Keine Bearbeitungszusammenfassung |
Klgn (Diskussion | Beiträge) (Kategorien hinzufügen) |
||
(29 dazwischenliegende Versionen von 4 Benutzern werden nicht angezeigt) | |||
Zeile 1: | Zeile 1: | ||
__NOTOC____NOEDITSECTION__ |
__NOTOC____NOEDITSECTION__ |
||
{{:Nm2/Titelaufnahme}} |
{{:Nm2/Titelaufnahme}} |
||
+ | |||
+ | ==Report== |
||
+ | The analysis presented here (as of January 14, 2014), including all documented findings of plagiarism, is available for [http://static3.wikia.nocookie.net/vroniplag/de/images/9/92/Nm2_Report_14_01_2014.pdf →download]. |
||
==Overview== |
==Overview== |
||
− | The pages 430-440 of the |
+ | The pages 430-440 of the paper have been analyzed. Page 441 contains only part of the bibliography and has been excluded: |
+ | <br /> |
||
{| class="ueberpruefte-fragmentseiten" |
{| class="ueberpruefte-fragmentseiten" |
||
! colspan="20" | Pages |
! colspan="20" | Pages |
||
Zeile 11: | Zeile 15: | ||
|- |
|- |
||
|} |
|} |
||
+ | <br /> |
||
− | |||
All pages except for page 439 contain plagiarism. Clicking on the respective page number in the table above leads to the documentation of the text parallels on the corresponding page. On [[Konzept:Nm2_und_Gt75|pages coloured in light red]] more than 75% of the text is plagiarized, on [[Konzept:Nm2_und_Gt50|pages coloured in dark red]] between 50% and 75% of the text is plagiarized and on pages coloured in blue less than 50% of the text is plagiarized. |
All pages except for page 439 contain plagiarism. Clicking on the respective page number in the table above leads to the documentation of the text parallels on the corresponding page. On [[Konzept:Nm2_und_Gt75|pages coloured in light red]] more than 75% of the text is plagiarized, on [[Konzept:Nm2_und_Gt50|pages coloured in dark red]] between 50% and 75% of the text is plagiarized and on pages coloured in blue less than 50% of the text is plagiarized. |
||
Zeile 17: | Zeile 21: | ||
The following chart illustrates the amount and the distribution of the findings of text parallels. The colours show the type of plagiarism diagnosed: |
The following chart illustrates the amount and the distribution of the findings of text parallels. The colours show the type of plagiarism diagnosed: |
||
* <span style="background-color:darkgray">grau</span>="Komplettplagiat": the source of the text parallel is not given, the copy is verbatim. |
* <span style="background-color:darkgray">grau</span>="Komplettplagiat": the source of the text parallel is not given, the copy is verbatim. |
||
− | * <span style="background-color:red">rot</span>="Verschleierung": the source of the text parallel is not given, the copied text |
+ | * <span style="background-color:red">rot</span>="Verschleierung": the source of the text parallel is not given, the copied text will be somewhat modified. |
* <span style="background-color:yellow">gelb</span>="Bauernopfer": the source of the text parallel is mentioned, but the extent and/or closeness of the copying is not made clear by the reference. |
* <span style="background-color:yellow">gelb</span>="Bauernopfer": the source of the text parallel is mentioned, but the extent and/or closeness of the copying is not made clear by the reference. |
||
− | [[Datei:Nm2 |
+ | [[Datei:Nm2 col.png|552px|650px]] |
− | ==Prominent findings of |
+ | ==Prominent findings of plagiarism== |
− | * [[Nm2/Fragment 430 28|Fragment 430 28]], [[Nm2/Fragment_431_03|Fragment 431 03]]: Three paragraphs of the introduction are taken from [[Quelle:Nm2/Katz et al 2004|Katz et al. (2004)]], a publication that is |
+ | * [[Nm2/Fragment 430 28|Fragment 430 28]], [[Nm2/Fragment_431_03|Fragment 431 03]]: Three paragraphs of the introduction are taken from [[Quelle:Nm2/Katz et al 2004|Katz et al. (2004)]], a publication that is not mentioned anywhere in the paper. The text is slightly adapted to give it a "terrorist feel", e.g. "Joe talks to Jane" in the source becomes "Atta talks with Khalid" in the paper. |
− | * [[Nm2/Fragment_432_31|Fragment 432 31]]: 10 lines of text in |
+ | * [[Nm2/Fragment_432_31|Fragment 432 31]]: 10 lines of text in Section 2 are taken verbatim without any attribution. |
− | * [[Nm2/Fragment_433_24|Fragment 433 24]]: The authors cite themselves for a passage taken verbatim from [[Quelle:Nm2/Koschade 2005|Koschade (2005)]], who in fact |
