von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 084 01 - Diskussion Zuletzt bearbeitet: 2012-05-07 16:20:26 Hindemith | CNS 2002, Fragment, Gesichtet, KomplettPlagiat, Nm, SMWFragment, Schutzlevel sysop |
|
|
Untersuchte Arbeit: Seite: 84, Zeilen: 1-10 |
Quelle: CNS_2002 Seite(n): 172, Zeilen: 10-16 |
---|---|
[Borgatti Stephen P. (2003) discussed how to identify sets of structurally key players, particularly in the context of attacking] terrorist networks. Three specific goals are discussed: (a) identifying nodes whose deletion would maximally fragment the network, (b) identifying nodes that, based on structural position alone, are potentially “in the know”, and (c) identifying nodes that are in a position to influence others. Measures of success, in the form of fragmentation and reach indices, are developed and used as cost functions in a combinatorial optimization algorithm. The algorithm is compared against naïve approaches based on choosing the k most central players, as well as against approaches based on group centrality. | This paper discusses how to identify sets of structurally key players, particularly in the context of attacking terrorist networks. Three specific goals are discussed: (a) identifying nodes whose deletion would maximally fragment the network, (b) identifying nodes that, based on structural position alone, are potentially “in the know”, and (c) identifying nodes that are in a position to influence others. Measures of success, in the form of fragmentation and reach indices, are developed and used as cost functions in a combinatorial optimization algorithm. The algorithm is compared against naïve approaches based on choosing the k most central players, as well as against approaches based on group centrality. |
The source is not given. The copied text starts on the previous page. |
|
[2.] Nm/Fragment 084 11 - Diskussion Zuletzt bearbeitet: 2012-05-11 22:05:21 WiseWoman | Berry etal 2004, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 84, Zeilen: 11-33 |
Quelle: Berry_etal_2004 Seite(n): 1, 2, Zeilen: 1: left column, Abstract; right column 19; 2: left column 1 |
---|---|
Berry, Nina et al (2004) presented a multi-disciplinary approach to developing organization software for the study of recruitment and group formation. The need to incorporate aspects of social science added a significant contribution to the vision of the resulting Seldon toolkit. The unique addition of an abstract agent category provided a means for capturing social concepts like cliques, gangs, schools, mosque, etc. in a manner that represents their social conceptualization and not simply as a physical or economical institution. This work provides an overview of the Seldon toolkit and terrorist model developed to study the formation of cliques, which are the primary recruitment entity for terrorist organizations. This is a hybrid architecture providing a unique integration of technology and concepts from interdisciplinary fields of agent-based modeling, social science and simulation. This architecture differs from traditional computational social dynamics simulations because of its multi-level design, abstract agent(s), and interaction based on social networks.
The supporting social terrorist model is based upon the work of Marc Sageman (2004). Marc Sageman, is a former Foreign Service officer who was based in Islamabad from 1987 to 1989, where he worked closely with Afghanistan’s Mujahedin. Sageman work reveals that the mujahedin have no documented history of psychological or social pathologies; they are considered healthy [members of their society.] |
[Abstract ]
The Seldon project represents a multi-disciplinary approach to developing organization software for the study of recruitment and group formation. The need to incorporate aspects of social science added a significant contribution to the vision of the resulting Seldon toolkit. The unique addition of an abstract agent category provided a means for capturing social concepts like cliques, gangs, schools, mosque, etc. in a manner that represents their social conceptualization and not simply as a physical or economical institution. This paper provides an overview of the Seldon toolkit and terrorist model developed to study the formation of cliques, which are the primary recruitment entity for terrorist organizations. [...] [right column] The general Seldon toolkit is a hybrid architecture providing a unique integration of technology and concepts from the interdisciplinary fields of agent-based modeling, social science, and simulation. This architecture differs from traditional computational social dynamic simulations because of its multi-level design, abstract agent(s), and interactions based on social networks. [...] [page 2, left column] The supporting social terrorist model is based upon the work of Marc Sageman (Sageman 2004). Marc Sageman, Ph.D., M.D., is a former Foreign Service officer who was based in Islamabad from 1987 to 1989, where he worked closely with Afghanistan's mujahedin. [...] Sageman work reveals that the mujahedin have no documented history of psychological or social pathologies: they are considered healthy members of their society. |
The description of the work of Berry et al. is actually taken from parts of their paper. Could also be classified as a pawn sacrifice, a "Bauernopfer". The incorrect grammar from Berry in the last sentence ("Sageman work" instead of "Sageman's work") is incorrect both in Berry et al and in Nm. |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:WiseWoman, Zeitstempel: 20120511220725