You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Sicilian Mafia is the most famous criminal organisation in the world. While its own code of honour, rustic chivalry and violence methods have been adopted by other illicit groups, very little is known about how the Mafia, Cosa Nostra, is actually organised and embedded in its territory. Who runs the day-to-day operations? What does it take for a Mafioso to raise the ranks and become a boss? How can the organisation protect itself and re-group after arrests? This book explores for the first time the structure of this criminal organisation through the lens of spatial and social network analysis and answers these questions. This is done by looking at the relationships of 176 members of the ...
This book covers computationally innovative methods and technologies including data collection and elicitation, data processing, data analysis, data visualizations, and data presentation. It explores how digital humanists have harnessed the hypersociality and social technologies, benefited from the open-source sharing not only of data but of code, and made technological capabilities a critical part of humanities work. Chapters are written by researchers from around the world, bringing perspectives from diverse fields and subject areas. The respective authors describe their work, their research, and their learning. Topics include semantic web for cultural heritage valorization, machine learning for parody detection by classification, psychological text analysis, crowdsourcing imagery coding in natural disasters, and creating inheritable digital codebooks.Designed for researchers and academics, this book is suitable for those interested in methodologies and analytics that can be applied in literature, history, philosophy, linguistics, and related disciplines. Professionals such as librarians, archivists, and historians will also find the content informative and instructive.
The analysis and implementation of effective human resources strategies creates opportunities for organizational success. By utilizing such intangible assets, businesses can gain competitive advantage and enhance productivity. Strategic Human Capital Development and Management in Emerging Economies is a comprehensive reference source for the latest scholarly research on the intersection of globalization, organizational behavior, and human capital management in the context of developing nations. Covering a range of business-oriented topics, such as job proficiency, corporate social responsibility, and burnout syndrome, this book is ideally designed for managers, researchers, academics, professionals, and graduate students interested in sustainable management of human behavior in modern organizations.
Through the rise of big data and the internet of things, terrorist organizations have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare, which grants great advantage to the attacker, has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. Examining cyber warfare and terrorism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applicatio...
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in ent...
In today’s society, the utilization of social media platforms has become an abundant forum for individuals to post, share, tag, and, in some cases, overshare information about their daily lives. As significant amounts of data flood these venues, it has become necessary to find ways to collect and evaluate this information. Social Media Data Extraction and Content Analysis explores various social networking platforms and the technologies being utilized to gather and analyze information being posted to these venues. Highlighting emergent research, analytical techniques, and best practices in data extraction in global electronic culture, this publication is an essential reference source for researchers, academics, and professionals.
As global business competition continues to accelerate, it is imperative that managers and executives examine all facets of an organization so that it remains successful. Often dynamics such as espionage, diplomacy, and geopolitical atmosphere have a great impact on daily operations of an organization; however, these areas are often overlooked. Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business highlights strategic planning and operations tactics in the areas of human resource management and security. Featuring the impact of espionage, geopolitics, and diplomacy, this book is an insightful reference for business and government executives, scholars, graduate and undergraduate students, and practitioners .
The second of two volumes, this book about the criminology of Carlo Morselli includes a diversity of contributions that study the social inter-dependence of criminal phenomena. It presents various studies on the importance and impact of social ties on offenders, victims and the social response to crime. The idea that social relationships are central to the understanding of human phenomena draws its roots from Jacob Moreno’s work in 1934, whose contribution – among others made at about the same time – paved the way for social network analysis (SNA), a set of methods and approaches that study dyadic relationships and their connections to other dyads in the same network. Surprisingly, SNA...
This collection explores organized crime and terror networks and the points at which they intersect. It analyses the close relationships between these criminalities, the prevalence and ambiguity of this nexus, the technological elements facilitating it, and the financial aspects embedded in this criminal partnership. Organized Crime and Terrorist Networks is the outcome of empirical research, seminars, workshops and interviews carried out by a multinational consortium of researchers within ‘TAKEDOWN’, a Horizon 2020 project funded by the European Commission. The consortium’s objective was to examine the perspectives, requirements and misgivings of front-line practitioners operating in ...
How has the digital revolution transformed criminal opportunities and behaviour? What is different about cybercrime compared with traditional criminal activity? What impact might cybercrime have on public security? In this updated edition of his authoritative and field-defining text, cybercrime expert David Wall carefully examines these and other important issues. Incorporating analysis of the latest technological advances and their criminological implications, he disentangles what is really known about cybercrime today. An ecosystem of specialists has emerged to facilitate cybercrime, reducing individual offenders’ level of risk and increasing the scale of crimes involved. This is a world...