+ | * [[Nm2/Fragment_433_24|Fragment 433 24]]: The authors cite themselves for a passage taken verbatim from [[Quelle:Nm2/Koschade 2005|Koschade (2005)]], who in fact quote another source for it. |
− | * [[Nm2/Fragment 434 01|Fragment 434 01]]: A table is taken together with an eight |
+ | * [[Nm2/Fragment 434 01|Fragment 434 01]]: A table is taken together with an eight-line explanation ([[Nm2/Fragment 433 32|Fragment 433 32]]) from a source not mentioned in the paper. The copied table is the one mentioned in an [http://link.springer.com/chapter/10.1007/978-3-540-73871-8_61 "Erratum" on SpringerLink]. |
− | * [[Nm2/Fragment_434_04|Fragment 434 04]]: Almost two paragraphs are taken from [[Quelle:Nm2/Koelle et al 2006|Koelle et al. (2006)]], a publication that is |
+ | * [[Nm2/Fragment_434_04|Fragment 434 04]]: Almost two paragraphs are taken from [[Quelle:Nm2/Koelle et al 2006|Koelle et al. (2006)]], a publication that is not mentioned anywhere in the paper. This includes all references to the literature (six in total). |
− | * [[Nm2/Fragment_440_16|Fragment 440 16]]: More than half of the conclusions is taken verbatim from [[Quelle:Nm2/Stephenson_and_Zelen_1989|Stephenson & Zelen (1989)]], a publication |
+ | * [[Nm2/Fragment_440_16|Fragment 440 16]]: More than half of the conclusions is taken verbatim from [[Quelle:Nm2/Stephenson_and_Zelen_1989|Stephenson & Zelen (1989)]], a publication not mentioned anywhere in the paper. |
==Statistics== |
==Statistics== |
||
Zeile 34: | Zeile 38: | ||
==Duplication== |
==Duplication== |
||
− | + | Most of the text of the paper has been recycled by the authors elsewhere: |
|
− | * The entire |
+ | * The entire Section 4 "Centrality Measures" as well as about half of Section 5 "Dependence Centrality" (i.e. p. 435:30-42, p. 436:all, p. 437:all, p. 438:1-30, p.439:5-10) are identical to the corresponding portions of [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4455057&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4454732%2F4454733%2F04455057.pdf Memon et al. (2007e) (retracted)]. |
+ | * A part of Section 4 "Centrality Measures" as well as about half of Section 5 "Dependence Centrality" (i.e. p. 435:30-42, p. 436:1-15, p. 437:26-35, p. 438:1-30) have also been published in [http://link.springer.com/chapter/10.1007%2F978-3-540-69304-8_50?LI=true Memon et al. (2008a)] |
||
⚫ | |||
+ | * The entire Section 3 "Graph Theory" (p. 435:1-29) has also been published in [http://vbn.aau.dk/en/publications/revealing-topological-properties-of-terrorist-networks(14f2d370-1ad4-11dd-8ae8-000ea68e967b).html Harkiolakis et al. (2008b)] |
||
+ | * The entire Section 2 "Investigative Data Mining (IDM)" (p. 432:12-40, p. 433:all, p. 434:all) has also been published (in a slightly edited form) in [http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=837145 Memon et al. (2008d)] as well as in [http://www.inderscience.com/info/inarticle.php?artid=31284 Memon et al. (2010d)] and in [http://www.inderscience.com/info/inarticle.php?artid=37161 Memon et al. (2011a)] |
||
+ | * Large parts of the paper (p. 430:17-36; p. 431: all; p. 432:12-40; p. 433:1-2,13-22,31-38; p. 434:19-45; p. 436:9-39; p. 437:all; p. 438:1-30) have also been published in [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4493536&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4488216%2F4493499%2F04493536.pdf%3Farnumber%3D4493536 Memon et al. (2008e) (retracted)] |
||
+ | * Substantial parts of the paper (p. 430:17-36; p. 431:1-28; p. 436:9-36; p. 437:all; p. 438:1-30) have also been published in [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4529487 Memon & Hicks (2008f) (retracted)] |
||
+ | * A large part of Section 2 "Investigative Data Mining (IDM)" (p. 432:12-40; p.433:1-30; 434:33-42) has also been published in [http://ieeexplore.ieee.org/xpl/login.jsp?reload=true&tp=&arnumber=5066528&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5066528 Memon et al. (2009a) (retracted)] |
||
+ | * Some parts of the paper (p. 430:27-36; p. 431:1-9; p. 437:26-35) have also been published in [http://link.springer.com/chapter/10.1007%2F978-3-7091-0388-3_20 Memon et al. (2011c)] |
||
⚫ | |||
** [[Nm|N. Memon's PhD thesis (2007)]] |
** [[Nm|N. Memon's PhD thesis (2007)]] |
||
− | ** [http://link.springer.com/chapter/10.1007%2F11811305_113 Memon & Larsen ( |
+ | ** [http://link.springer.com/chapter/10.1007%2F11811305_113 Memon & Larsen (2006a)] |
