WorldWideScience

Sample records for prevent future terrorist

  1. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  2. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  3. FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Bunchuk

    2017-11-01

    Full Text Available The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology. Within the scientific research, for the most effective approaches at the national level to prevent the threat of international terrorism, under the conditions of the deep internal political crisis and extremely difficult economic situation, in order to improve the efficiency of public administration in developing and implementing the anti-terrorism state policies in Ukraine, the paper analyses international and domestic regulations on preventing the terrorist financing, considers factors that affect the deterioration of the social and economic situation of the temporarily occupied parts of Donbas. Results of the research allow formulating the definition of financial instruments of antiterrorist policies, the paper develops and proposes a series of organizational measures in order to prevent the terrorist financing in Ukraine. Practical implications. Based on the above, we propose an option of classification of main illegal mechanisms that may be used to finance terrorist activities in the territories of Donetsk and Luhansk regions uncontrolled by Ukrainian authorities, dividing them into internal and external. Given the above studied factors and classification of financing of terrorist acts in eastern Ukraine, we can assume that for the purpose of evading duty payable to relevant state bodies of Ukraine, external supplies of inventories in the uncontrolled areas of the Donetsk region, which are later obtained by illegal armed groups, are possibly carried out as follows: on behalf of a commercial entity registered in a foreign country for the Ukrainian commercial entity, registered in settlements located in the uncontrolled territory; crossing of international transit traffic that moves through the

  4. Preventing Terrorist Bombings on United States Subway Systems

    Science.gov (United States)

    2006-09-01

    cleanup, and structural assessment.5 The economic impact of the attack would cost millions in repairs and lost revenue, and public trust would be...houses over a dozen restaurants and other businesses and serves as the “ basement level” for the major high-rise buildings in Philadelphia. An... Arabian Peninsula and Northern Africa, the “profiling appearance” is not a viable solution. As a result, prevention efforts must emphasize the

  5. Cooperative international arrangements: prevention of nuclear terrorism and the extradition and prosecution of terrorists

    International Nuclear Information System (INIS)

    Murphy, J.F.

    1987-01-01

    In considering the problems associated with prosecuting and punishing nuclear terrorists, it is noted that nuclear terrorism per se is not currently a crime under international law. To be sure, the Convention on the Physical Protection of Nuclear Material would probably cover any act of nuclear terrorism that involved nuclear material used for peaceful purposes. However, nuclear material used for military purposes or military nuclear reactors is outside the scope of the convention. US legislation implementing the convention goes beyond its terms in this respect and covers crimes involving nuclear material for nonpeaceful purposes if the offense is committed within US territorial, special maritime, special territorial, or special aircraft jurisdiction or if the offense is committed by nationals of the US. The author feels an effort should be made, under the auspices of the United Nations, to conclude a convention that would define nuclear terrorism, declare it a crime under international law, and obligate state parties to extradite or prosecute those who commit the crime. Such a convention would fill the large gap in the coverage of the Convention on the Physical Protection of Nuclear Material

  6. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  7. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  8. Profile of a Terrorist.

    Science.gov (United States)

    1988-04-01

    than those questions dealing with terrorists and their methods. Explosives are used routinely and plastique has entered the terrorist’s preferred...to handle. (12:23) The female Lebanese terrorist, May Mansin, easily concealed plastique in a body cavity and proceeded to blow a hole into the side

  9. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  10. Understanding Terrorist Ideology

    National Research Council Canada - National Science Library

    Cragin, Kim

    2007-01-01

    This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level...

  11. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  12. Australian Correctional Management Practices for Terrorist Prisoners

    Directory of Open Access Journals (Sweden)

    Nathan Tompson

    2018-03-01

    Full Text Available Management practices for incarcerated terrorists is an important counterterrorism policy consideration. Moreover, there is a misconception that once incarcerated, terrorists cease to be a risk. If correctional management regimes are implemented poorly, terrorist prisoners may be afforded the opportunity to remain active while incarcerated, including the recruitment of other prisoners, and the planning of future attacks. Equally, they may be viewed as role models or martyrs for sympathisers to aspire to. Despite the magnitude of the consequences, there is no agreed approach to managing Australian terrorist prisoners. As such, a dichotomy of dominant models has emerged; that is, to either segregate terrorist prisoners, or conversely, to disperse them throughout the wider prisoner population. Each strategy presents its own set of benefits and risks. This paper compares the management practices for terrorist prisoners in the states of New South Wales and Victoria to determine the strengths and vulnerabilities of each of these approaches. The paper concludes that policy-makers should consider reassessing current strategies. It suggests that a focus that extends the immediate containment considerations to encompass post-release factors would bring benefits for society.

  13. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  14. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  15. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  16. Combatting the Terrorist Threat.

    Science.gov (United States)

    1985-05-22

    have supplied many terrorist groups with plastique and other explosives to build bombs. 3 Using these explosives they have produced vehicle bombs which...deceptive, if not dangerously naive.1 5 State Supported Terrorism State supported terrorism is not a new concept , however, it has only recently been...terrorist incidents. The product of that study was the tri-level US anti- terrorism program concept . 3 The program structure is shown in Figure 11. President

  17. Molecular Cancer Prevention: Current Status & Future Directions

    Science.gov (United States)

    Maresso, Karen Colbert; Tsai, Kenneth Y.; Brown, Powel H.; Szabo, Eva; Lippman, Scott; Hawk, Ernest

    2016-01-01

    The heterogeneity and complexity of advanced cancers strongly supports the rationale for an enhanced focus on molecular prevention as a priority strategy to reduce the burden of cancer. Molecular prevention encompasses traditional chemopreventive agents as well as vaccinations and therapeutic approaches to cancer-predisposing conditions. Despite challenges to the field, we now have refined insights into cancer etiology and early pathogenesis; successful risk assessment and new risk models; agents with broad preventive efficacy (e.g., aspirin) in common chronic diseases, including cancer; and a successful track record of more than 10 agents approved by the FDA for the treatment of precancerous lesions or cancer risk reduction. The development of molecular preventive agents does not differ significantly from the development of therapies for advanced cancers, yet has unique challenges and special considerations given that it most often involves healthy or asymptomatic individuals. Agents, biomarkers, cohorts, overall design, and endpoints are key determinants of molecular preventive trials, as with therapeutic trials, although distinctions exist for each within the preventive setting. Progress in the development and evolution of molecular preventive agents has been steadier in some organ systems, such as breast and skin, than in others. In order for molecular prevention to be fully realized as an effective strategy, a number of challenges to the field must be addressed. Here we provide a brief overview of the context for and special considerations of molecular prevention along with a discussion of the results of major randomized controlled trials. PMID:26284997

  18. Future Directions in Preventing Child Abuse.

    Science.gov (United States)

    Krugman, Richard D.

    1995-01-01

    Efforts to prevent the abuse and neglect of children requires: professionals and citizens who care to make a difference; development of multidisciplinary units, teams, or organizations to deal with specific parts of the problem; a clear statement of child protection policy; programs that work; commitment to research and program evaluation; and a…

  19. Religious cover to terrorist movement

    International Nuclear Information System (INIS)

    Zaidi, M.K.

    2005-01-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  20. Religious cover to terrorist movement

    Energy Technology Data Exchange (ETDEWEB)

    Zaidi, M K [US Department of Energy, Idaho Radiological and Environmental Sciences Laboratory (RESL), Idaho Falls (United States)

    2005-07-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  1. On Deceiving Terrorists

    Science.gov (United States)

    2001-12-01

    developed. By way of contrast, the last two categories—theoretical works and doctrine—attempt to transcend the contextual limits of the first two... Busqueda , the Colombian National Police “Search Bloc,” which was tasked with apprehending Escobar (Bowden, 2001). Deceiving Terrorists Chain Network

  2. Future of obesity prevention and treatment.

    Science.gov (United States)

    Ness-Abramof, Rosane; Apovian, Caroline M

    2009-01-01

    The prevalence of obesity has risen sharply during the last 4 decades imposing a serious health burden to modern society. Obesity is known to cause and exacerbate many chronic diseases such as diabetes, hypertension, dyslipidemia, coronary heart disease, stroke, obstructive sleep apnea and certain cancers, among many others. The rise in obesity prevalence is mainly caused by overconsumption of energy, coupled to a sedentary life in susceptible individuals. Weight homeostasis is paramount for survival and its control is coordinated by neural and endocrine signals emanating from the fat tissue, digestive system and brain. During thousands of years humans were challenged by nutrient deprivation, developing an efficient mechanism to store energy. It explains the difficulty in losing weight, making obesity prevention the main effective health approach to halt the obesity epidemic.

  3. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  4. The Development of Decision Aids for Counter-Terrorist Applications

    Science.gov (United States)

    1980-12-01

    I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8

  5. Underfunding in Terrorist Organizations

    Science.gov (United States)

    Shapiro, Jacob N.; Siegel, David A.

    A review of international terrorist activity reveals a pattern of financially strapped operatives working for organizations that seem to have plenty of money. To explain this observation, and to examine when restricting terrorists’ funds will reduce their lethality, we model a hierarchical terror organization in which leaders delegate financial and logistical tasks to middlemen, but cannot perfectly monitor them for security reasons. These middlemen do not always share their leaders’ interests: the temptation exists to skim funds from financial transactions. When middlemen are sufficiently greedy and organizations suffer from sufficiently strong budget constraints, leaders will not fund attacks because the costs of skimming are too great. Using general functional forms, we find important nonlinearities in terrorists’ responses to government counter-terrorism. Restricting terrorists’ funds may be ineffective until a critical threshold is reached, at which point cooperation within terrorist organizations begins to break down and further government actions have a disproportionately large impact.

  6. Technology-based suicide prevention: current applications and future directions.

    Science.gov (United States)

    Luxton, David D; June, Jennifer D; Kinn, Julie T

    2011-01-01

    This review reports on current and emerging technologies for suicide prevention. Technology-based programs discussed include interactive educational and social networking Web sites, e-mail outreach, and programs that use mobile devices and texting. We describe innovative applications such as virtual worlds, gaming, and text analysis that are currently being developed and applied to suicide prevention and outreach programs. We also discuss the benefits and limitations of technology-based applications and discuss future directions for their use.

  7. Malevolent Creativity in Terrorist Organizations

    Science.gov (United States)

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  8. Saudi Arabia: Terrorist Financing Issues

    National Research Council Canada - National Science Library

    Blanchard, Christoper M; Prados, Alfred B

    2007-01-01

    According to the U.S. State Department 2007 International Narcotics Control Strategy Report, Saudi donors and unregulated charities have been a major source of financing to extremist and terrorist groups over the past 25 years...

  9. Investigating the Aftermath of Terror: Fundamental Outcomes, Methodological Choices, and Future Directions.

    Science.gov (United States)

    Gradus, Jaimie L; Marx, Brian P; Sloan, Denise M

    2016-06-01

    Acts of terrorism are becoming increasingly common throughout the world. These events represent a significant public health concern given the associated health consequences. Although it is clear that terrorist attacks have mental and physical health sequelae, the exact nature and prevalence of these consequences are unclear. Epidemiological research can play an important role in better understanding the mental and physical impact of terrorist attacks. In this editorial, we highlight recent epidemiological research on these terrorism-related health outcomes. We also provide suggestions for how future studies can build on the existing literature and describe ways in which epidemiological methods can be harnessed to extend the current literature. Lastly, we offer recommendations on how to best prepare communities for the aftermath of terrorist attacks, highlighting secondary intervention and prevention strategies. Overall, multilevel strategies are needed to adequately cope with the growing rise of terrorist acts, and these strategies will have to be reassessed as the nature of terrorist attacks changes.

  10. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  11. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  12. Game Theoretic Centrality Analysis of Terrorist Networks : The Cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2011-01-01

    The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist

  13. Training, SEVIS, and NSEERS: Will They Stop Terrorists from Entering the U.S

    National Research Council Canada - National Science Library

    Bugarin, Darwina S

    2007-01-01

    .... Stopping their entry is key to preventing attacks. The 9/11 Commission's Staff Report of the National Commission on Terrorist Attacks Upon the United States, 9/11 and Terrorist Travel, identified pre-9/11 gaps/weaknesses in U.S...

  14. Prevention of Rheumatic Diseases: Strategies, Caveats and Future Directions

    Science.gov (United States)

    Finckh, Axel

    2014-01-01

    Rheumatic diseases affect a significant portion of the population and lead to increased health care costs, disability and even premature mortality; as such, effective preventive measures for these diseases could lead to substantial improvements in public health. Importantly, established and emerging data from natural history studies show that for most rheumatic diseases there is a period of ‘preclinical’ disease development during which abnormal biomarkers or other processes can be detected. These changes are useful to understand mechanisms of disease pathogenesis; in addition, they may be applied to estimate a personal risk of future disease, while individuals are still relatively asymptomatic. Based on this, a hope is to implement effective screening and preventive approaches for some rheumatic diseases, perhaps in the near future. However, a key part of such approaches is a deep understanding of the mechanisms of disease development as well as evidence-based and effective screening and preventive interventions that incorporate disease biology as well as ethical and public health concerns. PMID:25437291

  15. Cyberbullying Prevention and Intervention Efforts: Current Knowledge and Future Directions

    Science.gov (United States)

    Hong, Jun Sung

    2016-01-01

    Bullying is a serious public health concern that is associated with significant negative mental, social, and physical outcomes. Technological advances have increased adolescents’ use of social media, and online communication platforms have exposed adolescents to another mode of bullying—cyberbullying. Prevention and intervention materials, from websites and tip sheets to classroom curriculum, have been developed to help youth, parents, and teachers address cyberbullying. While youth and parents are willing to disclose their experiences with bullying to their health care providers, these disclosures need to be taken seriously and handled in a caring manner. Health care providers need to include questions about bullying on intake forms to encourage these disclosures. The aim of this article is to examine the current status of cyberbullying prevention and intervention. Research support for several school-based intervention programs is summarised. Recommendations for future research are provided. PMID:28562094

  16. Cyberbullying Prevention and Intervention Efforts: Current Knowledge and Future Directions.

    Science.gov (United States)

    Espelage, Dorothy L; Hong, Jun Sung

    2017-06-01

    Bullying is a serious public health concern that is associated with significant negative mental, social, and physical outcomes. Technological advances have increased adolescents' use of social media, and online communication platforms have exposed adolescents to another mode of bullying- cyberbullying. Prevention and intervention materials, from websites and tip sheets to classroom curriculum, have been developed to help youth, parents, and teachers address cyberbullying. While youth and parents are willing to disclose their experiences with bullying to their health care providers, these disclosures need to be taken seriously and handled in a caring manner. Health care providers need to include questions about bullying on intake forms to encourage these disclosures. The aim of this article is to examine the current status of cyberbullying prevention and intervention. Research support for several school-based intervention programs is summarised. Recommendations for future research are provided.

  17. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  18. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    NARCIS (Netherlands)

    Farnham, N.T.; Liem, M.C.A.

    2017-01-01

    The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research.

  19. Primary prevention of diabetes mellitus: current strategies and future trends

    Directory of Open Access Journals (Sweden)

    Prasanta K. Bhattacharya

    2016-04-01

    Full Text Available Aim of this paper is to find evidence for primary prevention of type-2 diabetes mellitus (T2DM from epidemiological studies and clinical trials, and the feasibility of applying these interventions in resource limited countries. T2DM, which accounts for more than nine-tenths of all diabetics, results from inadequate insulin secretion or underlying insulin resistance. The prevalence of diabetes, mainly T2DM, has increased rapidly during the last few decades worldwide. Since the genetic background is unlikely to change during this short time period, the growing epidemic of T2DM is more likely due to changes in environmental or lifestyle risk factors including obesity, physical inactivity, smoking, alcohol and stress. The scope and feasibility for primary prevention of T2DM is based on elimination of these risk factors. This evidence that T2DM is preventable comes from epidemiologic studies and clinical trials of effect of lifestyle changes and drugs in development of T2DM. The positive effects are more profound and safer with lifestyle modifications (LSM compared to medications. This is shown to be effective globally, across various ethnicities and races and sustainable on long-term follow-up. However, there is a major challenge in translating this evidence into economically viable and sustained community programs, as these LSM interventions are expensive, even from western standards point of view. Future plan should focus on health education of the public, improving the national capacity to detect and manage the environmental risks including strategies to reduce stress, and development of innovative, cost effective, and scalable methodologies.

  20. Field note from Pakistan floods: Preventing future flood disasters

    Directory of Open Access Journals (Sweden)

    Marcus Oxley

    2011-04-01

    Full Text Available Unusually heavy monsoon rains in Northern Pakistan have caused disproportionate levels of extreme flooding and unprecedented flood losses across the entire Indus River basin. Extensive land use changes and environmental degradation in the uplands and lowlands of the river basin together with the construction of a “built environment” out of balance with the functioning, capacities, scale and limits of the local ecosystems have exposed millions of people to an increased risk of extreme #ooding. The catastrophic nature of the August #ooding provides a unique opportunity to fundamentally change Pakistan’s current socio-economic development path by incorporating disaster risk reduction and climate change measures into the post-disaster recovery process to rebuild a safer, more resilient nation. In January 2005 one hundred and sixty-eight nations adopted the Hyogo Framework for Action (HFA2005-2015 to bring about a “substantial reduction in disaster losses” by 2015. Despite this global initiative a series of major disasters, including the recent flooding in Pakistan, all indicate that we are not on track to achieve the substantial reduction of disaster losses. The following fieldnote considers what can be done to accelerate progress towards implementation of the Hyogo Framework, drawing on insights and lessons learnt from the August flooding to understand how Pakistan and neighbouring countries can prevent a repeat of such catastrophic disasters in future years.

  1. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  2. The Prevention of Blindness-Past, Present and Future

    Institute of Scientific and Technical Information of China (English)

    Akira; Nakajima

    1992-01-01

    Prevention of blindness is the most important aim of ophthalmology. Prevention of blindness is related to many factors. It is related to many factors, such as science and technology, economy and social behavior. There are worldwide activities by WHO, NGOs and other functions to promote the prevention of blindness in the world. More than 90% of blind population lives in developing world. Cataract is the top causes of blindness which is curable. Onchocerciasis is an endemic disease in west Africa and cent...

  3. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    Energy Technology Data Exchange (ETDEWEB)

    Ball, Ryan Jokl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly used by terrorists in asymmetric conflicts.

  4. The Decision Calculus of Terrorist Leaders

    OpenAIRE

    J. Tyson Chatagnier; Alex Mintz; Yair Samban

    2012-01-01

    This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizat...

  5. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  6. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  7. Once Is Enough: A Guide to Preventing Future Fractures

    Science.gov (United States)

    ... you should choose calcium supplements that are known brand names with proven reliability. Also, you will absorb ... mission of NIH ORBD~NRC is to expand awareness and enhance knowledge and understanding of the prevention, ...

  8. Future Research Opportunities in Peri-Prosthetic Joint Infection Prevention.

    Science.gov (United States)

    Berbari, Elie; Segreti, John; Parvizi, Javad; Berríos-Torres, Sandra I

    Peri-prosthetic joint infection (PJI) is a serious complication of prosthetic joint arthroplasty. A better understanding and reversal of modifiable risk factors may lead to a reduction in the incidence of incisional (superficial and deep) and organ/space (e.g., PJI) surgical site infections (SSI). Recently, the Centers for Disease Control and Prevention (CDC) and the Healthcare Infection Control Practices Advisory Committee (HICPAC) published the Guideline for Prevention of Surgical Site Infection. This targeted update applies evidence-based methodology in drafting recommendations for potential strategies to reduce the risk of SSI both across surgical procedures and specifically in prosthetic joint arthroplasty. A panel of PJI content experts identified nine PJI prevention research opportunities based on both evidence gaps identified through the guideline development process (transfusion, immunosuppressive therapy, anticoagulation, orthopedic space suit, and biofilm) and expert opinion (anesthesia, operative room environment, glycemic control, and Staphylococcus aureus nasal screening and decolonization. This article offers a road map for PJI prevention research.

  9. Defender's Edge: Utilizing Intelligent Agent Technology to Anticipate Terrorist Acts

    National Research Council Canada - National Science Library

    Scheiber, Lane

    2003-01-01

    ...), to the problem of anticipating terrorist acts. Two areas in which IAs could play a significant role are in the development and maintenance of a real-time picture of terrorist activity, and in predicting potential occurrences of terrorist acts...

  10. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  11. Human Papilloma Virus Vaccine: Future of Cervical Cancer Prevention

    Directory of Open Access Journals (Sweden)

    Jannatul Fardows

    2016-09-01

    Full Text Available Cervical cancer is a deadly cancer that clutches lives of the women in most of the cases due to lack of consciousness about the disease in the developing countries. It remains a threat which is second only to breast cancer in overall disease burden for women throughout the world. Cervical cancer is almost a preventable disease by prophylactic vaccine and routine screening. Both Cervarix and Gardasil vaccines have been effective in preventing persistent infection with targeted HPV types and in preventing cervical intraepithelial lesions. It is safe and nearly 100% effective if given before onset of sexual activity. This review article is aimed to explore different aspects of this vaccine as well as to develop awareness among health professionals of different disciplines.

  12. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  13. Creating Safe and Healthy Futures: Michigan Youth Violence Prevention Center

    Science.gov (United States)

    Morrel-Samuels, Susan; Zimmerman, Marc A.; Reischl, Thomas M.

    2013-01-01

    Youth are in the cross-fire of gun violence, and the highest rate in the nation is in Flint, Michigan. This article highlights six innovative strategies that prepare youth to solve problems at home and in their communities in peaceful ways. The Michigan Youth Violence Prevention Center (MI-YVPC) works with community groups to strengthen…

  14. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  15. Moderating effect of age on the association between future time perspective and preventive coping.

    Science.gov (United States)

    Chen, Tao; Liu, Lu-Lu; Cui, Ji-Fang; Chen, Xing-Jie; Shi, Hai-Song; Neumann, David L; Shum, David H K; Wang, Ya; Chan, Raymond C K

    2017-09-01

    The present study aimed to investigate the moderating effect of age on the relationship between future time perspective (FTP) and future-oriented coping. A total of 1,915 participants aged 9-84 years completed measures of FTP and future-oriented coping. Moderation analyses were conducted to examine whether age played a role in the association between FTP and future-oriented coping (proactive and preventive). Results showed that proactive and preventive coping were negatively correlated with age, and age moderated the association between FTP and preventive coping but not proactive coping. Furthermore, the strength of the positive association between FTP and preventive coping was strongest among the older participants, moderate among the middle-aged participants, and weakest among the younger participants. These results suggest that the association between FTP and preventive coping varies across the lifespan. © 2017 The Institute of Psychology, Chinese Academy of Sciences and John Wiley & Sons Australia, Ltd.

  16. Learning from Ebola Virus: How to Prevent Future Epidemics

    Directory of Open Access Journals (Sweden)

    Alexander S. Kekulé

    2015-07-01

    Full Text Available The recent Ebola virus disease (EVD epidemic in Guinea, Liberia and Sierra Leone demonstrated that the World Health Organization (WHO is incapable to control outbreaks of infectious diseases in less developed regions of the world. This essay analyses the causes for the failure of the international response and proposes four measures to improve resilience, early detection and response to future outbreaks of infectious diseases.

  17. Future trends in environmental mercury concentrations: implications for prevention strategies

    Directory of Open Access Journals (Sweden)

    Sunderland Elsie M

    2013-01-01

    Full Text Available Abstract In their new paper, Bellanger and coauthors show substantial economic impacts to the EU from neurocognitive impairment associated with methylmercury (MeHg exposures. The main source of MeHg exposure is seafood consumption, including many marine species harvested from the global oceans. Fish, birds and other wildlife are also susceptible to the impacts of MeHg and already exceed toxicological thresholds in vulnerable regions like the Arctic. Most future emissions scenarios project a growth or stabilization of anthropogenic mercury releases relative to present-day levels. At these emissions levels, inputs of mercury to ecosystems are expected to increase substantially in the future, in part due to growth in the legacy reservoirs of mercury in oceanic and terrestrial ecosystems. Seawater mercury concentration trajectories in areas such as the North Pacific Ocean that supply large quantities of marine fish to the global seafood market are projected to increase by more than 50% by 2050. Fish mercury levels and subsequent human and biological exposures are likely to also increase because production of MeHg in ocean ecosystems is driven by the supply of available inorganic mercury, among other factors. Analyses that only consider changes in primary anthropogenic emissions are likely to underestimate the severity of future deposition and concentration increases associated with growth in mercury reservoirs in the land and ocean. We therefore recommend that future policy analyses consider the fully coupled interactions among short and long-lived reservoirs of mercury in the atmosphere, ocean, and terrestrial ecosystems. Aggressive anthropogenic emission reductions are needed to reduce MeHg exposures and associated health impacts on humans and wildlife and protect the integrity of one of the last wild-food sources globally. In the near-term, public health advice on safe fish consumption choices such as smaller species, younger fish, and harvests

  18. The Future of Preschool Prevention, Assessment, and Intervention.

    Science.gov (United States)

    Hudziak, Jim; Archangeli, Christopher

    2017-07-01

    Preschoolers are in the most rapid period of brain development. Environment shapes the structure and function of the developing brain. Promoting brain health requires cultivation of healthy environments at home, school, and in the community. This improves the emotional-behavioral and physical health of all children, can prevent problems in children at risk, and can alter the trajectory of children already suffering. For clinicians, this starts with assessing and treating the entire family, equipping parents with the principles of parent management training, and incorporating wellness prescriptions for nutrition, physical activity, music, and mindfulness. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. The future of digital games for HIV prevention and care.

    Science.gov (United States)

    Hightow-Weidman, Lisa B; Muessig, Kathryn E; Bauermeister, José A; LeGrand, Sara; Fiellin, Lynn E

    2017-09-01

    Although there has been a significant increase in mHealth interventions addressing the HIV prevention and care continuum, interventions using game mechanics have been less explored. Digital games are rapidly becoming an important tool for improving health behaviors and supporting the delivery of care and education. The purpose of this review is to provide a historical context for the use of gamification and videogames (including those using virtual reality) used in technology-based HIV interventions and to review new research in the field. A review of recently published (1 January 2016-31 March 2017) or presented abstracts (2016) identified a paucity of technology-based interventions that included gamification elements or any terms associated with videogames or gameplay. A larger portfolio of digital gaming interventions is in the pipeline. Use of digital games that include elements of gamification or consist of standalone videogames or virtual-reality-based games, represent a promising intervention strategy to address the HIV prevention and care continuum, especially among youth. Our review demonstrates that there is significant room for growth in this area in designing, developing, testing and most importantly, implementation and dissemination these novel interventions.

  20. Future threats to biodiversity and pathways to their prevention.

    Science.gov (United States)

    Tilman, David; Clark, Michael; Williams, David R; Kimmel, Kaitlin; Polasky, Stephen; Packer, Craig

    2017-05-31

    Tens of thousands of species are threatened with extinction as a result of human activities. Here we explore how the extinction risks of terrestrial mammals and birds might change in the next 50 years. Future population growth and economic development are forecasted to impose unprecedented levels of extinction risk on many more species worldwide, especially the large mammals of tropical Africa, Asia and South America. Yet these threats are not inevitable. Proactive international efforts to increase crop yields, minimize land clearing and habitat fragmentation, and protect natural lands could increase food security in developing nations and preserve much of Earth's remaining biodiversity.

  1. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  2. Predicting and preventing the future: actively managing multiple sclerosis.

    LENUS (Irish Health Repository)

    Hutchinson, Michael

    2012-02-01

    Relapsing-remitting multiple sclerosis (MS) has a highly variable clinical course but a number of demographic, clinical and MRI features can guide the clinician in the assessment of disease activity and likely disability outcome. It is also clear that the inflammatory activity in the first five years of relapsing-remitting MS results in the neurodegenerative changes seen in secondary progressive MS 10-15 years later. While conventional first-line disease modifying therapy has an effect on relapses, about one third of patients have a suboptimal response to treatment. With the advent of highly active second-line therapies with their evident marked suppression of inflammation, the clinician now has the tools to manage the course of relapsing-remitting MS more effectively. The development of treatment optimisation recommendations based on the clinical response to first-line therapies can guide the neurologist in more active management of the early course of relapsing-remitting MS, with the aim of preventing both acute inflammatory axonal injury and the neurodegenerative process which leads to secondary progressive MS.

  3. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  4. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  5. PROSECUTING SOMALIA PIRATES AS TERRORISTS

    Directory of Open Access Journals (Sweden)

    ODHIAMBO E.O.S., ONKWARE K., KASSILLY J., NTABO O. M.

