Codes of the Underworld : : How Criminals Communicate / / Diego Gambetta.

How do criminals communicate with each other? Unlike the rest of us, people planning crimes can't freely advertise their goods and services, nor can they rely on formal institutions to settle disputes and certify quality. They face uniquely intense dilemmas as they grapple with the basic proble...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Backlist 2000-2013
VerfasserIn:
Place / Publishing House:Princeton, NJ : : Princeton University Press, , [2011]
©2009
Year of Publication:2011
Language:English
Online Access:
Physical Description:1 online resource (368 p.) :; 5 line illus. 3 tables.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781400833610
ctrlnum (DE-B1597)513155
(OCoLC)809738191
collection bib_alma
record_format marc
spelling Gambetta, Diego, author. aut http://id.loc.gov/vocabulary/relators/aut
Codes of the Underworld : How Criminals Communicate / Diego Gambetta.
Princeton, NJ : Princeton University Press, [2011]
©2009
1 online resource (368 p.) : 5 line illus. 3 tables.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Acknowledgments -- Introduction -- Abbreviations -- PART 1. Costly Signals -- 1. Criminal Credentials -- 2. The Power of Limits -- 3. Information as Hostage -- 4. Why Prisoners Fight (and Signal) -- 5. Self-harm as a Signal -- PART 2. Conventional Signals -- 6. Conventional and Iconic Signals -- 7. Protecting Easy-to-Fake Signals -- 8. Criminal Trademarks -- 9. Nicknames -- 10. Why (Low) Life Imitates Art -- Notes -- Bibliography -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
How do criminals communicate with each other? Unlike the rest of us, people planning crimes can't freely advertise their goods and services, nor can they rely on formal institutions to settle disputes and certify quality. They face uniquely intense dilemmas as they grapple with the basic problems of whom to trust, how to make themselves trusted, and how to handle information without being detected by rivals or police. In this book, one of the world's leading scholars of the mafia ranges from ancient Rome to the gangs of modern Japan, from the prisons of Western countries to terrorist and pedophile rings, to explain how despite these constraints, many criminals successfully stay in business. Diego Gambetta shows that as villains balance the lure of criminal reward against the fear of dire punishment, they are inspired to unexpected feats of subtlety and ingenuity in communication. He uncovers the logic of the often bizarre ways in which inveterate and occasional criminals solve their dilemmas, such as why the tattoos and scars etched on a criminal's body function as lines on a professional résumé, why inmates resort to violence to establish their position in the prison pecking order, and why mobsters are partial to nicknames and imitate the behavior they see in mafia movies. Even deliberate self-harm and the disclosure of their crimes are strategically employed by criminals to convey important messages. By deciphering how criminals signal to each other in a lawless universe, this gruesomely entertaining and incisive book provides a quantum leap in our ability to make sense of their actions.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jul 2021)
Communication.
Criminals Social conditions.
Criminals.
SOCIAL SCIENCE / Criminology. bisacsh
Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Backlist 2000-2013 9783110442502
print 9780691152479
https://doi.org/10.1515/9781400833610
https://www.degruyter.com/isbn/9781400833610
Cover https://www.degruyter.com/cover/covers/9781400833610.jpg
language English
format eBook
author Gambetta, Diego,
Gambetta, Diego,
spellingShingle Gambetta, Diego,
Gambetta, Diego,
Codes of the Underworld : How Criminals Communicate /
Frontmatter --
Contents --
Acknowledgments --
Introduction --
Abbreviations --
PART 1. Costly Signals --
1. Criminal Credentials --
2. The Power of Limits --
3. Information as Hostage --
4. Why Prisoners Fight (and Signal) --
5. Self-harm as a Signal --
PART 2. Conventional Signals --
6. Conventional and Iconic Signals --
7. Protecting Easy-to-Fake Signals --
8. Criminal Trademarks --
9. Nicknames --
10. Why (Low) Life Imitates Art --
Notes --
Bibliography --
Index
author_facet Gambetta, Diego,
Gambetta, Diego,
author_variant d g dg
d g dg
author_role VerfasserIn
VerfasserIn
author_sort Gambetta, Diego,
title Codes of the Underworld : How Criminals Communicate /
title_sub How Criminals Communicate /
title_full Codes of the Underworld : How Criminals Communicate / Diego Gambetta.
title_fullStr Codes of the Underworld : How Criminals Communicate / Diego Gambetta.
title_full_unstemmed Codes of the Underworld : How Criminals Communicate / Diego Gambetta.
title_auth Codes of the Underworld : How Criminals Communicate /
title_alt Frontmatter --
Contents --
Acknowledgments --
Introduction --
Abbreviations --
PART 1. Costly Signals --
1. Criminal Credentials --
2. The Power of Limits --
3. Information as Hostage --
4. Why Prisoners Fight (and Signal) --
5. Self-harm as a Signal --
PART 2. Conventional Signals --
6. Conventional and Iconic Signals --
7. Protecting Easy-to-Fake Signals --
8. Criminal Trademarks --
9. Nicknames --
10. Why (Low) Life Imitates Art --
Notes --
Bibliography --
Index
title_new Codes of the Underworld :
title_sort codes of the underworld : how criminals communicate /
publisher Princeton University Press,
publishDate 2011
physical 1 online resource (368 p.) : 5 line illus. 3 tables.
