Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Oscar Fingal O'Flahertie Wills Wilde was born on the 16th October 1854 in Dublin Ireland. The son of Dublin intellectuals Oscar proved himself an outstanding classicist at Dublin, then at Oxford. With his education complete Wilde moved to London and its fashionable cultural and social circles. With his biting wit, flamboyant dress, and glittering conversation, Wilde became one of the most well-known personalities of his day. His only novel, The Picture of Dorian Gray was published in 1890 and he then moved on to writing for the stage with Salome in 1891. His society comedies produced enormous hits and turned him into one of the most successful writers of late Victorian London. Whilst his masterpiece, The Importance of Being Earnest, was on stage in London, Wilde had the Marquess of Queensberry, the father of his lover, Lord Alfred Douglas, prosecuted for libel. The trial unearthed evidence that caused Wilde to drop his charges and led to his own arrest and trial for gross indecency. He was convicted and imprisoned for two years' hard labour. It was to break him. On release he left for France, There he wrote his last work, The Ballad of Reading Gaol in 1898. He died destitute in Paris at the age of forty-six sipping champagne a friend had brought with the line 'Alas I am dying beyond my means'. Here we publish another of his classic plays 'An Ideal Husband'
English drama. --- Political corruption. --- Extortion. --- Blackmail --- Chantage --- Offenses against property --- Undue influence --- Threats --- Boss rule --- Corruption (in politics) --- Graft in politics --- Malversation --- Political scandals --- Politics, Practical --- Corruption --- Misconduct in office --- English literature --- Corrupt practices
Choose an application
Cyberterrorism. --- Computer crimes. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Extortion. --- Blackmail --- Chantage --- Offenses against property --- Undue influence --- Threats
Choose an application
This systematic study of New York City's Chinatown gangs uses first-hand data collected from a substantial number of gang victims, gang members, community leaders and law enforcement authorities.
Chinese American gangs --- Chinese American teenagers --- Chinese American criminals --- Extortion --- Criminals, Chinese American --- Criminals --- Teenagers, Chinese American --- Teenagers --- Gangs, Chinese American --- Gangs --- Blackmail --- Chantage --- Offenses against property --- Undue influence --- Threats --- Chinatown (New York, N.Y.) --- Hua bu (New York, N.Y.) --- Tang ren bu (New York, N.Y.) --- 紐約華埠 (New York, N.Y.) --- 纽约华埠 (New York, N.Y.) --- Niuyue hua bu (New York, N.Y.) --- 華埠 (New York, N.Y.) --- 华埠 (New York, N.Y.) --- Social life and customs. --- Social conditions.
Choose an application
This book presents a multi-disciplinary investigation into extortion rackets with a particular focus on the structures of criminal organisations and their collapse, societal processes in which extortion rackets strive and fail and the impacts of bottom-up and top-down ways of fighting extortion racketeering. Through integrating a range of disciplines and methods the book provides an extensive case study of empirically based computational social science. It is based on a wealth of qualitative data regarding multiple extortion rackets, such as the Sicilian Mafia, an international money laundering organisation and a predatory extortion case in Germany. Computational methods are used for data analysis, to help in operationalising data for use in agent-based models and to explore structures and dynamics of extortion racketeering through simulations. In addition to textual data sources, stakeholders and experts are extensively involved, providing narratives for analysis and qualitative validation of models. The book presents a systematic application of computational social science methods to the substantive area of extortion racketeering. The reader will gain a deep understanding of extortion rackets, in particular their entrenchment in society and processes supporting and undermining extortion rackets. Also covered are computational social science methods, in particular computationally assisted text analysis and agent-based modelling, and the integration of empirical, theoretical and computational social science.
Computer science. --- Data mining. --- Computer simulation. --- Social sciences. --- Computer Science. --- Simulation and Modeling. --- Criminology and Criminal Justice, general. --- Data Mining and Knowledge Discovery. --- Data-driven Science, Modeling and Theory Building. --- Methodology of the Social Sciences. --- Organized crime --- Extortion --- Social aspects. --- Mathematical models. --- Blackmail --- Chantage --- Crime syndicates --- Organised crime --- Offenses against property --- Undue influence --- Threats --- Crime --- Criminology. --- Social sciences --- Methodology. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Criminals --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Study and teaching --- Sociophysics. --- Econophysics. --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Economics --- Statistical physics --- Mathematical sociology --- Statistical methods
Listing 1 - 4 of 4 |
Sort by
|