LEADER 03847nam 22005895 450 001 9910633938803321 005 20251008153441.0 010 $a9783031200366$b(electronic bk.) 010 $z9783031200359 024 7 $a10.1007/978-3-031-20036-6 035 $a(PPN)283337443 035 $a(MiAaPQ)EBC7152382 035 $a(Au-PeEL)EBL7152382 035 $a(CKB)25607664900041 035 $a(DE-He213)978-3-031-20036-6 035 $a(OCoLC)1353594951 035 $a(EXLCZ)9925607664900041 100 $a20221204d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMethods of Strategic Trade Analysis $eData-Driven Approaches to Detect Illicit Dual-Use Trade /$fby Christopher Nelson 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (191 pages) 225 1 $aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 311 08$aPrint version: Nelson, Christopher Methods of Strategic Trade Analysis Cham : Springer International Publishing AG,c2023 9783031200359 327 $aIntroduction -- Introduction to Strategic Trade Analysis -- Fundamental Systems of Strategic Trade Analysis -- Introduction to STA Methodologies -- Scripting an Illicit Strategic Trade Transaction -- Strategic Trade Risk Assessment -- Mirror Statistics -- Market Share Analysis -- Transshipment and Re-Export Analysis -- Machine Learning for Strategic Trade Analysis -- Network Analysis -- Applying Strategic Trade Analysis. 330 $aThis book addresses ways that governments, international organizations, and other stakeholders can utilize data to uncover illicit trade in materials and equipment that could be used to support chemical, biological, nuclear, and advanced conventional weapons systems. Key concepts of strategic trade are introduced, including examples of strategic goods and their potential uses in weapons of mass destruction (WMDs) and weapons systems, the interplay between the Harmonized System and strategic trade control regimes, and the data available for analysis in the field. Innovative, yet practical methodologies to analyze strategic trade cover the use of crime scripts, risk assessment indicators, mirror statistics, market share analysis, and transshipment and re-export analysis. There are also chapters on leading-edge techniques involving machine learning and network analysis that have shown promise in other areas of crime and illicit trade investigations. Each chapter provides step-by-step instructions on applying the technique, numerous case studies and examples, and discussions of the strengths and weaknesses of each approach. This volume is designed to provide all types of analysts with practical pathways for understanding, detecting, and disrupting illicit procurement of materials and equipment needed to produce WMDs and advanced weapons. 410 0$aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 606 $aSecurity, International 606 $aPolitics and war 606 $aPolitical science 606 $aInternational Security Studies 606 $aMilitary and Defence Studies 606 $aMethodology of Political Science 615 0$aSecurity, International. 615 0$aPolitics and war. 615 0$aPolitical science. 615 14$aInternational Security Studies. 615 24$aMilitary and Defence Studies. 615 24$aMethodology of Political Science. 676 $a382.021 700 $aNelson$b Christopher$01261428 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910633938803321 996 $aMethods of Strategic Trade Analysis$92995257 997 $aUNINA