Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

PAPER CRITIQUE ASSIGNMENT

Table of content

1. INTRODUCTION ........................................................................................................................................................... 2

2. SUMMARY .................................................................................................................................................................. 2

3. CRITIQUE ..................................................................................................................................................................... 3

3.1 THE FIRST LIMITATION...................................................................................................................................................... 3

3.2 THE SECOND LIMITATION .................................................................................................................................................. 3

3.3 THE THIRD LIMITATION .................................................................................................................................................... 3

3.4 THE FORTH LIMITATION.................................................................................................................................................... 4

CONCLUSION ....................................................................................................................................................................... 4
1. Introduction
Terrorism is a global security concern that requires proper analysis to understand the
nature of it, trends and patterns. The journal article Analyzing Relationships in Terrorism
Big Data Using Hadoop and Statistics aims to provide a full analysis of terrorism data
using big data technologies such as Hadoop and statistical techniques. The paper
proposes a novel approach to identify hidden relationships and patterns among terrorist
activities that can lead to identify potential terrorist attacks.

2. Summary
The authors showed a methodology for analyzing terrorism big data using Hadoop and
statistical techniques. They use datasets such as the Global Terrorism Database and the
Worldwide Incidents Tracking System for analyzing terrorism data.

Hadoop is used for processing large volumes of data and Apache Hive is used for data
querying.

Also used statistical techniques such as clustering, principal component analysis (PCA)
and network analysis are used to identify hidden relationships and patterns in the data.

The results indicate that the proposed approach provides a Full analysis of terrorism
data and can lead to identify potential terrorist attacks.
3. Critique
While the article presents a comprehensive methodology for analyzing terrorism data,
there are some limitations that need attention.

3.1 The First Limitation


The authors didn’t provide enough details about the datasets used in the analysis. GTD
and WITS datasets are used for terrorism research but there are doubt as to its accuracy
and completeness. Therefore, it would be helpful if the authors had provided some
information about the limitations and biases of these datasets

3.2 The Second Limitation


The paper didn’t provide unclear explanation for the statistical techniques used in the
analysis. The authors in brief mentioned the clustering, PCA, and network analysis
without providing any details about the implementation and they didn’t provide some
examples to explain how these techniques are used to identify hidden relationships and
patterns in the data

3.3 The Third Limitation


The article didn’t provide any information about the computational resources that
required for analyzing the terrorism data and the authors used Hadoop and Apache Hive
for processing a large volumes of the data but it is unclear how much computational
resources that needed to perform this analysis and because the big data technologies
need big computational resources so it would be helpful if the authors had provided
some information about the computational requirements of the methodology they used
3.4 The Forth Limitation
The article didn’t provide discussion on the ethical implications of analyzing terrorism
data and the analysis of terrorism data can raise several ethical concerns like privacy for
certain communities because the authors didn’t address these concerns and it would be
helpful if they could provide some insights on how to avoid these ethical issues

Conclusion
in the end of the report the article showed us a way for analyzing terrorism data using
big data technologies and statistical techniques and the approach that been used
provides a full analysis of terrorism data and lead to identify potential terrorist attacks.
So that the paper has a few limitations about 4 limitations that mentioned earlier that
requires attention:

providing more details about the datasets used in the analysis explaining the statistical
techniques used in the analysis

Providing information about the computational requirements

addressing the ethical implications of analyzing terrorism data.

Overall, the methodology provided will improve our understanding of terrorism


activities and lead to understand the development of counter-terrorism strategies.

You might also like