Exploring the Determinants of Crime-Terror Cooperation using Machine Learning
Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crim...
Ausführliche Beschreibung
Autor*in: |
Semmelbeck, Julia [verfasserIn] Besaw, Clayton [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2019 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Journal of quantitative criminology - Getzville, NY : HeinOnline, 1985, 36(2019), 3 vom: 19. Juli, Seite 527-558 |
---|---|
Übergeordnetes Werk: |
volume:36 ; year:2019 ; number:3 ; day:19 ; month:07 ; pages:527-558 |
Links: |
---|
DOI / URN: |
10.1007/s10940-019-09421-0 |
---|
Katalog-ID: |
SPR041026853 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | SPR041026853 | ||
003 | DE-627 | ||
005 | 20220111012409.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201007s2019 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s10940-019-09421-0 |2 doi | |
035 | |a (DE-627)SPR041026853 | ||
035 | |a (SPR)s10940-019-09421-0-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 340 |q ASE |
084 | |a 86.00 |2 bkl | ||
100 | 1 | |a Semmelbeck, Julia |e verfasserin |4 aut | |
245 | 1 | 0 | |a Exploring the Determinants of Crime-Terror Cooperation using Machine Learning |
264 | 1 | |c 2019 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data. | ||
650 | 4 | |a Terrorism |7 (dpeaa)DE-He213 | |
650 | 4 | |a Organized crime |7 (dpeaa)DE-He213 | |
650 | 4 | |a Machine learning |7 (dpeaa)DE-He213 | |
700 | 1 | |a Besaw, Clayton |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Journal of quantitative criminology |d Getzville, NY : HeinOnline, 1985 |g 36(2019), 3 vom: 19. Juli, Seite 527-558 |w (DE-627)320578003 |w (DE-600)2017241-2 |x 1573-7799 |7 nnns |
773 | 1 | 8 | |g volume:36 |g year:2019 |g number:3 |g day:19 |g month:07 |g pages:527-558 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s10940-019-09421-0 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_32 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_101 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_120 | ||
912 | |a GBV_ILN_138 | ||
912 | |a GBV_ILN_150 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_171 | ||
912 | |a GBV_ILN_184 | ||
912 | |a GBV_ILN_187 | ||
912 | |a GBV_ILN_206 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_250 | ||
912 | |a GBV_ILN_281 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_374 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_636 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2004 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a GBV_ILN_2008 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_2010 | ||
912 | |a GBV_ILN_2011 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a GBV_ILN_2018 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a GBV_ILN_2025 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a GBV_ILN_2031 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a GBV_ILN_2037 | ||
912 | |a GBV_ILN_2038 | ||
912 | |a GBV_ILN_2039 | ||
912 | |a GBV_ILN_2044 | ||
912 | |a GBV_ILN_2048 | ||
912 | |a GBV_ILN_2049 | ||
912 | |a GBV_ILN_2050 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2056 | ||
912 | |a GBV_ILN_2057 | ||
912 | |a GBV_ILN_2059 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a GBV_ILN_2064 | ||
912 | |a GBV_ILN_2065 | ||
912 | |a GBV_ILN_2068 | ||
912 | |a GBV_ILN_2070 | ||
912 | |a GBV_ILN_2086 | ||
912 | |a GBV_ILN_2088 | ||
912 | |a GBV_ILN_2093 | ||
912 | |a GBV_ILN_2106 | ||
912 | |a GBV_ILN_2107 | ||
912 | |a GBV_ILN_2108 | ||
912 | |a GBV_ILN_2110 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a GBV_ILN_2112 | ||
912 | |a GBV_ILN_2113 | ||
912 | |a GBV_ILN_2116 | ||
912 | |a GBV_ILN_2118 | ||
912 | |a GBV_ILN_2119 | ||
912 | |a GBV_ILN_2122 | ||
912 | |a GBV_ILN_2129 | ||
912 | |a GBV_ILN_2143 | ||
912 | |a GBV_ILN_2144 | ||
912 | |a GBV_ILN_2147 | ||
912 | |a GBV_ILN_2148 | ||
912 | |a GBV_ILN_2152 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a GBV_ILN_2188 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2232 | ||
912 | |a GBV_ILN_2336 | ||
912 | |a GBV_ILN_2446 | ||
912 | |a GBV_ILN_2470 | ||
912 | |a GBV_ILN_2472 | ||
912 | |a GBV_ILN_2507 | ||
912 | |a GBV_ILN_2522 | ||
912 | |a GBV_ILN_2548 | ||
912 | |a GBV_ILN_2949 | ||
912 | |a GBV_ILN_2950 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4035 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4046 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4242 | ||
912 | |a GBV_ILN_4246 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4251 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4333 | ||
912 | |a GBV_ILN_4334 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4336 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4346 | ||
912 | |a GBV_ILN_4393 | ||
912 | |a GBV_ILN_4700 | ||
936 | b | k | |a 86.00 |q ASE |
951 | |a AR | ||
952 | |d 36 |j 2019 |e 3 |b 19 |c 07 |h 527-558 |
author_variant |
j s js c b cb |
---|---|
matchkey_str |
article:15737799:2019----::xlrnteeemnnsfrmtrocoeains |
hierarchy_sort_str |
2019 |
bklnumber |
86.00 |
publishDate |
2019 |
allfields |
