von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 109 01 - Diskussion Zuletzt bearbeitet: 2012-04-21 22:53:16 Hindemith | Fragment, Gesichtet, Nm, Penzar etal 2005, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 109, Zeilen: 1-13 |
Quelle: Penzar_etal_2005 Seite(n): 34, 35, Zeilen: 25ff; 4ff |
---|---|
[This property characterises] the so called scale free networks (Watts, D.J., 2003; Kreisler, H., 2003). Scale free networks (see Section 3.5) form spontaneously, without needing a particular plan or interventions of central authority. Nodes that are members of the network for a longer time, that are better connected with other nodes, and that are more significant for a functioning network, are also more visible to new members, so that the new members spontaneously connect more readily to such nodes than other, relatively marginal ones.
[FIGURE: identical to corresponding figure in Source] Figure 3.6. Distribution of degree of nodes in the network (see Figure 1.4) of kidnappers and their supporters. On the pattern of scale free networks, the Al Qaeda’s Training Manual (2001) states: “The cell or cluster methods should be organized in a way that a group is composed of many cells whose members do not know each other, so that if a cell member is caught, other cells would not be affected, and work would proceed [normally”.] |
This property characterises the so-called scale-free networks [19, 20; pp.104-111][EN 8], [...]. Scale-free networks form spontaneously, without needing a particular plan or interventions of a central authority. Nodes that are members of the network for a longer time, that are better connected with other nodes, and that are more significant for network’s functioning, are also more visible to new members, so that the new members spontaneously connect more readily to such nodes than to other, relatively marginal ones.
[FIGURE] Figure 6. Distribution of degrees of nodes in the network of kidnappers and their supporters [Page 35] [...] Al-Qaeda’s Training Manual states: “Cell or cluster methods should be adopted by the Organization. It should be composed of many cells whose members do not know one another, so that if a cell member is caught, the other cells would not be affected, and work would proceed normally.” [12; Third Lesson]. [12] Al Qaeda Training Manual. US Department of Justice, http://www.usdoj.gov/ag/ trainingmanual.htm and http://www.pbs.org/wgbh/pages/ frontline/shows/network/alqaeda/manual.html, [18] Borgatti, S.P.: Intra-Organizational Networks. Handouts for the course Introduction to Organizational Behavior, 1996, revised 2002, http://www.analytictech.com/ mb021/intranet.htm, [19] Li, L.; Anderson, D.; Tanaka R.; Doyle J.C.; Willinger, W.: Towards a Theory of Scale- Free Graphs: Definition, Properties, and Implications. Technical Report CIT-CDS-04-006, Engineering and Applied Sciences Division, California Institute of Technology, Pasadena, 2004, http://arxiv.org/PS_cache/ cond-mat/pdf/0501/0501169.pdf, [20] Watts, D.J.: Six Degrees – The Science of a Connected Age. W. W. Norton & Company, New York, London, 2003, |
There is no reference to the source. Note, that at the beginning of chapter 3 on page 93, there is a footnote commenting the title of chaper 3. It says: FN 13: The parts of this chapter are already published in (Memon N, Henrik, L. L. 2006a, 2006b, 2006c, 2006d) However, the source Penzar et al. (2005) has been published before any of those publications. |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120421225536