    2011-01-01

    Full Text Available This article starts from the assumption that piracy resembles terrorism in many aspects and attempts to support it through both a theoretical investigation and practical examples. The argument it makes is that Somali pirates should be prosecuted as terrorists. Moreover, it emphasizes the idea that for Somalia’s neighboring countries and not only the implementation of such an approach consists in resorting to the antiterrorist conventions already in place. Thus, for example, Kenya Navy as a piracyfi ghting agency should rely on these conventions to justify the capture and prosecution of pirates in Kenyan courts. In this respect, we emphasize the idea that only by resorting to an established international legal framework can Kenya identify the tools to counter pirates’ actions within legal limits. Moreover, this should be paralleled by efforts towards rebuilding Somalia and its institutions if long-term solutions are to be envisaged in the eradication of piracy in the Indian Ocean. In conclusion, the article looks at the concepts of piracy, terrorism and development in the Horn of Africa, suggests that piracy is a form of Terrorism and, makes a series of recommendations.

  6. Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control Accidents

    Science.gov (United States)

    Belcastro, Christine M.; Jacobson, Steven r.

    2010-01-01

    Loss of control remains one of the largest contributors to aircraft fatal accidents worldwide. Aircraft loss-of-control accidents are highly complex in that they can result from numerous causal and contributing factors acting alone or (more often) in combination. Hence, there is no single intervention strategy to prevent these accidents. This paper presents future system concepts and research directions for preventing aircraft loss-of-control accidents.

  7. Intelligence Constraints on Terrorist Network Plots

    Science.gov (United States)

    Woo, Gordon

    Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.

  8. Terrorist Financing: The 9/11 Commission Recommendation

    National Research Council Canada - National Science Library

    Weiss, Martin A

    2005-01-01

    .... The Commission recommended that the U.S. government shift the focus of its efforts to counter terrorist financing from a strategy based on seizing terrorist assets to a strategy based on exploiting intelligence gathered from financial investigations...

  9. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ...) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially designated terrorist. (a) The term specially designated terrorist means: (1...

  10. Immigration: Terrorist Grounds for Exclusion and Removal Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2008-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  11. Immigration: Terrorist Grounds for Exclusion and Removal of Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2007-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  12. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS General Definitions § 597.309 Foreign terrorist organization. The term foreign terrorist... respect to which the Secretary of State has notified Congress of the intention to designate as a foreign...

  13. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  14. Future Directions in Etiologic, Prevention, and Treatment Research for Eating Disorders

    Science.gov (United States)

    Stice, Eric; South, Kelsey; Shaw, Heather

    2012-01-01

    Significant advances have occurred regarding the understanding of etiologic processes that give rise to eating disorders and the design and evaluation of efficacious prevention programs and treatment interventions. Herein we offer suggestions regarding potentially fruitful directions for future research in these areas. We suggest it would be…

  15. Real Time Big Data Analytics for Predicting Terrorist Incidents

    Science.gov (United States)

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  16. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...

  17. Combatting Commercial Terrorists: The PKK Case

    Science.gov (United States)

    2015-12-01

    Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist

  18. Injury and violence prevention policy: celebrating our successes, protecting our future.

    Science.gov (United States)

    Koné, Rebecca Greco; Zurick, Elizabeth; Patterson, Sara; Peeples, Amy

    2012-09-01

    Policy strategies for injury and violence prevention influence systems development, organizational change, social norms, and individual behavior to improve the health and safety of a population. Injury and violence prevention professionals should consider how their issues resonate with various audiences, including policy makers, the public, and other decision makers. As the cost of healthcare continues to rise and greater demands are placed on the healthcare system, the use of public health policy becomes increasingly critical to protect the public's health and prevent injury and violence and its related morbidities and disabilities (Degutis, 2011). This article highlights some impactful policy successes from the field, allows us to reflect on the Injury Center's 20th anniversary, and describes steps to address injuries and violence into the future. The purpose of this paper is to discuss policy as a public health strategy and the critical role it plays in injury and violence prevention. Published by Elsevier Ltd.

  19. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this

  20. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  1. Considering treatment of male genital schistosomiasis as a tool for future HIV prevention

    DEFF Research Database (Denmark)

    Stecher, Chalotte Willemann; Kallestrup, Per; Kjetland, Eyrun Floerecke

    2015-01-01

    OBJECTIVES: Male genital schistosomiasis (MGS) is a neglected manifestation of Schistosoma haematobium infection with ignored implications on reproductive health and a differential diagnosis to sexually transmitted infections in endemic regions. MGS may have associations with HIV transmission...... and acquisition, and treatment could be a neglected chance of HIV prevention. This review summarizes current knowledge on epidemiology, clinical manifestations, diagnosis and treatment of MGS as a hypothesized risk factor for HIV transmission. Future research areas of global interest are suggested. METHODS: Pub...... association between MGS and HIV are urgently needed. Furthermore, field diagnostic tools should be developed and future mass treatment programs should include adults to reduce morbidity and prevent HIV acquisition. SYSTEMATIC REVIEW REGISTRATION NUMBER: CRD42015016252....

  2. Fall Prediction and Prevention Systems: Recent Trends, Challenges, and Future Research Directions

    Directory of Open Access Journals (Sweden)

    Ramesh Rajagopalan

    2017-11-01

    Full Text Available Fall prediction is a multifaceted problem that involves complex interactions between physiological, behavioral, and environmental factors. Existing fall detection and prediction systems mainly focus on physiological factors such as gait, vision, and cognition, and do not address the multifactorial nature of falls. In addition, these systems lack efficient user interfaces and feedback for preventing future falls. Recent advances in internet of things (IoT and mobile technologies offer ample opportunities for integrating contextual information about patient behavior and environment along with physiological health data for predicting falls. This article reviews the state-of-the-art in fall detection and prediction systems. It also describes the challenges, limitations, and future directions in the design and implementation of effective fall prediction and prevention systems.

  3. Fall Prediction and Prevention Systems: Recent Trends, Challenges, and Future Research Directions.

    Science.gov (United States)

    Rajagopalan, Ramesh; Litvan, Irene; Jung, Tzyy-Ping

    2017-11-01

    Fall prediction is a multifaceted problem that involves complex interactions between physiological, behavioral, and environmental factors. Existing fall detection and prediction systems mainly focus on physiological factors such as gait, vision, and cognition, and do not address the multifactorial nature of falls. In addition, these systems lack efficient user interfaces and feedback for preventing future falls. Recent advances in internet of things (IoT) and mobile technologies offer ample opportunities for integrating contextual information about patient behavior and environment along with physiological health data for predicting falls. This article reviews the state-of-the-art in fall detection and prediction systems. It also describes the challenges, limitations, and future directions in the design and implementation of effective fall prediction and prevention systems.

  4. The future workforce in cancer prevention: advancing discovery, research, and technology.

    Science.gov (United States)

    Newhauser, Wayne D; Scheurer, Michael E; Faupel-Badger, Jessica M; Clague, Jessica; Weitzel, Jeffrey; Woods, Kendra V

    2012-05-01

    As part of a 2-day conference on October 15 and 16, 2009, a nine-member task force composed of scientists, clinicians, educators, administrators, and students from across the USA was formed to discuss research, discovery, and technology obstacles to progress in cancer prevention and control, specifically those related to the cancer prevention workforce. This article summarizes the task force's findings on the current state of the cancer prevention workforce in this area and its needs for the future. The task force identified two types of barriers impeding the current cancer prevention workforce in research, discovery, and technology from reaching its fullest potential: (1) limited cross-disciplinary research opportunities with underutilization of some disciplines is hampering discovery and research in cancer prevention, and (2) new research avenues are not being investigated because technology development and implementation are lagging. Examples of impediments and desired outcomes are provided in each of these areas. Recommended solutions to these problems are based on the goals of enhancing the current cancer prevention workforce and accelerating the pace of discovery and clinical translation.

  5. Gene–Environment Interactions in Preventive Medicine: Current Status and Expectations for the Future

    Directory of Open Access Journals (Sweden)

    Hiroto Narimatsu

    2017-01-01

    Full Text Available The progression of many common disorders involves a complex interplay of multiple factors, including numerous different genes and environmental factors. Gene–environmental cohort studies focus on the identification of risk factors that cannot be discovered by conventional epidemiological methodologies. Such epidemiological methodologies preclude precise predictions, because the exact risk factors can be revealed only after detailed analyses of the interactions among multiple factors, that is, between genes and environmental factors. To date, these cohort studies have reported some promising results. However, the findings do not yet have sufficient clinical significance for the development of precise, personalized preventive medicine. Especially, some promising preliminary studies have been conducted in terms of the prevention of obesity. Large-scale validation studies of those preliminary studies, using a prospective cohort design and long follow-ups, will produce useful and practical evidence for the development of preventive medicine in the future.

  6. Defense against terroristic hazards and risk by building planning law; Abwehr terroristischer Gefahren und Risiken durch Bauplanungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Richard

    2012-07-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  7. When Do Governments Concede to Terrorists

    Science.gov (United States)

    2014-06-01

    crisis, 146 people were taken hostage by the terrorist group Tupac Amaru (MRTA) at the Japanese Embassy in Peru . Six of those were American...hispanic_heritage/article-9475994 FARC-EP. (2009). Chronology of resistance: FARC-EP, a history of struggle. Retrieved from http://resistencia- colombia.org...index.php?option=com_content&view=article&id=463: chronology - of-resistance-farc-ep-a-history-of-struggle&catid=50&Itemid=85 Gladwell, M. (2000). The

  8. Will it ever be possible to profile the terrorist?

    OpenAIRE

    Rae, Jonathan A.

    2012-01-01

    This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise th...

  9. Putting the Barker Theory into the Future: Time to Act on Preventing Pediatric Obesity.

    Science.gov (United States)

    Pietrobelli, Angelo; Agosti, Massimo; Zuccotti, Gianvincenzo

    2016-11-17

    Growth and development are key characteristics of childhood and sensitive markers of health and adequate nutrition. The first 1000 days of life-conception through 24 months of age-represent a fundamental period for development and thus the prevention of childhood obesity and its adverse consequences is mandatory. There are many growth drivers during this complex phase of life, such as nutrition, genetic and epigenetic factors, and hormonal regulation. The challenge thus involves maximizing the potential for normal growth without increasing the risk of associated disorders. The Mediterranean Nutrition Group (MeNu Group), a group of researchers of the Mediterranean Region, in this Special Issue titled "Prevent Obesity in the First 1000 Days", presented results that advanced the science of obesity risk factors in early life, coming both from animal model studies and studies in humans. In the future, early-life intervention designs for the prevention of pediatric obesity will need to look at different strategies, and the MeNu Group is available for guidance regarding an appropriate conceptual framework to accomplish either prevention or treatment strategies to tackle pediatric obesity.

  10. Putting the Barker Theory into the Future: Time to Act on Preventing Pediatric Obesity

    Directory of Open Access Journals (Sweden)

    Angelo Pietrobelli

    2016-11-01

    Full Text Available Growth and development are key characteristics of childhood and sensitive markers of health and adequate nutrition. The first 1000 days of life—conception through 24 months of age—represent a fundamental period for development and thus the prevention of childhood obesity and its adverse consequences is mandatory. There are many growth drivers during this complex phase of life, such as nutrition, genetic and epigenetic factors, and hormonal regulation. The challenge thus involves maximizing the potential for normal growth without increasing the risk of associated disorders. The Mediterranean Nutrition Group (MeNu Group, a group of researchers of the Mediterranean Region, in this Special Issue titled “Prevent Obesity in the First 1000 Days”, presented results that advanced the science of obesity risk factors in early life, coming both from animal model studies and studies in humans. In the future, early-life intervention designs for the prevention of pediatric obesity will need to look at different strategies, and the MeNu Group is available for guidance regarding an appropriate conceptual framework to accomplish either prevention or treatment strategies to tackle pediatric obesity.

  11. The role of infant nutrition in the prevention of future disease

    Directory of Open Access Journals (Sweden)

    Ron eShaoul

    2014-07-01

    Full Text Available There is growing evidence that nutrition is part of the environmental factors affecting the incidence of various diseases. The effect starts in the prenatal life and affects fetal growth and continues in early life and throughout childhood. The effect has been shown on various disease states such as allergic diseases, hyperlipidemia and cardiovascular diseases, obesity, type II diabetes and metabolic syndrome and immunologic diseases such as celiac disease and type 1 diabetes mellitus. It seems that the recommendations of exclusive breastfeeding until the age of 4 months and subsequently exposure to various solid foods has beneficial effect in terms of allergic, immune and cardiovascular diseases prevention. Will these recommendations change the natural course of these diseases is unknown yet, but there is an accumulating evidence that indeed this is the case. In this review we review the evidence of early nutritional intervention and future disease prevention.

  12. [Institutional changes for the future of Hygiene and Preventive Medicine in Italy].

    Science.gov (United States)

    Faggioli, Antonio

    2011-01-01

    Following a brief overview of the initiatives undertaken since 2005 by the Italian Society of Hygiene (SitI) regarding he future of Hygiene and Public Health in Italy, the authors examine the latest proposals for renewing the organizational structure of the departments of Prevention, as well as for training programs and function of public health physicians. These changes, however, may be insufficient for a real renewal of public health, in the absence of institutional changes which would allocate administrative management of healthcare functions to local government, with community participation in health promotion. The planned establishment of "metropolitan cities" in 2012 is an opportunity for the SItI to show that the management of health administrative functions by the new local government organs is compatible with the institutional framework, is useful for achieving the objectives of health promotion and disease prevention, and facilitates health policy in local governments.

  13. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  14. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  15. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    .... Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to develop new computer skills, or develop alliances with criminal...

  16. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  17. Combating nuclear terrorism in India: preventive nuclear forensic perspectives

    International Nuclear Information System (INIS)

    Raghav, N.K.; Lad, J.S.; Deshmukh, A.V.; Jagtap, S.S.

    2014-01-01

    Nuclear terrorism is constant threat to India by many terrorist organization and neighboring country. These organizations are directly or indirectly aided with nuclear material by terrorism supporting country. Such organization has a significant potential source for acquiring nuclear and other radioactive material. Possibility of leakage is widely feared because of the deteriorating law and order condition, great spur of nuclear proliferation after the cold war and disintegration of USSR. Terrorist could gain access to Nuclear and radioactive material and smuggle to India through porous borders. Preventive forensic approach in screening and searching nuclear and radioactive material will play cardinal role to prevent nuclear disaster happening in India. Future plans could be extracted from terrorists through their narco-tests, brain fingerprinting and a data base on this could be prepared, which could later be used to help prevent any attacks. In present paper authors strongly recommend setting up Preventive Forensic Units in India so that any internal or external nuclear attack could be aborted. (author)

  18. Male circumcision and HIV prevention: current knowledge and future research directions.

    Science.gov (United States)

    Bailey, R C; Plummer, F A; Moses, S

    2001-11-01

    Over the past decade, numerous epidemiological studies have reported a significant association between lack of male circumcision and risk for HIV infection, leading to recommendations for male circumcision to be added to the armamentarium of effective HIV prevention strategies. We review the epidemiological data from studies that have investigated this association, including ecological, cross-sectional/case-control, and prospective studies. We discuss problematic issues in interpreting the epidemiological data, including the presence of other sexually transmitted infections, age of circumcision, and potential confounders such as religion, cultural practices, and genital hygiene. In addition, we review studies of biological mechanisms by which the presence of the foreskin may increase HIV susceptibility, data on risks associated with the circumcision procedure, and available data on the acceptability and feasibility of introducing male circumcision in societies where it is traditionally not practised. Although the evidence in support of male circumcision as an effective HIV prevention measure is compelling, residual confounding in observational studies cannot be excluded. Taken together with concerns over the potential disinhibiting effect of male circumcision on risk behaviour, and safety of the circumcision procedure, randomised trials of male circumcision to prevent HIV infection are recommended. An individual's choice to undergo male circumcision or a community's decision to promote the practice should be made in the light of the best available scientific evidence. More knowledge is required to assist individuals and communities in making those decisions. We conclude with recommendations for future research.

  19. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    International Nuclear Information System (INIS)

    Shin, Hyeongki; Kim, Juyoul

    2007-01-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity

  20. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hyeongki [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, Juyoul [Seoul National University, Seoul (Korea, Republic of)

    2007-07-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity.

  1. How far can we prevent further physical soil degradation in the future?

    Science.gov (United States)

    Horn, Rainer

    2017-04-01

    .g. fodder production and harvesting, adequate animal grazing), - wind is furthermore minimized by adequate hedgerow plantations, continuous cover crop growth, optimized particle bindings by water, infiltrating organic acids, appropriate grazing intensity. Agroforestry can be considered as an additional positive measure to reduce soil erosion risks generally and to ameliorate degraded sites. C) -plant cover on slopes remains untouched, overgrazing and consecutive soil homogenization especially under moist climatic conditions must be prevented but adjusted to the actual structure stability of the hillsides. The communication of these findings followed by application of such measures can help farmers and foresters as well as landowners to prevent (further) physical soil degradation in the future.

  2. Personality and Fear of Terrorist attacks in Ghana: The mediating ...

    African Journals Online (AJOL)

    The study aimed at determining whether or not neuroticism would account for more variance in predicting risk perception and fear of terrorist attack in Ghana compared to conscientiousness. Moreover, it sought to examine the mediating effect of risk perception on the relationship between neuroticism and fear of terrorist ...

  3. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    Science.gov (United States)

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  4. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  5. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a

  6. Terror i tvillingtårnene – dystopi og ironi? 9/11 i Darlah og En terrorist i senga

    Directory of Open Access Journals (Sweden)

    Lersbryggen Mørk, Kjersti

    2011-03-01

    Full Text Available Terror in the Twin Towers – dystopia and irony? 9/11 in Darlah and En terrorist i senga. Through globalization of our media society, children as well as adults are endlessly exposed to information and images from all over the world. In Norway, signs of the terrorist attack on the Twin Towers in USA on September 11th 2001 are now to be found in literature for children and young adults. With globalization theory and post-colonial theory I will examine how two novels present global challenges in general and 9/11 in particular. What does globalization mean for the construction of identity? Who are “we”, and who are “the others”? The novel for young adults, Darlah – 172 timer på månen [Darlah – 172 hours on the moon] (2008 by Johan Harstad, is a dystopia where 9/11 points forward to a full scale catastrophe for humanity. En terrorist i senga [There's a terrorist in my bed] (2008, a novel for children by Endre Lund Eriksen, makes explicit references to 9/11 – but with playfulness and ironic revelation of xenophobia. Both books use aliens from outer space as “the other”, but where Darlah presents a pessimistic view of our global future, En terrorist i senga is optimistic on behalf of the humankind.

  7. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  8. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  9. Categorizing terrorist entities listed by the European Union according to terrorist groups’ underlying motives

    Directory of Open Access Journals (Sweden)

    Liane Rothenberger

    2015-10-01

    Full Text Available States and international organizations have compiled lists of a great variety of terrorist groups. The current European Union list includes 44 entities. This study analyzes the underlying motives of the terrorist organizations named in this list. In order to understand the groups’ motivations and consequently be able to advise on methods of countering them with communication strategies, we employ a three-item typology provided by Waldmann (2001. The results show that only five of the 44 groups were religiously motivated to commit terrorism. Most of the groups (n=20 had nationalist-separatist motives, and 19 groups displayed social-revolutionary motives. Based on the respective motives, differing counter-terrorism strategies are proposed, e.g., developing rhetorical counter-narratives that address and reduce the groups’ motivational and identity-generating characteristics.

  10. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  11. Terrorists on Trial: A Performative Perspective

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-03-01

    Full Text Available On 30 March 2011, ICCT organised an Expert Meeting entitled “Terrorism Trials as Theatre: A Performative Perspective”. The Expert Meeting applied a performative perspective to three well known and recent trials in different parts of the world: the trials against the Dutch Hofstad Group, the Mumbai 2008 Terrorist Attack Trial and the Guantanamo Military Tribunals. As such, the Expert Meeting did not concentrate solely on the immediate judicial performance of the magistrates and/or the defence; instead, the trials were put in their wider sociological context, adopting notions of social drama and communication sciences. This Expert Meeting Paper is a further adaptation of the Discussion Paper that was used as basis for debate during the Meeting.

  12. Conceptualizing Terrorist Violence and Suicide Bombing

    Directory of Open Access Journals (Sweden)

    Murad Ismayilov

    2010-01-01

    Full Text Available This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts to address the question of whether suicide terrorism represents a "coherent phenomenon," and whether there is, or may be, a generalized pattern which could account for all possible causes of martyrdom operations.

  13. Near-space airships against terrorist activities

    Science.gov (United States)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  14. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  15. Adolescent Cellphone Use While Driving: An Overview of the Literature and Promising Future Directions for Prevention

    Directory of Open Access Journals (Sweden)

    M. Kit Delgado

    2016-06-01

    Full Text Available Motor vehicle crashes are the leading cause of death in adolescents, and drivers aged 16–19 are the most likely to die in distracted driving crashes. This paper provides an overview of the literature on adolescent cellphone use while driving, focusing on the crash risk, incidence, risk factors for engagement, and the effectiveness of current mitigation strategies. We conclude by discussing promising future approaches to prevent crashes related to cellphone use in adolescents. Handheld manipulation of the phone while driving has been shown to have a 3 to 4-fold increased risk of a near crash or crash, and eye glance duration greater than 2 seconds increases crash risk exponentially. Nearly half of U.S. high school students admit to texting while driving in the last month, but the frequency of use according to vehicle speed and high-risk situations remains unknown. Several risk factors are associated with cell phone use while driving including: parental cellphone use while driving, social norms for quick responses to text messages, and higher levels of temporal discounting. Given the limited effectiveness of current mitigation strategies such as educational campaigns and legal bans, a multi-pronged behavioral and technological approach addressing the above risk factors will be necessary to reduce this dangerous behavior in adolescents.

  16. Adolescent Cellphone Use While Driving: An Overview of the Literature and Promising Future Directions for Prevention

    Science.gov (United States)

    Delgado, M. Kit; Wanner, Kathryn J.; McDonald, Catherine

    2016-01-01

    Motor vehicle crashes are the leading cause of death in adolescents, and drivers aged 16–19 are the most likely to die in distracted driving crashes. This paper provides an overview of the literature on adolescent cellphone use while driving, focusing on the crash risk, incidence, risk factors for engagement, and the effectiveness of current mitigation strategies. We conclude by discussing promising future approaches to prevent crashes related to cellphone use in adolescents. Handheld manipulation of the phone while driving has been shown to have a 3 to 4-fold increased risk of a near crash or crash, and eye glance duration greater than 2 seconds increases crash risk exponentially. Nearly half of U.S. high school students admit to texting while driving in the last month, but the frequency of use according to vehicle speed and high-risk situations remains unknown. Several risk factors are associated with cell phone use while driving including: parental cellphone use while driving, social norms for quick responses to text messages, and higher levels of temporal discounting. Given the limited effectiveness of current mitigation strategies such as educational campaigns and legal bans, a multi-pronged behavioral and technological approach addressing the above risk factors will be necessary to reduce this dangerous behavior in adolescents. PMID:27695663

  17. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  18. Survival of the Fittest: Why Terrorist Groups Endure

    Directory of Open Access Journals (Sweden)

    Joseph K. Young

    2014-04-01

    Full Text Available Why do terrorist groups endure? This question is relevant to scholars and policy makers alike. In the past, this issue was not been addressed in a systematic fashion. Recent work investigates this question using data on transnational groups and finds that factors associated with the home country can influence the duration the group endures. Applying the theory of outbidding to terrorist group survival, we argue that strategic competition among groups predicts group duration. Using the Global Terrorism Database, we develop a dataset using the terrorist group as the unit of analysis to model the duration of group activity and thus include the largest sample of groups yet. Controlling for previous explanations of both group duration and terrorism, we find a robust effect for the impact that group competition has on terrorist group survival.

  19. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  20. Suits Against Terrorist States by Victims of Terrorism

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2008-01-01

    ... assets to satisfy judgments. After a court ruled that Congress never created a cause of action against terrorist States themselves, but only against their officials, employees, and agents, plaintiffs have based claims on state law...

  1. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    ... organizations and consider attempting a cyberattack against the critical infrastructure. Cybercrime increased dramatically between 2004 and 2005, and several recent terrorist events appear to have been funded partially through online credit card fraud...

  2. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group...

  3. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group...

  4. Role of oral pre-exposure prophylaxis (PrEP) in current and future HIV prevention strategies.

    Science.gov (United States)

    Burns, David N; Grossman, Cynthia; Turpin, Jim; Elharrar, Vanessa; Veronese, Fulvia

    2014-12-01

    Treatment as prevention is expected to have a major role in reducing HIV incidence, but other prevention interventions will also be required to bring the epidemic under control, particularly among key populations. One or more forms of pre-exposure prophylaxis (PrEP) will likely play a critical role. Oral PrEP with emtricitabine-tenofovir (Truvada®) is currently available in the US and some other countries, but uptake has been slow. We review the concerns that have contributed to this slow uptake and discuss current and future research in this critical area of HIV prevention research.

  5. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  6. Closing the gap : measuring the social identity of terrorists

    OpenAIRE

    Ludwick, Keith W.

    2008-01-01

    CHDS State/Local Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to...

  7. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  8. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  9. NCIPC's contribution to global injury and violence prevention: past, present, and future.

    Science.gov (United States)

    Mahendra, Reshma R; Roehler, Douglas R; Degutis, Linda C

    2012-09-01

    Injuries and violence impact millions across the globe each year. For the past 20 years, the National Center for Injury Prevention and Control (NCIPC) at the Centers for Disease Control and Prevention (CDC) has assembled the largest cadre of injury and violence prevention experts in the world to reduce the burden of injuries and violence domestically and to inform global injury and violence prevention efforts. This article focuses on NCIPC's global injury and violence prevention work that involves: increasing awareness of the preventability of injury and violence, partnerships to promote injury research and best practices; establishing standards and guidance for data collection; building capacity through training and mentoring; and supporting evidence-based strategies. To decrease the global burden, the authors propose priority setting to maximize the development and sustainability of financial and human resources for injury and violence prevention. The authors call for increased capacity and resources for global injury and violence prevention. Published by Elsevier Ltd.

  10. Determination of future prevention strategies in elite track and field: analysis of Daegu 2011 IAAF Championships injuries and illnesses surveillance

    OpenAIRE

    Alonso, Juan-Manuel; Edouard, Pascal; Fischetto, Giuseppe; Adams, Bob; Depiesse, Frédéric; Mountjoy, Margo

    2012-01-01

    Objective To determine the incidence and characteristics of newly incurred injuries and illnesses during international Athletics Championships, by improving the medical surveillance coverage, in order to determine future prevention strategies. Design Prospective recording of newly occurred injuries and illnesses. Setting 13th International Association of Athletics Federations World Championships in Athletics 2011 in Daegu, Korea. Participants National team and Local Organising Committee physi...

  11. Gynecologic Cancer Prevention and Control in the National Comprehensive Cancer Control Program: Progress, Current Activities, and Future Directions

    OpenAIRE

    Stewart, Sherri L.; Lakhani, Naheed; Brown, Phaeydra M.; Larkin, O. Ann; Moore, Angela R.; Hayes, Nikki S.

    2013-01-01

    Gynecologic cancer confers a large burden among women in the United States. Several evidence-based interventions are available to reduce the incidence, morbidity, and mortality from these cancers. The National Comprehensive Cancer Control Program (NCCCP) is uniquely positioned to implement these interventions in the US population. This review discusses progress and future directions for the NCCCP in preventing and controlling gynecologic cancer.

  12. Gynecologic cancer prevention and control in the National Comprehensive Cancer Control Program: progress, current activities, and future directions.

    Science.gov (United States)

    Stewart, Sherri L; Lakhani, Naheed; Brown, Phaeydra M; Larkin, O Ann; Moore, Angela R; Hayes, Nikki S

    2013-08-01

    Gynecologic cancer confers a large burden among women in the United States. Several evidence-based interventions are available to reduce the incidence, morbidity, and mortality from these cancers. The National Comprehensive Cancer Control Program (NCCCP) is uniquely positioned to implement these interventions in the US population. This review discusses progress and future directions for the NCCCP in preventing and controlling gynecologic cancer.

  13. Anesthetic gases and global warming: Potentials, prevention and future of anesthesia.

    Science.gov (United States)

    Gadani, Hina; Vyas, Arun

    2011-01-01

    Global warming refers to an average increase in the earth's temperature, which in turn causes changes in climate. A warmer earth may lead to changes in rainfall patterns, a rise in sea level, and a wide range of impacts on plants, wildlife, and humans. Greenhouse gases make the earth warmer by trapping energy inside the atmosphere. Greenhouse gases are any gas that absorbs infrared radiation in the atmosphere and include: water vapor, carbon dioxide (CO2), methane (CH4), nitrous oxide (N2O), halogenated fluorocarbons (HCFCs), ozone (O3), perfluorinated carbons (PFCs), and hydrofluorocarbons (HFCs). Hazardous chemicals enter the air we breathe as a result of dozens of activities carried out during a typical day at a healthcare facility like processing lab samples, burning fossil fuels etc. We sometimes forget that anesthetic agents are also greenhouse gases (GHGs). Anesthetic agents used today are volatile halogenated ethers and the common carrier gas nitrous oxide known to be aggressive GHGs. With less than 5% of the total delivered halogenated anesthetic being metabolized by the patient, the vast majority of the anesthetic is routinely vented to the atmosphere through the operating room scavenging system. The global warming potential (GWP) of a halogenated anesthetic is up to 2,000 times greater than CO2. Global warming potentials are used to compare the strength of different GHGs to trap heat in the atmosphere relative to that of CO2. Here we discuss about the GWP of anesthetic gases, preventive measures to decrease the global warming effects of anesthetic gases and Xenon, a newer anesthetic gas for the future of anesthesia.

