von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 025 22 - Diskussion Zuletzt bearbeitet: 2012-04-30 16:35:25 Graf Isolan | Fragment, Gesichtet, Koschade 2005, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 25, Zeilen: 22-29 |
Quelle: Koschade_2005 Seite(n): 2, 3, Zeilen: p2:6-8; p3:31-35 |
---|---|
IDM offers ability to map a covert cell, and to measure the specific structural and interactive criteria of such a cell. This framework aims to connect dots between individuals and to map and measure complex, covert, human groups and organisations (Memon N., and Larsen H. L., 2006c). The method focuses on uncovering the patterning of people’s interaction, and correctly interpreting these networks assists in predicting behaviour and decision-making within the network (Memon N., and Larsen H. L., 2006c). | Social network analysis offers the ability to firstly map a covert cell, and to secondly measure the specific structural and interactional criteria of such a cell.
[page 3] This framework aims to connect the dots between individuals and “map and measure complex, sometimes covert, human groups and organisations”. [EN 8] The method focuses on uncovering the patterning of people’s interaction, [EN 9] and correctly interpreting these networks assists “in predicting behaviour and decision-making within the network”. [EN 10] [EN 8] Krebs, V. (2002) “Mapping Networks of Terrorist Cells”, Connections, Vol. 24, 3, pp. 43-52. [EN 9] Freeman, L. (nd) ‘The Study of Social Networks’, The International Network for Social Network Analysis, Retrieved May 17, 2004, from http://www.sfu.ca/~insna/INSNA/na_inf.html. [EN 10] Renfro, R. & Deckro, R. (2001). “A Social Network Analysis of the Iranian Government”, paper presented at 69th MORS Symposium, 12-14 June, 2001, p. 4. |
The source is not mentioned anywhere in the thesis. Not only did Nm copy an entire paragraph from the source, he also references for it the paper "Memon N., and Larsen H. L., 2006c", written by himself and the thesis supervisor. Finally he also removes the references for correct quotations in the source. |
|
[2.] Nm/Fragment 025 30 - Diskussion Zuletzt bearbeitet: 2012-04-29 22:21:46 Hindemith | BauernOpfer, DeRosa 2004, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop |
|
|
Untersuchte Arbeit: Seite: 25, Zeilen: 30-32 |
Quelle: DeRosa 2004 Seite(n): 6, Zeilen: 25-29 |
---|---|
This technique is also known as subject based link analysis. This technique uses aggregated public records or other large collection of data to find the links between a subject — a suspect, an address, [or a piece of relevant information — and other people, places, or things.] | A relatively simple and useful data-analysis tool for counterterrorism is subject-based “link analysis.” This technique uses aggregated public records or other large collections of data to find links between a subject — a suspect, an address, or other piece of relevant information — and other people, places, or things. |
At the end of the paragraph (on the next page) the source is given. Unfortunately nothing in this paragraph has been marked as a citation. |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120423131038