VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm/Fragment 079 03 - Diskussion
Zuletzt bearbeitet: 2012-04-20 22:01:05 WiseWoman
Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu etal 2004

Typus
Verschleierung
Bearbeiter
Hindemith, Graf Isolan
Gesichtet
Untersuchte Arbeit:
Seite: 79, Zeilen: 3-18
Quelle: Xu etal 2004
Seite(n): 3, Zeilen: 5-13
A terrorist network is primarily a social network in which individuals connect with one another through various connections such as kinship, friendship, colleagues, and classmates, etc. Research has recognized SNA as a promising methodology to analyze the structural properties of criminal/ terrorist networks (Krebs, V., 2002; McAndrew, D., 1999 Sparrow, M.K., 1991). SNA was originally used in sociology research to extract patterns of relationships between social actors in order to discover the underlying social structure (Wasserman, S. and K. Faust, 1994; Wellman, B., 1988). A social network is often known as a graph in which nodes (or actors) represent individual members and links (or connections) represent relations among the members. The sructural properties of a social network can be described and analyzed at four levels: node, link, group, and overall network. SNA provides various measures, indexes, and approaches to capture these structural properties quantitatively. A criminal network is primarily a social network in which individuals connect with one another through various relations such as kinship, friendship, and co-workers. Research has recognized SNA as a promising methodology to analyze the structural properties of criminal networks [EN 23, EN 26, EN 35]. SNA was originally used in sociology research to extract patterns of relationships between social actors in order to discover the underlying social structure [EN 38, EN 39]. A social network is often treated as a graph in which nodes represent individual members and links represent relations among the members. The structural properties of a social network can be described and analyzed at four levels: node, link, group, and the overall network. SNA provides various measures, indexes, and approaches to capture these structural properties quantitatively.

---

[EN 23] Krebs, V.E. (2001). Mapping networks of terrorist cells. Connections, 24(3), 43-52.

[EN 26] McAndrew, D. (1999). The structural analysis of criminal networks, in The social psychology of crime: Groups, teams, and networks, offender profiling series, iii, D. Canter & L. Alison (eds.). Aldershot: Dartmouth.

[EN 35] Sparrow, M.K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251-274.

[EN 38] Wasserman, S. & K. Faust (1994). Social network analysis: Methods and applications, ed. Series. Cambridge: Cambridge University Press.

[EN 39] Wellman, B. (1988). Structural analysis: From method and metaphor to theory and substance, in Social structures: A network approach, B. Wellman & S.D. Berkowitz (eds.). Cambridge University Press: Cambridge.

Anmerkungen

Only minor adaptations. All literature references have been copied as well. The source is not given

Sichter
(Hindemith), Graf Isolan, WiseWoman


[2.] Nm/Fragment 079 19 - Diskussion
Zuletzt bearbeitet: 2012-04-22 20:40:17 Hindemith
Clark etal 2005, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Untersuchte Arbeit:
Seite: 79, Zeilen: 19-29
Quelle: Clark etal 2005
Seite(n): 4, Zeilen: 7-14
Researchers (for example; Simmel, 1906; Gross, 1980; Geis and Stotland, 1980; Erickson, 1981; Baker and Faulkner, 1993; Klerks, 2001) have conducted psychological and sociological analyses of covert networks for the past century, however since Sept. 11, 2001 there has been a dramatic increase in the number of publications (ex. Krebs, 2001; Carley et al, 2003, Sageman, 2004) on covert networks, specifically terror networks. These recent researchers have chosen Social Network Analysis (SNA) to help them “map,” (Krebs, 2001) “uncloak,” (Krebs, 2002) “identify key players,” (Borgatti, 2002) “destabilize,” (Carley et al., 2003) and “understand” (Sageman, 2004) terror networks. Researchers (ex. Simmel, 1906; Gross, 1980; Geis and Stotland, 1980; Erickson,

1981; Baker and Faulkner, 1993; Klerks, 2001) have conducted analyses of clandestine networks for the past century, however since Sept. 11, 2001 there has been a dramatic increase in the number of publications (ex. Krebs, 2001; Carley et al, 2003, Sageman, 2004) on clandestine networks, specifically terror networks. These recent researchers have chosen SNA to help them "map," (Krebs, 2001) "uncloak," (Krebs, 2002) "identify key players," (Borgatti, 2002) "destabilize," (Carley et al., 2003) and "understand" (Sageman, 2004) terror networks.

Anmerkungen

No source given

Sichter
(Hindemith) Agrippina1



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120422204735