von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 107 01 - Diskussion Zuletzt bearbeitet: 2012-07-07 20:45:17 WiseWoman | Balasundaram et al 2006, Fragment, Gesichtet, KomplettPlagiat, Nm, SMWFragment, Schutzlevel sysop |
|
|
Untersuchte Arbeit: Seite: 107, Zeilen: 1-4 |
Quelle: Balasundaram et al 2006 Seite(n): 2, Zeilen: 41-45 |
---|---|
[This graph was constructed by Valdis Krebs (2002) using the public data that were available] before, but collected after the event. Even though the information mapped in this network is by no means complete, its analysis may still provide valuable insights into the structure of a terrorist organization. | This graph was constructed in [32] using the public data that were available before, but collected after the event. Even though the information mapped in this network is by no means complete, its analysis may still provide valuable insights into the structure of a terrorist organization.
[32]. Krebs, V.: Mapping networks of terrorist cells. Connections 24, 45–52 (2002) |
The copied text starts on the previous page: Nm/Fragment_106_14 |
|
[2.] Nm/Fragment 107 07 - Diskussion Zuletzt bearbeitet: 2012-05-25 08:17:01 Hindemith | Fragment, Gesichtet, Nm, Penzar etal 2005, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 107, Zeilen: 7-23 |
Quelle: Penzar_etal_2005 Seite(n): 33-34, Zeilen: 2ff; 1ff |
---|---|
According to Kreb’s (2002) analysis, this network had 62 members in total, of which 19 were kidnapers, and 43 assistants: organizers, couriers, financiers, scouts, representatives, coordinators, counterfeiters, etc. Allen (2004) found that successfully functioning large networks typically comprise 25-80 members, with an optimal size between 45 and 50. A close match exists between the results of Allen’s analysis of collaborating networked groups and this particular example of a terrorist group.
Inspection of this network by standard measures of network structure reveals firstly its low connectedness. A member of this network holds only 4.9 connections with others members on average (also known as degree centrality), which means that average members were rather isolated from the rest of the network. The density (which is defined as the number of actual links divided by the number of possible links) of this network is only 0.08, meaning that only 8% of all possible connections in the network really exist. |
According to Krebs’ analysis, this wider network had 62 members in total, of which 19 were kidnappers, and 43 assistants: organisers, couriers, financiers, scouts,
counterfeiters etc. Allen found that successfully functioning large networks typically comprise 25-80 members, with optimal size between 45 and 50. Again, a close match exists between the results of Allen’s analysis of collaborating networked groups and this particular example of a terrorist group. [Page 34] Inspection of this network by standard measures of network structure [16 – 18] reveals firstly its low connectedness. A member of this network holds only 4,9 connections with other members on average [En 3], which means that average members are rather isolated from the rest of the network. [...] Connectedness measure [EN 4] of this network is only 0,08, meaning that only 8 % of all possible connections in the network really exist. [EN 3] This means that average degree of nodes is 4,9, where degree of a node represents the number of links coming out of the node. [EN 4] Connectedness of a given network is the ratio of actually existing number of links in this network and the maximal number of links that would be possible in a network with the same number of nodes, where each node would be linked to each other. [16] Krebs, V.E.: An Introduction to Social Network Analysis. 2005, http://www.orgnet.com /sna.html, [17] Wolfe, A.W.: Applications of Network Models – Glossary to Accompany the Course and the Manuscript. 2001, http://luna.cas.usf.edu /~wolfe/glossary.html, [18] Borgatti, S.P.: Intra-Organizational Networks. Handouts for the course Introduction to Organizational Behavior, 1996, revised 2002, http://www.analytictech.com /mb021/intranet.htm, |
There is no reference to the source. Note, that at the beginning of chapter 3 on page 93, there is a footnote commenting the title of chaper 3. It says: FN 13: The parts of this chapter are already published in (Memon N, Henrik, L. L. 2006a, 2006b, 2006c, 2006d) However, the source Penzar et al. (2005) has been published before any of those publications. |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120421224847