10.1007/s10940-019-09421-0 doi (DE-627)SPR041026853 (SPR)s10940-019-09421-0-e DE-627 ger DE-627 rakwb eng 340 ASE 86.00 bkl Semmelbeck, Julia verfasserin aut Exploring the Determinants of Crime-Terror Cooperation using Machine Learning 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data. Terrorism (dpeaa)DE-He213 Organized crime (dpeaa)DE-He213 Machine learning (dpeaa)DE-He213 Besaw, Clayton verfasserin aut Enthalten in Journal of quantitative criminology Getzville, NY : HeinOnline, 1985 36(2019), 3 vom: 19. Juli, Seite 527-558 (DE-627)320578003 (DE-600)2017241-2 1573-7799 nnns volume:36 year:2019 number:3 day:19 month:07 pages:527-558 https://dx.doi.org/10.1007/s10940-019-09421-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2949 GBV_ILN_2950 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4393 GBV_ILN_4700 86.00 ASE AR 36 2019 3 19 07 527-558 |
spelling |
10.1007/s10940-019-09421-0 doi (DE-627)SPR041026853 (SPR)s10940-019-09421-0-e DE-627 ger DE-627 rakwb eng 340 ASE 86.00 bkl Semmelbeck, Julia verfasserin aut Exploring the Determinants of Crime-Terror Cooperation using Machine Learning 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data. Terrorism (dpeaa)DE-He213 Organized crime (dpeaa)DE-He213 Machine learning (dpeaa)DE-He213 Besaw, Clayton verfasserin aut Enthalten in Journal of quantitative criminology Getzville, NY : HeinOnline, 1985 36(2019), 3 vom: 19. Juli, Seite 527-558 (DE-627)320578003 (DE-600)2017241-2 1573-7799 nnns volume:36 year:2019 number:3 day:19 month:07 pages:527-558 https://dx.doi.org/10.1007/s10940-019-09421-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2949 GBV_ILN_2950 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4393 GBV_ILN_4700 86.00 ASE AR 36 2019 3 19 07 527-558 |
allfields_unstemmed |
10.1007/s10940-019-09421-0 doi (DE-627)SPR041026853 (SPR)s10940-019-09421-0-e DE-627 ger DE-627 rakwb eng 340 ASE 86.00 bkl Semmelbeck, Julia verfasserin aut Exploring the Determinants of Crime-Terror Cooperation using Machine Learning 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data. Terrorism (dpeaa)DE-He213 Organized crime (dpeaa)DE-He213 Machine learning (dpeaa)DE-He213 Besaw, Clayton verfasserin aut Enthalten in Journal of quantitative criminology Getzville, NY : HeinOnline, 1985 36(2019), 3 vom: 19. Juli, Seite 527-558 (DE-627)320578003 (DE-600)2017241-2 1573-7799 nnns volume:36 year:2019 number:3 day:19 month:07 pages:527-558 https://dx.doi.org/10.1007/s10940-019-09421-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2949 GBV_ILN_2950 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4393 GBV_ILN_4700 86.00 ASE AR 36 2019 3 19 07 527-558 |
allfieldsGer |
10.1007/s10940-019-09421-0 doi (DE-627)SPR041026853 (SPR)s10940-019-09421-0-e DE-627 ger DE-627 rakwb eng 340 ASE 86.00 bkl Semmelbeck, Julia verfasserin aut Exploring the Determinants of Crime-Terror Cooperation using Machine Learning 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data. Terrorism (dpeaa)DE-He213 Organized crime (dpeaa)DE-He213 Machine learning (dpeaa)DE-He213 Besaw, Clayton verfasserin aut Enthalten in Journal of quantitative criminology Getzville, NY : HeinOnline, 1985 36(2019), 3 vom: 19. Juli, Seite 527-558 (DE-627)320578003 (DE-600)2017241-2 1573-7799 nnns volume:36 year:2019 number:3 day:19 month:07 pages:527-558 https://dx.doi.org/10.1007/s10940-019-09421-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2949 GBV_ILN_2950 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4393 GBV_ILN_4700 86.00 ASE AR 36 2019 3 19 07 527-558 |
allfieldsSound |
10.1007/s10940-019-09421-0 doi (DE-627)SPR041026853 (SPR)s10940-019-09421-0-e DE-627 ger DE-627 rakwb eng 340 ASE 86.00 bkl Semmelbeck, Julia verfasserin aut Exploring the Determinants of Crime-Terror Cooperation using Machine Learning 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data. Terrorism (dpeaa)DE-He213 Organized crime (dpeaa)DE-He213 Machine learning (dpeaa)DE-He213 Besaw, Clayton verfasserin aut Enthalten in Journal of quantitative criminology Getzville, NY : HeinOnline, 1985 36(2019), 3 vom: 19. Juli, Seite 527-558 (DE-627)320578003 (DE-600)2017241-2 1573-7799 nnns volume:36 year:2019 number:3 day:19 month:07 pages:527-558 https://dx.doi.org/10.1007/s10940-019-09421-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2949 GBV_ILN_2950 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4393 GBV_ILN_4700 86.00 ASE AR 36 2019 3 19 07 527-558 |
language |
English |
source |
Enthalten in Journal of quantitative criminology 36(2019), 3 vom: 19. Juli, Seite 527-558 volume:36 year:2019 number:3 day:19 month:07 pages:527-558 |
sourceStr |
Enthalten in Journal of quantitative criminology 36(2019), 3 vom: 19. Juli, Seite 527-558 volume:36 year:2019 number:3 day:19 month:07 pages:527-558 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Terrorism Organized crime Machine learning |
dewey-raw |
340 |
isfreeaccess_bool |
false |
container_title |
Journal of quantitative criminology |
authorswithroles_txt_mv |
Semmelbeck, Julia @@aut@@ Besaw, Clayton @@aut@@ |
publishDateDaySort_date |
2019-07-19T00:00:00Z |
hierarchy_top_id |
320578003 |
dewey-sort |
3340 |
id |
