000 03014cam a22004457c 4500
001 4nw71x312bf2165x
003 SE-LIBR
005 20240822100854.0
008 240821s2023 sz |||||||||||000 0|eng|d
020 _a9783031200366
020 _a3031200365
020 _a9783031200359
020 _a3031200357
020 _a9783031200373
020 _a3031200373
020 _a9783031200380
020 _a3031200381
022 _a1613-5113
024 7 _a10.1007/978-3-031-20036-6
040 _aSipr
_dOCLCQ
041 _aeng
100 1 _aNelson, Christopher
245 1 0 _aMethods of strategic trade analysis :
_bdata-driven approaches to detect illicit dual-use trade /
_cChristopher Nelson
260 _aCham :
_bSpringer,
_c2023
300 _a183 p.
490 _aAdvanced sciences and technologies for security applications
500 _aSIP2409
505 8 _aIntroduction -- Introduction to Strategic Trade Analysis -- Fundamental Systems of Strategic Trade Analysis -- Introduction to STA Methodologies -- Scripting an Illicit Strategic Trade Transaction -- Strategic Trade Risk Assessment -- Mirror Statistics -- Market Share Analysis -- Transshipment and Re-Export Analysis -- Machine Learning for Strategic Trade Analysis -- Network Analysis -- Applying Strategic Trade Analysis.
520 3 _aThis book addresses ways that governments, international organizations, and other stakeholders can utilize data to uncover illicit trade in materials and equipment that could be used to support chemical, biological, nuclear, and advanced conventional weapons systems. Key concepts of strategic trade are introduced, including examples of strategic goods and their potential uses in weapons of mass destruction (WMDs) and weapons systems, the interplay between the Harmonized System and strategic trade control regimes, and the data available for analysis in the field. Innovative, yet practical methodologies to analyze strategic trade cover the use of crime scripts, risk assessment indicators, mirror statistics, market share analysis, and transshipment and re-export analysis. There are also chapters on leading-edge techniques involving machine learning and network analysis that have shown promise in other areas of crime and illicit trade investigations. Each chapter provides step-by-step instructions on applying the technique, numerous case studies and examples, and discussions of the strengths and weaknesses of each approach. This volume is designed to provide all types of analysts with practical pathways for understanding, detecting, and disrupting illicit procurement of materials and equipment needed to produce WMDs and advanced weapons.
650 4 _alegislation
_xillegal trade
_xWMD
650 4 _aarms trade
_xarms transfers
650 4 _atrade
_xdual-use technology
650 4 _apolitics
650 4 _adefence
_xstatistics
653 _apolemology
653 _acriminology
653 _avictimology
852 _h623:339.5 Nelson
942 _cMONO
999 _c80442
_d80442