von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 083 01 - Diskussion Zuletzt bearbeitet: 2012-05-01 18:39:35 Hindemith | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu etal 2004 |
|
|
Untersuchte Arbeit: Seite: 83, Zeilen: 1-3 |
Quelle: Xu_etal_2004 Seite(n): 6, Zeilen: 15-17 |
---|---|
[By calculating this index between two similar clusters in two successive time periods, it is] possible to measure the stability or continuity of a scientific field as represented by a group of authors (Braam, R.R., H.F. Moed, and A.F.J. van Raan, 1991). | By calculating this index between two similar clusters in two successive time periods, it is possible to quantify the stability or continuity of a scientific field as represented by a group of authors [2].
[2]. Braam, R.R., H.F. Moed, & A.F.J. van Raan (1991). [...] |
Continued from previous page |
|
[2.] Nm/Fragment 083 04 - Diskussion Zuletzt bearbeitet: 2012-05-07 16:20:21 Hindemith | CNS 2002, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 83, Zeilen: 4-30 |
Quelle: CNS_2002 Seite(n): 80, 95, 172, Zeilen: 80: 7ff; 95: 12ff; 172: 10ff |
---|---|
Valdis Krebs [FN 12] worked in analyzing organizations, especially adaptive organizations. He has applied real-world data and model “social network processes”. He has done some work on analyzing the terrorist network surrounding the 9/11 attacks (Krebs, V.; 2001, 2002). He states that one can also apply his analysis to counterterrorist organization and believes it takes a network to fight a network; he therefore prescribes the use of small anti-terror teams.
In his approach, Krebs (2002) takes a snapshot of a network. After many such snapshots, he can see how networks evolve. He argues that one can see patterns at the planning stage of terrorist attacks - a terrorist planning team looks like any other planning team. So, once they get into active planning mode, terrorists’ project map looks like anyone else’s. One can use this knowledge to analyze groups and see where they are in the operational process. Krebs (2002) also emphasizes that terrorists, like other organizations, do have leaders, so one does not necessarily need all the data – we can obtain a lot of information without it. There has been a great deal of work in link analysis in law enforcement. Link analysis focuses more on objects and people, whereas Krebs’ software concentrates on people and uses social network metrics. Roger Smith (Smith, R., 2001) presented a definition of social cohesion based on network connectivity that leads to an operationalization of social embeddedness. He defined cohesiveness as the minimum number of actors who, if removed from a group, would disconnect the group. Borgatti Stephen P. (2003) discussed how to identify sets of structurally key players, particularly in the context of attacking [terrorist networks.] [FN 12] http://www.orgnet.com/VKbio.html |
- Mr. Krebs works in analyzing organizations, especially adaptive organizations. He would like to apply what
he does to real-world data and model ‘social network processes’. - He has done some work on analyzing the terrorist network surrounding the 9/11 attacks. He states that one can also apply his analysis to counterterrorist organization and believes it takes a network to fight a network; he therefore prescribes the use of small anti-terror teams. - In his approach, Mr. Krebs takes a snapshot of a network. After many such snapshots, he can see how networks evolve. He argues that one can see patterns at the planning stage of terrorist attacks - a terrorist planning team looks like any other planning team. So, once they get into active planning mode, terrorists’ project map looks like anyone else’s. One can use this knowledge to analyze groups and see where they are in the operational process. Mr. Krebs also emphasizes that terrorists, like other organizations, do have leaders, so one does not necessarily need all the data – we can obtain a lot of information without it. - There has been a lot of work in link analysis in law enforcement. Link analysis focuses more on objects and people, whereas Mr. Krebs’ software concentrates on people and uses social network metrics. [page 95] We present a definition of social cohesion based on network connectivity that leads to an operationalization of social embeddedness. We define cohesiveness as the minimum number of actors who, if removed from a group, would disconnect the group. [page 172] This paper discusses how to identify sets of structurally key players, particularly in the context of attacking terrorist networks. |
The given internet link does (and did not) give the same information let alone in the same formulations as the source. |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120507162626