SPR041026853 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR041026853</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220111012409.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201007s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10940-019-09421-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR041026853</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s10940-019-09421-0-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">340</subfield><subfield code="q">ASE</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">86.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Semmelbeck, Julia</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploring the Determinants of Crime-Terror Cooperation using Machine Learning</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Organized crime</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Besaw, Clayton</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of quantitative criminology</subfield><subfield code="d">Getzville, NY : HeinOnline, 1985</subfield><subfield code="g">36(2019), 3 vom: 19. Juli, Seite 527-558</subfield><subfield code="w">(DE-627)320578003</subfield><subfield code="w">(DE-600)2017241-2</subfield><subfield code="x">1573-7799</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:36</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:3</subfield><subfield code="g">day:19</subfield><subfield code="g">month:07</subfield><subfield code="g">pages:527-558</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s10940-019-09421-0</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_184</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_206</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_374</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_636</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2039</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2070</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2107</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2188</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2446</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2472</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2949</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2950</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4346</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">86.00</subfield><subfield code="q">ASE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">36</subfield><subfield code="j">2019</subfield><subfield code="e">3</subfield><subfield code="b">19</subfield><subfield code="c">07</subfield><subfield code="h">527-558</subfield></datafield></record></collection>
|
author |
Semmelbeck, Julia |
spellingShingle |
Semmelbeck, Julia ddc 340 bkl 86.00 misc Terrorism misc Organized crime misc Machine learning Exploring the Determinants of Crime-Terror Cooperation using Machine Learning |
authorStr |
Semmelbeck, Julia |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)320578003 |
format |
electronic Article |
dewey-ones |
340 - Law |
delete_txt_mv |
keep |
author_role |
aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
1573-7799 |
topic_title |
340 ASE 86.00 bkl Exploring the Determinants of Crime-Terror Cooperation using Machine Learning Terrorism (dpeaa)DE-He213 Organized crime (dpeaa)DE-He213 Machine learning (dpeaa)DE-He213 |
topic |
ddc 340 bkl 86.00 misc Terrorism misc Organized crime misc Machine learning |
topic_unstemmed |
ddc 340 bkl 86.00 misc Terrorism misc Organized crime misc Machine learning |
topic_browse |
ddc 340 bkl 86.00 misc Terrorism misc Organized crime misc Machine learning |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Journal of quantitative criminology |
hierarchy_parent_id |
320578003 |
dewey-tens |
340 - Law |
hierarchy_top_title |
Journal of quantitative criminology |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)320578003 (DE-600)2017241-2 |
title |
Exploring the Determinants of Crime-Terror Cooperation using Machine Learning |
ctrlnum |
(DE-627)SPR041026853 (SPR)s10940-019-09421-0-e |
title_full |
Exploring the Determinants of Crime-Terror Cooperation using Machine Learning |
author_sort |
Semmelbeck, Julia |
journal |
Journal of quantitative criminology |
journalStr |
Journal of quantitative criminology |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
300 - Social sciences |
recordtype |
marc |
publishDateSort |
2019 |
contenttype_str_mv |
txt |
container_start_page |
527 |
author_browse |
Semmelbeck, Julia Besaw, Clayton |
container_volume |
36 |
class |
340 ASE 86.00 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Semmelbeck, Julia |
doi_str_mv |
10.1007/s10940-019-09421-0 |
dewey-full |
340 |
author2-role |
verfasserin |
title_sort |
exploring the determinants of crime-terror cooperation using machine learning |
title_auth |
Exploring the Determinants of Crime-Terror Cooperation using Machine Learning |
abstract |
Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data. |
abstractGer |
Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data. |
abstract_unstemmed |
Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2949 GBV_ILN_2950 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4393 GBV_ILN_4700 |
container_issue |
3 |
title_short |
Exploring the Determinants of Crime-Terror Cooperation using Machine Learning |
url |
https://dx.doi.org/10.1007/s10940-019-09421-0 |
remote_bool |
true |
author2 |
Besaw, Clayton |
author2Str |
Besaw, Clayton |
ppnlink |
320578003 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s10940-019-09421-0 |
