VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki

Memon, Wiil, Alhajj, Atzenbeck, Harkiolakis (2011): Harvesting covert networks: a case study of the iMiner database in Int. J. Networking and Virtual Organisations, Vol. 8, Nos. 1/2, 2011, Inderscience

Fragments from the documentation of suspected plagiarism found in the thesis of Nasrullah Memon are listed below if they also show parallels to Memon's publication given above. In order to see exactly what parallel exists between the source text of the fragment and the publication, one can follow these steps:

  • Open the online text comparison tool
  • Copy the full text of the publication into the right box of the tool
  • Click on a fragment listed below and copy the source text (right hand side of the fragment) into the left box of the tool
  • Press "Texte vergleichen", text parallels between Memon's publication and the source text are now marked in colour.
Note that while great care has been taken to avoid mistakes, this documentation does not comply with the standards that are routinely applied in the VroniPlag Wiki for the documentation of plagiarism in doctoral theses. In particular, these findings have not been double-checked.
Fragments Dissertation Pages Publication Comments Source
023 27 55 source is given, bad paraphrase but probably no plagiarism DeRosa 2004
024 01 56 spread out in the publication, very short DeRosa 2004
025 22 57 almost literal copy Koschade 2005
025 30 57 source given, but no quotation marks DeRosa 2004
026 04 57 almost literal copy Koschade 2005
026 14 57 Popp & Poindexter 2006
028 05 58 short, but almost literal copy Xu & Chen 2005a
028 08 58 quite long, almost literal copy Koelle et al. 2006
029 03 58 short Tsvetovat et al. 2005
033 15 59 Ressler 2006
034 01 59 Ressler 2006
038 01 59 very short Ressler 2006
041 01 58 In the publication the source is given (unlike in the thesis), however only for one small part of the text taken from the source, for the other part, the PhD thesis of Nm is cited. Ressler 2006
091 21 61 Ressler 2006
180 02 54 Perer & Shneiderman 2006
181 01 54, 55 long, almost literal copy Perer & Shneiderman 2006
182 01 55 Only the last paragraph of the fragment. The source is given, but not for all copied formulations Perer & Shneiderman 2006
183 01 55 Perer & Shneiderman 2006
198 03 54 Xu & Chen 2005b
200 01 62 In the publication, the PhD thesis of Nm is cited for text that originally stems from Xu and Chen (2005) Xu & Chen 2005a
202 12 63 Tsvetovat et al. 2005
205 21 65 Zhao et al. 2006
206 01 65 Zhao et al. 2006
206 26 67 Only the first sentence of the fragment is affected, but this sentence is copied literally. Jensen et al. 2003
207 12 66 Frost 1982
208 01 67 Source is given in the publication Frost 1982
208 11 67, 68 Frost 1982
214 02 70 TrackingTheThreat.com - Home (2006)
214 07 70 TrackingTheThreat.com - About this site (2006)
214 15 70 TrackingTheThreat.com - About this site (2006)
215 01 70 Dugan et al. 2006
215 11 70, 71 Malin et al. 2005
216 05 71 Dugan et al. 2006

The fragments listed in the table above can all be found in Nm's thesis. However, there are additional findings of plagiarism in this publication that go beyond Nm's thesis:

  • Thuraisingham 2003: Page 213-214 of this source has been copied almost literally to form a paragraph on page 56 of the publication.