VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm/Fragment 019 01 - Diskussion
Zuletzt bearbeitet: 2012-05-01 19:49:00 Hindemith
Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu and Chen 2003

Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Untersuchte Arbeit:
Seite: 19, Zeilen: 1, 3-15
Quelle: Xu and Chen 2003
Seite(n): 232, Zeilen: 21-23, 24-29, 30-32
I. INTRODUCTION [FN 1]

1.1. OVERVIEW

Terrorists seldom operate in vacuum but interact with one another to carry out terrorist activities. To perform terrorist activities requires collaboration among terrorists. Relationship between individual terrorists for the basis of terrorism and are essential for the smooth operation of a terrorist organization, which can be viewed as network consisting of nodes [FN 2] (for example terrorists, terrorist camps, supporting countries, etc.) and links [FN 3] / ties (relationships). In terrorist networks, there may present some groups/ or cells, within which members have close relationships. One group may also interact with other groups. For example, some key nodes (key players) may act as leaders to control activities of a group. Some others may serve as gatekeepers to ensure smooth flow of information or illicit goods.

[FN 1] Parts of this chapter are already published in Memon N., Hicks David L., and Larsen Henrik Legind. (2007d) Memon N. Lasen H.L. (2006a) (2006b) (2006c);

[FN 2] In this dissertation the words: nodes, actors, players, and vertices are used interchangeably

[FN 3] In this dissertation the words: links, ties, relationships, and edges are used interchangeably

1 Introduction

Criminals seldom operate in a vacuum but interact with one another to carry out various illegal activities. In particular, organized crimes [...] require collaboration among offenders. Relationships between individual offenders form the basis for organized crimes [18] and are essential for smooth operation of a criminal enterprise, which can be viewed as a network consisting of nodes (individual offenders) and links (relationships). In criminal networks, there may exist groups or teams, within which members have close relationships. One group also may interact with other groups [...]. For example, some key members may act as leaders to control activities of a group. Some others may serve as gatekeepers to ensure smooth flow of information or illicit goods.

Anmerkungen

Take somebody else's introduction, shorten it slightly, cross out "criminals" and "offenders" and put "terrorists" instead. That way Nm's introduction was made. (There is no reference to Xu and Chen (2003))

The whole page will be repeated more or less on page 93 of the thesis: Nm/Fragment_093_04

Sichter
(Graf Isolan), Bummelchen


[2.] Nm/Fragment 019 16 - Diskussion
Zuletzt bearbeitet: 2012-04-28 16:27:52 Hindemith
BauernOpfer, Fragment, Gesichtet, Katz et al 2004, Nm, SMWFragment, Schutzlevel sysop

Typus
BauernOpfer
Bearbeiter
Graf Isolan
Gesichtet
Untersuchte Arbeit:
Seite: 19, Zeilen: 16-25
Quelle: Katz et al 2004
Seite(n): 308-309, Zeilen: p.308,23-33 - p.309,1-2
In social network literature, researchers have examined a broad range of types of ties (Katz, N. et al. 2004). These include communication ties (such as who talks to whom or who gives information or advice to whom), formal ties (such as who reports to whom), affective ties (such as who likes whom, or who trust whom), material or work flow ties (such as who gives bomb making material or other resources to whom), proximity ties (who is spatially or electronically close to whom). Networks are typically multiplex, that is, actors share more than one type of tie. For example, two terrorists might have a formal tie (one is foot-[soldier / newly recruited person in terrorist cell and reports to the other, who is the cell leader) and an affective tie (they are friends) and proximity tie (they are residing in the same apartment and their flats are two doors away on the same floor).] [p. 308]

Network researchers have examined a broad range of types of ties. These include communication ties (such as who talks to whom, or who gives information or advice to whom). formal ties (such as who reports to whom), affective ties (such as who likes whom, or who trusts whom). material or work flow ties (such as who gives money or other resources to whom), proximity ties (who is spatially or electronically close to whom), and cognitive ties (such as who knows who knows whom). Networks are typically mutiplex, that is, actors share more than one type of tie. For example, two academic colleagues might have a formal tie (one is an assistant professor and reports to the other. who is the department chairperson)

[p. 309]

and an affective tie (they are friends) and a proximity tie (their offices are two doors away).

Anmerkungen

The exact same section will be used again on pages 93 and 94 of this thesis [1], [2]. Here like there, there is only a passing reference made to the source of this text. Here like there, nothing is marked as a citation.

Sichter
(Graf Isolan) Agrippina1



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120428163514