Memon, Wiil, Alhajj, Atzenbeck, Harkiolakis (2011): Harvesting covert networks: a case study of the iMiner database in Int. J. Networking and Virtual Organisations, Vol. 8, Nos. 1/2, 2011, Inderscience
Fragments from the documentation of suspected plagiarism found in the thesis of Nasrullah Memon are listed below if they also show parallels to Memon's publication given above. In order to see exactly what parallel exists between the source text of the fragment and the publication, one can follow these steps:
- Open the online text comparison tool
- Copy the full text of the publication into the right box of the tool
- Click on a fragment listed below and copy the source text (right hand side of the fragment) into the left box of the tool
- Press "Texte vergleichen", text parallels between Memon's publication and the source text are now marked in colour.
Fragments Dissertation | Pages Publication | Comments | Source |
---|---|---|---|
023 27 | 55 | source is given, bad paraphrase but probably no plagiarism | DeRosa 2004 |
024 01 | 56 | spread out in the publication, very short | DeRosa 2004 |
025 22 | 57 | almost literal copy | Koschade 2005 |
025 30 | 57 | source given, but no quotation marks | DeRosa 2004 |
026 04 | 57 | almost literal copy | Koschade 2005 |
026 14 | 57 | Popp & Poindexter 2006 | |
028 05 | 58 | short, but almost literal copy | Xu & Chen 2005a |
028 08 | 58 | quite long, almost literal copy | Koelle et al. 2006 |
029 03 | 58 | short | Tsvetovat et al. 2005 |
033 15 | 59 | Ressler 2006 | |
034 01 | 59 | Ressler 2006 | |
038 01 | 59 | very short | Ressler 2006 |
041 01 | 58 | In the publication the source is given (unlike in the thesis), however only for one small part of the text taken from the source, for the other part, the PhD thesis of Nm is cited. | Ressler 2006 |
091 21 | 61 | Ressler 2006 | |
180 02 | 54 | Perer & Shneiderman 2006 | |
181 01 | 54, 55 | long, almost literal copy | Perer & Shneiderman 2006 |
182 01 | 55 | Only the last paragraph of the fragment. The source is given, but not for all copied formulations | Perer & Shneiderman 2006 |
183 01 | 55 | Perer & Shneiderman 2006 | |
198 03 | 54 | Xu & Chen 2005b | |
200 01 | 62 | In the publication, the PhD thesis of Nm is cited for text that originally stems from Xu and Chen (2005) | Xu & Chen 2005a |
202 12 | 63 | Tsvetovat et al. 2005 | |
205 21 | 65 | Zhao et al. 2006 | |
206 01 | 65 | Zhao et al. 2006 | |
206 26 | 67 | Only the first sentence of the fragment is affected, but this sentence is copied literally. | Jensen et al. 2003 |
207 12 | 66 | Frost 1982 | |
208 01 | 67 | Source is given in the publication | Frost 1982 |
208 11 | 67, 68 | Frost 1982 | |
214 02 | 70 | TrackingTheThreat.com - Home (2006) | |
214 07 | 70 | TrackingTheThreat.com - About this site (2006) | |
214 15 | 70 | TrackingTheThreat.com - About this site (2006) | |
215 01 | 70 | Dugan et al. 2006 | |
215 11 | 70, 71 | Malin et al. 2005 | |
216 05 | 71 | Dugan et al. 2006 |
The fragments listed in the table above can all be found in Nm's thesis. However, there are additional findings of plagiarism in this publication that go beyond Nm's thesis:
- Thuraisingham 2003: Page 213-214 of this source has been copied almost literally to form a paragraph on page 56 of the publication.