Computational Conflict Research.

Saved in:
Bibliographic Details
Superior document:Computational Social Sciences Series
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2019.
Ã2020.
Year of Publication:2019
Edition:1st ed.
Language:English
Series:Computational Social Sciences Series
Online Access:
Physical Description:1 online resource (270 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Intro
  • Acknowledgements
  • Contents
  • Contributors
  • List of Figures
  • List of Tables
  • Advancing Conflict Research Through Computational Approaches
  • 1 Introduction
  • 2 The Rise of Computational Social Science
  • 3 Computational Approaches to Conflict Research
  • 4 The Contributions of This Book
  • References
  • Part I Data and Methods in Computational Conflict Research
  • Advances in Data on Conflict and Dissent
  • 1 Introduction: The Need for Data in Computational Social Science
  • 2 Conflict Research and the Impact of the Early Conflict Data
  • 3 Data and Progress in Conflict Research
  • 4 The Essential Interaction Between Theory and Data in Conflict Research
  • 5 Key Unresolved Problems in Data for Conflict Research
  • 6 Conclusion
  • A.1 Appendix: Key Contemporary Data Sources, Listed Alphabetically
  • References
  • Text as Data for Conflict Research: A Literature Survey
  • 1 Introduction
  • 2 Dictionary Approaches for Conflict Research
  • 3 Supervised Methods
  • 4 Topic Modeling as Unsupervised Method in Conflict Research
  • 5 Techniques of Cross-Validation
  • 6 Conclusion
  • Appendix
  • References
  • Interdependencies in Conflict Dynamics: Analyzing Endogenous Patterns in Conflict Event Data Using Relational Event Models
  • 1 Introduction
  • 2 Relational Events
  • 3 Relational Event Models
  • 4 Controlling for Endogenous Network Effects
  • 5 Empirical Examples of Alliance Formation and Social Influencing
  • 5.1 Military Alliance-Formation Dynamics
  • 5.2 Influencing Dynamics Among EU Parliamentary Chambers
  • 6 Discussion
  • References
  • Part II Computational Research on Non-violent Conflict
  • Migration Policy Framing in Political Discourse: Evidence from Canada and the USA
  • 1 Introduction
  • 2 Theory
  • 2.1 Party-Based Issue Ownership
  • 2.2 Policy Framing
  • 2.3 Inter-Party Contest over Migration Policy
  • 2.4 Hypotheses.
  • 3 Data and Methods
  • 3.1 Comparative Case Study Approach
  • 3.2 Dataset Subsetting: Dictionary Approach
  • 3.3 Structural Topic Modeling
  • 3.4 Labeling and Categorizing Topics
  • 4 Results
  • 4.1 Topics in the USA and Canada
  • 4.2 Topic Association by Ideological Block
  • 4.3 Topic Prevalence Across Time
  • 4.4 Migration Policy Framing: Word Use
  • 5 Conclusion
  • A.1 Appendix
  • References
  • The Role of Network Structure and Initial Group Norm Distributions in Norm Conflict
  • 1 Introduction
  • 2 Social Norms
  • 2.1 Normative Conflict
  • 2.2 Finding Consensus
  • 3 Network Structure and Group Norm Distributions
  • 3.1 Homophily and Heterophily
  • 3.2 Group Size
  • 3.3 Initial Group Norm Distributions
  • 4 Agent-Based Model
  • 4.1 Simulating Norm Conflict
  • 4.2 Generation of Network Structure
  • 4.3 Initialization of Group Norm Distributions
  • 4.4 Norm Updating Process
  • 4.5 Outcome Metrics
  • 5 Simulation Results
  • 5.1 Change in Majority Norm
  • 5.2 Change in Group Norm Difference
  • 5.3 Conflict Ties
  • 6 Discussion and Conclusion
  • 6.1 The Alignment of Norms and Group Membership
  • 6.2 Homophily Balances In-Group and Between-Group Conflict
  • 6.3 Strategies to Maintain Minority Norms
  • 6.4 Limitations and Future Directions
  • Appendix: Analytical Derivations for Norm Endorsement
  • References
  • On the Fate of Protests: Dynamics of Social Activation and Topic Selection Online and in the Streets
  • 1 Introduction
  • 2 Data
  • 2.1 Iran Protest in 2017/2018
  • 2.2 PEGIDA, Germany Since 2014 and Ongoing
  • 2.3 Stylized Data Facts
  • 3 Agent-Based Model
  • 3.1 Agents, Follower Network, Thresholds, and Concerns
  • 3.2 Agents' Activities
  • 3.3 Initial Conditions and Stopping Rules
  • 4 Simulation Experiment
  • 4.1 The Iran Case in the Model
  • 4.2 The Germany Case in the Model
  • 4.3 Comparison Between the Iran and Germany Model Simulations.
