VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm/Fragment 244 21 - Diskussion
Zuletzt bearbeitet: 2012-04-21 22:29:29 Hindemith
BauernOpfer, Fragment, Gesichtet, Nm, Ressler 2006, SMWFragment, Schutzlevel sysop

Typus
BauernOpfer
Bearbeiter
Graf Isolan
Gesichtet
Yes
Untersuchte Arbeit:
Seite: 244, Zeilen: 21-32
Quelle: Ressler 2006
Seite(n): 7, Zeilen: 25-34
Investigative data mining is just one tool that can be used to understand terrorism, and one piece of the puzzle. Domain experts are needed to provide a context for the research. Furthermore, the basic assumption of investigative data mining regarding terrorism may not be completely valid. Despite their non-hierarchical approach, terrorist organizations are not completely organized in a network structure (Ressler, S., 2006). There are still central headquarters and training camps for most terrorist organizations. Investigative data mining must attempt to address the underlying root cause of terrorism. It is helpful to understand how a network evolves and how to destabilize a network. It is more helpful, however, to understand how a network recruits human bombs and [why people wish to join terrorist networks.] social network analysis is just one tool that can be used to understand terrorism, and is just one piece of the puzzle. Subject matter experts are needed to provide a context for the research. Furthermore, the basic assumption of network analysis regarding terrorism may not be completely valid. Despite their nonhierarchical approach, terrorist organizations are not completely organized in a network structure. There are still central headquarters and training facilities for most terrorist organizations. Also, social network analysis must attempt to address the underlying root cause of terrorism. It is helpful to understand how a network evolves and how to destabilize a network. It is more helpful, however, to understand how networks recruit participants and why people wish to join terrorist networks.
Anmerkungen

Even at the end, when Nm tries to summarize his own results - we are talking about the section "9.2 DISSERTATION CONTRIBUTIONS" - there is a whole section from another work without it being marked as a citation. This paragraph originally belonged to the final - discussion - section of Ressler (2006).

The source Ressler (2006) is given, but no citation is marked (and the copied text continues after the reference to Ressler (2006)).

Sichter
(Graf Isolan), Hindemith



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120421222658