  14. Motivational Antecedents of Preventive Proactivity in Late Life: Linking Future Orientation and Exercise1

    OpenAIRE

    Kahana, Eva; Kahana, Boaz; Zhang, Jianping

    2005-01-01

    Future orientation is considered as a motivational antecedent of late-life proactivity. In a panel study of 453 old-old adults, we linked future orientation to exercise, a key component of late-life proactivity. Findings based on hierarchical linear modeling reveal that future orientation at baseline predicts changes in exercise during the subsequent four years. Whereas exercise behavior generally declined over time, future orientation and female gender were associated with smaller decline. T...

  15. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  16. Prevention of Mental Health Disorders Using Internet- and Mobile-Based Interventions: A Narrative Review and Recommendations for Future Research

    Directory of Open Access Journals (Sweden)

    David Daniel Ebert

    2017-08-01

    Full Text Available Although psychological interventions might have a tremendous potential for the prevention of mental health disorders (MHD, their current impact on the reduction of disease burden is questionable. Possible reasons include that it is not practical to deliver those interventions to the community en masse due to limited health care resources and the limited availability of evidence-based interventions and clinicians in routine practice, especially in rural areas. Therefore, new approaches are needed to maximize the impact of psychological preventive interventions. Limitations of traditional prevention programs could potentially be overcome by providing Internet- and mobile-based interventions (IMIs. This relatively new medium for promoting mental health and preventing MHD introduces a fresh array of possibilities, including the provision of evidence-based psychological interventions that are free from the restraints of travel and time and allow reaching participants for whom traditional opportunities are not an option. This article provides an introduction to the subject and narratively reviews the available evidence for the effectiveness of IMIs with regard to the prevention of MHD onsets. The number of randomized controlled trials that have been conducted to date is very limited and so far it is not possible to draw definite conclusions about the potential of IMIs for the prevention of MHD for specific disorders. Only for the indicated prevention of depression there is consistent evidence across four different randomized trial trials. The only trial on the prevention of general anxiety did not result in positive findings in terms of eating disorders (EDs, effects were only found in post hoc subgroup analyses, indicating that it might be possible to prevent ED onset for subpopulations of people at risk of developing EDs. Future studies need to identify those subpopulations likely to profit from preventive. Disorders not examined so far include

  17. Prevention of Mental Health Disorders Using Internet- and Mobile-Based Interventions: A Narrative Review and Recommendations for Future Research.

    Science.gov (United States)

    Ebert, David Daniel; Cuijpers, Pim; Muñoz, Ricardo F; Baumeister, Harald

    2017-01-01

    Although psychological interventions might have a tremendous potential for the prevention of mental health disorders (MHD), their current impact on the reduction of disease burden is questionable. Possible reasons include that it is not practical to deliver those interventions to the community en masse due to limited health care resources and the limited availability of evidence-based interventions and clinicians in routine practice, especially in rural areas. Therefore, new approaches are needed to maximize the impact of psychological preventive interventions. Limitations of traditional prevention programs could potentially be overcome by providing Internet- and mobile-based interventions (IMIs). This relatively new medium for promoting mental health and preventing MHD introduces a fresh array of possibilities, including the provision of evidence-based psychological interventions that are free from the restraints of travel and time and allow reaching participants for whom traditional opportunities are not an option. This article provides an introduction to the subject and narratively reviews the available evidence for the effectiveness of IMIs with regard to the prevention of MHD onsets. The number of randomized controlled trials that have been conducted to date is very limited and so far it is not possible to draw definite conclusions about the potential of IMIs for the prevention of MHD for specific disorders. Only for the indicated prevention of depression there is consistent evidence across four different randomized trial trials. The only trial on the prevention of general anxiety did not result in positive findings in terms of eating disorders (EDs), effects were only found in post hoc subgroup analyses, indicating that it might be possible to prevent ED onset for subpopulations of people at risk of developing EDs. Future studies need to identify those subpopulations likely to profit from preventive. Disorders not examined so far include substance use

  18. The health profile of professional soccer players: future opportunities for injury prevention.

    Science.gov (United States)

    Volpi, Piero; Taioli, Emanuela

    2012-12-01

    Injuries are a major adverse event during a soccer player's career; they require medical and surgical treatment and rehabilitation and thus may interrupt the player's activity, often with severe physical and psychological sequel. Specialists have tried to identify the risk factors for injuries, in an attempt to discover predictors that could be prevented and or eliminated before the injury occurs, but the results are scarce. This article reviews the epidemiology of the frequency and occurrence of injuries in Italian soccer players, reports a list of preventable risk factors that are associated with injuries, and identifies preventable risk factors. We have identified personal factors (age, previous traumatic events, physical and biological characteristics of the player, life style habits such as smoking, alcohol, and diet, changes in physical-athletic aspects of the players, such as increased muscle strength, and use of medications) as possible risk factors for injuries. However, environmental factors such as changes in training techniques, field composition, and shoes structure may also have a major influence. This summary indicates that appropriate preventive measures can be undertaken to prevent injuries in professional soccer players. Professionals who are in close contacts with the players should be informed of the predictors of injuries and should be trained to intervene and plan appropriate preventive measures.

  19. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  20. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  1. Stroke prevention in atrial fibrillation: Past, present and future. Comparing the guidelines and practical decision-making.

    Science.gov (United States)

    Lip, Gregory; Freedman, Ben; De Caterina, Raffaele; Potpara, Tatjana S

    2017-06-28

    Concepts and our approaches to stroke prevention in atrial fibrillation (AF) have changed markedly over the last decade. There has been an evolution over the approach to stroke and bleeding risk assessment, as well as new treatment options. An increasing awareness of AF has led to calls to improve the detection of and population screening for AF. Stroke and bleeding risk assessment continues to evolve, and the ongoing debate on balance between simplicity and practicality, against precision medicine will continue. In this review article, we provide an overview of past, present and the (likely) future concepts and approaches to stroke prevention in AF. We propose three simple steps (the Birmingham '3-step') that offers a practical management pathway to help streamline and simplify decision-making for stroke prevention in patients with AF.

  2. Futures

    DEFF Research Database (Denmark)

    Pedersen, Michael Haldrup

    2017-01-01

    Currently both design thinking and critical social science experience an increased interest in speculating in alternative future scenarios. This interest is not least related to the challenges issues of global sustainability present for politics, ethics and design. This paper explores the potenti......Currently both design thinking and critical social science experience an increased interest in speculating in alternative future scenarios. This interest is not least related to the challenges issues of global sustainability present for politics, ethics and design. This paper explores...... the potentials of speculative thinking in relation to design and social and cultural studies, arguing that both offer valuable insights for creating a speculative space for new emergent criticalities challenging current assumptions of the relations between power and design. It does so by tracing out discussions...... of ‘futurity’ and ‘futuring’ in design as well as social and cultural studies. Firstly, by discussing futurist and speculative approaches in design thinking; secondly by engaging with ideas of scenario thinking and utopianism in current social and cultural studies; and thirdly by showing how the articulation...

  3. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions t...... to 9/11. Novels by Safran Foer (Extremely Loud and Incredibly Close) and Don DeLillo (Falling Man) focus on the personal and private consequences whereas Mohsin Hamid (The Reluctant Fundamentalist) includes the other side....

  4. Trials in the prevention of type 1 diabetes: current and future.

    Science.gov (United States)

    Wherrett, Diane K

    2014-08-01

    A major thrust in type 1 diabetes research is stopping the destruction of beta cells that leads to type 1 diabetes. Research over the past 30 years has defined genetic factors and evidence of autoimmunity that have led to the development of robust prediction models in those at high risk for type 1 diabetes. The ability to identify those at risk and the development of new agents and of collaborative research networks has led to multiple trials aimed at preventing beta cell loss. Trials at all stages of beta cell loss have been conducted: primary prevention (prior to the development of autoimmunity); secondary prevention (after autoantibodies are found) and tertiary prevention (intervening after diagnosis to maintain remaining beta cells). Studies have shown mixed results; evidence of maintained insulin secretion after the time of diagnosis has been described in a number of studies, and primary and secondary prevention is proving to be elusive. Much has been learned from the increasing number of studies in the field in terms of network creation, study design and choice of intervention that will facilitate new avenues of investigation. Copyright © 2014 Canadian Diabetes Association. Published by Elsevier Inc. All rights reserved.

  5. Late-life suicide prevention strategies: current status and future directions.

    Science.gov (United States)

    Van Orden, Kim; Deming, Charlene

    2017-09-08

    Late life suicide prevention differs from suicide prevention for other age groups: first, the number of older adults worldwide is on the rise; second, late-life suicide receives much less attention in all societal spheres, from the media, to federal funding agencies, to healthcare initiatives. Recent findings indicate an association between internalized ageist stereotypes and reduced will to live. Recent research also addresses the role of cognitive control as a contributor to risk and as an intervention target (e.g., through psychotherapies such as problem solving therapy) as well as firearm safety as a promising, though a politicized and challenging strategy to implement. Another strategy that may prove feasible is an approach on upstream prevention strategies in healthcare. One strategy we believe holds great promise is the promotion of high quality geriatric medicine. Geriatricians are trained to work with patients to prioritize the promotion of physical and cognitive functioning (rather than solely absence of disease) and to focus on well-being as a goal. Thus, geriatricians routinely target numerous late-life suicide risk factors-physical illness, functioning, pain, and (dis)satisfaction with life. However, efficacious strategies will not prevent suicide deaths if they are not implemented-addressing ageism as a universal prevention strategy is essential. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. The future of metabolic syndrome and cardiovascular disease prevention: polyhype or polyhope?: tales from the polyera

    NARCIS (Netherlands)

    Franco, O.; Karnik, K.; Bonneux, L.G.A.

    2007-01-01

    Recently society has been witnessing the rise of a new era in the prevention and treatment of the metabolic syndrome and cardiovascular disease: the Polyera. This new era started when a promising concept – the Polypill – was introduced by Wald et al. in 2003. The Polypill is a theoretical

  7. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  8. How and Why Do Terrorist Organizations Use the Internet?

    Directory of Open Access Journals (Sweden)

    Karolina Wojtasik

    2017-12-01

    Full Text Available The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula and ISIS (the so-called Islamic State. While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists.

  9. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  10. Protecting chemical plants against terrorist attacks: a review

    NARCIS (Netherlands)

    Khakzad Rostami, N.; Reniers, G.L.L.M.E.

    2015-01-01

    Protection of hazardous establishments such as chemical plants intentional incidents has drawn attention from safety and security experts since 9/11 terrorist attacks in the U.S. Although major steps have been taken since, the recent intentional incidents in two chemical plants in France in June and

  11. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  12. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  13. Freed: Ripples of the Convicted and Released Terrorist in America

    Science.gov (United States)

    2011-03-01

    Singapore, Malaysia , Indonesia, Thailand, and the Philippines (The International Conference on Terrorist Rehabilitation, 2009). No single methodology to...2009, p. 16). Care Rehabilitation Centers include group meals, art therapy, recreation and other leisure activity to “build teamwork but also

  14. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    Science.gov (United States)

    2007-01-22

    called “Digital Pearl Harbor” (DPH), with the result that 79% of the gamers said that a strategic cyberattack against the United States was likely...terrorist sponsors, five of them — North Korea , Sudan, Syria, Libya, and Cuba — are described as a diminishing concern for terrorism. Only Iran remains

  15. Implementing falls prevention research into policy and practice in Australia: past, present and future.

    Science.gov (United States)

    Lord, Stephen R; Sherrington, Catherine; Cameron, Ian D; Close, Jacqueline C T

    2011-12-01

    Falls in older Australians are a significant public health issue with one in three older people falling one or more times each year. Many fall prevention randomized controlled trials have been conducted in Australia as well as across the world. The findings of these studies now constitute a substantial evidence base that can provide direction for health and lifestyle interventions for preventing falls in older people. This research evidence has contributed to health policy in Australia to some extent, but is yet to be widely implemented into practice. This opinion piece overviews previous policy initiatives and describes a new Partnership research program funded by the Australian National Health and Medical Research Council (NHMRC), which seeks to further influence health policy and address the ongoing research-practice gap. Copyright © 2011. Published by Elsevier Ltd.

  16. Prevention of Mother-to-Child HIV Transmission: Predictors of Utilization & Future Policy Implication

    OpenAIRE

    Martz, Tyler Elizabeth

    2015-01-01

    Despite the availability of highly efficacious antiretroviral drug regimens for the prevention of mother-to-child HIV transmission (PMTCT), transmission rates remain higher than those achieved in clinical trials. Access to these efficacious drug regimens continues to expand rapidly in countries most affected by HIV. Such expansion is an important first step in dramatically reducing mother-to-child HIV transmission rates. However, beyond access to drug regimens, programs must also identify and...

  17. Using commercial video games for falls prevention in older adults: the way for the future?

    Science.gov (United States)

    Pietrzak, Eva; Cotea, Cristina; Pullman, Stephen

    2014-01-01

    Falls in older adults are an increasingly costly public health issue. There are many fall prevention strategies that are effective. However, with an increasing population of older people and ever-decreasing availability of health practitioners and health funding, novel modes of intervention are being developed, including those relying on computer technologies.The aim of this article was to review the literature on the use of exergaming to prevent falls in older adult persons living in the community. The Cochrane, Medline, and Embase databases were searched using prespecified search terms. To be included, studies had to investigate the effect of using commercially available consoles and video games on outcome measures such as a decrease in falls, improvements in balance control or gait parameters, decreased fear of falling, and attitude to exercise in older adult persons living in the community. All study designs with the exception of single-person case studies were included. Articles had to be published in peer-reviewed journals in the English language. Nineteen studies fulfilled the inclusion criteria. The following outcomes were observed: (1) using computer-based virtual reality gaming for balance training in older adults was feasible; (2) the majority of studies showed a positive effect of exergaming on balance control; (3) some studies showed a positive effect on balance confidence and gait parameters; (4) the effect was seen across the age and sex spectrum of older adults, including those with and without balance impairment. There is as yet no evidence that using virtual reality games will prevent falls, but there is an indication that their use in balance training may improve balance control, which in turn may lead to falls prevention.

  18. TERRITORIAL RISK ASSESMENT AFTER TERRORIST ACT: EXPRESS MODEL

    Directory of Open Access Journals (Sweden)

    M. M. Biliaiev

    2018-02-01

    Full Text Available Purpose. The paper involves the development of a method to assess the territorial risk in the event of a terrorist attack using a chemical agent. Methodology. To describe the process of chemical agent scattering in the atmosphere, ejected in the event of a terrorist attack, the equation of mass transfer of an impurity in atmospheric air is used. The equation takes into account the velocity of the wind flow, atmospheric diffusion, the intensity of chemical agent emission, the presence of buildings near the site of the emission of a chemically hazardous substance. For numerical integration of the modeling equation, a finite difference method is used. A feature of the developed numerical model is the possibility of assessing the territorial risk in the event of a terrorist attack under different weather conditions and the presence of buildings. Findings. A specialized numerical model and software package has been developed that can be used to assess the territorial risk, both in the case of terrorist attacks, with the use of chemical agents, and in case of extreme situations at chemically hazardous facilities and transport. The method can be implemented on small and medium-sized computers, which allows it to be widely used for solving the problems of the class under consideration. The results of a computational experiment are presented that allow estimating possibilities of the proposed method for assessing the territorial risk in the event of a terrorist attack using a chemical agent. Originality. An effective method of assessing the territorial risk in the event of a terrorist attack using a chemically hazardous substance is proposed. The method can be used to assess the territorial risk in an urban environment, which allows you to obtain adequate data on possible damage areas. The method is based on the numerical integration of the fundamental mass transfer equation, which expresses the law of conservation of mass in a liquid medium. Practical

  19. Health Prevention Programs in Social Marketing: Recent Trends and Future Prospects

    Directory of Open Access Journals (Sweden)

    Corina Serban

    2011-02-01

    Full Text Available Social marketing methods are nowadays frequently used in the development of healthprevention programs. The main Objectives of this paper are: to identify the role of skin protectionprograms in society, to evaluate sun protection behavior among consumers and to propose futuredirections of research in skin cancer prevention. Prior Work in skin protection focused on the risksassociated with long periods of sun exposure while offering advice regarding responsible behavior. InEurope, the main center of skin cancer research is European Cancer Observatory and, in Romania,Romanian Society of Dermatology (SRD. These institutions develop specialized programs annualy.The Approach used in this article is the survey. The paper analysis consumers’ perceptions regardingskin protection behavior in Romania by using a structured online questionnaire. A total number of 86respondents participated in the study. Results show that 53% of respondents don’t have a sunprotection behavior. Implications of the study are: health practitioners can use these findings infurther research and nonprofit organizations can increase their prevention programs in certain groups.The Value of this paper consists of direct analysis regarding skin cancer issue in Romania whileemphasizing the importance of health prevention programs for social marketing domain.

  20. FLU AS PROBLEM COMMON TO ALL MANKIND. FUTURE DIRECTIONS FOR PREVENTION AND TREATMENT OF INFLUENZA

    Directory of Open Access Journals (Sweden)

    Korovaeva I.V

    2014-06-01

    Full Text Available This article discusses the flu, as one of the most common infectious diseases affecting humanity throughout its history. The data on the structure of A influenza virus and its variability is given historical background for most famous of the pandemics, which inflicted irreparable damage to the population of the Earth, are shown the basic stages of the study for influenza virus. Are considered the types of variability of the A virus influenza, its ability to overcome interspecies barriers that form the basis of pathogen escape from the immune response. The article shows the promising areas of modern prevention and treatment of this disease

  1. Aripiprazole for relapse prevention and craving in alcohol use disorder: current evidence and future perspectives.

    Science.gov (United States)

    Martinotti, Giovanni; Orsolini, Laura; Fornaro, Michele; Vecchiotti, Roberta; De Berardis, Domenico; Iasevoli, Felice; Torrens, Marta; Di Giannantonio, Massimo

    2016-06-01

    Among other approaches, the modulation of the dopaminergic pathway has been advocated in the therapeutic management of Alcohol Use Disorders (AUD). A potential avenue toward the modulation of the dopaminergic pathway across varying substance disorders seems to be provided by aripiprazole, a second-generation antipsychotic characterized by a peculiar pharmacodynamics signature. In this review, the authors provided a qualitative synthesis and a critical perspective on the efficacy of aripiprazole in relapse prevention and craving in AUD. A systematic search was carried out through MEDLINE/Embase/PsycINFO/Cochrane Library from inception until September 2015, combining free terms and MESH headings for the topics of AUD and aripiprazole as following: (((Alcohol use Disorder) OR (Alcohol use)) AND aripiprazole). Based both on a qualitative synthesis and a critical interpretation of the evidence, the authors submit that aripiprazole would promote alcohol abstinence and reduce the alcohol seeking behaviour possibly via dopaminergic and serotoninergic modulations at the fronto-subcortical circuits underpinning alcohol reward and craving, impulsive behaviour as well as reduce alcohol-related anxiety/low mood and anhedonia. However, due to the lack of published studies, a conclusive statement about any direct effect of aripiprazole in the prevention of craving and/or alcohol consumption is not possible.

  2. Current strategies and future directions for the prevention of transfusion-transmitted cytomegalovirus

    Directory of Open Access Journals (Sweden)

    Harmon CM

    2017-04-01

    Full Text Available Charles M Harmon, Laura L Cooling Department of Pathology, University of Michigan, Ann Arbor, MI, USA Abstract: Cytomegalovirus (CMV is a pervasive DNA virus that infects a significant portion of individuals worldwide, and may be transmitted through the transfusion of blood products. Although CMV infection is of little consequence in immunocompetent individuals, patients with an impaired immune system are at risk of significant morbidity and mortality. Unlike other blood-borne infectious agents, it is impractical to defer all CMV-positive individuals from blood donation as this would exclude a substantial number of otherwise eligible donors. Other methods such as transfusion of CMV-seronegative and leukoreduced blood products must be employed to prevent the transmission of CMV to at-risk patients. In this study, the widespread use of current strategies for the prevention of transfusion-transmitted CMV (TT-CMV infection and the evidence to support these methods in various at-risk groups were reviewed. In addition, emerging pathogen inactivation technologies that have the potential to eliminate TT-CMV were also discussed. Keywords: blood transfusion, cytomegalovirus, leukoreduction, pathogen inactivation, hematopoietic stem cell transplantation, very low birth weight infants

  3. A reading of the crisis of prevention activities: current paradoxes and future challenges

    Directory of Open Access Journals (Sweden)

    Rodolfo Andrade de Gouveia Vilela

    2017-12-01

    Full Text Available Introduction: The activity of occupational health and safety professionals is in a paradoxical situation considering, among other aspects, the productivity context, which gives low priority to safety and health, the limitation imposed by the hegemonic conceptual references in the field, the limitation of these professionals’ power to act and the highly conflicting and complex character of the occupational world. Objective: In essay form, the article, in dialog with the literature of the field, proposes to reflect on the impasses and challenges of the prevention field. Method: The reflections are based on the experience of the authors both in the practical area as also in research, teaching and extension activities in the field of health surveillance and workers’ safety. Results: Even though this field of activity has been recognized as a specialized and legal area for more than 40 years in the country, the magnitude of the data concerning occupational and industrial accidents reveals the limitations and difficulties that these professionals face, and justifies the importance of the analysis of current practices in order to understand the contradictions that lie at the root of the difficulties to achieve prevention. Conclusion: Citizens could pressure corporations to improve their safety practices and concepts. State can also be pressured to create new safety policies.

  4. Present and future of desertification in Spain: Implementation of a surveillance system to prevent land degradation.

    Science.gov (United States)

    Martínez-Valderrama, Jaime; Ibáñez, Javier; Del Barrio, Gabriel; Sanjuán, Maria E; Alcalá, Francisco J; Martínez-Vicente, Silvio; Ruiz, Alberto; Puigdefábregas, Juan

    2016-09-01

    Mitigation strategies are crucial for desertification given that once degradation starts, other solutions are extremely expensive or unworkable. Prevention is key to handle this problem and solutions should be based on spotting and deactivating the stressors of the system. Following this topic, the Spanish Plan of Action to Combat Desertification (SPACD) created the basis for implementing two innovative approaches to evaluate the threat of land degradation in the country. This paper presents tools for preventing desertification in the form of a geomatic approach to enable the periodic assessments of the status and trends of land condition. Also System Dynamics modelling has been used to integrate bio-physical and socio-economic aspects of desertification to explain and analyse degradation in the main hot spots detected in Spain. The 2dRUE procedure was implemented to map the land-condition status by comparing potential land productivity according to water availability, the limiting factor in arid lands, with plant-biomass data. This assessment showed that 20% of the territory is degraded and an additional 1% is actively degrading. System Dynamics modelling was applied to study the five desertification landscapes identified by the SPACD. The risk analysis, implemented on these models, concluded that 'Herbaceous crops affected by soil erosion' is the landscape most at risk, while the Plackett-Burman sensitivity analysis used to rank the factors highlighted the supremacy of climatic factors above socioeconomic drivers. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Mobile system for radiation reconnaissance after terrorist attack

    International Nuclear Information System (INIS)

    Resehetin, V. P.

    2009-01-01

    Well-timed radiation reconnaissance aimed at identifying a source of radiation contamination and drawing up a contamination map represents an important and complex problem, the solution of which allows for the reduction of the irradiation dose, the implementation of decontamination works, and finally minimizing the consequences of a terrorist attack. New opportunities for operational gathering of radiation contamination data and corresponding space coordinates can be associated with the development of mobile systems which provide measurements of ionizing radiation dose rate and corresponding space coordinates, and subsequent transferral to the crisis centre server where these data are processed and used for mapping radiation contamination. In such a way, the data obtained on radiation contamination could be incorporated in a timely manner as input data to computer models, describing the dispersion of radionuclides in an environment that makes it possible not only to forecast the development of a situation but to define necessary protection measures for mitigating and localizing the consequences. The mobile reconnaissance system was developed as a prototype of such a solution, based on a cellular terminal such as the Nokia 12i (Teltonika BoxGPS). A Global Positioning System (GPS) was used to determine space coordinates. A Russian BDMG device measured the dose rate of ionizing radiation, and the subsequent data were transferred to the server of the crisis centre of the Nuclear Safety Institute of RAS (IBRAE). The main operation regime involved setting the GPRS connection, transferring data, and switching off the connection. A change of the operation regime can be produced via SMS commands from the crisis centre's terminal or with the help of a cellular phone. When a connection is not available, the data are aggregated in memory and transferred to the server when the connection channel arises. A few data transfer protocols, including FTP and HTTP/HTTPS, are provided

  6. Is prophylactic fixation a cost-effective method to prevent a future contralateral fragility hip fracture?

    Science.gov (United States)

    Faucett, Scott C; Genuario, James W; Tosteson, Anna N A; Koval, Kenneth J

    2010-02-01

    : A previous hip fracture more than doubles the risk of a contralateral hip fracture. Pharmacologic and environmental interventions to prevent hip fracture have documented poor compliance. The purpose of this study was to examine the cost-effectiveness of prophylactic fixation of the uninjured hip to prevent contralateral hip fracture. : A Markov state-transition model was used to evaluate the cost and quality-adjusted life-years (QALYs) for unilateral fixation of hip fracture alone (including internal fixation or arthroplasty) compared with unilateral fixation and contralateral prophylactic hip fixation performed at the time of hip fracture or unilateral fixation and bilateral hip pad protection. Prophylactic fixation involved placement of a cephalomedullary nail in the uninjured hip and was initially assumed to have a relative risk of a contralateral fracture of 1%. Health states included good health, surgery-related complications requiring a second operation (infection, osteonecrosis, nonunion, and malunion), fracture of the uninjured hip, and death. The primary outcome measure was the incremental cost-effectiveness ratio estimated as cost per QALY gained in 2006 US dollars with incremental cost-effectiveness ratios below $50,000 per QALY gained considered cost-effective. Sensitivity analyses evaluated the impact of patient age, annual mortality and complication rates, intervention effectiveness, utilities, and costs on the value of prophylactic fixation. : In the baseline analysis, in a 79-year-old woman, prophylactic fixation was not found to be cost-effective (incremental cost-effectiveness ratio = $142,795/QALY). However, prophylactic fixation was found to be a cost-effective method to prevent contralateral hip fracture in: 1) women 71 to 75 years old who had 30% greater relative risk for a contralateral fracture; and 2) women younger than age 70 years. Cost-effectiveness was greater when the additional costs of prophylaxis were less than $6000. However, for

  7. Stakeholders' opinions on a future in-vehicle alcohol detection system for prevention of drunk driving.

    Science.gov (United States)

    Anund, Anna; Antonson, Hans; Ihlström, Jonas

    2015-01-01

    There is a common understanding that driving under the influence of alcohol is associated with higher risk of being involved in crashes with injuries and possible fatalities as the outcome. Various countermeasures have therefore from time to time been taken by the authorities to prevent drunk driving. One of them has been the alcohol interlock. Up to now, interlocks have mainly been used by previously convicted drunk drivers and in the commercial road transport sector, but not in private cars. New technology has today reached a level where broader implementation might be possible. To our knowledge, however, little is known about different stakeholders' opinions of a broader implementation of such systems. In order to increase that knowledge, we conducted a focus group study to collect in-depth thoughts from different stakeholders on this topic. Eight focus groups representing a broad societal span were recruited and conducted for the purpose. The results show that most stakeholders thought that an integrated system for alcohol detection in vehicles might be beneficial in lowering the number of drunk driving crashes. They said that the system would probably mainly prevent driving by people who unintentionally and unknowingly drive under the influence of alcohol. The groups did, however, not regard the system as a final solution to the drunk driving problem, and believed that certain groups, such as criminals and alcoholics, would most likely find a way around the system. Concerns were raised about the risk of increased sleepy driving and driving just under the legal blood alcohol concentration (BAC) limit. The results also indicate that stakeholders preferred a system that provides information on the BAC up to the legal limit, but not for levels above the limit; for those, the system should simply prevent the car from starting. Acceptance of the system depended on the reliability of the system, on its ability to perform fast sampling, and on the analytical process

  8. Introduction to proceedings of healthy futures: engaging the oral health community in childhood obesity prevention national conference.

