Listing 11 - 12 of 12 | << page >> |
Sort by
|
Choose an application
This book presents a multi-disciplinary investigation into extortion rackets with a particular focus on the structures of criminal organisations and their collapse, societal processes in which extortion rackets strive and fail and the impacts of bottom-up and top-down ways of fighting extortion racketeering. Through integrating a range of disciplines and methods the book provides an extensive case study of empirically based computational social science. It is based on a wealth of qualitative data regarding multiple extortion rackets, such as the Sicilian Mafia, an international money laundering organisation and a predatory extortion case in Germany. Computational methods are used for data analysis, to help in operationalising data for use in agent-based models and to explore structures and dynamics of extortion racketeering through simulations. In addition to textual data sources, stakeholders and experts are extensively involved, providing narratives for analysis and qualitative validation of models. The book presents a systematic application of computational social science methods to the substantive area of extortion racketeering. The reader will gain a deep understanding of extortion rackets, in particular their entrenchment in society and processes supporting and undermining extortion rackets. Also covered are computational social science methods, in particular computationally assisted text analysis and agent-based modelling, and the integration of empirical, theoretical and computational social science.
Computer science. --- Data mining. --- Computer simulation. --- Social sciences. --- Computer Science. --- Simulation and Modeling. --- Criminology and Criminal Justice, general. --- Data Mining and Knowledge Discovery. --- Data-driven Science, Modeling and Theory Building. --- Methodology of the Social Sciences. --- Organized crime --- Extortion --- Social aspects. --- Mathematical models. --- Blackmail --- Chantage --- Crime syndicates --- Organised crime --- Offenses against property --- Undue influence --- Threats --- Crime --- Criminology. --- Social sciences --- Methodology. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Criminals --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Study and teaching --- Sociophysics. --- Econophysics. --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Economics --- Statistical physics --- Mathematical sociology --- Statistical methods
Choose an application
Chinese American criminals --- Chinese American gangs --- Chinese American teenagers --- Extortion --- 858 Geweld --- Blackmail --- Chantage --- Offenses against property --- Undue influence --- Threats --- Teenagers, Chinese American --- Teenagers --- Gangs, Chinese American --- Gangs --- Criminals, Chinese American --- Criminals --- Chinatown (New York, N.Y.) --- Hua bu (New York, N.Y.) --- Tang ren bu (New York, N.Y.) --- 紐約華埠 (New York, N.Y.) --- 纽约华埠 (New York, N.Y.) --- Niuyue hua bu (New York, N.Y.) --- 華埠 (New York, N.Y.) --- 华埠 (New York, N.Y.) --- Social life and customs. --- S11/0800 --- S11/0810 --- S11/1120 --- China: Social sciences--Associations, guilds --- China: Social sciences--Secret societies, triads --- China: Social sciences--Migration and emigration: U.S.A. and Canada (incl. Hawaï) (whatever timeperiod) --- 883.2 Oost-Azië
Listing 11 - 12 of 12 | << page >> |
Sort by
|