{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:05:36Z","timestamp":1725516336090},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692072"},{"type":"electronic","value":"9783540692096"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69209-6_13","type":"book-chapter","created":{"date-parts":[[2008,8,11]],"date-time":"2008-08-11T13:20:59Z","timestamp":1218460859000},"page":"227-247","source":"Crossref","is-referenced-by-count":1,"title":["A Data Miner\u2019s Approach to Country Corruption Analysis"],"prefix":"10.1007","author":[{"given":"Johan","family":"Huysmans","sequence":"first","affiliation":[]},{"given":"Bart","family":"Baesens","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Vanthienen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Alesina, A., Weder, B.: Do corrupt governments receive less foreign aid? National Bureau of Economic Research Working Paper 7108 (1999)","DOI":"10.3386\/w7108"},{"issue":"4","key":"13_CR2","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1109\/TSMCC.2004.843177","volume":"35","author":"A. Azcarraga","year":"2005","unstructured":"Azcarraga, A., Hsieh, M., Pan, S., Setiono, R.: Extracting salient dimensions for automatic SOM labeling. Transactions on Systems, Management and Cybernetics, Part C\u00a035(4), 595\u2013600 (2005)","journal-title":"Transactions on Systems, Management and Cybernetics, Part C"},{"issue":"6","key":"13_CR3","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1057\/palgrave.jors.2601545","volume":"54","author":"B. Baesens","year":"2003","unstructured":"Baesens, B., Van Gestel, T., Viaene, S., Stepanova, M., Suykens, J., Vanthienen, J.: Benchmarking state of the art classification algorithms for credit scoring. Journal of the Operational Research Society\u00a054(6), 627\u2013635 (2003)","journal-title":"Journal of the Operational Research Society"},{"issue":"4","key":"13_CR4","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1111\/j.1541-0072.2004.00077.x","volume":"32","author":"A. Bohara","year":"2004","unstructured":"Bohara, A., Mitchell, N., Mittendorff, C.: Compound democracy and the control of corruption: A cross-country investigation. The Policy Studies Journal\u00a032(4), 481\u2013499 (2004)","journal-title":"The Policy Studies Journal"},{"key":"13_CR5","unstructured":"Breiman, L., Friedman, J.H., Olsen, R.A., Stone, C.J.: Classification and Regression Trees. Wadsworth and Brooks (1984)"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"245","DOI":"10.2307\/253535","volume":"65","author":"P.L. Brockett","year":"1998","unstructured":"Brockett, P.L., Xia, X., Derrig, R.: Using Kohonen\u2019s self-organizing feature map to uncover automobile bodily injury claims fraud. International Journal of Risk and Insurance\u00a065, 245\u2013274 (1998)","journal-title":"International Journal of Risk and Insurance"},{"issue":"2","key":"13_CR7","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C.J.C. Burges","year":"1998","unstructured":"Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery\u00a02(2), 121\u2013167 (1998)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"13_CR8","unstructured":"CIA Factbook, retrieved from http:\/\/www.cia.gov\/cia\/publications\/factbook\/"},{"key":"13_CR9","unstructured":"De Brabanter, J.: LS-SVM Regression Modelling and its Applications. Ph.D. the-sis, Katholieke Universiteit Leuven, Faculty of Engineering (2004)"},{"key":"13_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-3913-3","volume-title":"Visual Explorations in Finance with Self Organizing maps","author":"G. Deboeck","year":"1998","unstructured":"Deboeck, G., Kohonen, T.: Visual Explorations in Finance with Self Organizing maps. Springer, Heidelberg (1998)"},{"key":"13_CR11","unstructured":"Freedom House, Freedom in the world country ratings (2005), retrieved from http:\/\/www.freedomhouse.org"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1017\/S0007123404000067","volume":"34","author":"J. Gerring","year":"2004","unstructured":"Gerring, J., Thacker, S.: Political institutions and corruption: The role of unitarism and parliamentarism. The British Journal of Political Science\u00a034, 295\u2013330 (2004)","journal-title":"The British Journal of Political Science"},{"key":"13_CR13","unstructured":"Honkela, T., Kaski, S., Lagus, K., Kohonen, T.: WEBSOM-Self-Organizing Maps of Document Collections. In: Proceedings of WSOM 1997, Workshop on Self-Organizing Maps, Espoo, Finland, Helsinki University of Technology, pp. 310\u2013315 (1997)"},{"key":"13_CR14","unstructured":"Karalic, A.: Linear regression in regression tree leaves. In: ISSEK 1992 (International School for Synthesis of Expert Knowledge), pp. 151\u2013163 (1992)"},{"key":"13_CR15","first-page":"267","volume-title":"Handbook of Data Mining and Knowledge Discovery","author":"R. Kohavi","year":"2002","unstructured":"Kohavi, R., Quinlan, J.R.: Decision-tree discovery. In: Klosgen, W., Zytkow, J. (eds.) Handbook of Data Mining and Knowledge Discovery, pp. 267\u2013276. Oxford University Press, Oxford (2002)"},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BF00337288","volume":"43","author":"T. Kohonen","year":"1982","unstructured":"Kohonen, T.: Self-organized formation of topologically correct feature maps. Biological Cybernetics\u00a043, 59\u201369 (1982)","journal-title":"Biological Cybernetics"},{"key":"13_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97610-0","volume-title":"Self-Organising Maps","author":"T. Kohonen","year":"1995","unstructured":"Kohonen, T.: Self-Organising Maps. Springer, Heidelberg (1995)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Lagus, K., Kaski, S.: Keyword selection method for characterizing text document maps. In: Proceedings of ICANN 1999, Ninth International Conference on Artificial Neural Networks, pp. 371\u2013376 (1999)","DOI":"10.1049\/cp:19991137"},{"key":"13_CR19","unstructured":"Lambsdorff, J.: Corruption in empirical research: a review. Transparency International Working paper (1999)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Leite, C., Weidmann, J.: Does mother nature corrupt? natural resources, corruption and economical growth. International Monetary Fund Working Paper 99\/85 (1999)","DOI":"10.5089\/9781451850734.001"},{"issue":"3","key":"13_CR21","doi-asserted-by":"publisher","first-page":"681","DOI":"10.2307\/2946696","volume":"110","author":"P. Mauro","year":"1995","unstructured":"Mauro, P.: Corruption and growth. The Quarterly Journal of Economics\u00a0110(3), 681\u2013712 (1995)","journal-title":"The Quarterly Journal of Economics"},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1017\/S0007123402000066","volume":"32","author":"G. Montinola","year":"2002","unstructured":"Montinola, G., Jackman, R.: Sources of corruption: a cross-country study. British Journal of Political Science\u00a032, 147\u2013170 (2002)","journal-title":"British Journal of Political Science"},{"key":"13_CR23","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/3-540-48912-6_31","volume-title":"Methodologies for Knowledge Discovery and Data Mining","author":"A. Rauber","year":"1999","unstructured":"Rauber, A., Merkl, D.: Automatic labeling of self-organizing maps: Making a treasure-map reveal its secrets. In: Zhong, N., Zhou, L. (eds.) PAKDD 1999. LNCS (LNAI), vol.\u00a01574, pp. 228\u2013237. Springer, Heidelberg (1999)"},{"key":"13_CR24","unstructured":"Seldadyo, H., de Haan, J.: The determinants of corruption: a literature survey and new evidence. In: EPCS 2006 Conference (2006)"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1023\/B:STCO.0000035301.49549.88","volume":"14","author":"A. Smola","year":"2004","unstructured":"Smola, A., Sch\u00f6lkopf, B.: A tutorial on support vector regression. Statistics and Computing\u00a014, 199\u2013222 (2004)","journal-title":"Statistics and Computing"},{"key":"13_CR26","doi-asserted-by":"crossref","DOI":"10.1142\/5089","volume-title":"Least Squares Support Vector Machines","author":"J. Suykens","year":"2002","unstructured":"Suykens, J., Van Gestel, T., De Brabanter, J., De Moor, B., Vandewalle, J.: Least Squares Support Vector Machines. World Scientific, Singapore (2002)"},{"key":"13_CR27","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/S0304-3878(00)00123-1","volume":"64","author":"A. Swamy","year":"2001","unstructured":"Swamy, A., Knack, S., Lee, Y., Azfar, O.: Gender and corruption. Journal of Development Economics\u00a064, 25\u201355 (2001)","journal-title":"Journal of Development Economics"},{"key":"13_CR28","unstructured":"Transparency International. Corruption Perceptions Index, retrieved from http:\/\/www.transparency.org\/"},{"issue":"3","key":"13_CR29","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/S0047-2727(99)00092-4","volume":"76","author":"D. Treisman","year":"2000","unstructured":"Treisman, D.: The causes of corruption: a cross-national study. Journal of Public Economics\u00a076(3), 339\u2013457 (2000)","journal-title":"Journal of Public Economics"},{"key":"13_CR30","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"V.N. Vapnik","year":"1995","unstructured":"Vapnik, V.N.: The nature of statistical learning theory. Springer, New York (1995)"},{"key":"13_CR31","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S1088-467X(99)00013-X","volume":"3","author":"J. Vesanto","year":"1999","unstructured":"Vesanto, J.: Som-based data visualization methods. Intelligent Data Analysis\u00a03, 111\u2013126 (1999)","journal-title":"Intelligent Data Analysis"},{"issue":"3","key":"13_CR32","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/72.846731","volume":"11","author":"J. Vesanto","year":"2000","unstructured":"Vesanto, J., Alhoniemi, E.: Clustering of the self-organizing map. IEEE Transactions on Neural Networks\u00a011(3), 586\u2013600 (2000)","journal-title":"IEEE Transactions on Neural Networks"}],"container-title":["Studies in Computational Intelligence","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69209-6_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:32:21Z","timestamp":1605763941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69209-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692072","9783540692096"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69209-6_13","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[]}}