    Science.gov (United States)

    Tinanoff, Norman; Holt, Katrina

    2017-06-01

    The Robert Wood Johnson Foundation (RWJF) has worked to ensure that all children have healthy weights. To promote this goal, the RWJF has supported the Healthy Futures: Engaging the Oral Health Community in Childhood Obesity Prevention National Conference, held on November 3-4, 2016, and the proceeding of this conference. The goals of the conference were to increase understanding of the science focusing on oral health and childhood obesity, increase understanding of how to prevent childhood obesity, and provide opportunities to network and plan activities to prevent childhood obesity. The papers prepared for the conference identified through systematic reviews or scoping reviews the state of the science related to preventing childhood obesity and reducing children's consumption of sugar-sweetened beverages and strategies that oral health professionals and organizations can employ prevent childhood obesity. Causes of childhood obesity are multifactorial and include genetic components, environmental and lifestyle variables, and nutritional factors. Dental caries also is caused by a combination of factors, including cariogenic diet, inadequate fluoride exposure, a susceptible host, and the presence of caries-causing bacteria in the oral cavity. One key risk factors for both obesity and caries is excessive sugar consumption. To reduce the risk of obesity and dental caries in children, health professionals and parents need to be aware of the sugar content of processed foods and beverages as well as of current daily sugar-consumption recommendations. Additionally, oral health professionals must become more engaged in identifying children who are at risk for obesity and dental caries; and provide education, screening and referral to reduce these risks. © 2017 American Association of Public Health Dentistry.

  9. Youth violence prevention comes of age: research, training and future directions.

    Science.gov (United States)

    Williams, Kara; Rivera, Lourdes; Neighbours, Robert; Reznik, Vivian

    2007-01-01

    Youth violence is recognized as a major public health problem in the United States and the world. Over the past ten years, progress has been made in documenting the factors that contribute to violent behavior. Emerging research is deepening our understanding of the individual and societal influences that contribute to and protect against youth violence. However, much work still remains to be done in this field, both in examining potential causes and in designing effective intervention strategies. This chapter highlights specific dimensions of youth violence prevention selected by the authors because these dimensions are the focus of public attention, are emerging as critical issues in the study of youth violence, or have a unique place in the current political and social context. We focus on the developmental pathways to violence, factors that mediate and moderate youth violence, the role of culture and media in youth violence, school-based violence such as school shootings and bullying, and the training of health care professionals.

  10. Prevention of inhibitor development in hemophilia A in 2016. A glimpse into the future?

    Science.gov (United States)

    Franchini, Massimo; Lippi, Giuseppe

    2016-12-01

    Thanks to considerable progresses made over the last 30years, hemophilia benefits from the most efficacious and safe treatment among the many monogenic inherited disorders. The most challenging complication of replacement therapy in hemophilia A is the occurrence of alloantibodies against infused factor VIII (FVIII), thus predisposing the patients to increased morbidity and disability. Extensive research in this field has definitively unraveled that development of inhibitors in hemophilia A is a complex and multifactorial process, in which inherited and environmental factors dynamically interact. This narrative review, after providing a concise overview about the main genetic and non-genetic risk factors, is aimed to focus on prediction risk models and preventive strategies for minimizing the risk of developing inhibitors in hemophilia A patients. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. The future of HIV prevention: prospects for an effective anti-HIV microbicide.

    Science.gov (United States)

    Nuttall, Jeremy; Romano, Joseph; Douville, Karen; Galbreath, Caroline; Nel, Annaléne; Heyward, William; Mitchnick, Mark; Walker, Saul; Rosenberg, Zeda

    2007-03-01

    Topical microbicides are self-administered products for prevention of HIV transmission, and they present one of the most promising strategies for combating the HIV-AIDS epidemic. The development of microbicides is a long and complicated process, with many hurdles that are unique to this class of product, including challenges in product design, in the conduct and design of clinical trials, and in obtaining licensure of a new class of products intended for use almost exclusively in developing countries. Once they have been registered, there are additional challenges to the marketing and distribution of microbicides. An overview of the types of microbicide currently in development, and a summary of the issues and the approaches being taken to address them, are provided.

  12. Nanotechnology and the Future of Condoms in the Prevention of Sexually Transmitted Infections

    Science.gov (United States)

    Yah, Clarence S.; Simate, Geoffrey S.; Hlangothi, Percy; Somai, Benesh M.

    2018-01-01

    Objective: The human immunodeficiency virus (HIV) is among the utmost destructive viruses humankind has ever faced in almost four decades. It carries with it profound socioeconomic and public health implications. Unfortunately, there is, currently, no effective cure for HIV infections. This review discusses the various types of condoms, microbicides, and the potential use of nanoparticle-coated condoms as a means of diminishing the risk of HIV transmission and sexually transmitted infections (STIs) during sexual intercourse. Methods: We identified 153 articles from 1989 to 2015 indexed in various journal platforms, reports, and magazines. Using the PRISMA guidelines as proxy in performing the research review process, only 53 articles were selected. Ideally, articles that failed to describe the nature and types of condoms, condom failures, nanoparticle-coated condoms, microbicides, and HIV prevention were excluded. Results and Discussion: In general, it has been shown that antiretroviral therapy (ART) currently available can only limit transmission and acquisition of HIV strains. Apart from ART treatment, the use of condoms has been identified globally as a cost-effective intervention for reducing the spread of HIV and other STIs. However, while condoms are supposed to be effective, reliable, and easy to use, research has shown that they are attributable to 20% failures including breakages. Nevertheless, other studies have shown that coating condoms with nanoparticles is an important and effective method for reducing condom breakage and HIV/STI transmission during sexual intercourse. Conclusions: A review of literature cited in this paper has shown that nanotechnology-based condom systems have the potential to prevent the spread of HIV and STIs. Furthermore, the antimicrobial nature of some nanoparticles could provide a safe and efficient way to disrupt and/or inactivate different STIs – including viral, bacterial, and fungal diseases. PMID:29536957

  13. Microbicides in the prevention of HIV infection: current status and future directions.

    Science.gov (United States)

    Nuttall, Jeremy

    2010-07-09

    More than 28 years since the first cases of HIV/AIDS, there is still no cure or vaccine. The worst affected region is sub-Saharan Africa and, increasingly, it is young women who are bearing the brunt of the epidemic. Consequently, there is an urgent need for HIV prevention options for women in developing countries. Microbicides are topical products that can be used vaginally by women to impede sexual transmission of HIV and thus represent one of the most promising prevention strategies. Efficacy trials with early nonspecific microbicide gels have so far been unsuccessful, but the field has now switched its focus to products containing highly potent and highly specific antiretroviral drugs that are easier to use, and can be formulated in a variety of dosage forms to suit individual and regional preferences. However, these products have their own challenges, with a greater likelihood of absorption, and the potential for systemic toxicities or the development of resistance in infected individuals who are unaware of their HIV status. The conduct of clinical trials is complex for all microbicides, with limited availability of trial sites, difficulties in dose selection and safety monitoring, and a lack of a truly objective measure of adherence. Once a microbicide has been shown to be safe and effective, there will need to be a clear pathway to regulatory approval, and the successful launch of a product will depend on having in place appropriate methods for distribution to the women who need it, along with a strategy for ensuring that they use it correctly. This will require substantial effort in terms of education and community engagement, and these activities need to be initiated well in advance of microbicide rollout.

  14. HIV Treatment as Prevention: Modelling the Cost of Antiretroviral Treatment—State of the Art and Future Directions

    Science.gov (United States)

    Meyer-Rath, Gesine; Over, Mead

    2012-01-01

    Policy discussions about the feasibility of massively scaling up antiretroviral therapy (ART) to reduce HIV transmission and incidence hinge on accurately projecting the cost of such scale-up in comparison to the benefits from reduced HIV incidence and mortality. We review the available literature on modelled estimates of the cost of providing ART to different populations around the world, and suggest alternative methods of characterising cost when modelling several decades into the future. In past economic analyses of ART provision, costs were often assumed to vary by disease stage and treatment regimen, but for treatment as prevention, in particular, most analyses assume a uniform cost per patient. This approach disregards variables that can affect unit cost, such as differences in factor prices (i.e., the prices of supplies and services) and the scale and scope of operations (i.e., the sizes and types of facilities providing ART). We discuss several of these variables, and then present a worked example of a flexible cost function used to determine the effect of scale on the cost of a proposed scale-up of treatment as prevention in South Africa. Adjusting previously estimated costs of universal testing and treatment in South Africa for diseconomies of small scale, i.e., more patients being treated in smaller facilities, adds 42% to the expected future cost of the intervention. PMID:22802731

  15. Prevent recurrence of nuclear disaster (4). Future tasks in the field of structure and components

    International Nuclear Information System (INIS)

    Okamoto, Koji; Takagi, Toshiyuki; Ueda, Susumu

    2012-01-01

    Structure and components subcommittee under the special committee of seismic safety of nuclear power stations of the Atomic Energy Society of Japan discussed future activities related with technical problems of seismic design of structures, components and piping system and evaluation of seismic effects in collaboration with the Japan Society of Mechanical Engineers. These problems were arranged by 'logic of seismic safety' and tabulated just enough, and then their roadmap was prepared. This article described selected relevant problems and discussed safety margins of seismic design and their related problems, referring to state of countermeasures and evaluated results of nuclear power stations after Great East Japan Earthquake occurred in March 11, 2011. Main problems were related with seismic safety margins of structure and components, consideration of ground motion index, rationalization and upgrade of seismic design, application of new technology, integrity evaluation of structure and components after or at earthquake, and upgrade of seismic probabilistic risk assessment methodology. (T. Tanaka)

  16. Prevention

    DEFF Research Database (Denmark)

    Halken, S; Høst, A

    2001-01-01

    , breastfeeding should be encouraged for 4-6 months. In high-risk infants a documented extensively hydrolysed formula is recommended if exclusive breastfeeding is not possible for the first 4 months of life. There is no evidence for preventive dietary intervention neither during pregnancy nor lactation...... populations. These theories remain to be documented in proper, controlled and prospective studies. Breastfeeding and the late introduction of solid foods (>4 months) is associated with a reduced risk of food allergy, atopic dermatitis, and recurrent wheezing and asthma in early childhood. In all infants....... Preventive dietary restrictions after the age of 4-6 months are not scientifically documented....

  17. The future of metabolic syndrome and cardiovascular disease prevention: polyhype or polyhope? Tales from the polyera.

    Science.gov (United States)

    Franco, O H; Karnik, K; Bonneux, L

    2007-09-01

    Recently society has been witnessing the rise of a new era in the prevention and treatment of the metabolic syndrome and cardiovascular disease: the Polyera. This new era started when a promising concept - the Polypill - was introduced by Wald et al. in 2003. The Polypill is a theoretical combination of six pharmacological compounds (a statin, three different antihypertensives, aspirin, and folic acid) that in combination could reduce cardiovascular disease by more than 80%. Although the Polypill could theoretically be a highly effective intervention, it is not yet available in the market and its effectiveness remains unproven. In the population at large, cheap prizes may come at prohibitive costs. With frail elderly and population prevalences of co-morbidity far higher than in drug trials, rare adverse effects may be frequent. In December 2004, a more natural, safer, and probably tastier alternative to the Polypill - the Polymeal - was introduced. Contrary to the Polypill, the Polymeal combined 6 different foods (fruits and vegetables, almonds, chocolate, wine, fish, and garlic) that taken together in a regular basis could cut cardiovascular disease risk by over 75%. Polyproducts from the polyera in true populations might hide unexpected polyinteractions. In the polyera, polytrials will need to establish benefits, harms, and costs.

  18. Knitting the Future Story of Indian Women: Preventing Violence, Fostering Development, and Accelerating Empowerment

    Directory of Open Access Journals (Sweden)

    Prerna S Ramteke

    2017-07-01

    Full Text Available A number of cases of women’s exploitation in India reflects serious problem in viewing and treating women. This article highlights the issues of women in India that are aimed to describe the violence against women in India that degrades their dignity as a human being, to analyze both conceptual and practical aspects of women, particularly with regards to their role in development and also to discuss the need for accelerating the empowerment of women in India. Some concepts such as the three classical approaches on the relationship between women and development are discussed in this writing. Besides this it also analyzes the present situation faced by Indian women that can potentially become obstacles for their development. In addition, this paper looks at some legal instruments and cases that relates to the legal protection of women in India. It is as a research in the field of Sociology that will be enriched by legal, cultural and economic approaches. It will also highlight about the dreams on the better situation for women in India that are expected to become true and will also encourage women in India to involve in any efforts to knit their future story.

  19. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  20. Surgical resource utilization in urban terrorist bombing: a computer simulation.

    Science.gov (United States)

    Hirshberg, A; Stein, M; Walden, R

    1999-09-01

    The objective of this study was to analyze the utilization of surgical staff and facilities during an urban terrorist bombing incident. A discrete-event computer model of the emergency room and related hospital facilities was constructed and implemented, based on cumulated data from 12 urban terrorist bombing incidents in Israel. The simulation predicts that the admitting capacity of the hospital depends primarily on the number of available surgeons and defines an optimal staff profile for surgeons, residents, and trauma nurses. The major bottlenecks in the flow of critical casualties are the shock rooms and the computed tomographic scanner but not the operating rooms. The simulation also defines the number of reinforcement staff needed to treat noncritical casualties and shows that radiology is the major obstacle to the flow of these patients. Computer simulation is an important new tool for the optimization of surgical service elements for a multiple-casualty situation.

  1. Morbidity management and disability prevention for lymphatic filariasis in Sri Lanka: Current status and future prospects.

    Science.gov (United States)

    Chandrasena, Nilmini; Premaratna, Ranjan; Gunaratna, Indeewarie E; de Silva, Nilanthi R

    2018-05-01

    Sri Lanka was acknowledged to have eliminated lymphatic filariasis (LF) as a public health problem in 2016, largely due to its success in Mass Drug Administration (MDA) to interrupt disease transmission. Analysis of the Strengths, Weaknesses, Opportunities and Threats (SWOT) of the national Morbidity Management and Disability Prevention (MMDP) program, the other pillar of the LF control program, was carried out with the objective of evaluating it and providing recommendations to optimize the use of available resources. A situation analysis of the MMDP activities provided by the state health sector was carried out using published records, in-depth interviews with key informants of the Anti Filariasis Campaign, site-visits to filariasis clinics with informal discussions with clinic workforce and personal communications to identify strengths and weaknesses; and opportunities to overcome weaknesses and perceived threats to the program were explored. The principal strength of the MMDP program was the filariasis clinics operational in most endemic districts of Sri Lanka, providing free health care and health education to clinic attendees. The weaknesses identified were the low accessibility of clinics, incomplete coverage of the endemic region and lack of facilities for rehabilitation. The perceived threats were diversion of staff and resources for control of other vector-borne infections, under-utilization of clinics and non-compliance with recommended treatment. Enhanced high level commitment for MMDP, wider publicity and referral systems, integration of MMDP with other disease management services and collaboration with welfare organizations and research groups were identified as opportunities to overcome weaknesses and challenges. The recommended basic package of MMDP was functional in most of the LF-endemic region. The highlighted weaknesses and challenges, unless addressed, may threaten program sustainability. The identified opportunities for improvement of the

  2. The Effect Terrorist Labels Have on Military Operations

    Science.gov (United States)

    2012-05-17

    Department until 2008.44 Nelson Mandela , the renowned member of the ANC and Nobel Prize laureate, became president of South Africa in 1994 and is...celebrated internationally as one of the most prolific and revolutionary leaders of the 20th century. Mandela received all these awards and accolades—many...models or key players during 44 Mimi Hall, "U.S. has Mandela on Terrorist List," USA Today, http

  3. MOTIVATION SPECIFIC FOR YOUNGSTERS INVOLVED INTO TERRORIST OPERATION

    OpenAIRE

    Beslan Alexeyevich Tarchokov

    2015-01-01

    The paper made an attempt to explore preconditions, motives, reasons and factors capable of facilitating youth’ involvement into terrorist operations, emergence of youth terrorism and its spreading around, including the specifics of social and economic domains, of ideology and politics, psychology and law, etc. all of them taken on the scene of nowadays globalized society. Specifying in greater detail the causes and circumstances that contributed to involvement of young Russians into terroris...

  4. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  5. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  6. Transition from Terrorist Event Management to Consequence Management, Executive Summary

    Science.gov (United States)

    1982-03-31

    hUMIEe " BDM/W-82-l1 5-TR AUTO11(o 1. CONTR ACT OR GRANT NumURe) J. C. Evanis, M. K. Pilgrim, C. J. Potter EMW-C-0744 9. PER•O^•ING ORGANIZATIN NAME...should, and is expected to, provide leadership in this regard. There exists a variety of experience and planning for responding to terrorist events. The

  7. Have the Mexican Drug Cartels Evolved into a Terrorist Insurgency?

    Science.gov (United States)

    2013-06-14

    individual police officers and journalists.55 Originally, the Gulf Cartel recruited them from Mexico’s Special Operations Forces, known as Grupo Aeromóvil de ...fluid situation surrounding the Mexican drug war has led to much speculation about how to classify the powerful drug cartels conducting it. There is... conducting it. There is literature debating whether the cartels are merely a criminal enterprise or whether the cartels represent a new terrorist

  8. Playing the villain : understanding the punishment and portrayal of terrorists

    OpenAIRE

    Spens, Christiana

    2017-01-01

    Playing the Villain argues that the portrayal and punishment of terrorists in the Western media perpetuates colonialist attitudes, due to the visual connections between these modern images and past or fictional representations of iconic, punished villains. A theory of scapegoating related to intervisuality supports this argument, by explaining that as a ritual dependent on and developed by cultural history and mythology, scapegoating requires engagement with recognisable visual motifs that...

  9. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    Science.gov (United States)

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  10. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  11. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  12. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  13. Severe accidents and terrorist threats at nuclear reactors

    International Nuclear Information System (INIS)

    Pollack, G.L.

    1987-01-01

    Some of the key areas of uncertainty are the nature of the physical and chemical interactions of released fission products and of the interactions between a molten core and concrete, the completeness and validity of the computer codes used to predict accidents, and the behavior of the containment. Because of these and other uncertainties, it is not yet possible to reliably predict the consequences of reactor accidents. It is known that for many accident scenarios, especially less severe ones or where the containment is not seriously compromised, the amount of radioactive material expected to escape the reactor is less, even much less, than was previously calculated. For such accidents, the predictions are easier and more reliable. With severe accidents, however, there is considerable uncertainty as to the predicted results. For accidents of the type that terrorists might cause - for example, where the sequence of failure would be unexpected or where redundant safety features are caused to fail together - the uncertainties are still larger. The conclusion, then, is that there are potential dangers to the public from terrorist actions at a nuclear reactor; however, because of the variety of potential terrorist threats and the incompleteness of the knowledge about the behavior of reactor components and fission products during accidents, the consequences cannot yet be assessed quantitatively

  14. Impunity for International Terrorists? Key Legal Questions and Practical Considerations

    Directory of Open Access Journals (Sweden)

    Christophe Paulussen

    2012-04-01

    Full Text Available This Research Paper discusses several of the key questions related to the subject of impunity of international terrorists, taking both a fundamental and a more practical approach within the context of international law. First, it reflects on a number of core definitional and theoretical questions which have been pushed into the background of day‐to‐day reality, by the actual fight against terrorism. For instance: what does the concept of impunity entail exactly and which kinds of standards could be used in measuring impunity? Is it clear what falls under the header of international terrorism and can it in fact be argued that international terrorists enjoy impunity? In practical terms, the paper explores a number of questions related to the actual prosecution of terrorism. What are the obstacles that national prosecutors face every day when prosecuting suspects of international terrorism? To what extent does a rule that prima facie seems ideal to fight terrorism (aut dedere aut judicare: either extradite or prosecute apply to terrorist offences? And what is the role of international criminal law – and the international criminal tribunals – in fighting terrorism? The Paper concludes with a series of recommendations.

  15. Breivik--the Norwegian terrorist case.

    Science.gov (United States)

    Syse, Aslak

    2014-01-01

    On July 22, 2011, there were two murderous attacks in Norway. Both assaults - the bombing of governmental buildings in Oslo City center and the lethal shooting down of young members of the Labour Party on an island - were planned and accomplished by a lone perpetrator. These episodes give rise to several interesting questions. What happened really, and how could it happen? Was the perpetrator sane or insane? What was the ideological background for the attacks? It is unnecessary to discuss in any detail whether or not these acts should be categorized as terrorism. However, there is good reason to consider what these terror attacks imply for Norwegian society at large. What significance did the attacks have for Norwegian democracy, and did they have any impact on the 2013 parliamentary elections? What will be the future for the offender, both in the short term and in years to come? What will happen to the Norwegian insanity defense? These questions are addressed in this article. Copyright © 2014 John Wiley & Sons, Ltd.

  16. Historical development of vaginal microbicides to prevent sexual transmission of HIV in women: from past failures to future hopes.

    Science.gov (United States)

    Notario-Pérez, Fernando; Ruiz-Caro, Roberto; Veiga-Ochoa, María-Dolores

    2017-01-01

    Infection with human immunodeficiency virus (HIV) remains a global public health concern and is particularly serious in low- and middle-income countries. Widespread sexual violence and poverty, among other factors, increase the risk of infection in women, while currently available prevention methods are outside the control of most. This has driven the study of vaginal microbicides to prevent sexual transmission of HIV from men to women in recent decades. The first microbicides evaluated were formulated as gels for daily use and contained different substances such as surfactants, acidifiers and monoclonal antibodies, which failed to demonstrate efficacy in clinical trials. A gel containing the reverse transcriptase inhibitor tenofovir showed protective efficacy in women. However, the lack of adherence by patients led to the search for dosage forms capable of releasing the active principle for longer periods, and hence to the emergence of the vaginal ring loaded with dapivirine, which requires a monthly application and is able to reduce the sexual transmission of HIV. The future of vaginal microbicides will feature the use of alternative dosage forms, nanosystems for drug release and probiotics, which have emerged as potential microbicides but are still in the early stages of development. Protecting women with vaginal microbicide formulations would, therefore, be a valuable tool for avoiding sexual transmission of HIV.

  17. Historical development of vaginal microbicides to prevent sexual transmission of HIV in women: from past failures to future hopes

    Directory of Open Access Journals (Sweden)

    Notario-Pérez F

    2017-06-01

    Full Text Available Fernando Notario-Pérez, Roberto Ruiz-Caro, María-Dolores Veiga-Ochoa Department of Pharmacy and Pharmaceutical Technology, School of Pharmacy, Universidad Complutense de Madrid, Madrid, Spain Abstract: Infection with human immunodeficiency virus (HIV remains a global public health concern and is particularly serious in low- and middle-income countries. Widespread sexual violence and poverty, among other factors, increase the risk of infection in women, while currently available prevention methods are outside the control of most. This has driven the study of vaginal microbicides to prevent sexual transmission of HIV from men to women in recent decades. The first microbicides evaluated were formulated as gels for daily use and contained different substances such as surfactants, acidifiers and monoclonal antibodies, which failed to demonstrate efficacy in clinical trials. A gel containing the reverse transcriptase inhibitor tenofovir showed protective efficacy in women. However, the lack of adherence by patients led to the search for dosage forms capable of releasing the active principle for longer periods, and hence to the emergence of the vaginal ring loaded with dapivirine, which requires a monthly application and is able to reduce the sexual transmission of HIV. The future of vaginal microbicides will feature the use of alternative dosage forms, nanosystems for drug release and probiotics, which have emerged as potential microbicides but are still in the early stages of development. Protecting women with vaginal microbicide formulations would, therefore, be a valuable tool for avoiding sexual transmission of HIV. Keywords: vaginal formulations, microbicides, prevention, sexual transmission, acquired immunodeficiency syndrome (AIDS, human immunodeficiency virus (HIV

  18. Infection prevention behaviour and infectious disease modelling: a review of the literature and recommendations for the future.

    Science.gov (United States)

    Weston, Dale; Hauck, Katharina; Amlôt, Richard

    2018-03-09

    Given the importance of person to person transmission in the spread of infectious diseases, it is critically important to ensure that human behaviour with respect to infection prevention is appropriately represented within infectious disease models. This paper presents a large scale scoping review regarding the incorporation of infection prevention behaviour in infectious disease models. The outcomes of this review are contextualised within the psychological literature concerning health behaviour and behaviour change, resulting in a series of key recommendations for the incorporation of human behaviour in future infectious disease models. The search strategy focused on terms relating to behaviour, infectious disease and mathematical modelling. The selection criteria were developed iteratively to focus on original research articles that present an infectious disease model with human-human spread, in which individuals' self-protective health behaviour varied endogenously within the model. Data extracted included: the behaviour that is modelled; how this behaviour is modelled; any theoretical background for the modelling of behaviour, and; any behavioural data used to parameterise the models. Forty-two papers from an initial total of 2987 were retained for inclusion in the final review. All of these papers were published between 2002 and 2015. Many of the included papers employed a multiple, linked models to incorporate infection prevention behaviour. Both cognitive constructs (e.g., perceived risk) and, to a lesser extent, social constructs (e.g., social norms) were identified in the included papers. However, only five papers made explicit reference to psychological health behaviour change theories. Finally, just under half of the included papers incorporated behavioural data in their modelling. By contextualising the review outcomes within the psychological literature on health behaviour and behaviour change, three key recommendations for future behavioural

  19. Anti-money laundering and counter-terrorist financing in the Luxembourg investment fund market

    OpenAIRE

    Dietz, Andrea

    2017-01-01

    The field of Anti-Money Laundering and Counter-Terrorist Financing in their current form have had an important impact on the financial world for almost half a century. Today, Money Laundering and Terrorist Financing pose a threat to the integrity of the financial markets and systems worldwide. The intention behind implementing a regulatory Anti-Money Laundering and Counter-Terrorist Financing framework is to cut off the financial resources of criminals and to follow back the traces that finan...

  20. Terrorist use of the Internet: exploitation and support through ICT infrastructure

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-03-01

    Full Text Available methods of fundraising are also possible. Electronic money transfer, laundering and generating support through front organisations are all fundraising methods used by terrorists (Goodman, Kirk & Kirk 2007). According to the Financial Action Task Force... agent. This allows terrorist groups to move money around without actually delivering the auctioned goods or services. Online casinos can be used for both laundering and storing money. When dealing with large sums of money, terrorists can place...

  1. Contextualizing willingness to participate: recommendations for engagement, recruitment & enrolment of Kenyan MSM in future HIV prevention trials

    Directory of Open Access Journals (Sweden)

    Monika Doshi

    2017-05-01

    Full Text Available Abstract Background The HIV epidemic among men who have sex with men (MSM continues to expand globally. The addition of an efficacious, prophylactic vaccine to combination prevention offers immense hope, particularly in low- and middle- income countries which bear the greatest global impact. However, in these settings, there is a paucity of vaccine preparedness studies that specifically pertain to MSM. Our study is the first vaccine preparedness study among MSM and female sex workers (FSWs in Kenya. In this paper, we explore willingness of Kenyan MSM to participate in HIV vaccine efficacy trials. In addition to individual and socio-cultural motivators and barriers that influence willingness to participate (WTP, we explore the associations or linkages that participants draw between their experiences with or knowledge of medical research both generally and within the context of HIV/AIDS, their perceptions of a future HIV vaccine and their willingness to participate in HIV vaccine trials. Methods Using a social network-based approach, we employed snowball sampling to recruit MSM into the study from Kisumu, Mombasa, and Nairobi. A field team consisting of seven community researchers conducted in-depth interviews with a total of 70 study participants. A coding scheme for transcribed and translated data was developed and the data was then analysed thematically. Results Most participants felt that an HIV vaccine would bring a number of benefits to self, as well as to MSM communities, including quelling personal fears related to HIV acquisition and reducing/eliminating stigma and discrimination shouldered by their community. Willingness to participate in HIV vaccine efficacy trials was highly motivated by various forms of altruism. Specific researcher responsibilities centred on safe-guarding the rights and well-being of participants were also found to govern WTP, as were reflections on the acceptability of a future preventive HIV vaccine. Conclusion

  2. The Next Terrorist Attack: Not If, But When...Are We Prepared?

    National Research Council Canada - National Science Library

    Lynch, David

    2004-01-01

    .... Since lessons learned from past attacks call attention to the terrorists' ability to overcome military defenses, the importance of well-developed, exercised response plans cannot be overstated...

  3. A scoping review of epidemiologic risk factors for pediatric obesity: Implications for future childhood obesity and dental caries prevention research.

    Science.gov (United States)

    Chi, Donald L; Luu, Monique; Chu, Frances

    2017-06-01

    important implications for future oral health research aimed at preventing childhood obesity and dental caries. Epidemiologic knowledge gleaned from the literature can be used to develop rigorous interventions and programs aimed at preventing these highly prevalent diseases and improving health outcomes for children. © 2017 American Association of Public Health Dentistry.

