining the statistical
techniques used in the analysis

Providing information about the computational requirements

addressing the ethical implications of analyzing terrorism data.

Overall, the methodology provided will improve our understanding of terrorism


activities and lead to understand the development of counter-terrorism strategies.

12

You might also like