Angaben zur Quelle [Bearbeiten]
Autor | Dražen Penzar, Armano Srbljinović |
Titel | About Modelling of complex networks with applications to terrorist group modelling |
Zeitschrift | Interdisciplinary Description of Complex Systems |
Jahr | 2005 |
Jahrgang | 3 |
Nummer | 1 |
Seiten | 27-43 |
ISSN | 1334-4676 |
URL | http://www.indecs.eu/2005/indecs2005-pp27-43.pdf |
Literaturverz. |
yes |
Fußnoten | yes |
Fragmente | 1 |
Fragmente der Quelle:
[1.] Nm6/Fragment 477 18 - Diskussion Zuletzt bearbeitet: 2014-02-11 01:34:20 Hindemith | BauernOpfer, Fragment, Gesichtet, Nm6, Penzar et al 2005, SMWFragment, Schutzlevel sysop |
|
|
Untersuchte Arbeit: Seite: 477, Zeilen: 18-26 |
Quelle: Penzar et al 2005 Seite(n): 28, Zeilen: 2ff |
---|---|
After the tragic terrorist attacks in New York and Washington in September, 2001, media interest in the Al Qaeda organization rose immediately. Experts and analysts all over the world started to offer various explanations of Al Qaeda’s origins, membership recruitment, modes of operation, as well as possible ways for its disruption. One could thus read or hear that Al Qaeda is “a net that contains independent intelligence”, that “functions as a swarm”, that “gathers from nowhere and disappears after action”, that is “an ad hoc network”, “an atypical organization”, and that is extremely hard to destroy, especially by traditional anti-terrorist or counterterrorist methods [1].
1. Penzar, D., Srbljinović, A.: About Modeling of Complex Networks with Applications to Terrorist Group Modeling. J. Interdisciplinary Description of Complex Systems 3(1), 27–43 (2005) |
After catastrophic terrorist attacks by kidnapped airlines on New York and Washington in September 2001 the interest for al-Qaeda terrorist organisation in public and media rose immediately. Experts and analysts all over the world started to offer various explanations of al-Qaeda’s origins, membership recruitment, modes of operation, as well as of possible ways of its disruption. [...]
One could thus read or hear that al-Qaeda is “a net that contains independent intelligence”,that it “functions as a swarm”, that it “gathers from nowhere and disappears after action”, that it is “an ad hoc network”, “an atypical organisation”, extremely hard to destroy, especially by traditional anti-terrorist methods. |
The source is given at the end of the paragraph, but nothing indicates that most of the text is taken verbatim from the source. |
|