Fandom

VroniPlag Wiki

Quelle:Nm2/Koschade 2005

< Quelle:Nm2

31.340Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Angaben zur Quelle [Bearbeiten]

Autor     Stuart A. Koschade
Titel    A Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia
Sammlung    Social Change in the 21st Century Conference, 28 October 2005, Queensland University of Technology
Herausgeber    C. Bailey, Laurie R. Buys
Ort    Brisbane
Datum    28. October 2005
ISBN    1-7410-7108-9
URL    http://eprints.qut.edu.au/3496/

Literaturverz.   

no
Fußnoten    no
Fragmente    2


Fragmente der Quelle:
[1.] Nm2/Fragment 433 14 - Diskussion
Zuletzt bearbeitet: 2014-01-11 22:36:43 Singulus
Fragment, Gesichtet, Koschade 2005, Nm2, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 433, Zeilen: 14-19
Quelle: Koschade 2005
Seite(n): 2, 3, Zeilen: 2: 6ff; 3: 31ff
IDM offers the ability to map a covert cell, and to measure the specific structural and interactional criteria of such a cell. This framework aims to connect the dots between individuals and to map and measure complex, covert, human groups and organizations [13]. The method focuses on uncovering the patterning of people’s interaction, and correctly interpreting these networks assists in predicting behaviour and decision-making within the network [13].

13. Memon, N., Larsen, H.L.: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks. In: Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 1037–1048. Springer, Heidelberg (2006)

Social network analysis offers the ability to firstly map a covert cell, and to secondly measure the specific structural and interactional criteria of such a cell.

[page 3]

This framework aims to connect the dots between individuals and “map and measure complex, sometimes covert, human groups and organisations”.8 The method focuses on uncovering the patterning of people’s interaction,9 and correctly interpreting these networks assists “in predicting behaviour and decision-making within the network”.10


8 Krebs, V. (2002) “Mapping Networks of Terrorist Cells”, Connections, Vol. 24, 3, pp. 43-52.

9 Freeman, L. (nd) ‘The Study of Social Networks’, The International Network for Social Network Analysis, Retrieved May 17, 2004, from http://www.sfu.ca/~insna/INSNA/na_inf.html.

10 Renfro, R. & Deckro, R. (2001). “A Social Network Analysis of the Iranian Government”, paper presented at 69th MORS Symposium, 12-14 June, 2001, p. 4.

Anmerkungen

The authors refer to one of their own earlier papers (see SpringerLink). There the passage can indeed be found, but Koschade (2005) was published even before the Memon/Larson paper. Thus, the Memon/Larson paper cannot be the original source.

The authors also removed three citations.

Sichter
(Hindemith), WiseWoman

[2.] Nm2/Fragment 433 24 - Diskussion
Zuletzt bearbeitet: 2014-01-11 23:19:19 Hindemith
Fragment, Gesichtet, Koschade 2005, Nm2, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 433, Zeilen: 24-31
Quelle: Koschade 2005
Seite(n): 2, 3, Zeilen: 2: 8-14; 3: 38ff
IDM also endows the analyst with the ability to measure the level of covertness and efficiency of the cell as a whole, and the level of activity, ability to access others, and the level of control over a network each individual possesses. The measurement of these criteria allows specific counter-terrorism applications to be drawn, and assists in the assessment of the most effective methods of disrupting and neutralising a terrorist cell [13]. In short, IDM provides a useful way of structuring knowledge and framing further research. Ideally it can also enhance an analyst’s predictive capability [13].

13. Memon, N., Larsen, H.L.: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks. In: Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 1037–1048. Springer, Heidelberg (2006)

The method also endows the analyst the ability to measure the level of covertness and efficiency of the cell as a whole, and also the level of activity, ability to access others, and the level of control over a network each individual possesses. The measurement of these criteria allows specific counter-terrorism applications to be drawn, and assists in the assessment of the most effective methods of disrupting and neutralising a terrorist cell.

[page 3]

In short, social network analysis “provides a useful way of structuring knowledge and framing further research. Ideally it can also enhance an analyst’s predictive capability”.12


12 Aftergood, S. (2004) ‘Secrecy News: Social Network Analysis and Intelligence’ [online], Federation of American Scientists Project on Government Secrecy, Vol. 2004, 15. Retrieved May 17, 2004, from http://www.fas.org/sgp/news /secrecy/2004/02/020904.html.

Anmerkungen

The authors refer to one of their own earlier papers (see SpringerLink). There the passage can indeed be found, but Koschade (2005) was published even before the Memon/Larson paper. Thus, it cannot be the original source.

The authors also removed a citation and attribute the quote to themselves.

Sichter
(Hindemith), WiseWoman

Auch bei Fandom

Zufälliges Wiki