von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 028 05 - Diskussion Zuletzt bearbeitet: 2012-04-29 20:51:53 Graf Isolan | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu and Chen 2005a |
|
|
Untersuchte Arbeit: Seite: 28, Zeilen: 5-8 |
Quelle: Xu and Chen 2005a Seite(n): 102, Zeilen: left column 42-46 |
---|---|
Although SNA is not conventionally considered as data mining technique, it is especially suitable for mining a large volume of association data to discover hidden structural patterns in terrorist networks. | Although SNA is not traditionally considered as a data mining technique, it is especially suitable for mining large volumes of association data to discover hidden structural patterns in criminal networks [9, 10]. |
Right before he starts to massively present material form Koelle et al. (2006), for which he gives no reference, he puts in a small section, adapted in the usual way, from Xu and Chen (2005a), which he also does not mark as a citation and for which he also does not give a reference. Pure patchwork. |
|
[2.] Nm/Fragment 028 08 - Diskussion Zuletzt bearbeitet: 2012-04-21 14:50:27 Hindemith | Fragment, Gesichtet, Koelle et al 2006, KomplettPlagiat, Nm, SMWFragment, Schutzlevel sysop |
|
|
Untersuchte Arbeit: Seite: 28, Zeilen: 8-27 |
Quelle: Koelle et al 2006 Seite(n): 1 (internet version), Zeilen: left column 25-46 |
---|---|
Social network analysis (SNA) primarily focuses on applying analytic techniques to the relationships between individuals and groups, and investigating how those relationships can be used to infer additional information about the individuals and groups (Degenne and Forse, 1999). There are a number of mathematical and algorithmic approaches that can be used in SNA to infer such information, including connectedness and centrality (Wasserman and Faust, 1994).
SNA is used in a variety of domains. For example, business consultants use SNA to identify the effective relationships between workers that enable work to get done; these relationships often differ from connections seen in an organizational chart (Ehrlich and Carboni, 2005). Law enforcement personnel have used social networks to analyze terrorist networks (Krebs, 2002; Stewart, 2001) and criminal networks (Sparrow, M. K., 1991). The capture of Saddam Hussein was facilitated by social network analysis: military officials constructed a network containing Hussein’s tribal and family links, allowing them to focus on individuals who had close ties to Hussein (Hougham, 2005). |
Social network analysis (SNA) primarily focuses on applying analytic techniques to the relationships between individuals and groups, and investigating how those relationships can be used to infer additional information about the individuals and groups (Degenne & Forse, 1999). There are a number of mathematical and algorithmic approaches that can be used in SNA to infer such information, including connectedness and centrality (Wasserman & Faust, 1994).
SNA is used in a variety of domains. For example, business consultants use SNA to identify the effective relationships between workers that enable work to get done; these relationships often differ from connections seen in an organizational chart (Ehrlich & Carboni, 2005). Law enforcement personnel have used social networks to analyze terrorist networks (Krebs, 2006; Stewart, 2001) and criminal networks (Sparrow, 1991). The capture of Saddam Hussein was facilitated by social network analysis: military officials constructed a network containing Hussein’s tribal and family links, allowing them to focus on individuals who had close ties to Hussein (Hougham, 2005). |
Identical, with the source not even being mentioned in Nm's thesis. |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120421145234