Estimating Impact (eBook)

A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions
eBook Download: PDF
2010 | 2010
XVIII, 362 Seiten
Springer US (Verlag)
978-1-4419-6235-5 (ISBN)

Lese- und Medienproben

Estimating Impact -
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Sociological theories of crime include: theories of strain blame crime on personal stressors; theories of social learning blame crime on its social rewards, and see crime more as an institution in conflict with other institutions rather than as in- vidual deviance; and theories of control look at crime as natural and rewarding, and explore the formation of institutions that control crime. Theorists of corruption generally agree that corruption is an expression of the Patron-Client relationship in which a person with access to resources trades resources with kin and members of the community in exchange for loyalty. Some approaches to modeling crime and corruption do not involve an explicit simulation: rule based systems; Bayesian networks; game theoretic approaches, often based on rational choice theory; and Neoclassical Econometrics, a rational choice-based approach. Simulation-based approaches take into account greater complexities of interacting parts of social phenomena. These include fuzzy cognitive maps and fuzzy rule sets that may incorporate feedback; and agent-based simulation, which can go a step farther by computing new social structures not previously identified in theory. The latter include cognitive agent models, in which agents learn how to perceive their en- ronment and act upon the perceptions of their individual experiences; and reactive agent simulation, which, while less capable than cognitive-agent simulation, is adequate for testing a policy's effects with existing societal structures. For example, NNL is a cognitive agent model based on the REPAST Simphony toolkit.
Sociological theories of crime include: theories of strain blame crime on personal stressors; theories of social learning blame crime on its social rewards, and see crime more as an institution in conflict with other institutions rather than as in- vidual deviance; and theories of control look at crime as natural and rewarding, and explore the formation of institutions that control crime. Theorists of corruption generally agree that corruption is an expression of the Patron-Client relationship in which a person with access to resources trades resources with kin and members of the community in exchange for loyalty. Some approaches to modeling crime and corruption do not involve an explicit simulation: rule based systems; Bayesian networks; game theoretic approaches, often based on rational choice theory; and Neoclassical Econometrics, a rational choice-based approach. Simulation-based approaches take into account greater complexities of interacting parts of social phenomena. These include fuzzy cognitive maps and fuzzy rule sets that may incorporate feedback; and agent-based simulation, which can go a step farther by computing new social structures not previously identified in theory. The latter include cognitive agent models, in which agents learn how to perceive their en- ronment and act upon the perceptions of their individual experiences; and reactive agent simulation, which, while less capable than cognitive-agent simulation, is adequate for testing a policy's effects with existing societal structures. For example, NNL is a cognitive agent model based on the REPAST Simphony toolkit.

I. Peering into the Fog.- Introduction; A. Kott. - How it is done today; D. Eyre. - The Historical Perspective; Vancourt. - Technology of Unconventional Modeling; E. Waltz. - II. Parts of the Equation. - Political Interactions; M. Abdollohian. - Social Interactions; M. Tswetovat. - Economic Interactions; J. Dechant. - Military and Insurgencies; A. Kott. - Infrastructure Phenomena; Th. Brown. - III. The Whole of the Parts. - Integrating Heterogeneous Models; L. Rozman. - Emergent Behavior in Modeling; H. van Parunak. - Integrating Heterogeneous Databases; D. Dyer. - Populating the Models; G. Citrenbaum. - Virtual Collaboratin Technologies; S. Fouse. - Visualization Technologies; W. Page. - IV Walking in the Fog. - Multi-Dimensional Planning; L. Hawley. - Plan Optimization and Synchronization; J. Ridder. - Adversary and War Games; A.R. Washburn. - Robust Planning in the Face of Uncertainty; S. Morse. - New Approaches to Decision Support; T. Leal. - Efect Identification and Impact Assessment; R. Richards. - V. Conclusion: Living with the Fog, G. Citrenbaum.

Erscheint lt. Verlag 15.9.2010
Zusatzinfo XVIII, 362 p.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Informatik Weitere Themen CAD-Programme
Mathematik / Informatik Mathematik Angewandte Mathematik
Mathematik / Informatik Mathematik Finanz- / Wirtschaftsmathematik
Sozialwissenschaften Politik / Verwaltung Politische Theorie
Technik
Wirtschaft Allgemeines / Lexika
Wirtschaft Betriebswirtschaft / Management Planung / Organisation
Wirtschaft Volkswirtschaftslehre Ökonometrie
Schlagworte Artificial Life • Computational Social Science • Computer • Computer Science • Conflict Resolution • Database • decision science • fuzzy environments • Game Theory • incertainty • international intervention • Modeling • Operations Research • Optimization • Peace operations • verification • Visualization
ISBN-10 1-4419-6235-2 / 1441962352
ISBN-13 978-1-4419-6235-5 / 9781441962355
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 9,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Technologische Grundlagen und industrielle Praxis

von André Borrmann; Markus König; Christian Koch …

eBook Download (2021)
Springer Fachmedien Wiesbaden (Verlag)
89,99
Guide für effizientes Projektmanagement

von Friedrich V. Klopstock

eBook Download (2024)
tredition (Verlag)
19,99