Computational Conflict Research.
Saved in:
Superior document: | Computational Social Sciences Series |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Cham : : Springer International Publishing AG,, 2019. Ã2020. |
Year of Publication: | 2019 |
Edition: | 1st ed. |
Language: | English |
Series: | Computational Social Sciences Series
|
Online Access: | |
Physical Description: | 1 online resource (270 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5005975917 |
---|---|
ctrlnum |
(MiAaPQ)5005975917 (Au-PeEL)EBL5975917 (OCoLC)1135664306 |
collection |
bib_alma |
record_format |
marc |
spelling |
Deutschmann, Emanuel. Computational Conflict Research. 1st ed. Cham : Springer International Publishing AG, 2019. Ã2020. 1 online resource (270 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Computational Social Sciences Series Intro -- Acknowledgements -- Contents -- Contributors -- List of Figures -- List of Tables -- Advancing Conflict Research Through Computational Approaches -- 1 Introduction -- 2 The Rise of Computational Social Science -- 3 Computational Approaches to Conflict Research -- 4 The Contributions of This Book -- References -- Part I Data and Methods in Computational Conflict Research -- Advances in Data on Conflict and Dissent -- 1 Introduction: The Need for Data in Computational Social Science -- 2 Conflict Research and the Impact of the Early Conflict Data -- 3 Data and Progress in Conflict Research -- 4 The Essential Interaction Between Theory and Data in Conflict Research -- 5 Key Unresolved Problems in Data for Conflict Research -- 6 Conclusion -- A.1 Appendix: Key Contemporary Data Sources, Listed Alphabetically -- References -- Text as Data for Conflict Research: A Literature Survey -- 1 Introduction -- 2 Dictionary Approaches for Conflict Research -- 3 Supervised Methods -- 4 Topic Modeling as Unsupervised Method in Conflict Research -- 5 Techniques of Cross-Validation -- 6 Conclusion -- Appendix -- References -- Interdependencies in Conflict Dynamics: Analyzing Endogenous Patterns in Conflict Event Data Using Relational Event Models -- 1 Introduction -- 2 Relational Events -- 3 Relational Event Models -- 4 Controlling for Endogenous Network Effects -- 5 Empirical Examples of Alliance Formation and Social Influencing -- 5.1 Military Alliance-Formation Dynamics -- 5.2 Influencing Dynamics Among EU Parliamentary Chambers -- 6 Discussion -- References -- Part II Computational Research on Non-violent Conflict -- Migration Policy Framing in Political Discourse: Evidence from Canada and the USA -- 1 Introduction -- 2 Theory -- 2.1 Party-Based Issue Ownership -- 2.2 Policy Framing -- 2.3 Inter-Party Contest over Migration Policy -- 2.4 Hypotheses. 3 Data and Methods -- 3.1 Comparative Case Study Approach -- 3.2 Dataset Subsetting: Dictionary Approach -- 3.3 Structural Topic Modeling -- 3.4 Labeling and Categorizing Topics -- 4 Results -- 4.1 Topics in the USA and Canada -- 4.2 Topic Association by Ideological Block -- 4.3 Topic Prevalence Across Time -- 4.4 Migration Policy Framing: Word Use -- 5 Conclusion -- A.1 Appendix -- References -- The Role of Network Structure and Initial Group Norm Distributions in Norm Conflict -- 1 Introduction -- 2 Social Norms -- 2.1 Normative Conflict -- 2.2 Finding Consensus -- 3 Network Structure and Group Norm Distributions -- 3.1 Homophily and Heterophily -- 3.2 Group Size -- 3.3 Initial Group Norm Distributions -- 4 Agent-Based Model -- 4.1 Simulating Norm Conflict -- 4.2 Generation of Network Structure -- 4.3 Initialization of Group Norm Distributions -- 4.4 Norm Updating Process -- 4.5 Outcome Metrics -- 5 Simulation Results -- 5.1 Change in Majority Norm -- 5.2 Change in Group Norm Difference -- 5.3 Conflict Ties -- 6 Discussion and Conclusion -- 6.1 The Alignment of Norms and Group Membership -- 6.2 Homophily Balances In-Group and Between-Group Conflict -- 6.3 Strategies to Maintain Minority