Issued also in print.
contents Frontmatter --
Contents --
Acknowledgments --
Introduction --
Abbreviations --
PART 1. Costly Signals --
1. Criminal Credentials --
2. The Power of Limits --
3. Information as Hostage --
4. Why Prisoners Fight (and Signal) --
5. Self-harm as a Signal --
PART 2. Conventional Signals --
6. Conventional and Iconic Signals --
7. Protecting Easy-to-Fake Signals --
8. Criminal Trademarks --
9. Nicknames --
10. Why (Low) Life Imitates Art --
Notes --
Bibliography --
Index
isbn 9781400833610
9783110442502
9780691152479
url https://doi.org/10.1515/9781400833610
https://www.degruyter.com/isbn/9781400833610
https://www.degruyter.com/cover/covers/9781400833610.jpg
illustrated Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 364 - Criminology
dewey-full 364.301/4
dewey-sort 3364.301 14
dewey-raw 364.301/4
dewey-search 364.301/4
doi_str_mv 10.1515/9781400833610
oclc_num 809738191
work_keys_str_mv AT gambettadiego codesoftheunderworldhowcriminalscommunicate
status_str n
ids_txt_mv (DE-B1597)513155
(OCoLC)809738191
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Backlist 2000-2013
is_hierarchy_title Codes of the Underworld : How Criminals Communicate /
container_title Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Backlist 2000-2013
_version_ 1806143542544826368
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04606nam a22007095i 4500</leader><controlfield tag="001">9781400833610</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210729020517.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210729t20112009nju fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400833610</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400833610</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)513155</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)809738191</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">364.301/4</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gambetta, Diego, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Codes of the Underworld :</subfield><subfield code="b">How Criminals Communicate /</subfield><subfield code="c">Diego Gambetta.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (368 p.) :</subfield><subfield code="b">5 line illus. 3 tables.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">Abbreviations -- </subfield><subfield code="t">PART 1. Costly Signals -- </subfield><subfield code="t">1. Criminal Credentials -- </subfield><subfield code="t">2. The Power of Limits -- </subfield><subfield code="t">3. Information as Hostage -- </subfield><subfield code="t">4. Why Prisoners Fight (and Signal) -- </subfield><subfield code="t">5. Self-harm as a Signal -- </subfield><subfield code="t">PART 2. Conventional Signals -- </subfield><subfield code="t">6. Conventional and Iconic Signals -- </subfield><subfield code="t">7. Protecting Easy-to-Fake Signals -- </subfield><subfield code="t">8. Criminal Trademarks -- </subfield><subfield code="t">9. Nicknames -- </subfield><subfield code="t">10. Why (Low) Life Imitates Art -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">How do criminals communicate with each other? Unlike the rest of us, people planning crimes can't freely advertise their goods and services, nor can they rely on formal institutions to settle disputes and certify quality. They face uniquely intense dilemmas as they grapple with the basic problems of whom to trust, how to make themselves trusted, and how to handle information without being detected by rivals or police. In this book, one of the world's leading scholars of the mafia ranges from ancient Rome to the gangs of modern Japan, from the prisons of Western countries to terrorist and pedophile rings, to explain how despite these constraints, many criminals successfully stay in business. Diego Gambetta shows that as villains balance the lure of criminal reward against the fear of dire punishment, they are inspired to unexpected feats of subtlety and ingenuity in communication. He uncovers the logic of the often bizarre ways in which inveterate and occasional criminals solve their dilemmas, such as why the tattoos and scars etched on a criminal's body function as lines on a professional résumé, why inmates resort to violence to establish their position in the prison pecking order, and why mobsters are partial to nicknames and imitate the behavior they see in mafia movies. Even deliberate self-harm and the disclosure of their crimes are strategically employed by criminals to convey important messages. By deciphering how criminals signal to each other in a lawless universe, this gruesomely entertaining and incisive book provides a quantum leap in our ability to make sense of their actions.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jul 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Communication.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminals</subfield><subfield code="x">Social conditions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminals.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press eBook-Package Backlist 2000-2013</subfield><subfield code="z">9783110442502</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780691152479</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400833610</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781400833610</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781400833610.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-044250-2 Princeton University Press eBook-Package Backlist 2000-2013</subfield><subfield code="c">2000</subfield><subfield code="d">2013</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>