The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phen
Goodness may appear in many forms; evil need only take one.The Chicago PD Deviant Data Unit specializes in the dark and cruel aspects of criminal behavior. When a serial killer who leaves his victims
Since the 2008 financial crisis, researchers and policy makers have been looking to empirical data to distil both what happened and how a similar event can be avoided in the future. In Lit and Dark Li
In view of the 2016 US election season, the second edition of this book analyzes the way political campaigns have been traditionally run and the extraordinary changes that have occurred since 2012. De
In view of the 2016 US election season, the second edition of this book analyzes the way political campaigns have been traditionally run and the extraordinary changes that have occurred since 2012. De
Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholars and analysts an array of approaches for disrupting dark networks.
Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholars and analysts an array of approaches for disrupting dark networks.
A Canadian astronomer commits suicide on a desolate mountain peak in Hawaii, and Morgan O'Brien is sent to the observatory to find his missing data. But it seems she's not the only one who needs those
This book puts middle Australia under the microscope, examining how quality of life is faring in the face of change and uncertainty. 400 Australians from around the country shared their experiences of work, family, and community for this book, creating a striking picture of Australian society into a new millennium. This lived experience is set against hard data so that we can truly understand the impact - good and bad - of economic restructuring on the broad Australian middle class. Meticulously researched, it mounts a moral and intellectual counter-argument to economic reform. A sequel to the best-selling Economic Rationalism in Canberra, Michael Pusey's book will be equally important.
This book puts middle Australia under the microscope, examining how quality of life is faring in the face of change and uncertainty. 400 Australians from around the country shared their experiences of work, family, and community for this book, creating a striking picture of Australian society into a new millennium. This lived experience is set against hard data so that we can truly understand the impact - good and bad - of economic restructuring on the broad Australian middle class. Meticulously researched, it mounts a moral and intellectual counter-argument to economic reform. A sequel to the best-selling Economic Rationalism in Canberra, Michael Pusey's book will be equally important.
Some of the most important international security threats stem from terror groups, criminal enterprises, and other violent non-state actors (VNSAs). Because these groups are often structured as complex, dark networks, analysts have begun to use network science to study them. However, standard network tools were originally developed to examine companies, friendship groups, and other transparent networks. The inherently clandestine nature of dark networks dictates that conventional analytical tools do not always apply. Data on dark networks is incomplete, inaccurate, and often just difficult to find. Moreover, dark networks are often organized to undertake fundamentally different tasks than transparent networks, so resources and information may follow different paths through these two types of organizations. Given the distinctive characteristics of dark networks, unique tools and methods are needed to understand these structures. Illuminating Dark Networks explores the state of the art i
Steve Lohr, a technology reporter for the New York Times, chronicles the rise of Big Data, addressing cutting-edge business strategies and examining the dark side of a data-driven world.Coal, iron ore
This new collection of essays follows in the footsteps of the successful volume Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society, published at a time when our
The renowned classical scholar and archaeologist A. B. Cook (1868–1952) published the second volume of his monumental Zeus: A Study in Ancient Religion in two parts in 1925. The volume covers the theme of Zeus as god of lightning and thunder, an idea that became common during the classical period. Part II contains detailed appendixes and a comprehensive index for the volume. It offers a wealth of information, including primary sources, on Zeus' relationship with the god Kairos; mountain-cults; folk-tales and myths; and the various personas and manifestations of the god Zeus. It is beautifully illustrated with maps, diagrams, photographs, and engravings, including many images of pottery, statues, busts, friezes and ancient coins. A treasure-trove of primary texts, both Greek and Latin, epigraph material and archaeological data, this magnificent work remains an indispensable tool for students and scholars of classics, mythology and ancient religion.