Fandom

VroniPlag Wiki

Nm3/Fragment 1038 01

< Nm3

31.357Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Share

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.


Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 1038, Zeilen: 1-2, 5-16
Quelle: Balasundaram et al 2006
Seite(n): 2, Zeilen: 9ff
[Examples of cohesive sub-] groups include religious cults, terrorist cells, criminal gangs, military platoons, tribal groups and work groups etc.

[...]

Some direct application areas of social networks include studying terrorist networks (Sageman, M., 2004, Berry, N. et al., 2004), which is essentially an [sic] special application of criminal network analysis that is intended to study organized crimes such as terrorism, drug trafficking and money laundering (McAndrew, D., 1999, Davis, R. H., 1981). Concepts of social network analysis provide suitable data mining tools for this purpose (Chen, H., et al., 2004).

Figure 1 shows an example of a terrorist network, which maps the links between terrorists involved in the tragic events of September 11, 2001. This graph was constructed by Valdis Krebs (Krebs, V., 2002) using the public data that were available before, but collected after the event. Even though the information mapped in this network is by no means complete, its analysis may still provide valuable insights into the structure of a terrorist organization.

Examples of cohesive subgroups include religious cults, terrorist cells, criminal gangs, military platoons, sports teams and conferences, work groups etc. [...]

[...]

Some direct application areas of social networks include studying terrorist networks [43,9], which is essentially a special application of criminal network analysis that is intended to study organized crimes such as terrorism, drug trafficking and money laundering [36,21]. Concepts of social network analysis provide suitable data mining tools for this purpose [17]. Figure 1 shows an example of a terrorist network, which maps the links between terrorists involved in the tragic events of September 11, 2001. This graph was constructed in [32] using the public data that were available before, but collected after the event. Even though the information mapped in this network is by no means complete, its analysis may still provide valuable insights into the structure of a terrorist organization.


9. Berry, N., Ko, T., Moy, T., Smrcka, J., Turnley, J., Wu, B.: Emergent clique formation in terrorist recruitment. The AAAI-04 Workshop on Agent Organizations: Theory and Practice, July 25, 2004, San Jose, California (2004). Http://www.cs.uu.nl/ virginia/aotp/papers.htm [sic]

17. Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: A general framework and some examples. Computer 37(4), 50–56 (2004)

21. Davis, R.H.: Social network analysis: An aid in conspiracy investigations. FBI Law Enforcement Bulletin pp. 11–19 (1981)

32. Krebs, V.: Mapping networks of terrorist cells. Connections 24, 45–52 (2002)

36. McAndrew, D.: The structural analysis of criminal networks. In: D. Canter, L. Alison (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. Aldershot, Dartmouth (1999)

43. Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press (2004)

Anmerkungen

The source is not given. The copied text starts on the previous page: Nm3/Fragment_1037_35. Figure 1 is different in each text.

Sichter
(Hindemith), WiseWoman

Auch bei Fandom

Zufälliges Wiki