Parker series

GPTKB entity

Statements (124)
Predicate Object
gptkbp:instance_of gptkb:book_series
gptkbp:adaptations gptkb:film_adaptations
gptkb:film
gptkbp:author gptkb:Donald_E._Westlake
gptkb:Richard_Stark
gptkbp:first_published gptkb:The_Hunter
gptkbp:genre gptkb:detective_fiction
https://www.w3.org/2000/01/rdf-schema#label Parker series
gptkbp:influenced heist genre
gptkbp:language English
gptkbp:main_character gptkb:Parker
gptkbp:narrative_style third-person
gptkbp:notable_work gptkb:The_Outfit
gptkb:The_Score
gptkb:Butcher's_Moon
Slayground
gptkbp:number_of_books gptkb:24
gptkbp:parker's_allies gptkb:crime
informants
accomplices
fellow thieves
gptkbp:parker's_motivation gptkb:survival
gptkb:independence
financial gain
gptkbp:parker's_motivations gptkb:revenge
gptkb:survival
money
gptkbp:parker's_nemesis police
rival criminals
betrayers
gptkbp:parker's_personality ruthless
gptkbp:parker's_profession gptkb:crime
gptkbp:parker's_relationships transactional
with law enforcement
antagonistic
with partners
often antagonistic
with criminals
limited trust
gptkbp:parker's_traits pragmatic
intelligent
cold
calculating
gptkbp:publication_year gptkb:1962
gptkbp:published_by gptkb:Gold_Medal_Books
gptkbp:setting various locations
gptkbp:target_audience adult readers
gptkbp:technique gptkb:political_negotiations
gptkb:teamwork
gptkb:deception
gptkb:mask
strategic planning
combat
stealth
violence
surveillance
strategic retreats
using technology
learning from failures
building trust
gathering intelligence
maintaining secrecy
creating distractions
manipulating others
planning heists
managing resources
creating opportunities
eliminating threats
using psychological tactics
gathering resources
double-crossing
conducting interviews
building networks
lock picking
assessing outcomes
exploiting weaknesses
using disguises
maintaining a low profile
using deception
planning logistics
using informants
timing actions
analyzing risks
using technology for surveillance
executing plans
understanding psychology
planning escapes
using aliases
using brute force
adapting to situations
creating alibis
escaping detection
evaluating rewards
executing heists
leveraging skills
negotiating deals
observing targets
planning contingencies
using charm
using intimidation
using resources
using violence
exploiting situations
hiding evidence
negotiating conflicts
planning diversions
understanding law enforcement
using firearms
using misdirection
using negotiation tactics
using social engineering
using technology for analysis
using technology for communication
using technology for deception
using technology for execution
using technology for logistics
using technology for planning
using technology for security
using technology for tracking
gptkbp:themes gptkb:betrayal
gptkb:greed
gptkb:revenge
gptkbp:bfsParent gptkb:The_Hunter
gptkbp:bfsLayer 4