In pursuit of the lone wolf terrorist : investigative economics and new horizons for the economic analysis of terrorism /
This book explores new horizons for the economic analysis of terrorism with an innovative combination of economics and offender profiling. The book is aimed at contributing to law enforcement efforts to pre-empt and pursue the lone wolf terrorist. By taking the economic analysis of terrorism back to...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hauppauge, New York :
Nova Science Publishers, Incorporated,
[2013]
|
Colección: | Terrorism, hot spots and conflict-related issues.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- ""IN PURSUIT OF THE LONE WOLF TERRORIST""; ""IN PURSUIT OF THE LONE WOLF TERRORIST ""; ""Library of Congress Cataloging-in-Publication Data ""; ""CONTENTS ""; ""PREFACE ""; ""ANALYTICAL SUMMARY ""; ""CHAPTER 1 ""; ""CHAPTER 2 ""; ""CHAPTER 3 ""; ""CHAPTER 4 ""; ""CHAPTER 5 ""; ""CHAPTER 6 ""; ""CHAPTER 7 ""; ""CHAPTER 8 ""; ""CHAPTER 9: SUMMARY ""; ""CHAPTER 10 ""; ""CHAPTER 11 ""; ""CHAPTER 12 ""; ""CHAPTER 13 ""; ""CHAPTER 14 ""; ""CHAPTER 15 ""; ""PART ONE ""; ""Chapter 1 THE INTRODUCTION ""; ""THE LONE WOLF TERRORIST AND ECONOMICS ""; ""PRE-EMPTING THE LONE WOLF TERRORIST ""
- ""THE PROFILE """"WHAT THE PROFILE CAN SAY ""; ""NEW HORIZONS ""; ""CONCLUDING REMARKS ""; ""Chapter 2 THE (TRADITIONAL) ECONOMIC ANALYSIS OF TERRORISM ""; ""THE TRADITIONAL APPROACH TO THE ECONOMIC ANALYSIS OF TERRORISM ""; ""BECKER�S MODEL OF CRIME ""; ""EHRLICH�S IMPORTANT CONTRIBUTION ""; ""INCENTIVES AND THE ADVANTAGES OF ECONOMIC ANALYSIS ""; ""TERRORISM AND TERRORIST BEHAVIOUR: FOUNDATIONS ""; ""TRANSNATIONAL TERRORISM AND THE EMERGENCE OF THE �ECONOMICS OF TERRORISM� ""; ""A NOTE ON THE USE OF MONETARY EQUIVALENTS ""; ""CONCLUDING REMARKS ""
- ""Chapter 3 THE RISK-REWARD TRADE-OFF AND THE STATISTICAL STRUCTURE OF THE TERRORISM CONTEXT """"MEASURING RISK AND REWARD ""; ""INJURIES AND FATALITIES AND TERRORISM ""; ""MEAN-VARIANCE EXPECTED UTILITY ANALYSIS ""; ""NOTES ON SPECIFYING A FUNCTIONAL FORM FOR THE EXPECTED UTILITY FUNCTION ""; ""RISK PREFERENCE ""; ""CONCLUDING REMARKS ""; ""Chapter 4 THE ATTACK METHODS ""; ""CATEGORIES OF ATTACK METHODS ""; ""ATTACK METHODS AND HUMAN TRAGEDY ""; ""LONE WOLVES IN AMERICA ""; ""LONE WOLVES IN EUROPE ""; ""CONCLUDING REMARKS ""; ""Chapter 5 THE CORRELATION STRUCTURE ""
- ""THE CASE OF PERFECT CORRELATION """"THE CONSEQUENCES OF IMPERFECT CORRELATION ""; ""IMPOSSIBLE RISK-REWARD TRADE-OFF RELATIONSHIPS ""; ""THE HISTORICAL CORRELATION STRUCTURE OF ATTACK METHODS ""; ""CORRELATION STRUCTURE AND LAW ENFORCEMENT ""; ""CONCLUDING REMARKS ""; ""Chapter 6 THE LONE WOLF�S OPPORTUNITY SET AND CHOICES: THEORY ""; ""THE COMPLETE OPPORTUNITY SET: SINGLE ATTACK METHODS AND COMBINATIONS ""; ""THE EFFICIENT OPPORTUNITY SET ""; ""MORE ABOUT THE STATISTICAL STRUCTURE ""; ""CHOOSING FROM THE OPPORTUNITY SET ""; ""CONCLUDING REMARKS ""
- ""Chapter 7 THE LONE WOLF�S OPPORTUNITIES: PRACTICE """"COMPUTING THE LONE WOLF�S EFFICIENT SET: THE �SPECIALIST� LONE WOLF ""; ""THE OPPORTUNITIES OF THE NON-SPECIALIST LONE WOLVES ""; ""THE OPPORTUNITIES AT DIFFERENT DEGREES OF SPECIALISATION ""; ""WHEN COMBINATION IS NOT POSSIBLE ""; ""CONCLUDING REMARKS ""; ""Chapter 8 THE LONE WOLF�S CHOICES: PRACTICE""; ""VERY LOW RISK AVERSION: WITH COMBINATION OF ATTACK METHODS POSSIBLE ""; ""MODERATE RISK AVERSION: WITH COMBINATION OF ATTACK METHODS POSSIBLE ""; ""HIGH RISK AVERSION: WITH COMBINATION OF ATTACK METHODS POSSIBLE ""