000 | 03014cam a22004457c 4500 | ||
---|---|---|---|
001 | 4nw71x312bf2165x | ||
003 | SE-LIBR | ||
005 | 20240822100854.0 | ||
008 | 240821s2023 sz |||||||||||000 0|eng|d | ||
020 | _a9783031200366 | ||
020 | _a3031200365 | ||
020 | _a9783031200359 | ||
020 | _a3031200357 | ||
020 | _a9783031200373 | ||
020 | _a3031200373 | ||
020 | _a9783031200380 | ||
020 | _a3031200381 | ||
022 | _a1613-5113 | ||
024 | 7 | _a10.1007/978-3-031-20036-6 | |
040 |
_aSipr _dOCLCQ |
||
041 | _aeng | ||
100 | 1 | _aNelson, Christopher | |
245 | 1 | 0 |
_aMethods of strategic trade analysis : _bdata-driven approaches to detect illicit dual-use trade / _cChristopher Nelson |
260 |
_aCham : _bSpringer, _c2023 |
||
300 | _a183 p. | ||
490 | _aAdvanced sciences and technologies for security applications | ||
500 | _aSIP2409 | ||
505 | 8 | _aIntroduction -- Introduction to Strategic Trade Analysis -- Fundamental Systems of Strategic Trade Analysis -- Introduction to STA Methodologies -- Scripting an Illicit Strategic Trade Transaction -- Strategic Trade Risk Assessment -- Mirror Statistics -- Market Share Analysis -- Transshipment and Re-Export Analysis -- Machine Learning for Strategic Trade Analysis -- Network Analysis -- Applying Strategic Trade Analysis. | |
520 | 3 | _aThis book addresses ways that governments, international organizations, and other stakeholders can utilize data to uncover illicit trade in materials and equipment that could be used to support chemical, biological, nuclear, and advanced conventional weapons systems. Key concepts of strategic trade are introduced, including examples of strategic goods and their potential uses in weapons of mass destruction (WMDs) and weapons systems, the interplay between the Harmonized System and strategic trade control regimes, and the data available for analysis in the field. Innovative, yet practical methodologies to analyze strategic trade cover the use of crime scripts, risk assessment indicators, mirror statistics, market share analysis, and transshipment and re-export analysis. There are also chapters on leading-edge techniques involving machine learning and network analysis that have shown promise in other areas of crime and illicit trade investigations. Each chapter provides step-by-step instructions on applying the technique, numerous case studies and examples, and discussions of the strengths and weaknesses of each approach. This volume is designed to provide all types of analysts with practical pathways for understanding, detecting, and disrupting illicit procurement of materials and equipment needed to produce WMDs and advanced weapons. | |
650 | 4 |
_alegislation _xillegal trade _xWMD |
|
650 | 4 |
_aarms trade _xarms transfers |
|
650 | 4 |
_atrade _xdual-use technology |
|
650 | 4 | _apolitics | |
650 | 4 |
_adefence _xstatistics |
|
653 | _apolemology | ||
653 | _acriminology | ||
653 | _avictimology | ||
852 | _h623:339.5 Nelson | ||
942 | _cMONO | ||
999 |
_c80442 _d80442 |