Illicit trades have emerged as a significant problem to almost every government across the world. Their gradual expansion and diversification throughout the years suggests the …
LL Thompson, M Thompson - 2008 - leighthompson.com
Names: Thompson, Leigh L., author. Title: Making the team: a guide for managers/Leigh L. Thompson, Kellogg School of Management, Northwestern University. Description: Sixth …
Researchers, policymakers and law enforcement agencies across the globe struggle to find effective strategies to control criminal networks. The effectiveness of disruption strategies is …
Social scientists have used computation since the days of the earliest digital computers. What is the role of computation in contemporary Computational Social Science (CSS) theory …
Dark networks are the illegal and covert networks (eg, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt …
The identification of key players in a terrorist organization aids in preventing attacks, the efficient allocation of surveillance measures, and the destabilization of the corresponding …
A key operational problem for those charged with the security of vulnerable facilities (such as airports or art galleries) is the scheduling and deployment of patrols. Motivated by the …
AM Hübschle - 2016 - wellbeingintlstudiesrepository.org
This dissertation (424 pages) addresses in great detail global rhino conservation and the international efforts to protect the remaining rhino populations via international treaties …
Criminal networks are frequently at risk of disruption through arrest and interorganizational violence. Difficulties in designing empirical studies of criminal network recovery, however …