Memon, Qureshi (2005): Investigative Data Mining and its Application in Counterterrorism Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFORMATICS and COMMUNICATIONS, Malta, September 15-17, 2005 (pp397-403)
Fragments from the documentation of suspected plagiarism found in the thesis of Nasrullah Memon are listed below if they also show parallels to Memon's publication given above. In order to see exactly what parallel exists between the source text of the fragment and the publication, one can follow these steps:
- Open the online text comparison tool
- Copy the full text of the publication into the right box of the tool
- Click on a fragment listed below and copy the source text (right hand side of the fragment) into the left box of the tool
- Press "Texte vergleichen", text parallels between Memon's publication and the source text are now marked in colour.
|Fragments Dissertation||Pages Publication||Comments|
|075 07||398-399||Here, the article is even closer to the unnamed source than the analogous part of the thesis. In fact here it is a word-for-word copy, where Nm just exchanges "terrorist" for "criminal".|
|076 01||399||Continues the take-over begun on the previous page. The last two items ("Fuzzy boundaries" and "Network dynamics") have been left out and do not appear in this paper.|
|077 03||399-400||Again, this is a word-for-word copy of the original article. The take-over continues more pieces than what is documented in the fragment.|
|078 01||400||The final piece taken from this part of Quelle:Nm/Xu_and_Chen_2005a|
The whole of section 5 ("SNA Techniques", p. 400) of this paper has also been taken verbatim from Quelle:Nm/Xu_and_Chen_2005a.