Fandom

VroniPlag Wiki

Nm/084

< Nm

31.377Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Teilen

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 084 01 - Diskussion
Zuletzt bearbeitet: 2012-05-07 16:20:26 Hindemith
CNS 2002, Fragment, Gesichtet, KomplettPlagiat, Nm, SMWFragment, Schutzlevel sysop

Typus
KomplettPlagiat
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 84, Zeilen: 1-10
Quelle: CNS_2002
Seite(n): 172, Zeilen: 10-16
[Borgatti Stephen P. (2003) discussed how to identify sets of structurally key players, particularly in the context of attacking] terrorist networks. Three specific goals are discussed: (a) identifying nodes whose deletion would maximally fragment the network, (b) identifying nodes that, based on structural position alone, are potentially “in the know”, and (c) identifying nodes that are in a position to influence others. Measures of success, in the form of fragmentation and reach indices, are developed and used as cost functions in a combinatorial optimization algorithm. The algorithm is compared against naïve approaches based on choosing the k most central players, as well as against approaches based on group centrality. This paper discusses how to identify sets of structurally key players, particularly in the context of attacking terrorist networks. Three specific goals are discussed: (a) identifying nodes whose deletion would maximally fragment the network, (b) identifying nodes that, based on structural position alone, are potentially “in the know”, and (c) identifying nodes that are in a position to influence others. Measures of success, in the form of fragmentation and reach indices, are developed and used as cost functions in a combinatorial optimization algorithm. The algorithm is compared against naïve approaches based on choosing the k most central players, as well as against approaches based on group centrality.
Anmerkungen

The source is not given. The copied text starts on the previous page.

Sichter
(Hindemith), Bummelchen

[2.] Nm/Fragment 084 11 - Diskussion
Zuletzt bearbeitet: 2012-05-11 22:05:21 WiseWoman
Berry etal 2004, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 84, Zeilen: 11-33
Quelle: Berry_etal_2004
Seite(n): 1, 2, Zeilen: 1: left column, Abstract; right column 19; 2: left column 1
Berry, Nina et al (2004) presented a multi-disciplinary approach to developing organization software for the study of recruitment and group formation. The need to incorporate aspects of social science added a significant contribution to the vision of the resulting Seldon toolkit. The unique addition of an abstract agent category provided a means for capturing social concepts like cliques, gangs, schools, mosque, etc. in a manner that represents their social conceptualization and not simply as a physical or economical institution. This work provides an overview of the Seldon toolkit and terrorist model developed to study the formation of cliques, which are the primary recruitment entity for terrorist organizations. This is a hybrid architecture providing a unique integration of technology and concepts from interdisciplinary fields of agent-based modeling, social science and simulation. This architecture differs from traditional computational social dynamics simulations because of its multi-level design, abstract agent(s), and interaction based on social networks.

The supporting social terrorist model is based upon the work of Marc Sageman (2004). Marc Sageman, is a former Foreign Service officer who was based in Islamabad from 1987 to 1989, where he worked closely with Afghanistan’s Mujahedin. Sageman work reveals that the mujahedin have no documented history of psychological or social pathologies; they are considered healthy [members of their society.]

[Abstract ]

The Seldon project represents a multi-disciplinary approach to developing organization software for the study of recruitment and group formation. The need to incorporate aspects of social science added a significant contribution to the vision of the resulting Seldon toolkit. The unique addition of an abstract agent category provided a means for capturing social concepts like cliques, gangs, schools, mosque, etc. in a manner that represents their social conceptualization and not simply as a physical or economical institution. This paper provides an overview of the Seldon toolkit and terrorist model developed to study the formation of cliques, which are the primary recruitment entity for terrorist organizations. [...]

[right column]

The general Seldon toolkit is a hybrid architecture providing a unique integration of technology and concepts from the interdisciplinary fields of agent-based modeling, social science, and simulation. This architecture differs from traditional computational social dynamic simulations because of its multi-level design, abstract agent(s), and interactions based on social networks. [...]

[page 2, left column]

The supporting social terrorist model is based upon the work of Marc Sageman (Sageman 2004). Marc Sageman, Ph.D., M.D., is a former Foreign Service officer who was based in Islamabad from 1987 to 1989, where he worked closely with Afghanistan's mujahedin. [...]

Sageman work reveals that the mujahedin have no documented history of psychological or social pathologies: they are considered healthy members of their society.

Anmerkungen

The description of the work of Berry et al. is actually taken from parts of their paper. Could also be classified as a pawn sacrifice, a "Bauernopfer". The incorrect grammar from Berry in the last sentence ("Sageman work" instead of "Sageman's work") is incorrect both in Berry et al and in Nm.

Sichter
(Hindemith), WiseWoman


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:WiseWoman, Zeitstempel: 20120511220725

Auch bei Fandom

Zufälliges Wiki