Fandom

VroniPlag Wiki

Nm/028

< Nm

31.351Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Share

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 028 05 - Diskussion
Zuletzt bearbeitet: 2012-04-29 20:51:53 Graf Isolan
Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu and Chen 2005a

Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 28, Zeilen: 5-8
Quelle: Xu and Chen 2005a
Seite(n): 102, Zeilen: left column 42-46
Although SNA is not conventionally considered as data mining technique, it is especially suitable for mining a large volume of association data to discover hidden structural patterns in terrorist networks. Although SNA is not traditionally considered as a data mining technique, it is especially suitable for mining large volumes of association data to discover hidden structural patterns in criminal networks [9, 10].
Anmerkungen

Right before he starts to massively present material form Koelle et al. (2006), for which he gives no reference, he puts in a small section, adapted in the usual way, from Xu and Chen (2005a), which he also does not mark as a citation and for which he also does not give a reference.

Pure patchwork.

Sichter
(Graf Isolan), Bummelchen

[2.] Nm/Fragment 028 08 - Diskussion
Zuletzt bearbeitet: 2012-04-21 14:50:27 Hindemith
Fragment, Gesichtet, Koelle et al 2006, KomplettPlagiat, Nm, SMWFragment, Schutzlevel sysop

Typus
KomplettPlagiat
Bearbeiter
Graf Isolan
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 28, Zeilen: 8-27
Quelle: Koelle et al 2006
Seite(n): 1 (internet version), Zeilen: left column 25-46
Social network analysis (SNA) primarily focuses on applying analytic techniques to the relationships between individuals and groups, and investigating how those relationships can be used to infer additional information about the individuals and groups (Degenne and Forse, 1999). There are a number of mathematical and algorithmic approaches that can be used in SNA to infer such information, including connectedness and centrality (Wasserman and Faust, 1994).

SNA is used in a variety of domains. For example, business consultants use SNA to identify the effective relationships between workers that enable work to get done; these relationships often differ from connections seen in an organizational chart (Ehrlich and Carboni, 2005). Law enforcement personnel have used social networks to analyze terrorist networks (Krebs, 2002; Stewart, 2001) and criminal networks (Sparrow, M. K., 1991). The capture of Saddam Hussein was facilitated by social network analysis: military officials constructed a network containing Hussein’s tribal and family links, allowing them to focus on individuals who had close ties to Hussein (Hougham, 2005).

Social network analysis (SNA) primarily focuses on applying analytic techniques to the relationships between individuals and groups, and investigating how those relationships can be used to infer additional information about the individuals and groups (Degenne & Forse, 1999). There are a number of mathematical and algorithmic approaches that can be used in SNA to infer such information, including connectedness and centrality (Wasserman & Faust, 1994).

SNA is used in a variety of domains. For example, business consultants use SNA to identify the effective relationships between workers that enable work to get done; these relationships often differ from connections seen in an organizational chart (Ehrlich & Carboni, 2005). Law enforcement personnel have used social networks to analyze terrorist networks (Krebs, 2006; Stewart, 2001) and criminal networks (Sparrow, 1991). The capture of Saddam Hussein was facilitated by social network analysis: military officials constructed a network containing Hussein’s tribal and family links, allowing them to focus on individuals who had close ties to Hussein (Hougham, 2005).

Anmerkungen

Identical, with the source not even being mentioned in Nm's thesis.

Sichter
(Graf Isolan), Hindemith


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120421145234

Auch bei Fandom

Zufälliges Wiki