von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 079 03 - Diskussion Zuletzt bearbeitet: 2012-04-20 22:01:05 WiseWoman | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu etal 2004 |
|
|
Untersuchte Arbeit: Seite: 79, Zeilen: 3-18 |
Quelle: Xu etal 2004 Seite(n): 3, Zeilen: 5-13 |
---|---|
A terrorist network is primarily a social network in which individuals connect with one another through various connections such as kinship, friendship, colleagues, and classmates, etc. Research has recognized SNA as a promising methodology to analyze the structural properties of criminal/ terrorist networks (Krebs, V., 2002; McAndrew, D., 1999 Sparrow, M.K., 1991). SNA was originally used in sociology research to extract patterns of relationships between social actors in order to discover the underlying social structure (Wasserman, S. and K. Faust, 1994; Wellman, B., 1988). A social network is often known as a graph in which nodes (or actors) represent individual members and links (or connections) represent relations among the members. The sructural properties of a social network can be described and analyzed at four levels: node, link, group, and overall network. SNA provides various measures, indexes, and approaches to capture these structural properties quantitatively. | A criminal network is primarily a social network in which individuals connect with one another through various relations such as kinship, friendship, and co-workers. Research has recognized SNA as a promising methodology to analyze the structural properties of criminal networks [EN 23, EN 26, EN 35]. SNA was originally used in sociology research to extract patterns of relationships between social actors in order to discover the underlying social structure [EN 38, EN 39]. A social network is often treated as a graph in which nodes represent individual members and links represent relations among the members. The structural properties of a social network can be described and analyzed at four levels: node, link, group, and the overall network. SNA provides various measures, indexes, and approaches to capture these structural properties quantitatively.
--- [EN 23] Krebs, V.E. (2001). Mapping networks of terrorist cells. Connections, 24(3), 43-52. [EN 26] McAndrew, D. (1999). The structural analysis of criminal networks, in The social psychology of crime: Groups, teams, and networks, offender profiling series, iii, D. Canter & L. Alison (eds.). Aldershot: Dartmouth. [EN 35] Sparrow, M.K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251-274. [EN 38] Wasserman, S. & K. Faust (1994). Social network analysis: Methods and applications, ed. Series. Cambridge: Cambridge University Press. [EN 39] Wellman, B. (1988). Structural analysis: From method and metaphor to theory and substance, in Social structures: A network approach, B. Wellman & S.D. Berkowitz (eds.). Cambridge University Press: Cambridge. |
Only minor adaptations. All literature references have been copied as well. The source is not given |
|
[2.] Nm/Fragment 079 19 - Diskussion Zuletzt bearbeitet: 2012-04-22 20:40:17 Hindemith | Clark etal 2005, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 79, Zeilen: 19-29 |
Quelle: Clark etal 2005 Seite(n): 4, Zeilen: 7-14 |
---|---|
Researchers (for example; Simmel, 1906; Gross, 1980; Geis and Stotland, 1980; Erickson, 1981; Baker and Faulkner, 1993; Klerks, 2001) have conducted psychological and sociological analyses of covert networks for the past century, however since Sept. 11, 2001 there has been a dramatic increase in the number of publications (ex. Krebs, 2001; Carley et al, 2003, Sageman, 2004) on covert networks, specifically terror networks. These recent researchers have chosen Social Network Analysis (SNA) to help them “map,” (Krebs, 2001) “uncloak,” (Krebs, 2002) “identify key players,” (Borgatti, 2002) “destabilize,” (Carley et al., 2003) and “understand” (Sageman, 2004) terror networks. | Researchers (ex. Simmel, 1906; Gross, 1980; Geis and Stotland, 1980; Erickson,
1981; Baker and Faulkner, 1993; Klerks, 2001) have conducted analyses of clandestine networks for the past century, however since Sept. 11, 2001 there has been a dramatic increase in the number of publications (ex. Krebs, 2001; Carley et al, 2003, Sageman, 2004) on clandestine networks, specifically terror networks. These recent researchers have chosen SNA to help them "map," (Krebs, 2001) "uncloak," (Krebs, 2002) "identify key players," (Borgatti, 2002) "destabilize," (Carley et al., 2003) and "understand" (Sageman, 2004) terror networks. |
No source given |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120422204735