001453488 000__ 03755cam\a2200529\i\4500 001453488 001__ 1453488 001453488 003__ OCoLC 001453488 005__ 20230314003354.0 001453488 006__ m\\\\\o\\d\\\\\\\\ 001453488 007__ cr\un\nnnunnun 001453488 008__ 221207s2023\\\\sz\a\\\\ob\\\\000\0\eng\d 001453488 019__ $$a1353734620 001453488 020__ $$a9783031200366$$q(electronic bk.) 001453488 020__ $$a3031200365$$q(electronic bk.) 001453488 020__ $$z9783031200359$$q(print) 001453488 020__ $$z3031200357 001453488 0247_ $$a10.1007/978-3-031-20036-6$$2doi 001453488 035__ $$aSP(OCoLC)1353594951 001453488 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dYDX$$dOCLCF$$dN$T 001453488 049__ $$aISEA 001453488 050_4 $$aHF1017 001453488 08204 $$a381$$223/eng/20221207 001453488 1001_ $$aNelson, Christopher,$$eauthor. 001453488 24510 $$aMethods of strategic trade analysis :$$bdata-driven approaches to detect illicit dual-use trade /$$cChristopher Nelson. 001453488 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2023] 001453488 300__ $$a1 online resource (xvii, 183 pages) :$$billustrations (some color). 001453488 336__ $$atext$$btxt$$2rdacontent 001453488 337__ $$acomputer$$bc$$2rdamedia 001453488 338__ $$aonline resource$$bcr$$2rdacarrier 001453488 4901_ $$aAdvanced sciences and technologies for security applications,$$x2363-9466 001453488 504__ $$aIncludes bibliographical references. 001453488 5050_ $$aIntroduction -- Introduction to Strategic Trade Analysis -- Fundamental Systems of Strategic Trade Analysis -- Introduction to STA Methodologies -- Scripting an Illicit Strategic Trade Transaction -- Strategic Trade Risk Assessment -- Mirror Statistics -- Market Share Analysis -- Transshipment and Re-Export Analysis -- Machine Learning for Strategic Trade Analysis -- Network Analysis -- Applying Strategic Trade Analysis. 001453488 506__ $$aAccess limited to authorized users. 001453488 520__ $$aThis book addresses ways that governments, international organizations, and other stakeholders can utilize data to uncover illicit trade in materials and equipment that could be used to support chemical, biological, nuclear, and advanced conventional weapons systems. Key concepts of strategic trade are introduced, including examples of strategic goods and their potential uses in weapons of mass destruction (WMDs) and weapons systems, the interplay between the Harmonized System and strategic trade control regimes, and the data available for analysis in the field. Innovative, yet practical methodologies to analyze strategic trade cover the use of crime scripts, risk assessment indicators, mirror statistics, market share analysis, and transshipment and re-export analysis. There are also chapters on leading-edge techniques involving machine learning and network analysis that have shown promise in other areas of crime and illicit trade investigations. Each chapter provides step-by-step instructions on applying the technique, numerous case studies and examples, and discussions of the strengths and weaknesses of each approach. This volume is designed to provide all types of analysts with practical pathways for understanding, detecting, and disrupting illicit procurement of materials and equipment needed to produce WMDs and advanced weapons. 001453488 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 7, 2022). 001453488 650_0 $$aCommercial statistics$$xData processing. 001453488 650_0 $$aBlack market. 001453488 650_0 $$aTrade regulation. 001453488 655_0 $$aElectronic books. 001453488 77608 $$iPrint version:$$z3031200357$$z9783031200359$$w(OCoLC)1346294750 001453488 830_0 $$aAdvanced sciences and technologies for security applications,$$x2363-9466 001453488 852__ $$bebk 001453488 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-20036-6$$zOnline Access$$91397441.1 001453488 909CO $$ooai:library.usi.edu:1453488$$pGLOBAL_SET 001453488 980__ $$aBIB 001453488 980__ $$aEBOOK 001453488 982__ $$aEbook 001453488 983__ $$aOnline 001453488 994__ $$a92$$bISE