  4. Addressing the Foreign Terrorist Fighters Phenomenon From a European Union Perspective

    Directory of Open Access Journals (Sweden)

    Mark Singleton

    2014-12-01

    Full Text Available With the outbreak of civil war and sectarian violence in Syria, Iraq, and Libya, over 15,000 men and women from more than 80 countries around the world have left their homes to become foreign fighters. The security challenge they pose is immense and there are concerns about radicalised fighters returning to their countries of origin or residence, hardened by experience and with the possible intent – and the know-how – to engage in terrorist activities. On 24 September, the UN Security Council unanimously adopted Resolution 2178 (2014 with the support of over 120 states representing a broad cross-section of the UN membership. Resolution 2178 called on all UN member states to ensure increased border security and to screen for or arrest so-called “foreign terrorist fighters” (FTFs travelling to or returning from conflict areas. Rightly so, it also urges states to counter violent extremism by taking preventive measures, such as engaging with communities at the local level to stop the spread of extremist ideologies. On 23 October 2014, the Global Center on Cooperative Security, the Human Security Collective, and ICCT convened an expert meeting at the European Union (EU in Brussels to discuss the implications of the resolution and to explore appropriate and effective responses to the threat of FTFs, both within the EU and as part of the Union’s foreign security and development programming. Building upon the discussion in Brussels, this policy brief is a compilation of essays from all three organisations on the challenges and opportunities for addressing the FTF threat from a European Union perspective. It also examines the implementation of Resolution 2178 as an integral part of national and multilateral foreign security and development policies and initiatives.

  5. Suits Against Terrorist States by Victims of Terrorism

    Science.gov (United States)

    2008-05-01

    Nat’l City Bank v. Banco Para El Comercio Exterior de Cuba, 462 U.S. 611 (1983) (“Bancec”) to judgments against designated terrorist States. Bancec held...to determine both whether an exception to the Cuban Government’s immunity from garnishment also applies to [ Empresa de Telecomunicaciones de Cuba, S.A...was eventually reversed on other grounds by the U.S. Court of Appeals for the Eleventh Circuit — Alejandre v. Telefonica Larga Distancia de Puerto Rico

  6. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  7. Hidden Markov models for the activity profile of terrorist groups

    OpenAIRE

    Raghavan, Vasanthan; Galstyan, Aram; Tartakovsky, Alexander G.

    2012-01-01

    The main focus of this work is on developing models for the activity profile of a terrorist group, detecting sudden spurts and downfalls in this profile, and, in general, tracking it over a period of time. Toward this goal, a $d$-state hidden Markov model (HMM) that captures the latent states underlying the dynamics of the group and thus its activity profile is developed. The simplest setting of $d=2$ corresponds to the case where the dynamics are coarsely quantized as Active and Inactive, re...

  8. Determination of future prevention strategies in elite track and field: analysis of Daegu 2011 IAAF Championships injuries and illnesses surveillance

    Science.gov (United States)

    Alonso, Juan-Manuel; Edouard, Pascal; Fischetto, Giuseppe; Adams, Bob; Depiesse, Frédéric; Mountjoy, Margo

    2012-01-01

    Objective To determine the incidence and characteristics of newly incurred injuries and illnesses during international Athletics Championships, by improving the medical surveillance coverage, in order to determine future prevention strategies. Design Prospective recording of newly occurred injuries and illnesses. Setting 13th International Association of Athletics Federations World Championships in Athletics 2011 in Daegu, Korea. Participants National team and Local Organising Committee physicians; and 1851 registered athletes. Main outcome measures Incidence and characteristics of newly incurred injuries and illnesses. Results 82% of athletes were covered by medical teams participating with a response rate of 94%. A total of 249 injuries were reported, representing an incidence of 134.5 injuries per 1000 registered athletes, and 119 (48%) resulted in time loss from sport. A total of 185 injuries affected the lower limb (74%). Hamstring strain was the main diagnosis and 67% resulted in absence from sport. Overuse (n=148; 59%) was the predominant cause. A total of 126 illnesses were reported, signifying an incidence of 68.1 per 1000 registered athletes. Upper respiratory tract infection was the most common reported diagnosis (18%), followed by exercise-induced dehydration (12%), and gastroenteritis/diarrhoea (10%). The highest incidences of injuries were found in combined events and middle and long-distance events, and of illness in race walking events. Conclusion During elite Athletics World Championships, 135 injuries, 60 time-loss injuries and 68 illnesses per 1000 registered athletes were reported. Higher risks of injuries were found in combined events and long-distance runs. Preventive interventions should focus on overuse injuries and hamstring strains, decreasing the risk of transmission of infectious diseases, appropriate event scheduling and heat acclimatisation. PMID:22522588

  9. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  10. Operation of a low-level waste disposal facility and how to prevent problems in future facilities

    International Nuclear Information System (INIS)

    Di Sibio, R.

    1985-01-01

    Operation of a low-level waste facility is an ever increasing problem nationally, and specifically one that could grow to crisis proportion in Pennsylvania. There have been, nevertheless, a variety of changes over the years in the management of low level radioactive waste, particularly with regard to disposal facilities that can avert a crisis condition. A number of companies have been organized thru possible a broad range of services to the nuclear industry, including those that emphasize solidification of waste materials, engineering services, waste management, and transportation to disposal sites across the United States. This paper addresses one particular site and the problems which evolved at that site from an environmental perspective. It is important that it is clearly understood that, although these problems are resolvable, the lessons learned here are critical for the prevention of problems at future facilities. The focus of this paper is on the Maxey Flats, Kentucky disposal facility which was closed in 1977. It must be understood that the regulations for siting, management, burial techniques, waste classification, and the overall management of disposal sites were limited when this facility was in operation

  11. Scientific Support of Terrorist Actions by Commercial Grey Area Literature

    International Nuclear Information System (INIS)

    Katzung, W.

    2007-01-01

    The publication of the Al-Quaida handbook and time and time again notes of the possibility for getting special scientific knowledge from the internet have decreased the attention for an other important source of scientific support for terrorist education and/or actions. This is the commercial available and distributed grey area literature provided by a huge amount of (book) sellers and publishing houses. Most of this literature (hard copies and CDs) with dangerous subject matter is published in the US and may be ordered fast and with low costs using the internet. This kind of support for real and potential terrorists stands strongly in contradiction to the official policy and the 'unconditional' war against terrorism. With the presented poster the above described problem should be a little bit put in the focus of the CBMTS community and so to the authorities, too. By means of selected examples from different branches, such as Narcotics, Explosives, unusual Killing Methods, special Poisons / Toxins and, last not least, CW agents inclusive application methods and devices the highly charged situation is tried to shown. (author)

  12. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  13. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  14. TePiTri : a screening method for assessing terrorist-related pipeline transport risks

    NARCIS (Netherlands)

    Reniers, G.; Dullaert, W.E.H.

    2012-01-01

    The article proposes an approach to determine relative terrorist-related security risk levels of pipeline transportation. Pipeline routes are divided into smaller route segments. Subsequently, likelihood scores of possible terrorist-related incidents are determined per route segment and per

  15. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  16. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  17. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  18. Addiction research centres and the nurturing of creativity: The Swiss Institute for the Prevention of Alcohol and Drug Problems. Past, present and future

    NARCIS (Netherlands)

    Kuntsche, E.N.; Maffli, E.; Kuntsche, S.; Delgrande Jordan, M.

    2009-01-01

    The aim of this paper is to offer an account of the history, the current status and the future of substance use research at the Swiss Institute for the Prevention of Alcohol and Drug Problems (SIPA). Although founded originally by the temperance movement in 1901, its policy has shifted over time

  19. Terrorist threat, chemical, biological, radiological, nuclear medical approach; Menace terroriste, approche medicale nucleaire, radiologique, biologique, chimique

    Energy Technology Data Exchange (ETDEWEB)

    Revel, Th. de [Hopital d' Instruction des Armees Percy, 92 - Clamart (France); Gourmelon, P. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Clamart (France); Vidal, D. [Centre de Recherche du Service de Sante des Armees, 38 - La Tronche (France); Renaudeau, C. [Ecole du Val de Grace, 92 - Clamart (France)

    2005-07-01

    The different aspects linked to the use of nuclear, radiological, biological and or chemical weapons are gathered in this work. They concern history, fundamental aspect, diagnosis, therapy and prevention. The part devoted to the nuclear aspect concern the accidents in relation with ionizing radiations, the radiation syndrome, the contribution and limits of dosimetry, the treatment of medullary aplasia, the evaluation and treatment of an internal contamination, new perspectives on the use of cytokine for the treatment of accidental irradiated persons, alternative to the blood transfusion. (N.C.)

  20. "Evita Una Muerte, Esta en Tus Manos" Program: Bystander First Aid Training for Terrorist Attacks.

    Science.gov (United States)

    Pajuelo Castro, J J; Meneses Pardo, J C; Salinas Casado, P L; Hernandez Martin, P; Montilla Canet, R; Del Campo Cuesta, J L; Incera Bustio, G; Martin Ayuso, D

    The latest terrorist attacks in Europe and in the rest of the world, and the military experience in the most recent conflicts leave us with several lessons learned. The most important is that the fate of the wounded rests in the hands of the one who applies the first dressing, because the victims usually die within the first 10 minutes, before professional care providers or police personnel arrive at the scene. A second lesson is that the primary cause of preventable death in these types of incidents involving explosives and firearms is massive hemorraghe. There is a need to develop a training oriented to citizens so they can identify and use available resources to avoid preventable deaths that occur in this kind of incidents, especially massive hemorrhage. A 7-hour training intervention program was developed and conducted between January and May 2017. Data were collected from participants' answers on a multiple-choice test before and after undertaking the training. Improved mean score for at least 75% of a group's members on the posttraining test was considered reflective of adequate knowledge. A total of 173 participants (n = 74 men [42.8%]; n = 99 women [57.2%]) attended the training. They were classified into three groups: a group of citizens/ first responders with no prior health training, a group of health professionals, and a group of nursing students. Significant differences (ρ first responders group. 2017.

  1. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  2. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  3. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  4. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-03-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.

  5. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  6. Designing Supervision under the preventive Anti-money laundering policy in the European Union

    OpenAIRE

    van den Broek, Melissa

    2014-01-01

    Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing is currently one of the main instruments which regulates efforts to combat money laundering (and terrorist financing) in the European Union. Respecting national procedural autonomy, this directive leaves a high degree of freedom for the Member States in designing their own supervisory architectures under the preventive anti-money laundering policy. This contrib...

  7. The past, present and future use of epidemiological intelligence to plan malaria vector control and parasite prevention in Uganda.

    Science.gov (United States)

    Talisuna, Ambrose O; Noor, Abdisalan M; Okui, Albert P; Snow, Robert W

    2015-04-15

    An important prelude to developing strategies to control infectious diseases is a detailed epidemiological evidence platform to target cost-effective interventions and define resource needs. A review of published and un-published reports of malaria vector control and parasite prevention in Uganda was conducted for the period 1900-2013. The objective was to provide a perspective as to how epidemiological intelligence was used to design malaria control before and during the global malaria eradication programme (GMEP) and to contrast this with the evidence generated in support of the Roll Back Malaria (RBM) initiative from 1998 to date. During the GMEP era, comprehensive investigations were undertaken on the effectiveness of vector and parasite control such as indoor residual house-spraying (IRS) and mass drug administration (MDA) at different sites in Uganda. Nationwide malariometric surveys were undertaken between 1964 and 1967 to provide a profile of risk, epidemiology and seasonality leading to an evidence-based national cartography of risk to characterize the diversity of malaria transmission in Uganda. At the launch of the RBM initiative in the late 1990s, an equivalent level of evidence was lacking. There was no contemporary national evidence-base for the likely impact of insecticide-treated nets (ITN), no new malariometric data, no new national cartography of malaria risk or any evidence of tailored intervention delivery based on variations in the ecology of malaria risk in Uganda. Despite millions of dollars of overseas development assistance over the last ten years in ITN, and more recently the resurrection of the use of IRS, the epidemiological impact of vector control remains uncertain due to an absence of nationwide basic parasite and vector-based field studies. Readily available epidemiological data should become the future business model to maximize malaria funding from 2015. Over the next five to ten years, accountability, impact analysis, financial

  8. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  9. Narratives from caregivers of children surviving the terrorist attack in Beslan: issues of health, culture, and resilience.

    Science.gov (United States)

    Moscardino, Ughetta; Axia, Giovanna; Scrimin, Sara; Capello, Fabia

    2007-04-01

    Acts of terrorism have an extremely negative impact on the mental health of children and families. The school siege in Beslan, Russia, in 2004, represents a particularly traumatizing event as it was directed specifically at children and involved the entire community. This qualitative study aims to: (a) examine caregiver reactions to the terrorist attack in Beslan as reported 3 months after the traumatic event; (b) determine the extent to which indigenous cultural values and religious belief systems play a role in Beslan's caregivers' reactions to such event; and (c) identify variables that may function as sources of resilience to caregivers. A convenience sample of 17 primary caregivers from Beslan with at least one child who survived the school siege were asked to participate in semi-structured interviews. Narratives generated from the interviews were qualitatively analyzed using a thematic approach; nine major themes were identified. Caregivers' concerns centered on children's physical and psychological well-being, the reorganization of family life, and the disruption of community ties. Cultural values of pride, heroism, courage, and revenge emerged as relevant aspects shaping caregivers' reactions to the traumatic event. Possible sources of resilience included the willingness to return to normality, social support, and the reaffirmation of positive, culturally shared values in face of the perceived threat of future terrorist attacks. Findings are discussed in terms of their theoretical implications on the effects of trauma on children and families as well as interventions with highly traumatized populations in diverse cultural settings.

  10. Women Veterans? Experience With a Web-Based Diabetes Prevention Program: A Qualitative Study to Inform Future Practice

    OpenAIRE

    Moin, Tannaz; Ertl, Kristyn; Schneider, Jessica; Vasti, Elena; Makki, Fatima; Richardson, Caroline; Havens, Kathryn; Damschroder, Laura

    2015-01-01

    Background Diabetes prevention is a national goal and particularly important in the Veterans Health Administration (VHA) where 1 in 4 veterans has diabetes. There is growing evidence to support the use of Web-based diabetes prevention program (DPP) interventions, shown to be as effective and often more feasible than in-person interventions. Objective Our primary objective was to qualitatively explore women veterans? early experiences with a Web-based DPP intervention. Our secondary objective ...

  11. Ariadne´s house (Pompeii, Italy) wall paintings: A multidisciplinary study of its present state focused on a future restoration and preventive conservation

    OpenAIRE

    Pérez, M.C.; García-Diego, F. J.; Merello, P.; D’Antoni, P.; Fernández-Navajas, A.; Ribera i Lacomba, A.; Ferrazza, L.; Pérez-Miralles, J.; Baró, José-Luis; Merce, P.; D’Antoni, H.; Curiel-Esparza, J.

    2013-01-01

    This paper deals with the development of a multidisciplinary study on the current state of conservation of Ariadne's house (Pompeii, Italy), a domus of great archaeological value. The aim of this study is to undertake the preventive conservation actions required and increase the knowledge about its conservation and to generate discussions and points of view for a future restoration. Environmental studies, electromagnetic radiation measurements, study of materials and a photographical study we...

  12. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    National Research Council Canada - National Science Library

    Hudson, Rex A

    1999-01-01

    ...) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure...

  13. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    This study is based on open source research into the scope of Asian organized crime and terrorist activity in Canada during the period 1999 to 2002, and the extent of cooperation and possible overlap...

  14. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  15. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  16. Improving Local and State Agency Response to Terrorist Incidents Involving Biological Weapons

    National Research Council Canada - National Science Library

    2003-01-01

    .... Because of multiple terrorist acts such as the September II, 2001 attacks on the Pentagon and the World Trade Center, as well as anthrax contaminated mail and the Oklahoma City bombing, there is a...

  17. 40 years of terrorist bombings - A meta-analysis of the casualty and injury profile.

    Science.gov (United States)

    Edwards, D S; McMenemy, L; Stapley, S A; Patel, H D L; Clasper, J C

    2016-03-01

    Terrorists have used the explosive device successfully globally, with their effects extending beyond the resulting injuries. Suicide bombings, in particular, are being increasingly deployed due to the devastating effect of a combination of high lethality and target accuracy. The aim of this study was to identify trends and analyse the demographics and casualty figures of terrorist bombings worldwide. Analysis of the Global Terrorism Database (GTD) and a PubMed/Embase literature search (keywords "terrorist", and/or "suicide", and/or "bombing") from 1970 to 2014 was performed. 58,095 terrorist explosions worldwide were identified in the GTD. 5.08% were suicide bombings. Incidents per year are increasing (Pprofile of survivors to guide the immediate response by the medical services and the workload in the coming days. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Changing the story the role of the narrative in the success or failure of terrorist groups

    OpenAIRE

    Mellen, Brian C.

    2009-01-01

    Approved for public release, distribution unlimited This thesis focuses on the nexus between a terrorist group's narrative and the group's success or failure in achieving its strategic goals. This work theorizes that the interaction of competing narratives exerts a systematic impact on the ability of the terrorist group to achieve its strategic goals through the influence that the narratives have over a group's members, the group's adversary, and the affected population. Although a te...

  19. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    OpenAIRE

    Li MingChu; Yang Zekun; Lu Kun; Guo Cheng

    2017-01-01

    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watch...

  20. The human body as a terrorist weapon: hunger strikes and suicide bombers

    OpenAIRE

    Mollica, Marcello; Dingley, James

    2007-01-01

    This article argues that a major factor in terrorist acts is an appeal to the actor's own community at an emotional and symbolic level, through acts of sacrifice, particularly self-sacrifice. Although other aims also exist, a prime concern is to recall the actor's home audience to the struggle, because the actor regards himself as acting on their behalf. This utilizes the imagery and symbolism of traditional religion, implying a strong communal and non-material impetus to terrorist acts, rath...

  1. Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations

    OpenAIRE

    Roy, de, van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents th...

  2. The personality profile of terrorist leaders: theoretical aspects and ways of measuring

    OpenAIRE

    Dimitrovska, Aleksandra; Dojcinovski, Metodija

    2015-01-01

    The main task of the psychology of terrorism is to explain the psychological aspects of terrorism, trying to provide answers about the behavior of the persons involved in terrorist activities. The literature suggests that there is no a single theory that explains the reasons and the way of "making the terrorists." While the first generation of research have viewed on terrorism as a pathology, explaining it predominantly through mental illness and psychopathic personality, th...

  3. Averting HIV infections in New York City: a modeling approach estimating the future impact of additional behavioral and biomedical HIV prevention strategies.

    Science.gov (United States)

    Kessler, Jason; Myers, Julie E; Nucifora, Kimberly A; Mensah, Nana; Kowalski, Alexis; Sweeney, Monica; Toohey, Christopher; Khademi, Amin; Shepard, Colin; Cutler, Blayne; Braithwaite, R Scott

    2013-01-01

    New York City (NYC) remains an epicenter of the HIV epidemic in the United States. Given the variety of evidence-based HIV prevention strategies available and the significant resources required to implement each of them, comparative studies are needed to identify how to maximize the number of HIV cases prevented most economically. A new model of HIV disease transmission was developed integrating information from a previously validated micro-simulation HIV disease progression model. Specification and parameterization of the model and its inputs, including the intervention portfolio, intervention effects and costs were conducted through a collaborative process between the academic modeling team and the NYC Department of Health and Mental Hygiene. The model projects the impact of different prevention strategies, or portfolios of prevention strategies, on the HIV epidemic in NYC. Ten unique interventions were able to provide a prevention benefit at an annual program cost of less than $360,000, the threshold for consideration as a cost-saving intervention (because of offsets by future HIV treatment costs averted). An optimized portfolio of these specific interventions could result in up to a 34% reduction in new HIV infections over the next 20 years. The cost-per-infection averted of the portfolio was estimated to be $106,378; the total cost was in excess of $2 billion (over the 20 year period, or approximately $100 million per year, on average). The cost-savings of prevented infections was estimated at more than $5 billion (or approximately $250 million per year, on average). Optimal implementation of a portfolio of evidence-based interventions can have a substantial, favorable impact on the ongoing HIV epidemic in NYC and provide future cost-saving despite significant initial costs.

  4. The 1983 Beirut Airport terrorist bombing. Injury patterns and implications for disaster management.

    Science.gov (United States)

    Frykberg, E R; Tepas, J J; Alexander, R H

    1989-03-01

    The casualty profile and results of the medical care provided for the survivors of the terrorist truck bombing of the U.S. Marine Corps facility in Beirut, Lebanon, in 1983 were reviewed to determine the factors that influenced casualty survival. This explosion resulted in 346 casualties, of whom 234 (68%) were immediately killed. The spectrum of injury was determined in 85 survivors using the Injury Severity Score (ISS). There were seven (6.3%) deaths among the 112 immediate survivors. All deaths occurred among the 19 (17%) victims who were critically injured (ISS greater than 15), giving a mortality in this population of 37 per cent. Six (86%) of the seven deaths were associated with an initial delay in treatment. Head injury was the most common fatal injury among both immediate fatalities (71.4%) and immediate survivors (57%). Thoracic injury and burns each accounted for 29 per cent of survivor deaths. Triage efficiency, as determined by the rates of overtriage (80%) and undertriage (0), did not appear adversely to affect mortality. Critical analysis of disasters such as this can contribute to improvements in preparation and casualty care in the event of future disasters.

  5. The Future of Research on Evidence-based Developmental Violence Prevention in Europe – Introduction to the Focus Section

    Directory of Open Access Journals (Sweden)

    Manuel Eisner

    2012-12-01

    Full Text Available Across Europe, there is an increasing demand for good evidence that can inform policies aimed at reducing violence against and among children and adolescents. However, there is still a paucity of high-quality research on effective prevention of bullying and violence, and researchers from different parts of Europe rarely discuss their findings. The focus section of this issue of the International Journal of Conflict and Violence brings together work by prominent preventionscholars from across Europe, who show that significant progress is being made. The introduction presents nine recommendations about how prevention research could be further strengthened in Europe.

  6. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  7. An Overview of NCRP Report No. 138 on Terrorist Activities

    Science.gov (United States)

    Poston, John, Sr.

    2005-04-01

    In late 1998, the National Council on Radiation Protection and Measurements (NCRP) convened Scientific Committee 46-14 to prepare a report on the radiological safety aspects of terrorist activities involving radioactivity. The work of this committee was funded through a contract with the Planning and Preparedness Division of the Office of Emergency Management of the Department of Energy. The committee was composed of a diverse group of individuals with expertise in many areas in addition to radiation safety and emergency response. These areas included law (both federal and state), public communications, and psychosocial aspects of such incidents. The statement of work focused the work of the committee, and the resulting report did not necessarily address all issues of such activities. One of the charges of the committee was to provide guidance as to necessary research and make recommendations regarding the present infrastructure with the responsibility for responding to such incidents. This presentation will provide an overview of NCRP Report No. 138 and focus on some of the critical issues raised in the report. These issues include recognition of the event, the interface between federal, state, and local authorities, exposure limits for the first-responders, clean-up criteria, training and resources, the psychosocial aspects of such events, and communications with the media and the public. This report represented the ``beginning'' of such considerations. It pointed the way for additional studies and research in this very important area.

  8. Foreign (Terrorist Fighter Estimates: Conceptual and Data Issues

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2015-10-01

    Full Text Available This Policy Brief – a short version of a larger Research Paper to be released by ICCT in late 2015 – focuses on the phenomenon of foreign (terrorist fighters (FTFs as it relates to Syria and Iraq. It concentrates on recruits to jihad and the astonishing growth in numbers from less than 1,000 in 2011 to more than 3,500 in 2012, 8,500+ in 2013, 18,000+ in 2014 to more than 25,000 by fall 2015. By October 2015, nearly 30,000 militants from more than 100 countries had become foreign fighters with the so-called “Islamic State” (IS in Syria and Iraq and other militant groups. This Policy Brief first discusses various definitions of FTFs by disaggregating the “foreign”, “terrorist” and “fighters” elements of FTFs of the UN Security Council definition in resolution 2178 (2014. Subsequently, an attempt is made to bring some structure and order to the widely diverging estimates of the numbers of foreign fighters and their origins, with tables presenting the best available estimates for different sides of the conflict at different moments in time since 2011. UN estimates on foreign fighters are juxtaposed with estimates from other sources. The biggest uncertainty is the ratio of foreign fighters to IS own core manpower. It is likely that at least 40 percent of the fighters of IS are foreigners and many more if Iraqis in Syria are counted as such.

  9. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  10. Screening Cargo Containers to Remove a Terrorist Threat

    International Nuclear Information System (INIS)

    Hazi, A

    2005-01-01

    Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S

  11. Modeling cascading failures in interdependent infrastructures under terrorist attacks

    International Nuclear Information System (INIS)

    Wu, Baichao; Tang, Aiping; Wu, Jie

    2016-01-01

    An attack strength degradation model has been introduced to further capture the interdependencies among infrastructures and model cascading failures across infrastructures when terrorist attacks occur. A medium-sized energy system including oil network and power network is selected for exploring the vulnerabilities from independent networks to interdependent networks, considering the structural vulnerability and the functional vulnerability. Two types of interdependencies among critical infrastructures are involved in this paper: physical interdependencies and geographical interdependencies, shown by tunable parameters based on the probabilities of failures of nodes in the networks. In this paper, a tolerance parameter α is used to evaluation of the overloads of the substations based on power flow redistribution in power transmission systems under the attack. The results of simulation show that the independent networks or interdependent networks will be collapsed when only a small fraction of nodes are attacked under the attack strength degradation model, especially for the interdependent networks. The methodology introduced in this paper with physical interdependencies and geographical interdependencies involved in can be applied to analyze the vulnerability of the interdependent infrastructures further, and provides the insights of vulnerability of interdependent infrastructures to mitigation actions for critical infrastructure protections. - Highlights: • An attack strength degradation model based on the specified locations has been introduced. • Interdependencies considering both physical and geographical have been analyzed. • The structural vulnerability and the functional vulnerability have been considered.

  12. HIV Prevention Service Utilization in the Los Angeles House and Ball Communities: Past Experiences and Recommendations for the Future

    Science.gov (United States)

    Holloway, Ian W.; Traube, Dorian E.; Kubicek, Katrina; Supan, Jocelyn; Weiss, George; Kipke, Michele D.

    2012-01-01

    African-American young men who have sex with men and transgender persons are at elevated risk for HIV infection. House and Ball communities, networks of mostly African-American gay, bisexual, and transgender individuals who compete in modeling and dance, represent a prime venue for HIV prevention with these difficult-to-reach populations; however,…

  13. Prevention of Mental Health Disorders using Internet and mobile-based Interventions: a narrative review and recommendations for future research.

    NARCIS (Netherlands)

    Ebert, David Daniel; Cuijpers, Pim; Muñoz, Ricardo F.; Baumeister, Harald

    2017-01-01

    Although psychological interventions might have a tremendous potential for the prevention of mental health disorders (MHD), their current impact on the reduction of disease burden is questionable. Possible reasons include that it is not practical to deliver those interventions to the community en

  14. Prevention of mental health disorders using internet- and mobile-based interventions : A narrative review and recommendations for future research

    NARCIS (Netherlands)

    Ebert, David Daniel; Cuijpers, Pim; Muñoz, Ricardo F.; Baumeister, Harald

    2017-01-01

    Although psychological interventions might have a tremendous potential for the prevention of mental health disorders (MHD), their current impact on the reduction of disease burden is questionable. Possible reasons include that it is not practical to deliver those interventions to the community en

  15. Participation in ball sports may represent a prehabilitation strategy to prevent future stress fractures and promote bone health in young athletes.

    Science.gov (United States)

    Tenforde, Adam Sebastian; Sainani, Kristin Lynn; Carter Sayres, Lauren; Milgrom, Charles; Fredericson, Michael

    2015-02-01

    Sports participation has many benefits for the young athlete, including improved bone health. However, a subset of athletes may attain suboptimal bone health and be at increased risk for stress fractures. This risk is greater for female than for male athletes. In healthy children, high-impact physical activity has been shown to improve bone health during growth and development. We offer our perspective on the importance of promoting high-impact, multidirectional loading activities, including ball sports, as a method of enhancing bone quality and fracture prevention based on collective research. Ball sports have been associated with greater bone mineral density and enhanced bone geometric properties compared with participation in repetitive, low-impact sports such as distance running or nonimpact sports such as swimming. Runners and infantry who participated in ball sports during childhood were at decreased risk of future stress fractures. Gender-specific differences, including the coexistence of female athlete triad, may negate the benefits of previous ball sports on fracture prevention. Ball sports involve multidirectional loading with high ground reaction forces that may result in stiffer and more fracture-resistant bones. Encouraging young athletes to participate in ball sports may optimize bone health in the setting of adequate nutrition and in female athletes, eumenorrhea. Future research to determine timing, frequency, and type of loading activity could result in a primary prevention program for stress fracture injuries and improved life-long bone health. Copyright © 2015 American Academy of Physical Medicine and Rehabilitation. Published by Elsevier Inc. All rights reserved.

  16. Identification of critical locations across multiple infrastructures for terrorist actions

    International Nuclear Information System (INIS)

    Patterson, S.A.; Apostolakis, G.E.

