VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm/Fragment 109 01 - Diskussion
Zuletzt bearbeitet: 2012-04-21 22:53:16 Hindemith
Fragment, Gesichtet, Nm, Penzar etal 2005, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Untersuchte Arbeit:
Seite: 109, Zeilen: 1-13
Quelle: Penzar_etal_2005
Seite(n): 34, 35, Zeilen: 25ff; 4ff
[This property characterises] the so called scale free networks (Watts, D.J., 2003; Kreisler, H., 2003). Scale free networks (see Section 3.5) form spontaneously, without needing a particular plan or interventions of central authority. Nodes that are members of the network for a longer time, that are better connected with other nodes, and that are more significant for a functioning network, are also more visible to new members, so that the new members spontaneously connect more readily to such nodes than other, relatively marginal ones.

[FIGURE: identical to corresponding figure in Source]

Figure 3.6. Distribution of degree of nodes in the network (see Figure 1.4) of kidnappers and their supporters.

On the pattern of scale free networks, the Al Qaeda’s Training Manual (2001) states: “The cell or cluster methods should be organized in a way that a group is composed of many cells whose members do not know each other, so that if a cell member is caught, other cells would not be affected, and work would proceed [normally”.]

This property characterises the so-called scale-free networks [19, 20; pp.104-111][EN 8], [...]. Scale-free networks form spontaneously, without needing a particular plan or interventions of a central authority. Nodes that are members of the network for a longer time, that are better connected with other nodes, and that are more significant for network’s functioning, are also more visible to new members, so that the new members spontaneously connect more readily to such nodes than to other, relatively marginal ones.

[FIGURE]

Figure 6. Distribution of degrees of nodes in the network of kidnappers and their supporters

[Page 35]

[...] Al-Qaeda’s Training Manual states: “Cell or cluster methods should be adopted by the Organization. It should be composed of many cells whose members do not know one another, so that if a cell member is caught, the other cells would not be affected, and work would proceed normally.” [12; Third Lesson].


[12] Al Qaeda Training Manual. US Department of Justice, http://www.usdoj.gov/ag/ trainingmanual.htm and http://www.pbs.org/wgbh/pages/ frontline/shows/network/alqaeda/manual.html,

[18] Borgatti, S.P.: Intra-Organizational Networks. Handouts for the course Introduction to Organizational Behavior, 1996, revised 2002, http://www.analytictech.com/ mb021/intranet.htm,

[19] Li, L.; Anderson, D.; Tanaka R.; Doyle J.C.; Willinger, W.: Towards a Theory of Scale- Free Graphs: Definition, Properties, and Implications. Technical Report CIT-CDS-04-006, Engineering and Applied Sciences Division, California Institute of Technology, Pasadena, 2004, http://arxiv.org/PS_cache/ cond-mat/pdf/0501/0501169.pdf,

[20] Watts, D.J.: Six Degrees – The Science of a Connected Age. W. W. Norton & Company, New York, London, 2003,

Anmerkungen

There is no reference to the source.

Note, that at the beginning of chapter 3 on page 93, there is a footnote commenting the title of chaper 3. It says:

FN 13: The parts of this chapter are already published in (Memon N, Henrik, L. L. 2006a, 2006b, 2006c, 2006d)

However, the source Penzar et al. (2005) has been published before any of those publications.

Sichter
(Hindemith), Bummelchen



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120421225536