Norms -- 6.4 Limitations and Future Directions -- Appendix: Analytical Derivations for Norm Endorsement -- References -- On the Fate of Protests: Dynamics of Social Activation and Topic Selection Online and in the Streets -- 1 Introduction -- 2 Data -- 2.1 Iran Protest in 2017/2018 -- 2.2 PEGIDA, Germany Since 2014 and Ongoing -- 2.3 Stylized Data Facts -- 3 Agent-Based Model -- 3.1 Agents, Follower Network, Thresholds, and Concerns -- 3.2 Agents' Activities -- 3.3 Initial Conditions and Stopping Rules -- 4 Simulation Experiment -- 4.1 The Iran Case in the Model -- 4.2 The Germany Case in the Model -- 4.3 Comparison Between the Iran and Germany Model Simulations. 4.4 Parameter Study -- 5 Discussion -- References -- Part III Computational Research on Violent Conflict -- Do Non-State Armed Groups Influence Each Other in Attack Timing and Frequency? Generating, Analyzing, and Comparing Empirical Data and Simulation -- 1 Introduction -- 2 Data and Case Settings -- 3 Methods -- 3.1 Analytical Estimation -- 3.2 Generative Model and Simulation -- 4 Results -- 4.1 Analytical Estimation of Basal and Additive Rates -- 4.2 Comparison of Inferred Networks to the Network of Actual Ties -- 4.3 Generative Model Results and Correspondence to Analytical Findings -- 5 Conclusion -- References -- On the Beaten Path: Violence Against Civilians and Simulated Conflict Along Road Networks -- 1 Introduction -- 2 Conflict and Violence Against Civilians -- 3 A New Strategy for Causal Identification: Creating Synthetic Events on the "Beaten Path" -- 4 Data and Case Selection -- 5 Modeling and Results -- 6 Conclusion -- References -- Analysis of Conflict Diffusion Over Continuous Space -- 1 Introduction -- 2 Related Work -- 2.1 Empirical Studies on the Diffusion of Conflict -- 2.2 Grid Models -- 2.3 Continuous Space Models -- 3 Data -- 4 Analysis -- 4.1 Test for Complete Spatial Randomness -- 4.2 Continuous Space Model -- 4.3 Gaussian Process -- 5 Discussion and Future Work -- References -- Rebel Group Protection Rackets: Simulating the Effects of Economic Support on Civil War Violence -- 1 Introduction -- 2 Theoretical Underpinnings -- 2.1 Rebel Group Extortion and Looting -- 2.2 Enterprise Fleeing -- 2.3 Enterprise Reporting -- 2.4 Rebel Group Fighting and Expansion -- 2.5 Rebel Group Cooperation -- 2.6 Rebel Group Recruitment -- 3 Rebel Group Protection Rackets Model -- 3.1 Model Description -- 3.1.1 Income Process -- 3.1.2 Demand Process -- 3.1.3 Expand Process -- 3.2 Scenario and Initialization -- 3.3 Implementation. 4 Experiments -- 4.1 Security Experiments -- 4.1.1 Rebel Group Strength -- 4.1.2 Enterprise Allocation -- 4.2 Somalia Case Study -- 4.2.1 Historical Background -- 4.2.2 Data and Experimentation -- 5 Conclusion and Discussion -- References -- Online Material -- Chapter 2: Inventory of Conflict Data -- Chapter 4: R-Package Relational Event Models -- Chapter 5: Supplementary Material and Replication Files to Migration Framing in Political Discourse -- Chapter 6: Agent-Based Simulation Model Simulating Normative Conflict -- Chapter 7: Agent-Based Simulation Model ProtestFate -- Chapter 8: Agent-Based Simulation Model Non-State Armed Groups' Attack Timing -- Chapter 9: Replication Code to On the Beaten Path -- Chapter 10: Replication Code to Analysis of Conflict Diffusion over Continuous Space -- Chapter 11: Agent-Based Simulation Model Rebel Group Protection Rackets -- Index. Description based on publisher supplied metadata and other sources. Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. Electronic books. Lorenz, Jan. Nardin, Luis G. Natalini, Davide. Wilhelm, Adalbert F. X. Print version: Deutschmann, Emanuel Computational Conflict Research Cham : Springer International Publishing AG,c2019 9783030293321 ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5975917 Click to View |
language |
English |
format |
eBook |
author |
Deutschmann, Emanuel. |
spellingShingle |