    2007-01-01

    This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7 m of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIS) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIS system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when infrastructures

  17. Comment on the first anniversary of the terrorist attacks in the United States of America. Vienna, 11 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The attacks in September 2001 were, however, a wake-up call to the world nuclear community that more can and must be done. In the wake of the terrorist attacks, Member States of the IAEA meeting in the Agency's General Conference adopted a resolution requesting that the IAEA Director General initiate a thorough review of the Agency's activities and programmes relevant to preventing acts of terrorism involving nuclear and other radioactive materials. The Agency moved rapidly to respond. It devised and is presently implementing an integrated action plan which includes enhanced and new activities to upgrade nuclear security worldwide and to combat nuclear terrorism. The plan covers eight areas: (1) physical protection of nuclear material and nuclear facilities; (2) detection of malicious activities (such as illicit trafficking) involving nuclear and other radioactive materials; (3) strengthening of State systems for nuclear material accountancy and control; (4) security of radioactive sources; (5) the assessment of safety and security related vulnerabilities at nuclear facilities; (6) response to malicious acts or threats thereof; (7) the adherence to international agreements and guidelines; and (8) co-ordination and information management for nuclear security related matters. National measures for protecting nuclear material and facilities remain uneven in their substance and application. There is wide recognition that the international physical protection regime needs to be further strengthened. Through its International Physical Protection Advisory Service (IPPAS), the Agency provides Member States with assessment services, together with associated advice and follow up actions to improve security arrangements at nuclear facilities. It also provides training and workshops, notably in assessing threats, as well as other supporting

  18. August, 2002 - floods events, affected areas revitalisation and prevention for the future in the central Bohemian region, Czech Republic

    Science.gov (United States)

    Bina, L.; Vacha, F.; Vodova, J.

    2003-04-01

    Central Bohemian Region is located in a shape of a ring surrounding the capitol of Prague. Its total territorial area is 11.014 sq.km and population of 1 130.000 inhabitants. According to EU nomenclature of regional statistical units, the Central Bohemian Region is classified as an independent NUTS II. Bohemia's biggest rivers, Vltava and Labe form the region's backbone dividing it along a north-south line, besides that there are Sazava and Berounka, the two big headwaters of Vltava, which flow through the region and there also are some cascade man made lakes and 2 important big dams - Orlik and Slapy on the Vltava River in the area of the region. Overflowing of these rivers and their feeders including cracking of high-water dams during the floods in August 2002 caused total or partial destruction or damage of more than 200 towns and villages and total losses to the extend of 450 mil. EUR. The worst impact was on damaged or destroyed human dwellings, social infrastructure (schools, kindergartens, humanitarian facilities) and technical infrastructure (roads, waterworks, power distribution). Also businesses were considerably damaged including transport terminals in the area of river ports. Flowage of Spolana Neratovice chemical works caused critical environmental havoc. Regional crisis staff with regional Governor in the lead worked continuously during the floods and a regional integrated rescue system was subordinated to it. Due to the huge extent of the floods the crisis staff coordinated its work with central bodies of state including the Government and single "power" resorts (army, interior, transport). Immediately after floods a regional - controlled management was set up including an executive body for regional revitalisation which is connected to state coordinating resort - Ministry for Local Development, EU sources and humanitarian aid. In addition to a program of regional revitalisation additional preventive flood control programs are being developed

  19. Framework for Analyzing the Future Threat of WMD Terrorism

    Directory of Open Access Journals (Sweden)

    James J.F. Forest

    2012-01-01

    Full Text Available This article examines theories of practical and strategic constraints that collectively explain why so few terrorist groups in history have crossed (or attempted to cross the WMD threshold. From this analysis, it becomes clear that a terrorist group's deliberations about WMD can be influenced (positively or negatively by a variety of factors. Our projections of the future WMD terrorism threat must therefore account for changes in the kinds of practical and strategic constraints that could lead to an increased willingness and/or capability of a group to pursue these kinds of weapons. Further, there are ways in which governments can influence a terrorist group's decision-making and thus have a direct impact on the future evolution of the WMD terrorism threat.

  20. Nanoparticle Delivery of Natural Products in the Prevention and Treatment of Cancers: Current Status and Future Prospects

    International Nuclear Information System (INIS)

    Bharali, Dhruba J.; Siddiqui, Imtiaz A.; Adhami, Vaqar M.; Chamcheu, Jean Christopher; Aldahmash, Abdullah M.; Mukhtar, Hasan; Mousa, Shaker A.

    2011-01-01

    The advent of nanotechnology has had a revolutionary impact on many aspects of 21 st century life. Nanotechnology has provided an opportunity to explore new avenues that conventional technologies have been unable to make an impact on for diagnosis, prevention, and therapy of different diseases, and of cancer in particular. Entities in nanometer sizes are excellent platforms to incorporate various drugs or active materials that can be delivered effectively to the desired action site without compromising the activity of the incorporated drug or material. In particular, nanotechnology entities can be used to deliver conventional natural products that have poor solubility or a short half life. Conventional natural products used with entities in nanometer sizes enable us to solve many of the inherent problems (stability, solubility, toxicity) associated with natural products, and also provide a platform for targeted delivery to tumor sites. We recently introduced the novel concept of using nanotechnology for enhancing the outcome of chemoprevention, which we called ‘nanochemoprevention’. This idea was subsequently exploited by several laboratories worldwide and has now become an advancing field in chemoprevention research. This review examines some of the applications of nanotechnology for cancer prevention and therapy using natural products

  1. Nanoparticle Delivery of Natural Products in the Prevention and Treatment of Cancers: Current Status and Future Prospects

    Directory of Open Access Journals (Sweden)

    Hasan Mukhtar

    2011-10-01

    Full Text Available The advent of nanotechnology has had a revolutionary impact on many aspects of 21st century life. Nanotechnology has provided an opportunity to explore new avenues that conventional technologies have been unable to make an impact on for diagnosis, prevention, and therapy of different diseases, and of cancer in particular. Entities in nanometer sizes are excellent platforms to incorporate various drugs or active materials that can be delivered effectively to the desired action site without compromising the activity of the incorporated drug or material. In particular, nanotechnology entities can be used to deliver conventional natural products that have poor solubility or a short half life. Conventional natural products used with entities in nanometer sizes enable us to solve many of the inherent problems (stability, solubility, toxicity associated with natural products, and also provide a platform for targeted delivery to tumor sites. We recently introduced the novel concept of using nanotechnology for enhancing the outcome of chemoprevention, which we called ‘nanochemoprevention’. This idea was subsequently exploited by several laboratories worldwide and has now become an advancing field in chemoprevention research. This review examines some of the applications of nanotechnology for cancer prevention and therapy using natural products.

  2. Nanoparticle Delivery of Natural Products in the Prevention and Treatment of Cancers: Current Status and Future Prospects

    Energy Technology Data Exchange (ETDEWEB)

    Bharali, Dhruba J. [The Pharmaceutical Research Institute at Albany College of Pharmacy and Health Sciences, 1 Discovery Drive, Rensselaer, NY 12144 (United States); Siddiqui, Imtiaz A.; Adhami, Vaqar M.; Chamcheu, Jean Christopher [Department of Dermatology, University of Wisconsin, Madison, WI 53706 (United States); Aldahmash, Abdullah M. [Stem Cell Unit, College of Medicine, King Saud University, Riyadh, 11461 (Saudi Arabia); University Hospital of Odense & Medical Biotechnology Center, Winslowsparken 25, DK-5000, Odense (Denmark); Mukhtar, Hasan [Department of Dermatology, University of Wisconsin, Madison, WI 53706 (United States); Mousa, Shaker A., E-mail: shaker.mousa@acphs.edu [The Pharmaceutical Research Institute at Albany College of Pharmacy and Health Sciences, 1 Discovery Drive, Rensselaer, NY 12144 (United States); Stem Cell Unit, College of Medicine, King Saud University, Riyadh, 11461 (Saudi Arabia)

    2011-10-26

    The advent of nanotechnology has had a revolutionary impact on many aspects of 21{sup st} century life. Nanotechnology has provided an opportunity to explore new avenues that conventional technologies have been unable to make an impact on for diagnosis, prevention, and therapy of different diseases, and of cancer in particular. Entities in nanometer sizes are excellent platforms to incorporate various drugs or active materials that can be delivered effectively to the desired action site without compromising the activity of the incorporated drug or material. In particular, nanotechnology entities can be used to deliver conventional natural products that have poor solubility or a short half life. Conventional natural products used with entities in nanometer sizes enable us to solve many of the inherent problems (stability, solubility, toxicity) associated with natural products, and also provide a platform for targeted delivery to tumor sites. We recently introduced the novel concept of using nanotechnology for enhancing the outcome of chemoprevention, which we called ‘nanochemoprevention’. This idea was subsequently exploited by several laboratories worldwide and has now become an advancing field in chemoprevention research. This review examines some of the applications of nanotechnology for cancer prevention and therapy using natural products.

  3. Prevention and treatment of demineralisation during fixed appliance therapy: a review of current methods and future applications.

    Science.gov (United States)

    Chambers, C; Stewart, S; Su, B; Sandy, J; Ireland, A

    2013-11-01

    Orthodontic treatment, like all aspects of dentistry, exposes the clinician to the risk of malpractice and litigation. Demineralisation of tooth enamel is still one of the main complications of orthodontic treatment and it is essential patients are made aware of this risk during the consent process. There are a variety of fluoride delivery systems (mouthrinse, varnish, bonding system, and elastics), which can be used to prevent white spot lesion (WSL) formation. Glass-ionomer bonding cements (GIC) have also been shown to reduce WSL formation and have the benefit of not relying on patient compliance. However, these materials have not found widespread acceptance, possibly due to handling characteristics. A number of new technologies, principally fillers and coatings, have recently become available with potential antimicrobial and antibiofilm properties. Coatings can be applied to brackets and wires, which prevent bacterial adhesion. However, the longevity of these coatings is questionable. There are a number of methods available aimed at reducing the incidence of WSL, but they all have limitations. Capitalising on technological advances will enable the production of tailor made orthodontic brackets and adhesive systems, which provide long-term protection against WSL without relying on patient compliance.

  4. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    Science.gov (United States)

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  5. Potential exposure to Australian bat lyssavirus is unlikely to prevent future bat handling among adults in South East Queensland.

    Science.gov (United States)

    Young, M K; Banu, S; McCall, B J; Vlack, S; Carroll, H; Bennett, S; Davison, R; Francis, D

    2018-02-01

    Despite ongoing public health messages about the risks associated with bat contact, the number of potential exposures to Australian bat lyssavirus (ABLV) due to intentional handling by members of the general public in Queensland has remained high. We sought to better understand the reasons for intentional handling among these members of the public who reported their potential exposure to inform future public health messages. We interviewed adults who resided in a defined geographic area in South East Queensland and notified potential exposure to ABLV due to intentional handling of bats by telephone between 1 January 2012 and 31 December 2013. The participation rate was 54%. Adults who reported they had intentionally handled bats in South East Queensland indicated high levels of knowledge and perception of a moderately high risk associated with bats with overall low intentions to handle bats in the future. However, substantial proportions of people would attempt to handle bats again in some circumstances, particularly to protect their children or pets. Fifty-two percent indicated that they would handle a bat if a child was about to pick up or touch a live bat, and 49% would intervene if a pet was interacting with a bat. Future public health communications should recognize the situations in which even people with highrisk perceptions of bats will attempt to handle them. Public health messages currently focus on avoidance of bats in all circumstances and recommend calling in a trained vaccinated handler, but messaging directed at adults for circumstances where children or pets may be potentially exposed should provide safe immediate management options. © 2017 Blackwell Verlag GmbH.

  6. The Economic Burden of Intimate Partner Violence in Ecuador: Setting the Agenda for Future Research and Violence Prevention Policies

    Directory of Open Access Journals (Sweden)

    Phaedra Corso

    2013-08-01

    Full Text Available Introduction: Intimate partner violence (IPV is a widespread social structural problem that affects a great proportion of Ecuadorian women. IPV is a sexually, psychologically, or physically coercive act against an adult or adolescent woman by a current or former intimate partner. Not-for-profit groups in Ecuador report that 70% of women experience 1 of the forms of IPV sometime during their lifetime, but population-based surveys suggest that 41% of Ecuadorian women are exposed to emotional violence, 31% physical violence, and 12% sexual violence by their spouse or partner over their lifetime. Despite the high prevalence, the response of the Ecuadorian government has been insufficient to reduce the number of victims and to provide adequate legal and health services for the prevention and treatment of IPV. Given the power of economic data to influence policy making, the goal of this study is to produce the first estimate of the economic impact of IPV in Ecuador and to identify the policy paths in which these estimates would have the greatest impact for Ecuador.Methods: Using a bottom-up method for estimating the economic burden of IPV and a national prevalence of IPV based on a population-based survey in the 2003–2004 year, the total economic burden is estimated at approximately $109 million adjusted to the 2012 United States (U.S. currency rate. Results: Based on a prevalence of 255,267 women who were victims of IPV in the 2003–2004 year, the total economic burden is estimated at approximately $109 million adjusted to the 2012 the U.S. currency rate. The largest cost category contributing to the economic burden was the costs of healthcare services to treat injuries associated with IPV events.Conclusion: The asymmetry between the economic burden of IPV and the amount of government resources devoted to IPV prevention efforts suggests the need for a greater role to be played by the government and other factors in society in the area of IPV

  7. Pharmacokinetics and pharmacodynamics in HIV prevention; current status and future directions: a summary of the DAIDS and BMGF sponsored think tank on pharmacokinetics (PK)/pharmacodynamics (PD) in HIV prevention.

    Science.gov (United States)

    Romano, Joseph; Kashuba, Angela; Becker, Stephen; Cummins, James; Turpin, Jim; Veronese, Fulvia

    2013-11-01

    Thirty years after its beginning, the HIV/AIDS epidemic is still raging around the world. According to UNAIDS, in 2011 alone 1.7M deaths were attributable to AIDS, and 2.5M people were newly infected by the virus. Despite the success in treating HIV-infected people with potent antiretroviral drugs, preventing HIV infection is the key to ending the epidemic. Recently, the efficacy of topical and systemic antiviral chemoprophylaxis (i.e., preexposure prophylaxis or "PrEP"), using the same drugs used for HIV treatment, has been demonstrated in a number of clinical trials. However, results from other trials have been inconsistent, especially those evaluating PrEP in women. These inconsistencies may result from our incomplete understanding of pharmacokinetics (PK)/pharmacodynamics (PD) at the mucosal sites of sexual transmission: the male and female gastrointestinal and reproductive tracts. The drug concentrations used in these trials were derived from those used for treatment; however, we still do not know the relationship between the therapeutic and the preventive dose. This article presents the first comprehensive review of the available data in the HIV pharmacology field from animal models to human studies, and outlines gaps, challenges, and future directions. Addressing these pharmacological gaps and challenges will be critical in selecting and advancing future PrEP candidates and strategies with the greatest impact on the HIV epidemic.

  8. A two-dose heterologous prime-boost vaccine regimen eliciting sustained immune responses to Ebola Zaire could support a preventive strategy for future outbreaks.

    Science.gov (United States)

    Shukarev, Georgi; Callendret, Benoit; Luhn, Kerstin; Douoguih, Macaya

    2017-02-01

    The consequences of the 2013-16 Ebola Zaire virus disease epidemic in West Africa were grave. The economies, healthcare systems and communities of Guinea, Sierra Leone and Liberia were devastated by over 18 months of active Ebola virus transmission, followed by sporadic resurgences potentially related to sexual transmission by survivors with viral persistence in body fluids following recovery. The need to develop and implement strategies to prevent and mitigate future outbreaks is now beyond dispute. The potential for unpredictable outbreaks of indeterminate duration, and control challenges posed by the possibility of sporadic re-emergence, mean that implementation of an effective vaccination program for outbreak containment necessitates a vaccine providing durable immunity. Heterologous prime-boost vaccine regimens deliver the same or similar antigens through different vaccine types, the first to prime and the second to boost the immune system. Ad26.ZEBOV/MVA-BN-Filo is an investigational Ebola Zaire vaccine regimen that uses this heterologous prime-boost approach. Preliminary Phase 1 data suggest that Ad26.ZEBOV/MVA-BN-Filo confers durable immunity for at least 240 d and is well-tolerated with a good safety profile. This regimen may therefore be suitable for prophylactic use in a regional or targeted population vaccination strategy, and could potentially aid prevention and control of future Ebola outbreaks.

  9. Seveso II directive in prevention and mitigation of consequences of chemical terrorism, safety management systems in hazardous installations

    International Nuclear Information System (INIS)

    Klicek, M.

    2009-01-01

    Mayor accidents caused by hazardous substances are great threat to public. The consequences are often very severe with great number of injured people or even deaths and a great material damage. Statistic data shows that the main cause of accidents in hazardous installations is 'human factor', including the possibility of terrorist attack, or classic military operations. In order to ensure effective chemical safety, the actions should be taken by industry, public authorities, communities and other stake holders to prevent industrial accidents. Safety should be an integral part of the business activities of an enterprise, and all hazardous installations should strive to reach the ultimate goal of zero incidents. Safety management systems (SMS) should include appropriate technology and processes, as well as establishing an effective organisational structure. To mitigate consequences of accidents, emergency planning, land-use planning and risk communication is necessary. Adequate response in the event of accident should limit adverse consequences to health, environment and property. Follow-up actions are needed to learn from the accidents and other unexpected events, in order to reduce future incidents. In this paper the author will discus the implementing of SEVESO II directive in obtaining two main goals: major accident prevention and mitigation of consequences for men and environment in case of possible terrorist actions or military activities. Some Croatian experiences in implementing of UNEP APELL Programme, and its connection with SEVESO II directive will be shown.(author)

  10. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  11. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  12. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Directory of Open Access Journals (Sweden)

    Li MingChu

    2017-01-01

    Full Text Available The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency.

  13. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  14. Consumer Adoption of Future MyData-Based Preventive eHealth Services: An Acceptance Model and Survey Study.

    Science.gov (United States)

    Koivumäki, Timo; Pekkarinen, Saara; Lappi, Minna; Väisänen, Jere; Juntunen, Jouni; Pikkarainen, Minna

    2017-12-22

    Constantly increasing health care costs have led countries and health care providers to the point where health care systems must be reinvented. Consequently, electronic health (eHealth) has recently received a great deal of attention in social sciences in the domain of Internet studies. However, only a fraction of these studies focuses on the acceptability of eHealth, making consumers' subjective evaluation an understudied field. This study will address this gap by focusing on the acceptance of MyData-based preventive eHealth services from the consumer point of view. We are adopting the term "MyData", which according to a White Paper of the Finnish Ministry of Transport and Communication refers to "1) a new approach, a paradigm shift in personal data management and processing that seeks to transform the current organization centric system to a human centric system, 2) to personal data as a resource that the individual can access and control." The aim of this study was to investigate what factors influence consumers' intentions to use a MyData-based preventive eHealth service before use. We applied a new adoption model combining Venkatesh's unified theory of acceptance and use of technology 2 (UTAUT2) in a consumer context and three constructs from health behavior theories, namely threat appraisals, self-efficacy, and perceived barriers. To test the research model, we applied structural equation modeling (SEM) with Mplus software, version 7.4. A Web-based survey was administered. We collected 855 responses. We first applied traditional SEM for the research model, which was not statistically significant. We then tested for possible heterogeneity in the data by running a mixture analysis. We found that heterogeneity was not the cause for the poor performance of the research model. Thus, we moved on to model-generating SEM and ended up with a statistically significant empirical model (root mean square error of approximation [RMSEA] 0.051, Tucker-Lewis index [TLI] 0

  15. Diet, Gut Microbiota, and Colorectal Cancer Prevention: A Review of Potential Mechanisms and Promising Targets for Future Research.

    Science.gov (United States)

    Song, Mingyang; Chan, Andrew T

    2017-12-01

    Diet plays an important role in the development of colorectal cancer. Emerging data have implicated the gut microbiota in colorectal cancer. Diet is a major determinant for the gut microbial structure and function. Therefore, it has been hypothesized that alterations in gut microbes and their metabolites may contribute to the influence of diet on the development of colorectal cancer. We review several major dietary factors that have been linked to gut microbiota and colorectal cancer, including major dietary patterns, fiber, red meat and sulfur, and obesity. Most of the epidemiologic evidence derives from cross-sectional or short-term, highly controlled feeding studies that are limited in size. Therefore, high-quality large-scale prospective studies with dietary data collected over the life course and comprehensive gut microbial composition and function assessed well prior to neoplastic occurrence are critically needed to identify microbiome-based interventions that may complement or optimize current diet-based strategies for colorectal cancer prevention and management.

  16. Nickel Allergy and Our Children's Health: A Review of Indexed Cases and a View of Future Prevention.

    Science.gov (United States)

    Jacob, Sharon E; Goldenberg, Alina; Pelletier, Janice L; Fonacier, Luz S; Usatine, Richard; Silverberg, Nanette

    2015-01-01

    Nickel is the leading cause of allergic contact dermatitis (ACD) from early childhood through adolescence. Studies have shown that skin piercings and other nickel-laden exposures can trigger the onset of nickel ACD in those who are susceptible. Nickel ACD causes a vast amount of cutaneous disease in children. Cases of nickel ACD in children have been reported in peer-reviewed literature from 28 states. Common items that contain inciting nickel include jewelry, coins, zippers, belts, tools, toys, chair studs, cases for cell phones and tablets, and dental appliances. The diagnosis of nickel ACD has been routinely confirmed by patch testing in children older than 6 months suspected of ACD from nickel. Unlike in Europe, there are no mandatory restrictions legislated for nickel exposure in the United States. Denmark has demonstrated that regulation of the nickel content in metals can lower the risk of ACD and the associated health care-related costs that arise from excess nickel exposure. To further awareness, this article reviews the prominent role of nickel in pediatric skin disease in the United States. It discusses the need for a campaign by caretakers to reduce nickel-related morbidity. Lastly, it promotes the model of European legislation as a successful intervention in the prevention of nickel ACD. © 2015 Wiley Periodicals, Inc.

  17. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Directory of Open Access Journals (Sweden)

    H.A Eiselt

    2015-02-01

    Full Text Available This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.

  18. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researche...

  19. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002, The two most notorious terrorist organizations during this period were the "November 17" group and another group...

  20. Tracking the evolution of HIV/AIDS in China from 1989-2009 to inform future prevention and control efforts.

    Directory of Open Access Journals (Sweden)

    Zhongwei Jia

    Full Text Available BACKGROUND: To determine policy implications, this analysis tracks the evolution of HIV/AIDS infection across China to understand current trends and potential risk factors. METHODS AND PRINCIPAL FINDINGS: A retrospective study with spatial analytical model and multilevel spatial models was conducted among 326,157 HIV/AIDS cases reported from 1989-2009. The results indicate that the distribution of HIV/AIDS was clustered at the county level with different directional distributions across China from 2003 to 2009. Compared to 2003, by 2009 there was a 122% increase in HIV cases among rural residents, 294% increase among urban residents, 211% increase among migrants, and 237% increase among permanent residents. The overall proportion of HIV by different routes of transmission showed dramatic changes with a 504% increase in sexual transmission of HIV, 90% decrease in blood/plasma transmission, and 35% decrease in injecting drug user transmission. Sexual transmission was the major transmission route among women (44% and the elderly (59% in men, 44% in women as well as among permanent (36% and urban residents (33%. Among those <65 years old, women increased more than men, but among those ≥ 65 years, men increased more than women. Migrants contributed to the variance of HIV infection between counties but not within counties. The length of highway and urbanization combined with illiteracy were risk factors for HIV/AIDS. CONCLUSIONS/SIGNIFICANCE: Rates of HIV/AIDS among permanent urban residents, particularly women and elderly men, have increased significantly in recent years. To prevent HIV from spreading further among the general population, additional attention should be paid to these populations as well as to migrants.

  1. ANTI-TERROR POLICY OF UZBEKISTAN IN THE FRAMEWORK OF THE REGIONAL ANTI-TERRORIST POLICY OF THE SCO

    Directory of Open Access Journals (Sweden)

    С П Базылева

    2017-12-01

    Full Text Available The beginning of the XXI century was marked by a number of serious problems, including cancer, world hunger, environmental problems and increasing every year the problem of global terrorism, which poses a great threat to the security of the modern multipolar world. Uzbekistan today occupies a firm position in fight against terrorist threat. The principled position of Uzbekistan in the fight against terrorism is that “no country should exclude their participation in the fight against global terrorism, there must be no transit zones and "green corridors" for terrorist organizations”. The Central Asian region is one of the most vulnerable, because it is necessary to pay special attention to the strategy of the anti-terrorist security of the countries included in the structure of the Central Asian region. In this article, we consider the anti-terrorist policy of Uzbekistan in the framework of the regional anti-terrorist policy of the SCO.

  2. Role of Omega-3 Fatty Acids in the Etiology, Treatment, and Prevention of Depression: Current Status and Future Directions

    Science.gov (United States)

    McNamara, Robert K.

    2016-01-01

    Over the past three decades a body of translational evidence has implicated dietary deficiency in long-chain omega-3 (LCn-3) fatty acids, including eicosapenaenoic acid (EPA) and docosahexaenoic acid (DHA), in the pathophysiology and etiology of major depressive disorder (MDD). Cross-national and cross-sectional data suggest that greater habitual intake of preformed EPA+DHA is associated with reduced risk for developing depressive symptoms and syndromal MDD. Erythrocyte EPA and DHA composition is highly correlated with habitual fish or fish oil intake, and case-control studies have consistently observed lower erythrocyte EPA and/or DHA levels in patients with MDD. Low erythrocyte EPA+DHA composition may also be associated with increased risk for suicide and cardiovascular disease, two primary causes of excess premature mortality in MDD. While controversial, dietary EPA+DHA supplementation may have antidepressant properties and may augment the therapeutic efficacy of antidepressant medications. Neuroimaging and rodent neurodevelopmental studies further suggest that low LCn-3 fatty acid intake or biostatus can recapitulate central pathophysiological features associated with MDD. Prospective findings suggest that low LCn-3 fatty acid biostatus increases risk for depressive symptoms in part by augmenting pro-inflammatory responsivity. When taken collectively, these translational findings provide a strong empirical foundation in support of dietary LCn-3 fatty acid deficiency as a modifiable risk factor for MDD. This review provides an overview of this translational evidence and then discusses future directions including strategies to translate this evidence into routine clinical screening and treatment algorithms. PMID:27766299

  3. Change and Continuity in Indonesian Islamist Ideology and Terrorist Strategies

    Directory of Open Access Journals (Sweden)

    Adam James Fenton

    2015-04-01

    Full Text Available The “Islamisation” of Indonesia has exerted a transformative force on every aspect of Indonesian society. That process continues today. It has created streams of change and continuity in thoughts, ideologies and practices, of enormous complexity. Strict doctrinal interpretation of Koranic text is not a new phenomenon, contrary to what some reports in the mass media might suggest. Its roots stretch back at least as far as the 1800s with the outbreak of violent conflicts between those urging a stricter, scripturalist application of Islam, and those adhering to traditionalist and colonialist ideologies --culminating in the Padri war of West Sumatra of 1821-38. Indicating an ostensible continuity of ideology, modern extremist ideologues, such as Abu Bakar Bashir, urge their followers toward violent conflict and terrorist actions based on an ideology of strict “Middle Eastern” interpretation of fundamental Islamic tenets. This paper argues that the strategies of those carrying out radical and violent ideologies are undergoing change, as are the strategies of the authorities tasked with combating them. Radical groups have displayed a shift away from large-scale, attacks on symbolic foreign targets towards low-level violence primarily aimed at law enforcement authorities. Authorities, on the other hand, have shown a greater tendency to shoot dead those suspected of involvement with violent radical groups. This paper will examine the changing strategies of violent radical groups and the continuity, and evolution, of the underlying Islamic ideology that provides religious justification for their violent acts. The paper will argue that engaging Indonesia’s politically active youth in an ideological dialogue on Islamism and democracy provides the best prospect for disengagement from, and breaking the cycle of recruitment for, radical violence and terrorism.[Proses panjang Islamisasi di Indonesia telah menghasilkan kekuatan transformatif di

  4. Occupational Practitioner's Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack.

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  5. Occupational Practitioner’s Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up. PMID:27703965

  6. Occupational practitioner's role in the management of a crisis: lessons learned from the Paris November 2015 terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexis Descatha

    2016-09-01

    Full Text Available In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015.During and after the Paris attack, occupational practitioners in collaboration with emergency and security professionals were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans.Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events, and participate in preventing, to the extent possible, post-traumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols.In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  7. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  8. Iraagi väitel tuleb iga teine terrorist Süüriast / Igor Taro

    Index Scriptorium Estoniae

    Taro, Igor

    2007-01-01

    Bagdadis elurajooni turul hukkus enesetapurünnakus 130 inimest. Iraagi kõrge valitsusametniku sõnul tuleb 50% terrorist üle Süüria piiri. Iraagi peaminister Nuri al-Maliki arvamus. Vt. samas: Mässulised leiavad tuge internetist

  9. The Terrorist and the Media: Partners in Crime or Rituals and Harmless Observers?

    Science.gov (United States)

    Dowling, Ralph E.

    This paper explores the idea that the media "cause" or strongly motivate acts of terrorism. In an effort to refute this view the paper applies Kenneth Burke's dramatistic theory of communication to show that the motives and behavior of political terrorists can be explained without reference to the media coverage terrorism produces. The…

  10. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  11. Social categorization and fear reactions to the September 11th terrorist attacks

    NARCIS (Netherlands)

    Dumont, M.; Yzerbyt, V.Y.; Wigboldus, D.H.J.; Gordijn, E.H.

