Statements (124)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:book_series
|
gptkbp:adaptations |
gptkb:film_adaptations
gptkb:film |
gptkbp:author |
gptkb:Donald_E._Westlake
gptkb:Richard_Stark |
gptkbp:first_published |
gptkb:The_Hunter
|
gptkbp:genre |
gptkb:detective_fiction
|
https://www.w3.org/2000/01/rdf-schema#label |
Parker series
|
gptkbp:influenced |
heist genre
|
gptkbp:language |
English
|
gptkbp:main_character |
gptkb:Parker
|
gptkbp:narrative_style |
third-person
|
gptkbp:notable_work |
gptkb:The_Outfit
gptkb:The_Score gptkb:Butcher's_Moon Slayground |
gptkbp:number_of_books |
gptkb:24
|
gptkbp:parker's_allies |
gptkb:crime
informants accomplices fellow thieves |
gptkbp:parker's_motivation |
gptkb:survival
gptkb:independence financial gain |
gptkbp:parker's_motivations |
gptkb:revenge
gptkb:survival money |
gptkbp:parker's_nemesis |
police
rival criminals betrayers |
gptkbp:parker's_personality |
ruthless
|
gptkbp:parker's_profession |
gptkb:crime
|
gptkbp:parker's_relationships |
transactional
with law enforcement antagonistic with partners often antagonistic with criminals limited trust |
gptkbp:parker's_traits |
pragmatic
intelligent cold calculating |
gptkbp:publication_year |
gptkb:1962
|
gptkbp:published_by |
gptkb:Gold_Medal_Books
|
gptkbp:setting |
various locations
|
gptkbp:target_audience |
adult readers
|
gptkbp:technique |
gptkb:political_negotiations
gptkb:teamwork gptkb:deception gptkb:mask strategic planning combat stealth violence surveillance strategic retreats using technology learning from failures building trust gathering intelligence maintaining secrecy creating distractions manipulating others planning heists managing resources creating opportunities eliminating threats using psychological tactics gathering resources double-crossing conducting interviews building networks lock picking assessing outcomes exploiting weaknesses using disguises maintaining a low profile using deception planning logistics using informants timing actions analyzing risks using technology for surveillance executing plans understanding psychology planning escapes using aliases using brute force adapting to situations creating alibis escaping detection evaluating rewards executing heists leveraging skills negotiating deals observing targets planning contingencies using charm using intimidation using resources using violence exploiting situations hiding evidence negotiating conflicts planning diversions understanding law enforcement using firearms using misdirection using negotiation tactics using social engineering using technology for analysis using technology for communication using technology for deception using technology for execution using technology for logistics using technology for planning using technology for security using technology for tracking |
gptkbp:themes |
gptkb:betrayal
gptkb:greed gptkb:revenge |
gptkbp:bfsParent |
gptkb:The_Hunter
|
gptkbp:bfsLayer |
4
|