Deutschmann, Emanuel. Computational Conflict Research. Computational Social Sciences Series Intro -- Acknowledgements -- Contents -- Contributors -- List of Figures -- List of Tables -- Advancing Conflict Research Through Computational Approaches -- 1 Introduction -- 2 The Rise of Computational Social Science -- 3 Computational Approaches to Conflict Research -- 4 The Contributions of This Book -- References -- Part I Data and Methods in Computational Conflict Research -- Advances in Data on Conflict and Dissent -- 1 Introduction: The Need for Data in Computational Social Science -- 2 Conflict Research and the Impact of the Early Conflict Data -- 3 Data and Progress in Conflict Research -- 4 The Essential Interaction Between Theory and Data in Conflict Research -- 5 Key Unresolved Problems in Data for Conflict Research -- 6 Conclusion -- A.1 Appendix: Key Contemporary Data Sources, Listed Alphabetically -- References -- Text as Data for Conflict Research: A Literature Survey -- 1 Introduction -- 2 Dictionary Approaches for Conflict Research -- 3 Supervised Methods -- 4 Topic Modeling as Unsupervised Method in Conflict Research -- 5 Techniques of Cross-Validation -- 6 Conclusion -- Appendix -- References -- Interdependencies in Conflict Dynamics: Analyzing Endogenous Patterns in Conflict Event Data Using Relational Event Models -- 1 Introduction -- 2 Relational Events -- 3 Relational Event Models -- 4 Controlling for Endogenous Network Effects -- 5 Empirical Examples of Alliance Formation and Social Influencing -- 5.1 Military Alliance-Formation Dynamics -- 5.2 Influencing Dynamics Among EU Parliamentary Chambers -- 6 Discussion -- References -- Part II Computational Research on Non-violent Conflict -- Migration Policy Framing in Political Discourse: Evidence from Canada and the USA -- 1 Introduction -- 2 Theory -- 2.1 Party-Based Issue Ownership -- 2.2 Policy Framing -- 2.3 Inter-Party Contest over Migration Policy -- 2.4 Hypotheses. 3 Data and Methods -- 3.1 Comparative Case Study Approach -- 3.2 Dataset Subsetting: Dictionary Approach -- 3.3 Structural Topic Modeling -- 3.4 Labeling and Categorizing Topics -- 4 Results -- 4.1 Topics in the USA and Canada -- 4.2 Topic Association by Ideological Block -- 4.3 Topic Prevalence Across Time -- 4.4 Migration Policy Framing: Word Use -- 5 Conclusion -- A.1 Appendix -- References -- The Role of Network Structure and Initial Group Norm Distributions in Norm Conflict -- 1 Introduction -- 2 Social Norms -- 2.1 Normative Conflict -- 2.2 Finding Consensus -- 3 Network Structure and Group Norm Distributions -- 3.1 Homophily and Heterophily -- 3.2 Group Size -- 3.3 Initial Group Norm Distributions -- 4 Agent-Based Model -- 4.1 Simulating Norm Conflict -- 4.2 Generation of Network Structure -- 4.3 Initialization of Group Norm Distributions -- 4.4 Norm Updating Process -- 4.5 Outcome Metrics -- 5 Simulation Results -- 5.1 Change in Majority Norm -- 5.2 Change in Group Norm Difference -- 5.3 Conflict Ties -- 6 Discussion and Conclusion -- 6.1 The Alignment of Norms and Group Membership -- 6.2 Homophily Balances In-Group and Between-Group Conflict -- 6.3 Strategies to Maintain Minority Norms -- 6.4 Limitations and Future Directions -- Appendix: Analytical Derivations for Norm Endorsement -- References -- On the Fate of Protests: Dynamics of Social Activation and Topic Selection Online and in the Streets -- 1 Introduction -- 2 Data -- 2.1 Iran Protest in 2017/2018 -- 2.2 PEGIDA, Germany Since 2014 and Ongoing -- 2.3 Stylized Data Facts -- 3 Agent-Based Model -- 3.1 Agents, Follower Network, Thresholds, and Concerns -- 3.2 Agents' Activities -- 3.3 Initial Conditions and Stopping Rules -- 4 Simulation Experiment -- 4.1 The Iran Case in the Model -- 4.2 The Germany Case in the Model -- 4.3 Comparison Between the Iran and Germany Model Simulations. 