  • 4.4 Parameter Study
  • 5 Discussion
  • References
  • Part III Computational Research on Violent Conflict
  • Do Non-State Armed Groups Influence Each Other in Attack Timing and Frequency? Generating, Analyzing, and Comparing Empirical Data and Simulation
  • 1 Introduction
  • 2 Data and Case Settings
  • 3 Methods
  • 3.1 Analytical Estimation
  • 3.2 Generative Model and Simulation
  • 4 Results
  • 4.1 Analytical Estimation of Basal and Additive Rates
  • 4.2 Comparison of Inferred Networks to the Network of Actual Ties
  • 4.3 Generative Model Results and Correspondence to Analytical Findings
  • 5 Conclusion
  • References
  • On the Beaten Path: Violence Against Civilians and Simulated Conflict Along Road Networks
  • 1 Introduction
  • 2 Conflict and Violence Against Civilians
  • 3 A New Strategy for Causal Identification: Creating Synthetic Events on the "Beaten Path"
  • 4 Data and Case Selection
  • 5 Modeling and Results
  • 6 Conclusion
  • References
  • Analysis of Conflict Diffusion Over Continuous Space
  • 1 Introduction
  • 2 Related Work
  • 2.1 Empirical Studies on the Diffusion of Conflict
  • 2.2 Grid Models
  • 2.3 Continuous Space Models
  • 3 Data
  • 4 Analysis
  • 4.1 Test for Complete Spatial Randomness
  • 4.2 Continuous Space Model
  • 4.3 Gaussian Process
  • 5 Discussion and Future Work
  • References
  • Rebel Group Protection Rackets: Simulating the Effects of Economic Support on Civil War Violence
  • 1 Introduction
  • 2 Theoretical Underpinnings
  • 2.1 Rebel Group Extortion and Looting
  • 2.2 Enterprise Fleeing
  • 2.3 Enterprise Reporting
  • 2.4 Rebel Group Fighting and Expansion
  • 2.5 Rebel Group Cooperation
  • 2.6 Rebel Group Recruitment
  • 3 Rebel Group Protection Rackets Model
  • 3.1 Model Description
  • 3.1.1 Income Process
  • 3.1.2 Demand Process
  • 3.1.3 Expand Process
  • 3.2 Scenario and Initialization
  • 3.3 Implementation.
  • 4 Experiments
  • 4.1 Security Experiments
  • 4.1.1 Rebel Group Strength
  • 4.1.2 Enterprise Allocation
  • 4.2 Somalia Case Study
  • 4.2.1 Historical Background
  • 4.2.2 Data and Experimentation
  • 5 Conclusion and Discussion
  • References
  • Online Material
  • Chapter 2: Inventory of Conflict Data
  • Chapter 4: R-Package Relational Event Models
  • Chapter 5: Supplementary Material and Replication Files to Migration Framing in Political Discourse
  • Chapter 6: Agent-Based Simulation Model Simulating Normative Conflict
  • Chapter 7: Agent-Based Simulation Model ProtestFate
  • Chapter 8: Agent-Based Simulation Model Non-State Armed Groups' Attack Timing
  • Chapter 9: Replication Code to On the Beaten Path
  • Chapter 10: Replication Code to Analysis of Conflict Diffusion over Continuous Space
  • Chapter 11: Agent-Based Simulation Model Rebel Group Protection Rackets
  • Index.