von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 219 04 - Diskussion Zuletzt bearbeitet: 2012-07-07 20:44:47 WiseWoman | Balasundaram et al 2006, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 219, Zeilen: 4-8, 10-23, 24-26 |
Quelle: Balasundaram et al 2006 Seite(n): 1, 2, Zeilen: 1:18-21; 2:4-11.35-39 |
---|---|
In the wake of the information revolution, the interest in studying the network structure of organizations, in particular criminal in nature, has increased manifold. Social network concepts, regardless of their flexibility, have come to the forefront especially for these applications. This chapter introduces and studies cohesion analysis of terrorist networks.
Cohesion analysis is often used to explain and develop sociological theories. Members of a cohesive subgroup tend to share information, have homogeneity of thought, identity, beliefs, behaviour, even food habits and illnesses (Wasserman, S., Faust, K., 1994). Social cohesion is also believed to influence emergence of consensus among group members. Examples of cohesive subgroups include religious sects, terrorist groups, criminal gangs/ organized criminals, military teams, and tribal clusters, etc. Some direct application areas of social networks include studying terrorist networks (Sageman, M., 2004; Berry, N. et al., 2004), as mentioned earlier chapters a special application of criminal network analysis. It is anticipated to study organized crimes for example, terrorism, drug trafficking and money laundering, (McAndrew, D.,1999:; Chen, H. et al, 2004)), identity theft, credit card crime, child pornography, human smuggling. It is worthy to mention that SNA concepts provide suitable data mining tools for this purpose (Davis, R.H, 1981). |
In the wake of the information revolution, the interest in studying the network
structure of organizations, in particular criminal in nature, has increased manifold. Social network concepts, despite their versatility, have come to the forefront especially for these applications. [...] [Page 2] Social cohesion is often used to explain and develop sociological theories. Members of a cohesive subgroup tend to share information, have homogeneity of thought, identity, beliefs, behavior, even food habits and illnesses [52]. Social cohesion is also believed to influence emergence of consensus among group members. Examples of cohesive subgroups include religious cults, terrorist cells, criminal gangs, military platoons, sports teams and conferences, work groups etc. [...] Some direct application areas of social networks include studying terrorist networks [43,9], which is essentially a special application of criminal network analysis that is intended to study organized crimes such as terrorism, drug trafficking and money laundering [36,21]. Concepts of social network analysis provide suitable data mining tools for this purpose [17]. [9]. Berry, N., Ko, T., Moy, T., Smrcka, J., Turnley, J., Wu, B.:[...] (2004). [...] [17]. Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: [...] (2004) [21]. Davis, R.H.:[...] (1981) [36]. McAndrew, D.: [...] (1999) [43]. Sageman, M.: [...] (2004) [52]. Wasserman, S., Faust, K.: [...] (1994) |
The source is not given. The text is copied including all literature references. Only minor adjustments have been made. |
|
[2.] Nm/Fragment 219 27 - Diskussion Zuletzt bearbeitet: 2012-05-07 16:18:58 Hindemith | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Stokman 2004, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 219, Zeilen: 27-28 |
Quelle: Stokman_2004 Seite(n): 1, Zeilen: 1-3 |
---|---|
Social network analysis in general studies behaviour of the individuals at the micro level, the pattern of relationships (network [structure) at the macro level, and the interactions between the two.] | Social network analysis [FN 1] studies the behavior of the individual [FN 2] at the micro level, the pattern of relationships (network structure) at the macro level, and the interactions between the two. |
To be continued on the next page. The source is not mentioned in the thesis at all. |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Graf Isolan, Zeitstempel: 20120417213811