4.4 Parameter Study -- 5 Discussion -- References -- Part III Computational Research on Violent Conflict -- Do Non-State Armed Groups Influence Each Other in Attack Timing and Frequency? Generating, Analyzing, and Comparing Empirical Data and Simulation -- 1 Introduction -- 2 Data and Case Settings -- 3 Methods -- 3.1 Analytical Estimation -- 3.2 Generative Model and Simulation -- 4 Results -- 4.1 Analytical Estimation of Basal and Additive Rates -- 4.2 Comparison of Inferred Networks to the Network of Actual Ties -- 4.3 Generative Model Results and Correspondence to Analytical Findings -- 5 Conclusion -- References -- On the Beaten Path: Violence Against Civilians and Simulated Conflict Along Road Networks -- 1 Introduction -- 2 Conflict and Violence Against Civilians -- 3 A New Strategy for Causal Identification: Creating Synthetic Events on the "Beaten Path" -- 4 Data and Case Selection -- 5 Modeling and Results -- 6 Conclusion -- References -- Analysis of Conflict Diffusion Over Continuous Space -- 1 Introduction -- 2 Related Work -- 2.1 Empirical Studies on the Diffusion of Conflict -- 2.2 Grid Models -- 2.3 Continuous Space Models -- 3 Data -- 4 Analysis -- 4.1 Test for Complete Spatial Randomness -- 4.2 Continuous Space Model -- 4.3 Gaussian Process -- 5 Discussion and Future Work -- References -- Rebel Group Protection Rackets: Simulating the Effects of Economic Support on Civil War Violence -- 1 Introduction -- 2 Theoretical Underpinnings -- 2.1 Rebel Group Extortion and Looting -- 2.2 Enterprise Fleeing -- 2.3 Enterprise Reporting -- 2.4 Rebel Group Fighting and Expansion -- 2.5 Rebel Group Cooperation -- 2.6 Rebel Group Recruitment -- 3 Rebel Group Protection Rackets Model -- 3.1 Model Description -- 3.1.1 Income Process -- 3.1.2 Demand Process -- 3.1.3 Expand Process -- 3.2 Scenario and Initialization -- 3.3 Implementation. 4 Experiments -- 4.1 Security Experiments -- 4.1.1 Rebel Group Strength -- 4.1.2 Enterprise Allocation -- 4.2 Somalia Case Study -- 4.2.1 Historical Background -- 4.2.2 Data and Experimentation -- 5 Conclusion and Discussion -- References -- Online Material -- Chapter 2: Inventory of Conflict Data -- Chapter 4: R-Package Relational Event Models -- Chapter 5: Supplementary Material and Replication Files to Migration Framing in Political Discourse -- Chapter 6: Agent-Based Simulation Model Simulating Normative Conflict -- Chapter 7: Agent-Based Simulation Model ProtestFate -- Chapter 8: Agent-Based Simulation Model Non-State Armed Groups' Attack Timing -- Chapter 9: Replication Code to On the Beaten Path -- Chapter 10: Replication Code to Analysis of Conflict Diffusion over Continuous Space -- Chapter 11: Agent-Based Simulation Model Rebel Group Protection Rackets -- Index. |
author_facet |
Deutschmann, Emanuel. Lorenz, Jan. Nardin, Luis G. Natalini, Davide. Wilhelm, Adalbert F. X. |
author_variant |
e d ed |
author2 |
Lorenz, Jan. Nardin, Luis G. Natalini, Davide. Wilhelm, Adalbert F. X. |
author2_variant |
j l jl l g n lg lgn d n dn a f x w afx afxw |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_sort |
Deutschmann, Emanuel. |
title |
Computational Conflict Research. |
title_full |
Computational Conflict Research. |
title_fullStr |
Computational Conflict Research. |
title_full_unstemmed |
Computational Conflict Research. |
title_auth |
Computational Conflict Research. |
title_new |
Computational Conflict Research. |
title_sort |
computational conflict research. |
series |
Computational Social Sciences Series |
series2 |
Computational Social Sciences Series |
publisher |
Springer International Publishing AG, |
publishDate |
2019 |
physical |
1 online resource (270 pages) |
edition |
1st ed. |
contents |
Intro -- Acknowledgements -- Contents -- Contributors -- List of Figures -- List of Tables -- Advancing Conflict Research Through Computational Approaches -- 1 Introduction -- 2 The Rise of Computational Social Science -- 3 Computational Approaches to Conflict Research -- 4 The Contributions of This Book -- References -- Part I Data and Methods in Computational Conflict Research -- Advances in Data on Conflict and Dissent -- 1 Introduction: The Need for Data in Computational Social Science -- 2 Conflict Research and the Impact of the Early Conflict Data -- 3 Data and Progress in Conflict Research -- 4 The Essential Interaction Between Theory and Data in Conflict Research -- 5 Key Unresolved Problems in Data for Conflict Research -- 6 Conclusion -- A.1 Appendix: Key Contemporary Data Sources, Listed Alphabetically -- References -- Text as Data for Conflict Research: A Literature Survey -- 1 Introduction -- 2 Dictionary Approaches for Conflict Research -- 3 Supervised Methods -- 4 Topic Modeling as Unsupervised Method in Conflict Research -- 5 Techniques of Cross-Validation -- 6 Conclusion -- Appendix -- References -- Interdependencies in Conflict Dynamics: Analyzing Endogenous Patterns in Conflict Event Data Using Relational Event Models -- 1 Introduction -- 2 Relational Events -- 3 Relational Event Models -- 4 Controlling for Endogenous Network Effects -- 5 Empirical Examples of Alliance Formation and Social Influencing -- 5.1 Military Alliance-Formation Dynamics -- 5.2 Influencing Dynamics Among EU Parliamentary Chambers -- 6 Discussion -- References -- Part II Computational Research on Non-violent Conflict -- Migration Policy Framing in Political Discourse: Evidence from Canada and the USA -- 1 Introduction -- 2 Theory -- 2.1 Party-Based Issue Ownership -- 2.2 Policy Framing -- 2.3 Inter-Party Contest over Migration Policy -- 2.4 Hypotheses. 3 Data and Methods -- 3.1 Comparative Case Study Approach -- 3.2 Dataset Subsetting: Dictionary Approach -- 3.3 Structural Topic Modeling -- 3.4 Labeling and Categorizing Topics -- 4 Results -- 4.1 Topics in the USA and Canada -- 4.2 Topic Association by Ideological Block -- 4.3 Topic Prevalence Across Time -- 4.4 Migration Policy Framing: Word Use -- 5 Conclusion -- A.1 Appendix -- References -- The Role of Network Structure and Initial Group Norm Distributions in Norm Conflict -- 1 Introduction -- 2 Social Norms -- 2.1 Normative Conflict -- 2.2 Finding Consensus -- 3 Network Structure and Group Norm Distributions -- 3.1 Homophily and Heterophily -- 3.2 Group Size -- 3.3 Initial Group Norm Distributions -- 4 Agent-Based Model -- 4.1 Simulating Norm Conflict -- 4.2 Generation of Network Structure -- 4.3 Initialization of Group Norm Distributions -- 4.4 Norm Updating Process -- 4.5 Outcome Metrics -- 5 Simulation Results -- 5.1 Change in Majority Norm -- 5.2 Change in Group Norm Difference -- 5.3 Conflict Ties -- 6 Discussion and Conclusion -- 6.1 The Alignment of Norms and Group Membership -- 6.2 Homophily Balances In-Group and Between-Group Conflict -- 6.3 Strategies to Maintain Minority Norms -- 6.4 Limitations and Future Directions -- Appendix: Analytical Derivations for Norm Endorsement -- References -- On the Fate of Protests: Dynamics of Social Activation and Topic Selection Online and in the Streets -- 1 Introduction -- 2 Data -- 2.1 Iran Protest in 2017/2018 -- 2.2 PEGIDA, Germany Since 2014 and Ongoing -- 2.3 Stylized Data Facts -- 3 Agent-Based Model -- 3.1 Agents, Follower Network, Thresholds, and Concerns -- 3.2 Agents' Activities -- 3.3 Initial Conditions and Stopping Rules -- 4 Simulation Experiment -- 4.1 The Iran Case in the Model -- 4.2 The Germany Case in the Model -- 4.3 Comparison Between the Iran and Germany Model Simulations. 