    2003-01-01

    Two experiments were run in The Netherlands and Belgium 1 week after the terrorist attacks against the World Trade Center in New York on September 11, 2001. The aim was to investigate whether social categorization affected emotional reactions, behavioral tendencies, and actual behaviors. Results

  12. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  13. Lone Actor Terrorist Attack Planning and Preparation : A Data-Driven Analysis

    NARCIS (Netherlands)

    Schuurman, B.W.; Bakker, E.; Gill, P.; Bouhana, N.

    2017-01-01

    This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented

  14. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    Science.gov (United States)

    1999-09-01

    for School Killers,” New York Times, June 21, 1999, A10. Della Porta, Donatella. “ Political Socialization in Left-Wing Underground Organizations...Newsletter of the Association of Former Intelligence Officers, 22, No. 1, 1997. Wasmund, Klaus. “The Political Socialization of West German Terrorists.” In

  15. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    Science.gov (United States)

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  16. A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System

    Science.gov (United States)

    Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.

    2006-01-01

    The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…

  17. In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

    Directory of Open Access Journals (Sweden)

    Mary Beth Altier

    2012-01-01

    Full Text Available Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably stem from the fact that terrorists and the organizations to which they belong represent clandestine populations engaged in illegal activity. Unsurprisingly, these qualities make it difficult for the researcher to identify and locate willing subjects of study—let alone a representative sample. In this research note, we suggest the systematic analysis of terrorist autobiographies offers a promising means of investigating difficult-to-study areas of terrorism-related phenomena. Investigation of autobiographical accounts not only offers additional data points for the study of individual psychological issues, but also provides valuable perspectives on the internal structures, processes, and dynamics of terrorist organizations more broadly. Moreover, given most autobiographies cover critical events and personal experiences across the life course, they provide a unique lens into how terrorists perceive their world and insight into their decision-making processes. We support our advocacy of this approach by highlighting its methodological strengths and shortcomings.

  18. Activist or Terrorist? Negotiating Discourses of Eco-Terror in "If a Tree Falls"

    Science.gov (United States)

    Olson, Jade

    2018-01-01

    Environmentalist voices like the Earth Liberation Front have been labeled "eco-terrorists." The 2011 documentary film "If a Tree Falls" explores how "eco-terrorism" troubles the unstable border between activism and terrorism. This essay offers a textual analysis of the film's negotiation of the activism/terrorism…

  19. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    Science.gov (United States)

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  20. Analysing Personal Characteristics of Lone-Actor Terrorists : Research Findings and Recommendations

    NARCIS (Netherlands)

    Roy, de van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of

  1. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    Science.gov (United States)

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  2. Physics for future Presidents - nuclear power, terrorism, global warming; La physique expliquee a notre futur president - Nucleaire, terrorisme, rechauffement climatique

    Energy Technology Data Exchange (ETDEWEB)

    Muller, Richard A.

    2011-04-26

    This book explains the science behind the concerns that our nation faces in the immediate future. It outlines the tools of terrorists, the dangers of nuclear power, and the reality of global warming. As citizens who will elect future presidents of the most powerful and influential countries in the world, we need to know-truly understand if Iran's nascent nuclear capability is a genuine threat to the West, if biochemical weapons are likely to be developed by terrorists, if there are viable alternatives to fossil fuels that should be nurtured and supported by the government, if nuclear power should be encouraged, and if global warming is actually happening. This book is written in everyday, nontechnical language on the science behind the concerns that our nations faces in the immediate future. This book is translated from 'Physics for Future Presidents: The Science Behind the Headlines', published by W. W. Norton and Company in August 2008. Contents: 1 - Terrorism: Nine-eleven, Terrorist nukes, The next terrorist attack, Biological terrorism; 2 - Energy: Key energy surprises, Solar Power, The end of oil; 3 - Nukes: Radioactivity and death, Radioactive decay, Nuclear weapons, Nuclear madness, Nuclear power, Nuclear waste, Controlled fusion; 4 - Space: Space and satellites, Gravity applications, Humans in space, Spying with invisible light; 5 - Global Warming: A brief history of climate, The greenhouse effect, A very likely cause, Evidence, Non-solutions, The fruit on the ground, New technologies

  3. The Tablets, Ring, Injections as Options (TRIO) study: what young African women chose and used for future HIV and pregnancy prevention.

    Science.gov (United States)

    van der Straten, Ariane; Agot, Kawango; Ahmed, Khatija; Weinrib, Rachel; Browne, Erica N; Manenzhe, Kgahlisho; Owino, Fredrick; Schwartz, Jill; Minnis, Alexandra

    2018-03-01

    Preventing HIV and unintended pregnancies are key global health priorities. To inform product rollout and to understand attributes of future multipurpose prevention technologies (MPT) associated with preference and use, we evaluated three placebo delivery forms: daily oral tablets, a monthly vaginal ring, and two monthly intramuscular injections in TRIO, a five-month study among young Kenyan and South African women. HIV-negative, sexually active, non-pregnant women aged 18 to 30 were enrolled and randomized to use each placebo delivery form for one month (stage 1). Then, participants chose one product to use for two additional months (stage 2). We assessed safety, product ranking, choice, and use. We examined demographic and behavioural correlates of choice and, reciprocally, unwillingness to use in the future with logistic regression models. 277 women enrolled, 249 completed stage 1 and 246 completed stage 2. Median age was 23 years, 49% were Kenyan and 51% were South African. Three participants became pregnant during the study and one participant HIV-seroconverted. There were 18 product-related adverse events, six tablets-related, 11 ring-related, and one injection-related. After trying each product, 85% preferred a TRIO product over condoms. Injections were chosen most (64%, 95% confidence interval (CI) 58%, 70%; p < 0.001), and by more South Africans than Kenyans (odds ratio (OR) 2.01, 95% CI: 1.17, 3.43; p = 0.01). There was no significant difference in choosing tablets versus ring (21%, 95% CI: 16%, 26% vs. 15%, 95% CI: 11%, 20%; p = 0.11). Tablet and ring adherence, based on direct observations and self-reports, improved over time. However, participants' self-reported use of tablets did not match objective data from the electronic dose monitoring device. Participants were fully compliant with injections. In this population at risk for HIV and pregnancy, all participants agreed to choose and use a placebo MPT delivery form. A majority of participants

  4. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    Science.gov (United States)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  5. The nuclear terrorist, radiological, biological, chemical threat. Medical approach

    International Nuclear Information System (INIS)

    Gourmelon, P.; Vidal, D.; Renaudeau, C.

    2005-01-01

    This book illustrates the cooperation of the civil and the military experts in the domain of the NBRC (nuclear, biological, radiological and chemical threat). The different aspects bond to the use of nuclear, biological and chemical weapons, are discussed. Al topics of each domains (NRBC) are presented: historical and fundamental aspects, diagnostic, therapeutic and prevention. (A.L.B.)

  6. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL; Siebeneck, Laura K. [University of Utah; Hepner, George F. [University of Utah

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  7. The gut microbiome as a target for prevention and treatment of hyperglycaemia in type 2 diabetes: from current human evidence to future possibilities.

    Science.gov (United States)

    Brunkwall, Louise; Orho-Melander, Marju

    2017-06-01

    The totality of microbial genomes in the gut exceeds the size of the human genome, having around 500-fold more genes that importantly complement our coding potential. Microbial genes are essential for key metabolic processes, such as the breakdown of indigestible dietary fibres to short-chain fatty acids, biosynthesis of amino acids and vitamins, and production of neurotransmitters and hormones. During the last decade, evidence has accumulated to support a role for gut microbiota (analysed from faecal samples) in glycaemic control and type 2 diabetes. Mechanistic studies in mice support a causal role for gut microbiota in metabolic diseases, although human data favouring causality is insufficient. As it may be challenging to sort the human evidence from the large number of animal studies in the field, there is a need to provide a review of human studies. Thus, the aim of this review is to cover the current and future possibilities and challenges of using the gut microbiota, with its capacity to be modified, in the development of preventive and treatment strategies for hyperglycaemia and type 2 diabetes in humans. We discuss what is known about the composition and functionality of human gut microbiota in type 2 diabetes and summarise recent evidence of current treatment strategies that involve, or are based on, modification of gut microbiota (diet, probiotics, metformin and bariatric surgery). We go on to review some potential future gut-based glucose-lowering approaches involving microbiota, including the development of personalised nutrition and probiotic approaches, identification of therapeutic components of probiotics, targeted delivery of propionate in the proximal colon, targeted delivery of metformin in the lower gut, faecal microbiota transplantation, and the incorporation of genetically modified bacteria that express therapeutic factors into microbiota. Finally, future avenues and challenges for understanding the interplay between human nutrition, genetics

  8. The terrorist threat nuclear, radiological, biological, chemical - a medical approach

    International Nuclear Information System (INIS)

    Revel, M.C. de; Gourmelon, M.C.S.; Vidal, P.C.; Renaudeau, P.C.S.

    2005-01-01

    Since September 11, 2001, the fear of a large scale nuclear, biological and/or chemical terrorism is taken again into consideration at the highest level of national policies of risk prevention. The advent of international terrorism implies a cooperation between the military defense and the civil defense. The nuclear, radiological, biological and chemical (NRBC) experts of the health service of army and of civil defense will have to work together in case of major terror attack. This book presents this cooperation between civil and military experts in the NRBC domain: risk analysis, national defense plans, crisis management, syndromes and treatments. The different aspects linked with the use of nuclear, biological and chemical weapons are analyzed by the best experts from French medical and research institutes. All topics of each NRBC domain are approached: historical, basic, diagnostic, therapeutic and preventive. (J.S.)

  9. An Analysis of Modern State-Level Terrorist Deradicalization Campaigns

    Science.gov (United States)

    2012-12-01

    constitutional civil liberties. In addition to countering radicalization it appears that Algeria took steps to prevent it as well. The unemployment rate...been reduced to remnants of the GSPC (Mortimer, 2007, p. 36). In the same year, GSPC officially franchised with AQ and changed its names to AQIM...Environmental Manipulation Hegghammer (2006b, 2010a) suggests that economic conditions and unemployment play a role in the recruitment and radicalization of

  10. Culturally sanctioned suicide: Euthanasia, seppuku, and terrorist martyrdom

    Science.gov (United States)

    Pierre, Joseph M

    2015-01-01

    Suicide is one of the greatest concerns in psychiatric practice, with considerable efforts devoted to prevention. The psychiatric view of suicide tends to equate it with depression or other forms of mental illness. However, some forms of suicide occur independently of mental illness and within a framework of cultural sanctioning such that they aren’t regarded as suicide at all. Despite persistent taboos against suicide, euthanasia and physician-assisted suicide in the context of terminal illness is increasingly accepted as a way to preserve autonomy and dignity in the West. Seppuku, the ancient samurai ritual of suicide by self-stabbing, was long considered an honorable act of self-resolve such that despite the removal of cultural sanctioning, the rate of suicide in Japan remains high with suicide masquerading as seppuku still carried out both there and abroad. Suicide as an act of murder and terrorism is a practice currently popular with Islamic militants who regard it as martyrdom in the context of war. The absence of mental illness and the presence of cultural sanctioning do not mean that suicide should not be prevented. Culturally sanctioned suicide must be understood in terms of the specific motivations that underlie the choice of death over life. Efforts to prevent culturally sanctioned suicide must focus on alternatives to achieve similar ends and must ultimately be implemented within cultures to remove the sanctioning of self-destructive acts. PMID:25815251

  11. Terrorist threat, chemical, biological, radiological, nuclear medical approach

    International Nuclear Information System (INIS)

    Revel, Th. de; Gourmelon, P.; Vidal, D.; Renaudeau, C.

    2005-01-01

    The different aspects linked to the use of nuclear, radiological, biological and or chemical weapons are gathered in this work. They concern history, fundamental aspect, diagnosis, therapy and prevention. The part devoted to the nuclear aspect concern the accidents in relation with ionizing radiations, the radiation syndrome, the contribution and limits of dosimetry, the treatment of medullary aplasia, the evaluation and treatment of an internal contamination, new perspectives on the use of cytokine for the treatment of accidental irradiated persons, alternative to the blood transfusion. (N.C.)

  12. The terrorist threat nuclear, radiological, biological, chemical - a medical approach; Menace terroriste nucleaire, radiologique, biologique, chimique - approche medicale

    Energy Technology Data Exchange (ETDEWEB)

    Revel, M.C. de; Gourmelon, M.C.S.; Vidal, P.C.; Renaudeau, P.C.S

    2005-07-01

    Since September 11, 2001, the fear of a large scale nuclear, biological and/or chemical terrorism is taken again into consideration at the highest level of national policies of risk prevention. The advent of international terrorism implies a cooperation between the military defense and the civil defense. The nuclear, radiological, biological and chemical (NRBC) experts of the health service of army and of civil defense will have to work together in case of major terror attack. This book presents this cooperation between civil and military experts in the NRBC domain: risk analysis, national defense plans, crisis management, syndromes and treatments. The different aspects linked with the use of nuclear, biological and chemical weapons are analyzed by the best experts from French medical and research institutes. All topics of each NRBC domain are approached: historical, basic, diagnostic, therapeutic and preventive. (J.S.)

  13. [Defusing of victims of the terrorist attacks in Paris. Elements of assessment one-month post-event].

    Science.gov (United States)

    Prieto, N; Cheucle, E; Faure, P; Digard, F; Dalphin, C; Pachiaudi, V; Simond, M; Darbon, R; Collinet, C; Habibi, R; Gueugniaud, P-Y

    2018-04-01

    The terrorist attacks (fusillades and suicide attacks) in Paris on 13 November 2015 have had a major psychic impact on all individuals directly or secondarily exposed to them. Medico-psychological unit (CUMP) of the Paris Île-de-France region's immediate care services were immediately mobilized and rapidly strengthened by all regional medico-psychological units (CUMP) throughout the country. Psychological assistance has been provided in several key points of Paris and specifically in the 11th district City Hall of Paris where Lyon's Medico-psychological unit was located. These specific immediate psychological assistances, referred to as a "defusing process" by the medico-psychological unit (CUMP), are mostly devoted to provide the victims with an entry point to a psychological healthcare relationship and give them a first sense of soothing and relief even though they do not prevent further psychological care follow up for the victims. Nonetheless, the potential therapeutic effect of this "defusing process" has not yet been sufficiently established nor demonstrated by any scientific study. A phoning survey was carried out one-month post-terrorist attacks and interviewed the 129 victims who benefited from the "defusing process" conducted by Lyon's medico-psychological unit (CUMP) in order to collect data and assess its effects. These people, whether directly exposed, bereaved relatives or witnesses, whose average age is 35, are mostly living in the Île-de-France region. Most of them present a high score on the IES-R scale, whether they were directly exposed, bereaved relatives or witnesses. Almost all of them (96.5%) experienced at least one medical care contact within this one-month post-trauma period with psychotropic medication for 37% of them. Regarding the defusing conducted by Lyon's medico-psychological unit (CUMP) in the 11th district City Hall of Paris, it appears that 93% of the victims who were looked after indicated that they were satisfied and 87.4% of

  14. Review of the Estimates for the Impact of the September 11, 2001, Terrorist Attacks on New York Tax Revenues

    National Research Council Canada - National Science Library

    2002-01-01

    As a follow-up to our May 2002 report, reviewing the estimates of the economic impact of the September 11, 2001, terrorist attacks on New York, Congress requested additional information on New York tax revenues...

  15. 48 CFR 252.209-7001 - Disclosure of ownership or control by the government of a terrorist country.

    Science.gov (United States)

    2010-10-01

    ...) (a) Definitions. As used in this provision— (1) Government of a terrorist country includes the state... the government of which has repeatedly provided support for acts of international terrorism. As of the...

  16. About a hypothetical terrorist attack on a nuclear power plant

    International Nuclear Information System (INIS)

    2001-10-01

    After the terrorism attack on the World Trade Center, a record number ( two thirds) of US citizens favour the use of nuclear energy and consider nuclear plants to be safe. At the same time 59% definitely support building more nuclear plants, less than in March during the Californian crisis, but more than earlier., Most american citizens ( 84%) continue to support licence renewal for nuclear plants and 72 % agree with keeping the option open to build new nuclear plants in the future. The strongest supporters are those who have visited a nuclear plant or information centre. (N.C.)

  17. Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing

    Science.gov (United States)

    McCormick, Gordon H.; Owen, Guillermo

    We consider the conditions that lead to the dissolution of state-terrorist coalitions. While such coalitions have well known advantages, they also have structural weaknesses that are largely ignored in the literature on the state sponsorship of terrorism. Each player in the coalition has interests that are only partially shared and, in some cases, at odds with those of its partner. Long term cooperation must be based on mutual advantage and mutual trust, both of which are subject to change over time.We examine the conditions that are needed to begin and maintain a cooperative strategy and the circumstances that lead a state and a terrorist group to leave the coalition and double-cross its partner. Equilibrium strategies for both players are defined and interpreted.

  18. Offensive Counterterrorism Targeted killing in eliminating terrorist target: the case of the USA and Israel

    Directory of Open Access Journals (Sweden)

    Hermínio Matos

    2012-01-01

    Full Text Available Due to the "global terrorism project", some States have adopted offensive counterterrorism measures which, though within national strategies on security and defense, contemplate the use of military power and the use of lethal force against non-state actors - individuals, groups or terrorist organizations - beyond their national borders. Reformulating the security paradigm has led, in these cases, to policies against terrorism. This is the case of targeted killing - the killing of selected targets - by the USA and Israel. Targeted killing actions - using essentially but not only drones - in Pakistan and Yemen by the American administration, a well as the Israeli response to Palestinian terrorism, are under heated debate in terms of their efficiency and legality. Thus, this paper aims to not only provide an analytical framework on this theme but also analyze the scope and impact of these counter terrorist strategies by the two countries.

  19. The quest for significance model of radicalization: implications for the management of terrorist detainees.

    Science.gov (United States)

    Dugas, Michelle; Kruglanski, Arie W

    2014-01-01

    Radicalization and its culmination in terrorism represent a grave threat to the security and stability of the world. A related challenge is effective management of extremists who are detained in prison facilities. The major aim of this article is to review the significance quest model of radicalization and its implications for management of terrorist detainees. First, we review the significance quest model, which elaborates on the roles of motivation, ideology, and social processes in radicalization. Secondly, we explore the implications of the model in relation to the risks of prison radicalization. Finally, we analyze the model's implications for deradicalization strategies and review preliminary evidence for the effectiveness of a rehabilitation program targeting components of the significance quest. Based on this evidence, we argue that the psychology of radicalization provides compelling reason for the inclusion of deradicalization efforts as an essential component of the management of terrorist detainees. Copyright © 2014 John Wiley & Sons, Ltd.

  20. Licensing issues in the context of terrorist attacks on nuclear power plants

    International Nuclear Information System (INIS)

    Danwitz, T. von

    2002-01-01

    The terrorist attack on the World Trade Center in September 2001 has prompted enhanced nuclear risk awareness among the German population. But in the current public debate about the safety of nuclear power plants in Germany in times of new dimensions of danger, aspects such as the role of the constitutional law, the German Atomic Energy Act, and the regulatory system governing nuclear power plant licensing in the context of protection and safety have not been addressed. The author therefore discusses the German nuclear power plant licensing law and administrative regime, elaborating on the significance attributed in those bodies of law to risks like terrorist attacks on nuclear power plants. (orig./CB) [de

  1. ‘Let the Punishment Match the Offence’: Determining Sentences for Australian Terrorists

    Directory of Open Access Journals (Sweden)

    Nicola McGarrity

    2013-04-01

    Full Text Available To date, 38 men have been charged with terrorism offences in Australia. Twenty-six have been convicted. The article commences with an overview of the factual circumstances leading to these convictions. This provides important background for the following discussion of a largely unexplored issue in Australian anti-terrorism law and policy, namely, the difficulties faced by the Australian courts in adapting traditional sentencing principles to the (for the most part, preparatory terrorism offences enacted by the Commonwealth Parliament after the 9/11 terrorist attacks. Of particular interest are how the courts determine the objective seriousness of these offences and the respective weight placed upon deterrence (both specific and general and the rehabilitation of convicted terrorists.

  2. A data fusion approach to indications and warnings of terrorist attacks

    Science.gov (United States)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  3. [Stories and drawings by children after the 2015 terrorist attacks in Paris].

    Science.gov (United States)

    Poget, Marc; Bouaziz, Nora; Apter, Gisèle

    2016-01-01

    Through the stories and drawings of children in a medical-psychological centre, it is possible to explore their psychological representations of the terrorist attacks which took place in Paris in January 2015. This work highlights the need to rethink the methods of care provided to these children in order to adapt them to their specific needs. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  4. We Bomb, Therefore We Are: The Evolution of Terrorist Group Life Cycles

    Science.gov (United States)

    1994-03-24

    34 Political Socialization in Left-Wing Underground Organizations: Biographies of Italian and German Militants," International Social Movement Research... Political Socialization of Terrorist Groups in West Germany," Journal of Political and Military Sociology, v. 11, n. 2, Fall 1983, 236. See also Giorgio...Love?, 30-31. 7 Quoted in Wasmund, " Political Socialization ," 236. 88Irving L. Horowitz, "The Routinization of Terrorism and Its Unanticipated

  5. Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat.

    Science.gov (United States)

    Ackerman, Gary A; Zhuang, Jun; Weerasuriya, Sitara

    2017-02-01

    This article uses a game-theoretic approach to analyze the risk of cross-milieu terrorist collaboration-the possibility that, despite marked ideological differences, extremist groups from very different milieus might align to a degree where operational collaboration against Western societies becomes possible. Based upon theoretical insights drawn from a variety of literatures, a bargaining model is constructed that reflects the various benefits and costs for terrorists' collaboration across ideological milieus. Analyzed in both sequential and simultaneous decision-making contexts and through numerical simulations, the model confirms several theoretical arguments. The most important of these is that although likely to be quite rare, successful collaboration across terrorist milieus is indeed feasible in certain circumstances. The model also highlights several structural elements that might play a larger role than previously recognized in the collaboration decision, including that the prospect of nonmaterial gains (amplification of terror and reputational boost) plays at least as important a role in the decision to collaborate as potential increased capabilities does. Numerical simulation further suggests that prospects for successful collaboration over most scenarios (including operational) increase when a large, effective Islamist terrorist organization initiates collaboration with a smaller right-wing group, as compared with the other scenarios considered. Although the small number of historical cases precludes robust statistical validation, the simulation results are supported by existing empirical evidence of collaboration between Islamists and right- or left-wing extremists. The game-theoretic approach, therefore, provides guidance regarding the circumstances under which such an unholy alliance of violent actors is likely to succeed. © 2016 Society for Risk Analysis.

  6. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    are forced into prostitution, pornography and sweatshop labor, it becomes an obvious and direct threat to the fabric of our society.3 Add terrorists... impacts the U.S. Finally, many nation states are on the brink of thriving or failing, and their fate depends either on us…or the “help” of organized...and social fabric of societies came to light in the mid-1990s. Aggravating factors include globalization of business networks, lowered trade

  7. Spatial proximity and the risk of psychopathology after a terrorist attack

    OpenAIRE

    DiMaggio, Charles; Galea, Sandro; Emch, Michael

    2010-01-01

    Previous studies concerned with the relation of proximity to the September 11, 2001 terrorist attacks and subsequent psychopathology have produced conflicting results. The goals of this analysis are to assess the appropriateness of using Bayesian hierarchical spatial techniques to answer the question of the role of proximity to a mass trauma as a risk factor for psychopathology. Using a set of individual-level Medicaid data for New York State, and controlling for age, gender, median household...

  8. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    International Nuclear Information System (INIS)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli

    2010-01-01

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  9. Colombian Army Transformation and the Inflection Point of the Terrorist Groups

    Science.gov (United States)

    2011-03-30

    Prince (Cambridge: Cambridge University Press, 1988), 24. 2 James D Henderson, La Modernizacion en Colombia: Los años de Laureano Gomez, 1889-1965...prime factor that permits the terrorist´s isolation from the social base, as well as the legitimate use of force by the State. In summary, the FARC...his dismissal, for alleged meddling in political affairs. 23 3 Francisco Leal Buitrago, La Inseguridad de la Seguridad. Colombia 1958-2005

  10. Terrorists or cowards: negative portrayals of male Syrian refugees in social media

    OpenAIRE

    Rettberg, Jill Walker; Gajjala, Radhika

    2015-01-01

    This paper examines images and words shared on the Twitter hashtag #refugeesNOTwelcome to understand the portrayal of male Syrian refugees in a post-9/11 context where the Middle-Eastern male is often primarily cast as a potential terrorist. Queer theorist Jasbir Puar (2007) and Middle- East scholar Paul Amar (2011) provide us with a theoretical approach to make sense of the contradictions we see emerging in this social media context.

  11. Strengthening Hospital Surge Capacity in the Event of Explosive or Chemical Terrorist Attacks

    Science.gov (United States)

    2009-03-01

    and become more specialized and efficient over the past decade in order to survive in the tight financial markets . Capacity is not keeping pace...Surge Capacity for Terrorist Bombings,” Atlanta, Georgia, (April 2007): 6. 197 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler ...activated in several bombings, 200 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler

  12. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    Energy Technology Data Exchange (ETDEWEB)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli (Dept. of Diagnostic Imaging, Sheba Medical center, Tel Hashomer, Sackler School of Medicine, Tel Aviv Univ., Tel Aviv (Israel)), e-mail: iris.eshed@sheba.health.gov.il

    2010-03-15

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  13. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

    OpenAIRE

    Avoine , Gildas; Bultel , Xavier; Gambs , Sébastien; Gerault , David; Lafourcade , Pascal; Onete , Cristina; Robert , Jean-Marc

    2017-01-01

    International audience; Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, veri-fiers have to authenticate the credentials of untrusted provers. Unfortunately , these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a compl...

  14. The plutonium mountain: preventing diversion

    International Nuclear Information System (INIS)

    Pohling-Brown, Pamela.

    1997-01-01

    With continued arms-reduction between the USA and the former Soviet Union, surplus nuclear materials, from dismantled weapons, requires handling. A number of risks are identified including occupational safety for workers involved with handling nuclear materials, and environmental protection. Perhaps the most sinister is the extra security needed to ensure that these materials are not diverted to rogue states or terrorist groups, as materials are handled in a larger number of countries. In particular, the author addresses the problem of plutonium reserves, and discusses the role of reprocessing in preventing diversion. (UK)

  15. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  16. CAROLIN GOERZIG. TALKING TO TERRORISTS: CONCESSIONS AND THE RENUNCIATION OF VIOLENCE. REVIEWED BY: SCOTT NICHOLAS ROMANIUK

    Directory of Open Access Journals (Sweden)

    Scott Nicholas Romaniuk

    2016-03-01

    Full Text Available “Talking to terrorists remains a taboo” (Goerzig, 2010: p. 125. The adoption and reinforcement of such a moral position by many Western and non-Western governments alike has played no small role in, to a large extent, states to contain the violence and insecurity bred by terror activist in the post-Cold war and post-9/11 periods. Yet, few policymakers seem to recognize the danger in building political and social environments in which dialogue between states and terrorist groups and organizations is little more than depravity or even a betrayal to entire populations. To be sure, the protection of civilian populations has been entrusted to states that might otherwise learn better means of terrorism deterrence if lines of communication between states and terrorists were less constrained. The taboo of which Carolin Goerzig speaks, is one that “has been institutionalized in a legal framework in which … academics are being asked to report on their students and in which attempting to understand the subjectivities of ‘terrorist’ suspects could be interpreted as a ‘glorification of terrorism’” (Jackson quoted in Goerzig, 2010: p. 125.

  17. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  18. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  19. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  20. The challenge of preparation for a chemical, biological, radiological or nuclear terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexander David

    2006-01-01

    Full Text Available Terrorism is not a new phenomenon, but, in the contemporary scene, it has established itself in a manner which commands the most serious attention of the authorities. Until relatively recently, the major threat has been through the medium of conventional weaponry and explosives. Their obvious convenience of use and accessibility guarantees that such methods will continue to represent a serious threat. However, over the last few years, terrorists have displayed an enthusiasm for higher levels of carnage, destruction and publicity. This trend leads inexorably to the conclusion that chemical, biological, radiological and nuclear (CBRN methods will be pursued by terrorist organisations, particularly those which are well organised, are based on immutable ideological principles, and have significant financial backing. Whilst it is important that the authorities and the general public do not risk over-reacting to such a threat (otherwise, they will do the work of the terrorists for them, it would be equally ill-advised to seek comfort in denial. The reality of a CBRN event has to be accepted and, as a consequence, the authorities need to consider (and take seriously how individuals and the community are likely to react thereto and to identify (and rehearse in a realistic climate what steps would need to be taken to ameliorate the effects of such an event.

