Codes of the Underworld : : How Criminals Communicate / / Diego Gambetta.
How do criminals communicate with each other? Unlike the rest of us, people planning crimes can't freely advertise their goods and services, nor can they rely on formal institutions to settle disputes and certify quality. They face uniquely intense dilemmas as they grapple with the basic proble...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Backlist 2000-2013 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Princeton, NJ : : Princeton University Press, , [2011] ©2009 |
Year of Publication: | 2011 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (368 p.) :; 5 line illus. 3 tables. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781400833610 |
---|---|
ctrlnum |
(DE-B1597)513155 (OCoLC)809738191 |
collection |
bib_alma |
record_format |
marc |
spelling |
Gambetta, Diego, author. aut http://id.loc.gov/vocabulary/relators/aut Codes of the Underworld : How Criminals Communicate / Diego Gambetta. Princeton, NJ : Princeton University Press, [2011] ©2009 1 online resource (368 p.) : 5 line illus. 3 tables. text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Acknowledgments -- Introduction -- Abbreviations -- PART 1. Costly Signals -- 1. Criminal Credentials -- 2. The Power of Limits -- 3. Information as Hostage -- 4. Why Prisoners Fight (and Signal) -- 5. Self-harm as a Signal -- PART 2. Conventional Signals -- 6. Conventional and Iconic Signals -- 7. Protecting Easy-to-Fake Signals -- 8. Criminal Trademarks -- 9. Nicknames -- 10. Why (Low) Life Imitates Art -- Notes -- Bibliography -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star How do criminals communicate with each other? Unlike the rest of us, people planning crimes can't freely advertise their goods and services, nor can they rely on formal institutions to settle disputes and certify quality. They face uniquely intense dilemmas as they grapple with the basic problems of whom to trust, how to make themselves trusted, and how to handle information without being detected by rivals or police. In this book, one of the world's leading scholars of the mafia ranges from ancient Rome to the gangs of modern Japan, from the prisons of Western countries to terrorist and pedophile rings, to explain how despite these constraints, many criminals successfully stay in business. Diego Gambetta shows that as villains balance the lure of criminal reward against the fear of dire punishment, they are inspired to unexpected feats of subtlety and ingenuity in communication. He uncovers the logic of the often bizarre ways in which inveterate and occasional criminals solve their dilemmas, such as why the tattoos and scars etched on a criminal's body function as lines on a professional résumé, why inmates resort to violence to establish their position in the prison pecking order, and why mobsters are partial to nicknames and imitate the behavior they see in mafia movies. Even deliberate self-harm and the disclosure of their crimes are strategically employed by criminals to convey important messages. By deciphering how criminals signal to each other in a lawless universe, this gruesomely entertaining and incisive book provides a quantum leap in our ability to make sense of their actions. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jul 2021) Communication. Criminals Social conditions. Criminals. SOCIAL SCIENCE / Criminology. bisacsh Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Backlist 2000-2013 9783110442502 print 9780691152479 https://doi.org/10.1515/9781400833610 https://www.degruyter.com/isbn/9781400833610 Cover https://www.degruyter.com/cover/covers/9781400833610.jpg |
language |
English |
format |
eBook |
author |
Gambetta, Diego, Gambetta, Diego, |
spellingShingle |
Gambetta, Diego, Gambetta, Diego, Codes of the Underworld : How Criminals Communicate / Frontmatter -- Contents -- Acknowledgments -- Introduction -- Abbreviations -- PART 1. Costly Signals -- 1. Criminal Credentials -- 2. The Power of Limits -- 3. Information as Hostage -- 4. Why Prisoners Fight (and Signal) -- 5. Self-harm as a Signal -- PART 2. Conventional Signals -- 6. Conventional and Iconic Signals -- 7. Protecting Easy-to-Fake Signals -- 8. Criminal Trademarks -- 9. Nicknames -- 10. Why (Low) Life Imitates Art -- Notes -- Bibliography -- Index |
author_facet |
Gambetta, Diego, Gambetta, Diego, |
author_variant |
d g dg d g dg |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Gambetta, Diego, |
title |
Codes of the Underworld : How Criminals Communicate / |
title_sub |
How Criminals Communicate / |
title_full |
Codes of the Underworld : How Criminals Communicate / Diego Gambetta. |
title_fullStr |
Codes of the Underworld : How Criminals Communicate / Diego Gambetta. |
title_full_unstemmed |
Codes of the Underworld : How Criminals Communicate / Diego Gambetta. |
title_auth |
Codes of the Underworld : How Criminals Communicate / |
title_alt |
Frontmatter -- Contents -- Acknowledgments -- Introduction -- Abbreviations -- PART 1. Costly Signals -- 1. Criminal Credentials -- 2. The Power of Limits -- 3. Information as Hostage -- 4. Why Prisoners Fight (and Signal) -- 5. Self-harm as a Signal -- PART 2. Conventional Signals -- 6. Conventional and Iconic Signals -- 7. Protecting Easy-to-Fake Signals -- 8. Criminal Trademarks -- 9. Nicknames -- 10. Why (Low) Life Imitates Art -- Notes -- Bibliography -- Index |
title_new |
Codes of the Underworld : |
title_sort |
codes of the underworld : how criminals communicate / |
publisher |
Princeton University Press, |
publishDate |
2011 |
physical |
1 online resource (368 p.) : 5 line illus. 3 tables. Issued also in print. |
contents |