4.4 Parameter Study -- 5 Discussion -- References -- Part III Computational Research on Violent Conflict -- Do Non-State Armed Groups Influence Each Other in Attack Timing and Frequency? Generating, Analyzing, and Comparing Empirical Data and Simulation -- 1 Introduction -- 2 Data and Case Settings -- 3 Methods -- 3.1 Analytical Estimation -- 3.2 Generative Model and Simulation -- 4 Results -- 4.1 Analytical Estimation of Basal and Additive Rates -- 4.2 Comparison of Inferred Networks to the Network of Actual Ties -- 4.3 Generative Model Results and Correspondence to Analytical Findings -- 5 Conclusion -- References -- On the Beaten Path: Violence Against Civilians and Simulated Conflict Along Road Networks -- 1 Introduction -- 2 Conflict and Violence Against Civilians -- 3 A New Strategy for Causal Identification: Creating Synthetic Events on the "Beaten Path" -- 4 Data and Case Selection -- 5 Modeling and Results -- 6 Conclusion -- References -- Analysis of Conflict Diffusion Over Continuous Space -- 1 Introduction -- 2 Related Work -- 2.1 Empirical Studies on the Diffusion of Conflict -- 2.2 Grid Models -- 2.3 Continuous Space Models -- 3 Data -- 4 Analysis -- 4.1 Test for Complete Spatial Randomness -- 4.2 Continuous Space Model -- 4.3 Gaussian Process -- 5 Discussion and Future Work -- References -- Rebel Group Protection Rackets: Simulating the Effects of Economic Support on Civil War Violence -- 1 Introduction -- 2 Theoretical Underpinnings -- 2.1 Rebel Group Extortion and Looting -- 2.2 Enterprise Fleeing -- 2.3 Enterprise Reporting -- 2.4 Rebel Group Fighting and Expansion -- 2.5 Rebel Group Cooperation -- 2.6 Rebel Group Recruitment -- 3 Rebel Group Protection Rackets Model -- 3.1 Model Description -- 3.1.1 Income Process -- 3.1.2 Demand Process -- 3.1.3 Expand Process -- 3.2 Scenario and Initialization -- 3.3 Implementation. 4 Experiments -- 4.1 Security Experiments -- 4.1.1 Rebel Group Strength -- 4.1.2 Enterprise Allocation -- 4.2 Somalia Case Study -- 4.2.1 Historical Background -- 4.2.2 Data and Experimentation -- 5 Conclusion and Discussion -- References -- Online Material -- Chapter 2: Inventory of Conflict Data -- Chapter 4: R-Package Relational Event Models -- Chapter 5: Supplementary Material and Replication Files to Migration Framing in Political Discourse -- Chapter 6: Agent-Based Simulation Model Simulating Normative Conflict -- Chapter 7: Agent-Based Simulation Model ProtestFate -- Chapter 8: Agent-Based Simulation Model Non-State Armed Groups' Attack Timing -- Chapter 9: Replication Code to On the Beaten Path -- Chapter 10: Replication Code to Analysis of Conflict Diffusion over Continuous Space -- Chapter 11: Agent-Based Simulation Model Rebel Group Protection Rackets -- Index. |
isbn |
9783030293338 9783030293321 |
callnumber-first |
H - Social Science |
callnumber-subject |
HM - Sociology |
callnumber-label |
HM511-538 |
callnumber-sort |
HM 3511 3538 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5975917 |
illustrated |
Not Illustrated |
oclc_num |
1135664306 |
work_keys_str_mv |
AT deutschmannemanuel computationalconflictresearch AT lorenzjan computationalconflictresearch AT nardinluisg computationalconflictresearch AT natalinidavide computationalconflictresearch AT wilhelmadalbertfx computationalconflictresearch |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5005975917 (Au-PeEL)EBL5975917 (OCoLC)1135664306 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Computational Social Sciences Series |
is_hierarchy_title |
Computational Conflict Research. |
container_title |
Computational Social Sciences Series |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField |
marc_error |
Info : Unimarc and ISO-8859-1 translations identical, choosing ISO-8859-1. --- [ 856 : z ] |
_version_ |
1792331057010311168 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08257nam a22004813i 4500</leader><controlfield tag="001">5005975917</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073833.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2019 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030293338</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783030293321</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5005975917</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL5975917</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1135664306</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HM511-538</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Deutschmann, Emanuel.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computational Conflict Research.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">Ã2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (270 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Computational Social Sciences Series</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Acknowledgements -- Contents -- Contributors -- List of Figures -- List of Tables -- Advancing Conflict Research Through Computational Approaches -- 1 Introduction -- 2 The Rise of Computational Social Science -- 3 Computational Approaches to Conflict Research -- 4 The Contributions of This Book -- References -- Part I Data and Methods in Computational Conflict Research -- Advances in Data on Conflict and Dissent -- 1 Introduction: The Need for Data in Computational Social Science -- 2 Conflict Research and the Impact of the Early Conflict Data -- 3 Data and Progress in Conflict Research -- 4 The Essential Interaction Between Theory and Data in Conflict Research -- 5 Key Unresolved Problems in Data for Conflict Research -- 6 Conclusion -- A.1 Appendix: Key Contemporary Data Sources, Listed Alphabetically -- References -- Text as Data for Conflict Research: A Literature Survey -- 1 Introduction -- 2 Dictionary Approaches for Conflict Research -- 3 Supervised Methods -- 4 Topic Modeling as Unsupervised Method in Conflict Research -- 5 Techniques of Cross-Validation -- 6 Conclusion -- Appendix -- References -- Interdependencies in Conflict Dynamics: Analyzing Endogenous Patterns in Conflict Event Data Using Relational Event Models -- 1 Introduction -- 2 Relational Events -- 3 Relational Event Models -- 4 Controlling for Endogenous Network Effects -- 5 Empirical Examples of Alliance Formation and Social Influencing -- 5.1 Military Alliance-Formation Dynamics -- 5.2 Influencing Dynamics Among EU Parliamentary Chambers -- 6 Discussion -- References -- Part II Computational Research on Non-violent Conflict -- Migration Policy Framing in Political Discourse: Evidence from Canada and the USA -- 1 Introduction -- 2 Theory -- 2.1 Party-Based Issue Ownership -- 2.2 Policy Framing -- 2.3 Inter-Party Contest over Migration Policy -- 2.4 Hypotheses.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3 Data and Methods -- 3.1 Comparative Case Study Approach -- 3.2 Dataset Subsetting: Dictionary Approach -- 3.3 Structural Topic Modeling -- 3.4 Labeling and Categorizing Topics -- 4 Results -- 4.1 Topics in the USA and Canada -- 4.2 Topic Association by Ideological Block -- 4.3 Topic Prevalence Across Time -- 4.4 Migration Policy Framing: Word Use -- 5 Conclusion -- A.1 Appendix -- References -- The Role of Network Structure and Initial Group Norm Distributions in Norm Conflict -- 1 Introduction -- 2 Social Norms -- 2.1 Normative Conflict -- 2.2 Finding Consensus -- 3 Network Structure and Group Norm Distributions -- 3.1 Homophily and Heterophily -- 3.2 Group Size -- 3.3 Initial Group Norm Distributions -- 4 Agent-Based Model -- 4.1 Simulating Norm Conflict -- 4.2 Generation of Network Structure -- 4.3 Initialization of Group Norm Distributions -- 4.4 Norm Updating Process -- 4.5 Outcome Metrics -- 5 Simulation Results -- 5.1 Change in Majority Norm -- 5.2 Change in Group Norm Difference -- 5.3 Conflict Ties -- 6 Discussion and Conclusion -- 6.1 The Alignment of Norms and Group Membership -- 6.2 Homophily Balances In-Group and Between-Group Conflict -- 6.3 Strategies to Maintain Minority Norms -- 6.4 Limitations and Future Directions -- Appendix: Analytical Derivations for Norm Endorsement -- References -- On the Fate of Protests: Dynamics of Social Activation and Topic Selection Online and in the Streets -- 1 Introduction -- 2 Data -- 2.1 Iran Protest in 2017/2018 -- 2.2 PEGIDA, Germany Since 2014 and Ongoing -- 2.3 Stylized Data Facts -- 3 Agent-Based Model -- 3.1 Agents, Follower Network, Thresholds, and Concerns -- 3.2 Agents' Activities -- 3.3 Initial Conditions and Stopping Rules -- 4 Simulation Experiment -- 4.1 The Iran Case in the Model -- 4.2 The Germany Case in the Model -- 4.3 Comparison Between the Iran and Germany Model Simulations.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.4 Parameter Study -- 5 Discussion -- References -- Part III Computational Research on Violent Conflict -- Do Non-State Armed Groups Influence Each Other in Attack Timing and Frequency? Generating, Analyzing, and Comparing Empirical Data and Simulation -- 1 Introduction -- 2 Data and Case Settings -- 3 Methods -- 3.1 Analytical Estimation -- 3.2 Generative Model and Simulation -- 4 Results -- 4.1 Analytical Estimation of Basal and Additive Rates -- 4.2 Comparison of Inferred Networks to the Network of Actual Ties -- 4.3 Generative Model Results and Correspondence to Analytical Findings -- 5 Conclusion -- References -- On the Beaten Path: Violence Against Civilians and Simulated Conflict Along Road Networks -- 1 Introduction -- 2 Conflict and Violence Against Civilians -- 3 A New Strategy for Causal Identification: Creating Synthetic Events on the "Beaten Path" -- 4 Data and Case Selection -- 5 Modeling and Results -- 6 Conclusion -- References -- Analysis of Conflict Diffusion Over Continuous Space -- 1 Introduction -- 2 Related Work -- 2.1 Empirical Studies on the Diffusion of Conflict -- 2.2 Grid Models -- 2.3 Continuous Space Models -- 3 Data -- 4 Analysis -- 4.1 Test for Complete Spatial Randomness -- 4.2 Continuous Space Model -- 4.3 Gaussian Process -- 5 Discussion and Future Work -- References -- Rebel Group Protection Rackets: Simulating the Effects of Economic Support on Civil War Violence -- 1 Introduction -- 2 Theoretical Underpinnings -- 2.1 Rebel Group Extortion and Looting -- 2.2 Enterprise Fleeing -- 2.3 Enterprise Reporting -- 2.4 Rebel Group Fighting and Expansion -- 2.5 Rebel Group Cooperation -- 2.6 Rebel Group Recruitment -- 3 Rebel Group Protection Rackets Model -- 3.1 Model Description -- 3.1.1 Income Process -- 3.1.2 Demand Process -- 3.1.3 Expand Process -- 3.2 Scenario and Initialization -- 3.3 Implementation.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4 Experiments -- 4.1 Security Experiments -- 4.1.1 Rebel Group Strength -- 4.1.2 Enterprise Allocation -- 4.2 Somalia Case Study -- 4.2.1 Historical Background -- 4.2.2 Data and Experimentation -- 5 Conclusion and Discussion -- References -- Online Material -- Chapter 2: Inventory of Conflict Data -- Chapter 4: R-Package Relational Event Models -- Chapter 5: Supplementary Material and Replication Files to Migration Framing in Political Discourse -- Chapter 6: Agent-Based Simulation Model Simulating Normative Conflict -- Chapter 7: Agent-Based Simulation Model ProtestFate -- Chapter 8: Agent-Based Simulation Model Non-State Armed Groups' Attack Timing -- Chapter 9: Replication Code to On the Beaten Path -- Chapter 10: Replication Code to Analysis of Conflict Diffusion over Continuous Space -- Chapter 11: Agent-Based Simulation Model Rebel Group Protection Rackets -- Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lorenz, Jan.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nardin, Luis G.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Natalini, Davide.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wilhelm, Adalbert F. X.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Deutschmann, Emanuel</subfield><subfield code="t">Computational Conflict Research</subfield><subfield code="d">Cham : Springer International Publishing AG,c2019</subfield><subfield code="z">9783030293321</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Computational Social Sciences Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5975917</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |