VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm/Fragment 025 22 - Diskussion
Zuletzt bearbeitet: 2012-04-30 16:35:25 Graf Isolan
Fragment, Gesichtet, Koschade 2005, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes
Untersuchte Arbeit:
Seite: 25, Zeilen: 22-29
Quelle: Koschade_2005
Seite(n): 2, 3, Zeilen: p2:6-8; p3:31-35
IDM offers ability to map a covert cell, and to measure the specific structural and interactive criteria of such a cell. This framework aims to connect dots between individuals and to map and measure complex, covert, human groups and organisations (Memon N., and Larsen H. L., 2006c). The method focuses on uncovering the patterning of people’s interaction, and correctly interpreting these networks assists in predicting behaviour and decision-making within the network (Memon N., and Larsen H. L., 2006c). Social network analysis offers the ability to firstly map a covert cell, and to secondly measure the specific structural and interactional criteria of such a cell.

[page 3]

This framework aims to connect the dots between individuals and “map and measure complex, sometimes covert, human groups and organisations”. [EN 8] The method focuses on uncovering the patterning of people’s interaction, [EN 9] and correctly interpreting these networks assists “in predicting behaviour and decision-making within the network”. [EN 10]


[EN 8] Krebs, V. (2002) “Mapping Networks of Terrorist Cells”, Connections, Vol. 24, 3, pp. 43-52.

[EN 9] Freeman, L. (nd) ‘The Study of Social Networks’, The International Network for Social Network Analysis, Retrieved May 17, 2004, from http://www.sfu.ca/~insna/INSNA/na_inf.html.

[EN 10] Renfro, R. & Deckro, R. (2001). “A Social Network Analysis of the Iranian Government”, paper presented at 69th MORS Symposium, 12-14 June, 2001, p. 4.

Anmerkungen

The source is not mentioned anywhere in the thesis.

Not only did Nm copy an entire paragraph from the source, he also references for it the paper "Memon N., and Larsen H. L., 2006c", written by himself and the thesis supervisor. Finally he also removes the references for correct quotations in the source.

Sichter
(Hindemith), Bummelchen


[2.] Nm/Fragment 025 30 - Diskussion
Zuletzt bearbeitet: 2012-04-29 22:21:46 Hindemith
BauernOpfer, DeRosa 2004, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop

Typus
BauernOpfer
Bearbeiter
Graf Isolan
Gesichtet
Yes
Untersuchte Arbeit:
Seite: 25, Zeilen: 30-32
Quelle: DeRosa 2004
Seite(n): 6, Zeilen: 25-29
This technique is also known as subject based link analysis. This technique uses aggregated public records or other large collection of data to find the links between a subject — a suspect, an address, [or a piece of relevant information — and other people, places, or things.] A relatively simple and useful data-analysis tool for counterterrorism is subject-based “link analysis.” This technique uses aggregated public records or other large collections of data to find links between a subject — a suspect, an address, or other piece of relevant information — and other people, places, or things.
Anmerkungen

At the end of the paragraph (on the next page) the source is given. Unfortunately nothing in this paragraph has been marked as a citation.

Sichter
(Graf Isolan), Bummelchen



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120423131038