− | ** [http://ftp.rta.nato.int/public//PubFullText/RTO/MP/RTO-MP-IST-063///MP-IST-063-14.pdf Memon & Larsen ( |
+ | ** [http://ftp.rta.nato.int/public//PubFullText/RTO/MP/RTO-MP-IST-063///MP-IST-063-14.pdf Memon & Larsen (2007a)] |
− | ** [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4272050&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4272050 Memon et al. ( |
+ | ** [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4272050&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4272050 Memon et al. (2007c) (retracted)] |
− | ** [http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=837145 Memon et al. ( |
+ | ** [http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=837145 Memon et al. (2008d)] |
− | ** [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4493536&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4488216%2F4493499%2F04493536.pdf%3Farnumber%3D4493536 Memon et al. ( |
+ | ** [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4493536&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4488216%2F4493499%2F04493536.pdf%3Farnumber%3D4493536 Memon et al. (2008e) (retracted)] |
− | ** [http://ieeexplore.ieee.org/xpl/login.jsp?reload=true&tp=&arnumber=5066528&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5066528 Memon et al. ( |
+ | ** [http://ieeexplore.ieee.org/xpl/login.jsp?reload=true&tp=&arnumber=5066528&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5066528 Memon et al. (2009a) (retracted)] |
− | ** [http://www.inderscience.com/info/inarticle.php?artid=31284 Memon et al. ( |
+ | ** [http://www.inderscience.com/info/inarticle.php?artid=31284 Memon et al. (2010d)] |
− | ** [http://link.springer.com/chapter/10.1007%2F978-3-7091-0388-3_20 Memon et al. ( |
+ | ** [http://link.springer.com/chapter/10.1007%2F978-3-7091-0388-3_20 Memon et al. (2011a)] |
Zeile 53: | Zeile 64: | ||
*[[Quelle:Nm2|All Sources ({{#ask: [[Kategorie:Nm2]] [[Kategorie:Quelle]] | format=count }})]] |
*[[Quelle:Nm2|All Sources ({{#ask: [[Kategorie:Nm2]] [[Kategorie:Quelle]] | format=count }})]] |
||
*[[:Kategorie:Nm2|All Wiki-pages related to this documentation]] |
*[[:Kategorie:Nm2|All Wiki-pages related to this documentation]] |
||
− | *The extensive [[Nm|documentation of N. |
+ | *The extensive [[Nm|documentation of N. Memon's PhD thesis]] including an [[Nm/Comparisons|overview of all his terrorism-related publications]] up to 2011. |
+ | *[[Nm3]], [[Nm4]]: The documentation of plagiarism in other papers of the authors. |
||
*[[Nm2/Pressespiegel|Press and Blog mentions related to this case]] |
*[[Nm2/Pressespiegel|Press and Blog mentions related to this case]] |
||
− | *[[VroniPlag Wiki:Pressespiegel|General Press listings related to |
+ | *[[VroniPlag Wiki:Pressespiegel|General Press listings related to VroniPlag Wiki and its cases]] |
− | *In the [[VroniPlag_Wiki:Chat| |
+ | *In the [[VroniPlag_Wiki:Chat|VroniPlag Wiki Chat]] questions are answered regarding this case and regarding the wiki in general. Please introduce yourself, at times you may have to keep the chat open and wait a while until someone answers, generally evenings German time (UTC +1). |
[[Kategorie:Nm2]] |
[[Kategorie:Nm2]] |
||
+ | [[Kategorie:HNR]] |
Aktuelle Version vom 2. April 2019, 08:47 Uhr
A critical discussion of the publication by Nasrullah Memon, David L. Hicks, and Henrik Legind Larsen: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks
in: R. Alhajj et al. (Eds.): ADMA 2007, LNAI 4632, pp. 430–441, 2007. Springer Berlin Heidelberg →ISBN 978-3-540-73870-1 →Download →Erratum
Report
The analysis presented here (as of January 14, 2014), including all documented findings of plagiarism, is available for →download.
Overview
The pages 430-440 of the paper have been analyzed. Page 441 contains only part of the bibliography and has been excluded:
Pages | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
430 | 431 | 432 | 433 | 434 | 435 | 436 | 437 | 438 | 439 | 440 |
All pages except for page 439 contain plagiarism. Clicking on the respective page number in the table above leads to the documentation of the text parallels on the corresponding page. On pages coloured in light red more than 75% of the text is plagiarized, on pages coloured in dark red between 50% and 75% of the text is plagiarized and on pages coloured in blue less than 50% of the text is plagiarized.
