von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 040 01 - Diskussion Zuletzt bearbeitet: 2012-05-22 19:44:54 Hindemith | Carley 2006, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 40, Zeilen: 1-9 |
Quelle: Carley 2006 Seite(n): 53, Zeilen: 31-37 |
---|---|
In addition to the previous discussion, link analysis is basically a descriptive approach for exploring data in order to identify relationship among values in the database. In this approach, the user lays out graphically; the links between various entities; such as people, resources, and locations. A key limitation of this approach is that it is a primary a tool for visualization and organization. There are no analytic metrics attached. As such, there are no
procedures for analyzing the data estimating who or what should be targeted to achieve what effects, or for estimating [...] |
Visual link analysis is basically a descriptive approach to exploring data in order to identify relationships among values in a database. In this approach, the user lays out graphically the links between various entities such as people, resources, and locations. A key limitation of this approach is that it is primarily a tool for visualization and organization. There are no analytic metrics or attached. As such, there are no procedures for analyzing the data and estimating what data is missing, who or what should be targeted to achieve what effects, or for estimating [...] |
nothing is marked as a citation, source is not given. |
|
[2.] Nm/Fragment 040 22 - Diskussion Zuletzt bearbeitet: 2012-04-21 21:54:26 Hindemith | Fragment, Gesichtet, Nm, Ressler 2006, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 40, Zeilen: 22-32 |
Quelle: Ressler 2006 Seite(n): 4, 5, Zeilen: p.4,3-6.8-11 and p.5,32-33 |
---|---|
After 9/11 attacks, the academic world has increased the attention paid to the analysis of terrorist networks because of public interest. Network analysis of terrorist organizations is divided into two groups: data collectors and data modelers:
Data collection is difficult for network analysis because it is hard to create a complete network (as already discussed). It is especially difficult to gain information on terrorist networks. Terrorist organizations do not provide information on the members, and governments rarely allow researchers to use their intelligence data. There has been limited work in the field of complex modeling of terrorist networks. |
[p. 4]
Since the winter of 2001, the academic world has increased the attention paid to the social network analysis of terrorism as a result of public interest and new grant money. [FN 15] Network analysis of terrorist organizations continues to grow and can be divided into two groups: the data collectors and the modelers. [...] Data collection is difficult for any network analysis because it is hard to create a complete network. It is especially difficult to gain information on terrorist networks. Terrorist organizations do not provide information on their members, and the government rarely allows researchers to use their intelligence data. [p. 5] There has been limited work in the field of complex modeling of terrorist networks outside the work of Kathleen Carley and her associates. |
The paragraph from line 26 to 30 can already be found on page 33 Nm/Fragment_033_15 of Nm's thesis. Comparing these two paragraphs, one can see directly how Nm tries to camouflage his copying |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120522194752