The Resource Thieves of state : why corruption threatens global security, Sarah Chayes
Thieves of state : why corruption threatens global security, Sarah Chayes
Resource Information
The item Thieves of state : why corruption threatens global security, Sarah Chayes represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Memorial Hall Library.This item is available to borrow from 1 library branch.
Resource Information
The item Thieves of state : why corruption threatens global security, Sarah Chayes represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Memorial Hall Library.
This item is available to borrow from 1 library branch.
- Summary
- A former advisor to the Joint Chiefs of Staff explains the common role of corruption in today's international uprisings, tracing corruption since the 1990s while arguing that corrupt governments have been largely responsible for extreme acts of rebellion
- Language
- eng
- Edition
- First edition.
- Extent
- x, 262 pages
- Contents
-
- "If I see somebody planting an IED..." : Afghanistan, 2009
- "Lord King, how I wish that you were wise" : mirrors for princes, ca. 700-1516
- Hearing the people's complaints : Kandahar to Kabul, 2001-2009
- Nonkinetic targeting : Kabul, 2009
- Vertically integrated criminal syndicates : Kabul, Garmisch, 2009-2010
- Revolt against kleptocracy : the Arab spring : Morocco, Algeria, Tunisia, 2011
- Variation 1: the (overlooked) military-kleptocratic complex : Egypt, ca. 2010
- Variation 2: the bureaucratic kleptocracy : Tunisia, ca. 2010
- Variation 3: the post-Soviet kleptocratic autocracy : Uzbekistan, ca. 2013
- Variation 4: the resource kleptocracy : Nigeria, ca. 2014
- Up a level : Afghanistan and Washington, June 2010-January 2011
- Forging an appeal on Earth : The Netherlands, England, America, ca. 1560-1787
- Violent extremists
- Remedies
- Self-reflection
- Appendix
- Isbn
- 9780393239461
- Label
- Thieves of state : why corruption threatens global security
- Title
- Thieves of state
- Title remainder
- why corruption threatens global security
- Statement of responsibility
- Sarah Chayes
- Language
- eng
- Summary
- A former advisor to the Joint Chiefs of Staff explains the common role of corruption in today's international uprisings, tracing corruption since the 1990s while arguing that corrupt governments have been largely responsible for extreme acts of rebellion
- Cataloging source
- DLC
- http://library.link/vocab/creatorDate
- 1962-
- http://library.link/vocab/creatorName
- Chayes, Sarah
- Dewey number
- 364.1/323
- Illustrations
- illustrations
- Index
- index present
- LC call number
- JF1081
- LC item number
- .C43 2015
- Literary form
- non fiction
- Nature of contents
- bibliography
- http://library.link/vocab/subjectName
-
- Political corruption
- Security, International
- Label
- Thieves of state : why corruption threatens global security, Sarah Chayes
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- volume
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type MARC source
- rdacontent
- Contents
- "If I see somebody planting an IED..." : Afghanistan, 2009 -- "Lord King, how I wish that you were wise" : mirrors for princes, ca. 700-1516 -- Hearing the people's complaints : Kandahar to Kabul, 2001-2009 -- Nonkinetic targeting : Kabul, 2009 -- Vertically integrated criminal syndicates : Kabul, Garmisch, 2009-2010 -- Revolt against kleptocracy : the Arab spring : Morocco, Algeria, Tunisia, 2011 -- Variation 1: the (overlooked) military-kleptocratic complex : Egypt, ca. 2010 -- Variation 2: the bureaucratic kleptocracy : Tunisia, ca. 2010 -- Variation 3: the post-Soviet kleptocratic autocracy : Uzbekistan, ca. 2013 -- Variation 4: the resource kleptocracy : Nigeria, ca. 2014 -- Up a level : Afghanistan and Washington, June 2010-January 2011 -- Forging an appeal on Earth : The Netherlands, England, America, ca. 1560-1787 -- Violent extremists -- Remedies -- Self-reflection -- Appendix
- Control code
- 1591554
- Dimensions
- 25 cm
- Edition
- First edition.
- Extent
- x, 262 pages
- Isbn
- 9780393239461
- Lccn
- 2014031700
- Media category
- unmediated
- Media MARC source
- rdamedia
- Other physical details
- illustrations
- System control number
-
- (Sirsi) 1591554
- (OCoLC)880566167
- Label
- Thieves of state : why corruption threatens global security, Sarah Chayes
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- volume
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type MARC source
- rdacontent
- Contents
- "If I see somebody planting an IED..." : Afghanistan, 2009 -- "Lord King, how I wish that you were wise" : mirrors for princes, ca. 700-1516 -- Hearing the people's complaints : Kandahar to Kabul, 2001-2009 -- Nonkinetic targeting : Kabul, 2009 -- Vertically integrated criminal syndicates : Kabul, Garmisch, 2009-2010 -- Revolt against kleptocracy : the Arab spring : Morocco, Algeria, Tunisia, 2011 -- Variation 1: the (overlooked) military-kleptocratic complex : Egypt, ca. 2010 -- Variation 2: the bureaucratic kleptocracy : Tunisia, ca. 2010 -- Variation 3: the post-Soviet kleptocratic autocracy : Uzbekistan, ca. 2013 -- Variation 4: the resource kleptocracy : Nigeria, ca. 2014 -- Up a level : Afghanistan and Washington, June 2010-January 2011 -- Forging an appeal on Earth : The Netherlands, England, America, ca. 1560-1787 -- Violent extremists -- Remedies -- Self-reflection -- Appendix
- Control code
- 1591554
- Dimensions
- 25 cm
- Edition
- First edition.
- Extent
- x, 262 pages
- Isbn
- 9780393239461
- Lccn
- 2014031700
- Media category
- unmediated
- Media MARC source
- rdamedia
- Other physical details
- illustrations
- System control number
-
- (Sirsi) 1591554
- (OCoLC)880566167
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mhl.org/portal/Thieves-of-state--why-corruption-threatens/DpQI2U74M6I/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mhl.org/portal/Thieves-of-state--why-corruption-threatens/DpQI2U74M6I/">Thieves of state : why corruption threatens global security, Sarah Chayes</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mhl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.mhl.org/">Memorial Hall Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Thieves of state : why corruption threatens global security, Sarah Chayes
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mhl.org/portal/Thieves-of-state--why-corruption-threatens/DpQI2U74M6I/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mhl.org/portal/Thieves-of-state--why-corruption-threatens/DpQI2U74M6I/">Thieves of state : why corruption threatens global security, Sarah Chayes</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mhl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.mhl.org/">Memorial Hall Library</a></span></span></span></span></div>