Illustration
The following chart illustrates the amount and the distribution of the findings of text parallels. The colours show the type of plagiarism diagnosed:
- grau="Komplettplagiat": the source of the text parallel is not given, the copy is verbatim.
- rot="Verschleierung": the source of the text parallel is not given, the copied text will be somewhat modified.
- gelb="Bauernopfer": the source of the text parallel is mentioned, but the extent and/or closeness of the copying is not made clear by the reference.
Prominent findings of plagiarism
- Fragment 430 28, Fragment 431 03: Three paragraphs of the introduction are taken from Katz et al. (2004), a publication that is not mentioned anywhere in the paper. The text is slightly adapted to give it a "terrorist feel", e.g. "Joe talks to Jane" in the source becomes "Atta talks with Khalid" in the paper.
- Fragment 432 31: 10 lines of text in Section 2 are taken verbatim without any attribution.
- Fragment 433 24: The authors cite themselves for a passage taken verbatim from Koschade (2005), who in fact quote another source for it.
- Fragment 434 01: A table is taken together with an eight-line explanation (Fragment 433 32) from a source not mentioned in the paper. The copied table is the one mentioned in an "Erratum" on SpringerLink.
- Fragment 434 04: Almost two paragraphs are taken from Koelle et al. (2006), a publication that is not mentioned anywhere in the paper. This includes all references to the literature (six in total).
- Fragment 440 16: More than half of the conclusions is taken verbatim from Stephenson & Zelen (1989), a publication not mentioned anywhere in the paper.
Statistics
- Currently there are 20 reviewed fragments documented that are considered to be violations of citation rules. For 18 of them there is no reference given to the source used („Verschleierungen“ and „Komplettplagiate“). For 2 fragments the source is given, but the extent of the used text is not made clear („Bauernopfer“).
- The publication has 11 pages that have been analyzed. On a total of 10 of these pages violations of citation rules have been documented. This represents a percentage of 90.9%. The 11 analyzed pages break down with respect to the amount of text parallels encountered as follows:
- From these statistics an extrapolation of the amount of text of the publication under investigation that has been documented as problematic can be estimated (conservatively) as about 46% of the main part of the publication.
- In all, text was taken from 12 sources.
Duplication
Most of the text of the paper has been recycled by the authors elsewhere:
- The entire Section 4 "Centrality Measures" as well as about half of Section 5 "Dependence Centrality" (i.e. p. 435:30-42, p. 436:all, p. 437:all, p. 438:1-30, p.439:5-10) are identical to the corresponding portions of Memon et al. (2007e) (retracted).
- A part of Section 4 "Centrality Measures" as well as about half of Section 5 "Dependence Centrality" (i.e. p. 435:30-42, p. 436:1-15, p. 437:26-35, p. 438:1-30) have also been published in Memon et al. (2008a)
- The entire Section 3 "Graph Theory" (p. 435:1-29) has also been published in Harkiolakis et al. (2008b)
- The entire Section 2 "Investigative Data Mining (IDM)" (p. 432:12-40, p. 433:all, p. 434:all) has also been published (in a slightly edited form) in Memon et al. (2008d) as well as in Memon et al. (2010d) and in Memon et al. (2011a)
- Large parts of the paper (p. 430:17-36; p. 431: all; p. 432:12-40; p. 433:1-2,13-22,31-38; p. 434:19-45; p. 436:9-39; p. 437:all; p. 438:1-30) have also been published in Memon et al. (2008e) (retracted)
- Substantial parts of the paper (p. 430:17-36; p. 431:1-28; p. 436:9-36; p. 437:all; p. 438:1-30) have also been published in Memon & Hicks (2008f) (retracted)
- A large part of Section 2 "Investigative Data Mining (IDM)" (p. 432:12-40; p.433:1-30; 434:33-42) has also been published in Memon et al. (2009a) (retracted)
- Some parts of the paper (p. 430:27-36; p. 431:1-9; p. 437:26-35) have also been published in Memon et al. (2011c)
- Fragment 433 24 can be found in 9 other publications:
Relevant Links
- Fragments showing plagiarism (20)
- Fragments showing text parallels that might not constitute plagiarism (2)
- All Sources (12)
- All Wiki-pages related to this documentation
- The extensive documentation of N. Memon's PhD thesis including an overview of all his terrorism-related publications up to 2011.
- Nm3, Nm4: The documentation of plagiarism in other papers of the authors.
- Press and Blog mentions related to this case
- General Press listings related to VroniPlag Wiki and its cases
- In the VroniPlag Wiki Chat questions are answered regarding this case and regarding the wiki in general. Please introduce yourself, at times you may have to keep the chat open and wait a while until someone answers, generally evenings German time (UTC +1).