Frontmatter -- Contents -- Acknowledgments -- Introduction -- Abbreviations -- PART 1. Costly Signals -- 1. Criminal Credentials -- 2. The Power of Limits -- 3. Information as Hostage -- 4. Why Prisoners Fight (and Signal) -- 5. Self-harm as a Signal -- PART 2. Conventional Signals -- 6. Conventional and Iconic Signals -- 7. Protecting Easy-to-Fake Signals -- 8. Criminal Trademarks -- 9. Nicknames -- 10. Why (Low) Life Imitates Art -- Notes -- Bibliography -- Index |
isbn |
9781400833610 9783110442502 9780691152479 |
url |
https://doi.org/10.1515/9781400833610 https://www.degruyter.com/isbn/9781400833610 https://www.degruyter.com/cover/covers/9781400833610.jpg |
illustrated |
Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
364 - Criminology |
dewey-full |
364.301/4 |
dewey-sort |
3364.301 14 |
dewey-raw |
364.301/4 |
dewey-search |
364.301/4 |
doi_str_mv |
10.1515/9781400833610 |
oclc_num |
809738191 |
work_keys_str_mv |
AT gambettadiego codesoftheunderworldhowcriminalscommunicate |
status_str |
n |
ids_txt_mv |
(DE-B1597)513155 (OCoLC)809738191 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Backlist 2000-2013 |
is_hierarchy_title |
Codes of the Underworld : How Criminals Communicate / |
container_title |
Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Backlist 2000-2013 |
_version_ |
1806143542544826368 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04606nam a22007095i 4500</leader><controlfield tag="001">9781400833610</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210729020517.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210729t20112009nju fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400833610</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400833610</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)513155</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)809738191</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">364.301/4</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gambetta, Diego, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Codes of the Underworld :</subfield><subfield code="b">How Criminals Communicate /</subfield><subfield code="c">Diego Gambetta.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (368 p.) :</subfield><subfield code="b">5 line illus. 3 tables.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">Abbreviations -- </subfield><subfield code="t">PART 1. Costly Signals -- </subfield><subfield code="t">1. Criminal Credentials -- </subfield><subfield code="t">2. The Power of Limits -- </subfield><subfield code="t">3. Information as Hostage -- </subfield><subfield code="t">4. Why Prisoners Fight (and Signal) -- </subfield><subfield code="t">5. Self-harm as a Signal -- </subfield><subfield code="t">PART 2. Conventional Signals -- </subfield><subfield code="t">6. Conventional and Iconic Signals -- </subfield><subfield code="t">7. Protecting Easy-to-Fake Signals -- </subfield><subfield code="t">8. Criminal Trademarks -- </subfield><subfield code="t">9. Nicknames -- </subfield><subfield code="t">10. Why (Low) Life Imitates Art -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">How do criminals communicate with each other? Unlike the rest of us, people planning crimes can't freely advertise their goods and services, nor can they rely on formal institutions to settle disputes and certify quality. They face uniquely intense dilemmas as they grapple with the basic problems of whom to trust, how to make themselves trusted, and how to handle information without being detected by rivals or police. In this book, one of the world's leading scholars of the mafia ranges from ancient Rome to the gangs of modern Japan, from the prisons of Western countries to terrorist and pedophile rings, to explain how despite these constraints, many criminals successfully stay in business. Diego Gambetta shows that as villains balance the lure of criminal reward against the fear of dire punishment, they are inspired to unexpected feats of subtlety and ingenuity in communication. He uncovers the logic of the often bizarre ways in which inveterate and occasional criminals solve their dilemmas, such as why the tattoos and scars etched on a criminal's body function as lines on a professional résumé, why inmates resort to violence to establish their position in the prison pecking order, and why mobsters are partial to nicknames and imitate the behavior they see in mafia movies. Even deliberate self-harm and the disclosure of their crimes are strategically employed by criminals to convey important messages. By deciphering how criminals signal to each other in a lawless universe, this gruesomely entertaining and incisive book provides a quantum leap in our ability to make sense of their actions.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jul 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Communication.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminals</subfield><subfield code="x">Social conditions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminals.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press eBook-Package Backlist 2000-2013</subfield><subfield code="z">9783110442502</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780691152479</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400833610</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781400833610</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781400833610.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-044250-2 Princeton University Press eBook-Package Backlist 2000-2013</subfield><subfield code="c">2000</subfield><subfield code="d">2013</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |