Fandom

VroniPlag Wiki

Nm6/487

< Nm6

31.380Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Teilen

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies

von Nasrullah Memon, Henrik Legind Larsen, David L. Hicks, and Nicholas Harkiolakis

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm6/Fragment 487 01 - Diskussion
Zuletzt bearbeitet: 2014-02-08 23:13:44 Hindemith
Fragment, Gesichtet, Jacobides 2006, Nm6, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 487, Zeilen: 1-9
Quelle: Jacobides 2006
Seite(n): 7, 8, Zeilen: 7: last lines; 8: 1ff
Hierarchy’s ability to take the role of network (organizational) architect and devise new ways of dividing labour allows a new set of frames to emerge. A new decomposition allows a new set of informational inputs to percolate through the network, and for new views to be formed [25] [26]. This is the cybernetic control function of hierarchy.

Hierarchy can also help to provide some real-time control of terrorist network’s (organization) routine mode of operation, at the level of both actions and cognition. In terms of action, it can step in to block routines that are not functional and override or restructure a proposed course of action to the extent possible.


25. Simon, H.A.: The Architecture of Complexity. Proc. Amer. Philos. Soc. 106, 467–482 (1962)

26. Jacobides, M.: The Architecture and Design of Organizational Capabilities. Indust. Corporate Change 15(1), 115–169 (2006)

Second, hierarchy’s ability to take the role of the “organizational architect”, and devise new ways of breaking up the tasks, and new types of units provides the opportunity for a new set of “frames” to emerge. A new “decomposition”, a new structure leads to a new set of inputs to come through to the

[page 8]

organization, and for new views to be formed (see Simon, 1962; Jacobides, 2006).7 This is the “cybernetic control” function of hierarchy.

Third, there is another important role for hierarchy, and that is to provide real-time control of the organization’s routine mode of operation, at the level of both actions and cognition. Hierarchy, in principle, provides the ability of stepping in (a) to “block” routines that are not functional, and override the proposed or emerging course of action of a part of the organization; [...]


7 [...]


Jacobides, M.G., 2006. The Architecture and Design of Organizational Capabilities, Industrial and Corporate Change 15(1): 151-169.

Simon, H.A.. 1962. The architecture of complexity. Proceedings of the American Philosophical Society 106 467-482.Simon, H.A.. 1962 [1988]. Sciences of the Artificial. MIT Press, Harvard MA.

Anmerkungen

The source is not mentioned anywhere.

The parallel text cannot be found in the mentioned source Jacobides 2006, which is different from the source of the parallel text.

The text parallel begins on the previous page: Nm6/Fragment_486_35

Sichter
(Hindemith) Singulus

[2.] Nm6/Fragment 487 15 - Diskussion
Zuletzt bearbeitet: 2014-02-11 01:34:12 Hindemith
Fragment, Gesichtet, KomplettPlagiat, Nm6, SMWFragment, Saxena et al. 2004, Schutzlevel sysop

Typus
KomplettPlagiat
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 487, Zeilen: 15-18
Quelle: Saxena et al. 2004
Seite(n): 94, Zeilen: 11ff
We are also confident that real-time or near real-time information from a multiplicity of databases could have the potential to generate early warning signals of utility in detecting and deterring terrorist attacks. It is necessary, of course, to have experts in the loop. It has not escaped our notice that SNA, duly validated and used with real-time or near real-time information from a multiplicity of databases could have the potential to generate early warning signals of utility in detecting and deterring terrorist attacks. It is necessary, of course, to have ‘experts’ in the loop.
Anmerkungen

The source is not mentioned anywhere in the paper.

Sichter
(Hindemith) Singulus


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20140208231710


Auch bei Fandom

Zufälliges Wiki