Fandom

VroniPlag Wiki

Nm2/434

< Nm2

31.358Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Share

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks

von Nasrullah Memon, David L. Hicks, Henrik Legind Larsen

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm2/Fragment 434 01 - Diskussion
Zuletzt bearbeitet: 2014-01-13 22:41:36 Hindemith
Fragment, Gesichtet, Nm2, Popp and Poindexter 2006, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 434, Zeilen: 1
Quelle: Popp and Poindexter 2006
Seite(n): 23, Zeilen: Table 2
Nm434diss.png Nm434source.png
Anmerkungen

The tables are almost identical, but the source is not mentioned anywhere in the thesis.

(click on the images to enlarge them)

Sichter
(Hindemith), WiseWoman

[2.] Nm2/Fragment 434 04 - Diskussion
Zuletzt bearbeitet: 2014-01-11 21:11:07 Hindemith
Fragment, Gesichtet, Koelle et al 2006, KomplettPlagiat, Nm2, SMWFragment, Schutzlevel sysop

Typus
KomplettPlagiat
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 434, Zeilen: 4-14
Quelle: Koelle et al 2006
Seite(n): 1, Zeilen: left col.: 19ff
SNA primarily focuses on applying analytic techniques to the relationships between individuals and groups, and investigating how those relationships can be used to infer additional information about the individuals and groups [14]. There are a number of mathematical and algorithmic approaches that can be used in SNA to infer such information, including connectedness and centrality [15].

Law enforcement personnel have used social networks to analyze terrorist networks [16, 17] and criminal networks [6]. The capture of Saddam Hussein was facilitated by social network analysis: military officials constructed a network containing Hussein’s tribal and family links, allowing them to focus on individuals who had close ties to Hussein [19].


6. Sparrow, M.: The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13, 251–274 (1991)

14. Degenne, A., Forse, M.: Introducing Social Networks. Sage Publications, London (1999)

15. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)

16. Krebs, V.E.: Uncloaking Terrorist Networks (2002), Accessed on 23/3/2005 http:// www.firstmonday.org/ issues/issue7_4/krebs

17. Stewart, T.: Six Degrees of Mohamed Atta (2001), Accessed on 24/1/2006 http://money.cnn.com/ magazines/business2

19. Hougham, V.: Sociological Skills Used in the Capture of Saddam Hussein (2005), Accessed on 22/2/2005 http://www.asanet.org/ footnotes/julyaugust05/fn3.html

Social network analysis (SNA) primarily focuses on applying analytic techniques to the relationships between individuals and groups, and investigating how those relationships can be used to infer additional information about the individuals and groups (Degenne & Forse, 1999). There are a number of mathematical and algorithmic approaches that can be used in SNA to infer such information, including connectedness and centrality (Wasserman & Faust, 1994).

[...] Law enforcement personnel have used social networks to analyze terrorist networks (Krebs, 2006; Stewart, 2001) and criminal networks (Sparrow, 1991). The capture of Saddam Hussein was facilitated by social network analysis: military officials constructed a network containing Hussein’s tribal and family links, allowing them to focus on individuals who had close ties to Hussein (Hougham, 2005).


Degenne, A. & Forse, M. (1999). Introducing Social Networks. London: Sage Publications.

Hougham, V. (2005). Sociological Skills Used in the Capture of Saddam Hussein. http://www.asanet.org/footnotes/ julyaugust05/fn3.html.

Krebs, V. E. (2006). Uncloaking Terrorist Networks. http://www.firstmonday.org/ issues/issue7_4/krebs

Sparrow, M. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks 13, 251-274.

Stewart, T. (2001). Six Degrees of Mohamed Atta. http://money.cnn.com/magazines/business2

Wasserman, S. & Faust, K. (1994). Social Network Analysis: Methods and Applications. Cambridge University Press.

Anmerkungen

The source is not mentioned, although the text and six references to the literature are taken verbatim from it.

Sichter
(Hindemith), WiseWoman


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20140111211655

Auch bei Fandom

Zufälliges Wiki