up_date |
2024-07-03T19:46:46.790Z |
_version_ |
1803588475861073920 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR041026853</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220111012409.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201007s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10940-019-09421-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR041026853</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s10940-019-09421-0-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">340</subfield><subfield code="q">ASE</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">86.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Semmelbeck, Julia</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploring the Determinants of Crime-Terror Cooperation using Machine Learning</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Objectives This study seeks to further strengthen extant knowledge regarding terrorist group involvement in organized criminal activity through two means. First, it measures a set of environmental and organizational characteristics for a sample of well-known terrorist organizations based on the crime-terror literature. Second, it illustrates the utility of inductive research designs for examining patterns in the criminal behavior of terrorist groups for theory building and the potential risk classification of new terrorist organizations in the future. Methods The authors utilize a random forest classification algorithm to examine three sources of information about a broad set of environmental and organizational factors determined to be of potential importance in predicting when a terrorist organization will engaged in organized criminal behavior. First, it examines out-of-sample accuracy through bootstrap cross-validation estimation. Second, it quantifies the predictive efficacy/importance of each measured factor. Finally, it utilizes partial dependence functions to examine the relational trend between the most important predictive factors and variation in the presence of organized criminal behavior. Results The study finds three results. First, predictive accuracy using readily quantifiable factors about the criminal behavior of terrorist organizations is good but could be improved upon. Second, organizational factors such as group size, ideology and attack behavior out perform environmental factors in terms of predictive performance. Third, it finds that the most important predictor variables have a predominately non-linear relationship with whether the algorithm would classify a group as engaging in organized criminal behavior or not. Conclusions The study finds that theory building should seek to examine temporal variation in the organizational structure of terrorist groups as a fruitful way forward for further understanding when a group is likely to engage in organized criminal behavior. It also suggests that scholars should seek to engage more critically with concepts surrounding the potential non-linear pathways in which groups end up engaging in organized crime. Finally, the results illustrate the utility of modern machine learning algorithms and inductive research processes for both academic and practitioner needs alike. Especially when dealing with a complex phenomenon with imperfect data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Organized crime</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Besaw, Clayton</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of quantitative criminology</subfield><subfield code="d">Getzville, NY : HeinOnline, 1985</subfield><subfield code="g">36(2019), 3 vom: 19. Juli, Seite 527-558</subfield><subfield code="w">(DE-627)320578003</subfield><subfield code="w">(DE-600)2017241-2</subfield><subfield code="x">1573-7799</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:36</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:3</subfield><subfield code="g">day:19</subfield><subfield code="g">month:07</subfield><subfield code="g">pages:527-558</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s10940-019-09421-0</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_184</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_206</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_374</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_636</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2039</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2070</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2107</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2188</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2446</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2472</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2949</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2950</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4346</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">86.00</subfield><subfield code="q">ASE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">36</subfield><subfield code="j">2019</subfield><subfield code="e">3</subfield><subfield code="b">19</subfield><subfield code="c">07</subfield><subfield code="h">527-558</subfield></datafield></record></collection>
|
score |
7.3980246 |