  1. Terrorist Threats in the Basque Country: its Impact on the Psychosocial Sphere of Victims

    Directory of Open Access Journals (Sweden)

    Javier Martín-Peña

    2014-07-01

    Full Text Available The ceasefire of armed activities announced by ETA (Basque Homeland and Freedom in 2011 has fostered a debate about the violence and the victims of the terrorist organization. During those years, the violence perpetrated by ETA was characterized by bomb attacks and assassinations. In addition to this blatant violent behavior, a low-intensity violence was also taking place in the Basque Country, consisting of terrorist threats against their targets. There is, however, a lack of evidence-based research into this phenomenon. This investigation studies the impact of terrorist threats on the psychosocial functioning of people threatened by ETA in the Basque Country. Seventy-six people targeted by ETA completed self-reported survey. Terrorist threats and their derived psychosocial consequences were assessed by this way. The findings point out a relationship between terrorist threats and their psychosocial effects, which greatly affected the immediate environment of the targets too. The implications of these findings are discussed. El cese de la actividad armada anunciado por ETA (Euskadi ta Askatasuna – Euskadi y Libertad en 2011 ha promovido un debate sobre la violencia y las víctimas de la organización terrorista. Durante esos años, la violencia perpetrada por ETA se caracterizó por ataques con bombas y asesinatos. Además de este comportamiento claramente violento, en el País Vasco también se estaba produciendo una violencia de baja intensidad, consistente en amenazas terroristas contra sus objetivos. Sin embargo, no hay una investigación basada en la evidencia sobre este fenómeno. Esta investigación estudia el impacto de las amenazas terroristas en el funcionamiento psicosocial de las personas amenazadas por ETA en el País Vasco. Setenta y seis personas amenazadas por ETA completaron una encuesta de autoevaluación. Se evaluaron de esta forma las amenazas terroristas y sus consecuencias psicosociales derivadas. Los resultados indicaron

  2. After the flood is before the next flood - post event review of the Central European Floods of June 2013. Insights, recommendations and next steps for future flood prevention

    Science.gov (United States)

    Szoenyi, Michael; Mechler, Reinhard; McCallum, Ian

    2015-04-01

    In early June 2013, severe flooding hit Central and Eastern Europe, causing extensive damage, in particular along the Danube and Elbe main watersheds. The situation was particularly severe in Eastern Germany, Austria, Hungary and the Czech Republic. Based on the Post Event Review Capability (PERC) approach, developed by Zurich Insurance's Flood Resilience Program to provide independent review of large flood events, we examine what has worked well (best practice) and opportunities for further improvement. The PERC overall aims to thoroughly examine aspects of flood resilience, flood risk management and catastrophe intervention in order to help build back better after events and learn for future events. As our research from post event analyses shows a lot of losses are in fact avoidable by taking the right measures pre-event and these measures are economically - efficient with a return of 4 Euro on losses saved for every Euro invested in prevention on average (Wharton/IIASA flood resilience alliance paper on cost benefit analysis, Mechler et al. 2014) and up to 10 Euros for certain countries. For the 2013 flood events we provide analysis on the following aspects and in general identify a number of factors that worked in terms of reducing the loss and risk burden. 1. Understanding risk factors of the Central European Floods 2013 We review the precursors leading up to the floods in June, with an extremely wet May 2013 and an atypical V-b weather pattern that brought immense precipitation in a very short period to the watersheds of Elbe, Donau and partially the Rhine in the D-A-CH countries and researched what happened during the flood and why. Key questions we asked revolve around which protection and risk reduction approaches worked well and which did not, and why. 2. Insights and recommendations from the post event review The PERC identified a number of risk factors, which need attention if risk is to be reduced over time. • Yet another "100-year flood" - risk

  3. Epidemiology of pediatric burns and future prevention strategies-a study of 475 patients from a high-volume burn center in North India.

    Science.gov (United States)

    Dhopte, Amol; Tiwari, V K; Patel, Pankaj; Bamal, Rahul

    2017-01-01

    Pediatric burns have a long-term social impact. This is more apparent in a developing country such as India, where their incidence and morbidity are high. The aim of this study was to provide recent prospective epidemiological data on pediatric burns in India and to suggest future preventive strategies. Children up to 18 years old admitted to the Department of Burns, Plastic & Maxillofacial Surgery, VMMC & Safdarjung Hospital, New Delhi, between January and December 2014 were included in the study. Data regarding age, sex, etiology, total body surface area (TBSA), circumstances of injury, and clinical assessment were collected. The Mann-Whitney test or Kruskal-Wallis test or ANOVA was used to compare involved TBSA among various cohort groups accordingly. Univariate and multivariate linear regression analyses were used to determine the predictors of TBSA. There were a total of 475 patients involved in the study, including seven suicidal burns, all of whom were females with a mean age greater than the cohort average. Age, type of burns, mode of injury, presence or absence of inhalation injury, gender, and time of year (quarter) for admission were found to independently affect the TBSA involved. Electrical burns also formed an important number of presenting burn patients, mainly involving teenagers. Several societal issues have come forth, e.g., child marriage, child labor, and likely psychological problems among female children as suggested by a high incidence of suicidal burns. This study also highlights several issues such as overcrowding, lack of awareness, dangerous cooking practices, and improper use of kerosene oil. There is an emergent need to recognize the problems, formulate strategies, spread awareness, and ban or replace hazardous substances responsible for most burn accidents.

  4. The Nation That Cried Lone Wolf : A Data-Driven Analysis of Individual Terrorists in the United States Since 9/11

    OpenAIRE

    Eby, Charles A.

    2012-01-01

    Approved for public release; distribution is unlimited Lone-wolf terrorist attacks have occurred in the United States throughout the countrys history. Attempted attacks from individual terrorists unaffiliated with terrorist groups may be becoming more prevalent. Both the general public and government officials acknowledge the presence and importance of these attacks; however, relatively little literature exists on the subject compared to group terrorism. Much of the information on lone wol...

  5. Ariadne´s house (Pompeii, Italy wall paintings: A multidisciplinary study of its present state focused on a future restoration and preventive conservation

    Directory of Open Access Journals (Sweden)

    Pérez, M.C.

    2013-09-01

    Full Text Available This paper deals with the development of a multidisciplinary study on the current state of conservation of Ariadne's house (Pompeii, Italy, a domus of great archaeological value. The aim of this study is to undertake the preventive conservation actions required and increase the knowledge about its conservation and to generate discussions and points of view for a future restoration. Environmental studies, electromagnetic radiation measurements, study of materials and a photographical study were carried out. Those studies revealed that the rooftops covering the analyzed rooms resulting in adverse weather conditions causing grave damage to the conservation of the wall paintings. Thus, between 2009-2010 the rooftops were changed and new environmental studies were conducted. Studies of materials showed that the paintings match in execution and composition with those reported by other authors. The salts from modern mortars from previous restorations were affecting frescoes, also it is described a thin grayish surface layer from environmental contaminants.Este trabajo desarrolla un estudio multidisciplinar sobre el actual estado de conservación de la casa de Ariadna (Pompeya, Italia, domus de gran valor arqueológico. El objetivo es aumentar el conocimiento del estado actual de conservación de la casa para la discusión de una futura restauración. Para ello se realizaron estudios ambientales, mediciones de radiación electromagnética, estudio de materiales y un estudio fotográfico. Los estudios revelaron que los tejados que cubrían las salas analizadas estaban originando unas condiciones climatológicas adversas que se traducían en un grave daño para la conservación de las pinturas murales. Entre 2009-2010 se cambiaron las cubiertas y los estudios ambientales fueron repetidos. Los estudios de materiales demostraron que las pinturas coinciden en ejecución y composición con las señaladas por otros autores. Las sales procedentes de morteros

  6. Stochastic nanopore sensors for the detection of terrorist agents: Current status and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Liu Aihua; Zhao Qitao [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States); Guan Xiyun, E-mail: xguan@uta.edu [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States)

    2010-08-24

    Nanopore stochastic sensor works by monitoring the ionic current modulations induced by the passage of analytes of interest through a single pore, which can be obtained from a biological ion channel by self-assembly or artificially fabricated in a solid-state membrane. In this minireview, we overview the use of biological nanopores and artificial nanopores for the detection of terrorist agents including explosives, organophosphorus nerve agents, nitrogen mustards, organoarsenic compounds, toxins, and viruses. We also discuss the current challenge in the development of deployable nanopore sensors for real-world applications.

  7. Cyberspace as a new arena for terroristic propaganda: an updated examination.

    Science.gov (United States)

    Minei, Elizabeth; Matusitz, Jonathan

    2012-11-01

    This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists exploit cyberspace to trigger feelings of panic and overreaction in the target population. In many cases, this form of propaganda is the primary means of communication for various cyberterrorist groups to convey their intents. Internet sites also produce numerous opportunities for in-group communication and publicity.

  8. Architectural and structural engineering aspects of protective design for nuclear power plants against terrorist attack

    International Nuclear Information System (INIS)

    Musacchio, J.M.; Rozen, A.

    1987-01-01

    This paper presents the results of several threat studies which have been performed, provides collective data on costs, and discusses, in a general sense, architectural/structural aspects of passive protection design measures which have been developed and utilized at several nuclear power plants. By combining relevant architectural and structural measures in the standard design, it is possible to substantially reduce the vulnerability of nuclear power plants to terrorist attack and the estimated damage to a manageable level with a minimal investment. (orig./HP)

  9. Finding the Wolves in Sheeps Clothing: Ways to Distinguish and Deter Lone-Wolf Terrorists

    Science.gov (United States)

    2015-03-01

    Mark Hamm, “Lone-wolf Terrorism in America: Forging a New Way of Looking at an Old Problem,” YouTube video, 7:32, posted by the National Institute...that factors that influence most lone-wolf terrorists include, “to varying degrees and in variable combinations: personal aversion or depression ...Russia.”97 Also discovered after the bombings, “Tamerlan had a YouTube account that he used to post and watch violent Islamic extremist videos starting

  10. The Treatment of Images in 11-M Terrorist Attacks. Terrorism and Violence in the Press

    Directory of Open Access Journals (Sweden)

    Dra. Emma Torres Romay

    2006-01-01

    Full Text Available In this paper we want to analyze the pictures publishing in the Spanish and international newspapers before the Madrid terrorist attack, March, 11. With this research we get some ideas about freedom speech limits: the respect of the privacy and, in special, the respect of the pain. At the same time, we´ll remark the importance of the photography in the press and their communication power. For this research we used the March, 11 and 12 newspapers of most important Spanish editors and the digital edition of international press.

  11. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  12. Guidelines on suicide prevention measures for South Korea and Japan based on recent suicide trends: the need to utilize this approach to devise future suicide prevention measures for the rest of asia and the rest of the world

    OpenAIRE

    INOUE K.; CHAIZHUNUSOVA N.; HOSHI M.; NOSO Y.; TAKEICHI N.; OSPANOVA N.; MOLDAGALIEV T.; SARSEMBINA ZH.; KALIEVA A.; JAMEDINOVA U.; CHEGEDEKOVA SH.; SHARAPIYEVA A.; BITEBAYEVA D.; RAKHYPBEKOV T.K.

    2016-01-01

    Introduction: Devising and implementing effective suicide prevention measures is an urgent matter for countries around the world. South Korea and Japan have some of the world’s highest suicide rates, so the current study examined more effective suicide prevention measures for those countries with a focus on recent suicide rates by age group. Materials and Methods: This study examined the suicide rate for each sex by age group in South Korea and Japan in 2009 and 2012, and this study then calc...

  13. Political terrorism and affective polarization in "black" and "red" terrorists in Italy during the years 1968-1988.

    Science.gov (United States)

    Pacini, Matteo; Maremmani, Icro

    2018-04-01

    Psychiatric evaluations of violent political crime were mostly performed on a case-by-case basis in a forensic environment, which made them unduly dependent on categories of presumed dangerousness and legal responsibility, rather than on a clinical definition of their mental status. In referring to such "clinical" definitions, the disorder we have in mind is not limited to the major, agitated psychotic manias or mixed states. The presence of a dominant temperament, or protracted hypomania, is enough by itself to explain an individual's engagement in a wide range of activities, not necessarily sociopathic or violent. We put forward the hypothesis that formal and transpolitical radical choices, either in favor of an illegal lifestyle or of activities involving a high level of risk, may be linked with certain mental states, especially when considering small clandestine groups showing a high level of internal ideological consensus, and a no-return attitude toward a commitment to radical choices. Available data about the psycho(patho)logical profile of terrorists are still hard to come by. The only available studies are those on identified living terrorists (judging by the trials of those who personally admitted to having been terrorists), and statistical data imply a number of documented cases belonging to the same terrorist organization. In Italy, the period often called the "years of lead [bullets]" displays an interesting viewpoint for the study of terrorist psychology, for two main reasons: first of all, it is a historically defined period (1968-1988), and second, the number of ascertained participants in terrorist activities was quite large.

  14. Biomedical HIV Prevention Including Pre-exposure Prophylaxis and Opiate Agonist Therapy for Women Who Inject Drugs: State of Research and Future Directions.

    Science.gov (United States)

    Page, Kimberly; Tsui, Judith; Maher, Lisa; Choopanya, Kachit; Vanichseni, Suphak; Mock, Philip A; Celum, Connie; Martin, Michael

    2015-06-01

    Women who inject drugs (WWID) are at higher risk of HIV compared with their male counterparts as a result of multiple factors, including biological, behavioral, and sociostructural factors, yet comparatively little effort has been invested in testing and delivering prevention methods that directly target this group. In this article, we discuss the need for expanded prevention interventions for WWID, focusing on 2 safe, effective, and approved, yet underutilized biomedical prevention methods: opiate agonist therapy (OAT) and oral pre-exposure prophylaxis (PrEP). Although both interventions are well researched, they have not been well examined in the context of gender. We discuss the drivers of women injectors' higher HIV risk, review the effectiveness of OAT and PrEP interventions among women, and explain why these new HIV prevention tools should be prioritized for WWID. There is substantial potential for impact of OAT and PrEP programs for WWID in the context of broader gender-responsive HIV prevention initiatives. Although awaiting efficacy data on other biomedical approaches in the HIV prevention research "pipeline," we propose that the scale-up and implementation of these proven, safe, and effective interventions are needed now.

  15. The need to counter extremist terrorist manifestations in society and in the penal system

    Directory of Open Access Journals (Sweden)

    Kazberov P.N.

    2013-09-01

    Full Text Available The article discusses the need for inter-agency work to minimize the extremist-terrorist activities in the community. The problem of the psychology of extremism and terrorism are increasingly in the spotlight representatives of various scientific disciplines. First of all, there is no single legal science in all respects understanding of phenomena such as extremism and terrorism, their classification and evaluation, although a number of positive examples in this respect international cooperation is present. According to current data provided by the Investigative Committee of the Russian Federation, the General Prosecutor of the Russian Federation, the Russian Ministry of Internal Affairs, as well as the Moscow Bureau for Human Rights, extremism is a real threat to the national security of the Russian Federation. From the data of law enforcement should be the fact that most of the crimes of extremist and terrorist nature committed by persons of young age, the consciousness of which are susceptible to nationalist propaganda. A significant increase in informal youth movements extremist-nationalist orientation. The problem of expansion of extremism is also relevant for the penitentiary system of modern society. The very fact that a significant number of prisoners serving sentences for extremism and terrorism, illustrates the need for them special psychological and educational work

  16. Radiological preparedness in the case of a terrorist attack or an accident

    International Nuclear Information System (INIS)

    Cizmek, A.

    2005-01-01

    During the Cold War, every information about weapons of mass destruction was treated as top secret, regardless of whether the information concerned friend or foe. The most serious threat in our post Cold War era are terrorist radiological dispersal devices. Dirty nukes are what you may choose to build if you're unable to create a real nuclear bomb, i.e. one whose explosion is based on a nuclear reaction. A dirty bomb is a conventional explosive salted with radioactive isotopes in order to spew out that nuclear material and contaminate a wide area. The military usefulness of such devices have always been in dispute. In fact, the TNT in such a bomb may still be more dangerous than the nuclear material. Its destructive power would really depend on the size of the conventional bomb, and the volume and nature of nuclear material. This paper addresses the possibilities of decontamination and preparedness in the case of a terrorist attack or accident.(author)

  17. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  18. Reflection in phraseological neology of traumatic historical events connected with the terrorist threat

    Directory of Open Access Journals (Sweden)

    Skorobogatova Taisiya Ivanovna

    2016-03-01

    Full Text Available The article is devoted to the analysis of phraseological units - neologisms which are associated with such traumatic historical events, as the implementation of terrorist acts. Particular emphasis is placed on the description of English, Russian and French phraseological units that have introduced the memory of the terrorist threat in the XX-XXI centuries.: Eng. That’s so 10th September (lit. today September 10, fig: Do not worry ahead of time about nothing; Rus. мочить в сортире (descriptor: беспощадно расправиться; фр. le prince s’est mari, le m chant est mort, c’est une semaine Walt Disney (lit. prince married the villain died, week Walt Disney; descriptor: Idyll, g n ration Bataclan (lit. Bataklan generation; descriptor: young people age of the victims who died in the “Bataklane”, i.e. young people aged 25-35. Phraseology description of new, emerging units is one of the most important problems in theoretical linguistics, namely: to illustrate and confirm the fact that the phrasebook body of a single national language is the result of the two memories - historical and linguistic. At the same time important to consider such a significant factor that determines the specificity of the national phraseological fund as memory selectivity in general and historical memory in particular.

  19. Plastic Surgery Management of Victims of Terrorist Violence in Ankara, Turkey.

    Science.gov (United States)

    İğde, Murat; Kaplan, Ahmet

    2017-12-01

    Terror attacks have been progressively increasing worldwide through the present era. The management of the consequences of terrorism events is under debate in almost every scientific area. The organization and advancement of health services constitute important components of the crisis management. Similar to other specialty areas in medicine, the medical management of terrorist attacks is becoming important in terms of plastic and reconstructive surgery.Ankara, the capital of Turkey, has been subject to 2 terrorist events in public places within a year. The total number of patients involved in both cases was 434. Ankara Numune Training and Research Hospital is a tertiary health care institution and one of the most important trauma centers in the region. A total of 178 Patients exposed to these events referred to our hospital. Of the total, 34 patients were completely or partially treated in the plastic and reconstructive surgery clinic. In this study, we tried to discuss the difficulties encountered in the classification of patients and plastic surgery during the treatment period of patients who experienced these attacks.Data were obtained from The National News Agency, hospital, and our own clinic registries. Patient classification was based on the injured parts of the body. Statistical analysis was performed for all data. In conclusion, the role and the importance of plastic surgery department especially in trauma management have been emphasized in the light of our findings.

  20. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    Barakat, M.

    2008-01-01

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  1. A project to develop restoration methods for buildings and facilities after a terrorist attack

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.F. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Div]|[Environment Canada, Ottawa, ON (Canada). River Road Environmental Technology Centre; Volchek, K.; Hornof, M.; Boudreau, L.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Best, M. [Health Canada, Ottawa, ON (Canada); Garbutt, M.; Krishnan, J.; Wagener, S.; Bernard, K. [Health Canada, Winnipeg, MB (Canada); Cousins, T.; Haslip, D. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2004-07-01

    A multi-agent project was initiated to review site restoration after a terrorist attack. The objective was to acquire and compile information on all known restoration procedures for buildings, exteriors of buildings, their interior contents, and adjacent areas such as parking lots, lawns and vehicles. All procedures were then tested and validated. Restoration procedures included pickup, neutralization, decontamination, removal and final destruction/deposition of the contaminant, cleaning material and contaminated debris resulting from the terrorist act. This research and development project considered chemical, biological and nuclear contamination with the intent to develop methods to decontaminate and restore buildings after a chemical, biological and radiological (CBR) attack. Ideas were collected from work conducted around the world. The efficacy of best candidates was tested along with all selected chemical target items. The project also involved the preparation of procedures for decontamination and restoration. Ultimately, a tradeoff decision basis will be developed to provide information on abandonment and quarantine versus cleanup. The study revealed that there are several technologies that can be used for the decontamination of structures and equipment after acts of terrorism, however, no one technique will work for all contaminants on all surfaces. The selection of a decontamination method depends on the contaminant, the surface being decontaminated and economic, social and health factors. The amount of waste generated by decontamination is a major feasibility factor. 25 refs., 6 tabs.

  2. Optimizing Visits to the Site of Death for Bereaved Families After Disasters and Terrorist Events.

    Science.gov (United States)

    Kristensen, Pål; Dyregrov, Atle; Weisæth, Lars; Straume, Marianne; Dyregrov, Kari; Heir, Trond; Bugge, Renate Grønvold

    2017-09-13

    In recent years it has been common after disasters and terrorist events to offer bereaved families the opportunity to visit the place where their loved ones died. Many report that such visits are beneficial in processing their loss. Various factors, both cognitive (eg, counteracting disbelief) and existential or emotional (eg, achieving a sense of closeness to the deceased), are associated with the experienced benefit. Nonetheless, exacerbations of trauma and grief reactions (eg, re-enactment fantasies) are common, with some of the bereaved also reporting adverse reactions after the visit. Subsequently, proper preparations are a prerequisite before such visits take place. This article describes how to optimize collective visits to the site of death after disasters or terrorist events for bereaved families. Important questions-for example, concerning those who should be responsible for organizing a visit and those who should be invited, the timing of the visit, what can be done at the site, the need for support personnel, and other practical issues-are discussed and general guidelines are recommended. (Disaster Med Public Health Preparedness. 2017;page 1 of 5).

  3. Tracking and Analyzing Individual Distress Following Terrorist Attacks Using Social Media Streams.

    Science.gov (United States)

    Lin, Yu-Ru; Margolin, Drew; Wen, Xidao

    2017-08-01

    Risk research has theorized a number of mechanisms that might trigger, prolong, or potentially alleviate individuals' distress following terrorist attacks. These mechanisms are difficult to examine in a single study, however, because the social conditions of terrorist attacks are difficult to simulate in laboratory experiments and appropriate preattack baselines are difficult to establish with surveys. To address this challenge, we propose the use of computational focus groups and a novel analysis framework to analyze a social media stream that archives user history and location. The approach uses time-stamped behavior to quantify an individual's preattack behavior after an attack has occurred, enabling the assessment of time-specific changes in the intensity and duration of an individual's distress, as well as the assessment of individual and social-level covariates. To exemplify the methodology, we collected over 18 million tweets from 15,509 users located in Paris on November 13, 2015, and measured the degree to which they expressed anxiety, anger, and sadness after the attacks. The analysis resulted in findings that would be difficult to observe through other methods, such as that news media exposure had competing, time-dependent effects on anxiety, and that gender dynamics are complicated by baseline behavior. Opportunities for integrating computational focus group analysis with traditional methods are discussed. © 2017 Society for Risk Analysis.

  4. The Representation of Islam in Western Media: The Coverage of Norway Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Emad A. Alghamdi

    2015-05-01

    Full Text Available Undeniably mass media have become the primary source of information and communication for the majority of, if not all, members of modern societies. The nature of the information thus communicated and the manner in which it is dispensed through media certainly have a profound influence on people’s perceptions of the world around them. The relation between the media, on one hand, and culture, social life, and politics on the other, is an interesting one in which media fulfills dual functions, reflecting and also shaping issues occurring within these three domains (Bell & Garrett, 1998. In the initial media coverage of the 2011 Norway terrorist attacks, some western media authors, inaccurately and unjustly, held Muslims and Islamic groups as being responsible for the attacks. Using Critical Discourse Analysis (CDA, this study seeks to ascertain how language was manipulated in this coverage of the terrorist attacks in order to give expression to blind prejudice against Islam and Muslims. As findings of the analyses reveal, the tones of allegation in these articles and reports differed dramatically from one article to another ranging from tones of mere suspicion to those of overt accusation. The varying degrees of uncertainty or assertion of the authors’ statements were reflected in the varied linguistic forms and devices used within the discourse.

  5. The game-theoretic national interstate economic model : an integrated framework to quantify the economic impacts of cyber-terrorist behavior.

    Science.gov (United States)

    2014-12-01

    This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...

  6. The 'overlooked trio' of hypothetical terrorist nuclear weapons - reactor grade plutonium, neptunium-237 and tritium

    International Nuclear Information System (INIS)

    Sholly, S.

    2002-01-01

    Full text: Considerations revolving around physical protection of nuclear material are quite commonly and naturally focused on protecting weapons-grade plutonium (WGPu) and highly enriched uranium (HEU) from theft and diversion. These two materials are the center of attention because of their well-known (and demonstrated) potential for use in first-generation nuclear explosive devices of which potential terrorists are widely thought to be capable. They are also the center of attention because of retirements of these materials from military use as the Russian Federation and the United States reduce the number of nuclear weapons in their arsenals. Three other materials - an 'overlooked trio' - must also be borne in mind within this context: (1) reactor-grade plutonium (RGPu); (2) neptunium-237 (Np-237); and (3) tritium (H-3). Although there are still some authorities who either contend that RGPu cannot be used in a nuclear explosive or that there are (for a terrorist) insurmountable difficulties in doing so, the knowledgeable scientific and technical community, recognizes the potential utility of RGPu for hypothetical terrorist nuclear devices. A much smaller community of experts recognizes the usefulness of Np-237 for nuclear devices, but Np-237 is as straight-forwardly and easily usable as HEU and similarly abundant (but not often in separated form). Tritium can be used (with a modest increase in design sophistication) in a conventional first-generation nuclear device with any of the weapons-usable materials (WGPu, HEU, RGPu or Np-237) to increase the yield and/or increase the reliability of a non-fizzle yield. Given the presence of RGPu and Np-237 in abundant quantities in spent commercial reactor fuel, widely available knowledge of how to separate these materials, and a world-wide total of more than 400 nuclear power plants, spent reactor fuel also requires stringent controls. This is especially true of old spent fuel which has far less radiation dose

  7. Terrorist threat and perceived Islamic support for terrorist attacks as predictors of personal and institutional out-group discrimination and support for anti-immigration policies: evidence from 9 European countries

    NARCIS (Netherlands)

    Doosje, B.; Zimmermann, A.; Küpper, B.; Zick, A.; Meertens, R.

    2009-01-01

    Traditionally, research has shown that subtle and blatant prejudices are important predictors of out-group discrimination and support for anti-immigration policies. The present paper shows that, when controlling for these types of prejudices and for political conservatism, terrorist threat and

  8. Preventing a Cyber Dresden: How the Evolution of Air Power can Guide the Evolution of Cyber

    Science.gov (United States)

    2011-06-01

    non-military cyber issues including non-state actors such as terrorists, and organized crime syndicates . This delineation will be drawn upon later...Future with Alvin Toffler,” USA Today available at http://www.usatoday.com/news/opinion/ columnists /toffler/toff05.htm accessed 5 January 2011. 29

  9. Preemption Contested: Suspect Spaces and Preventability in the July 7 Inquest

    NARCIS (Netherlands)

    de Goede, M.

    2014-01-01

    The London Coroner's Inquest into the deaths of July 7 2005 unequivocally rejected the notion that the security services could and should have been able to identify the 7/7 perpetrators as potential future terrorists before July 2005. These findings contest powerful post-9/11 security logics of

  10. Leveraging the Trinity: A Clausewitzian Framework for Genocide Prevention

    Science.gov (United States)

    2014-05-22

    the fish by draining the sea.”150 The terrorist category includes mass killing of civilians in an attempt to quickly end a conflict, a grouping that...EBSCOhost (accessed 31 March 2014). David A. Hamburg , Preventing Genocide: Practical Steps Toward Early Detection and Effective Action (Boulder, CO...Humanity. New York: PublicAffairs, 2009. ———. Hitler’s Willing Executioners: Ordinary Germans and the Holocaust. New York: Knopf, 1996. Hamburg , David A

  11. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  12. Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists (by Jeffrey Kahn, University of Michigan Press, 2013

    Directory of Open Access Journals (Sweden)

    Susan Ginsburg

    2014-04-01

    Full Text Available Since 9/11, migration-related security measures, including a growing reliance on watch-lists, have limited the right to travel. Jeffrey Kahn’s book, Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists, examines the legal and policy questions raised by prohibitions on travel by US citizens. 

  13. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-07-25

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  14. Granting Concessions and Paying Ransoms to Terrorists: A Policy Options Analysis of the U.S. Policy on Hostage Recovery

    Science.gov (United States)

    2016-06-01

    businesses like General Motors, which received bailout money from the federal government, and the Catholic Church, which receives tax-exempt status...from gaining independence from France . Other examples of absolute terrorists include the Provisional Irish Republican Army (IRA), Hamas, and al...The conflict began when the IRA, which represented the Catholic minority, felt discriminated against by the Protestant majority, represented by

  15. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Directory of Open Access Journals (Sweden)

    Tuncay Ercan

    2008-07-01

    Full Text Available Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  16. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Science.gov (United States)

    2011-07-06

    ... of Investigation (FBI)/Terrorist Screening Center (TSC) is providing a near real time, synchronized... appropriate clearances or permissions. Retention and disposal: The WLS will maintain a near real time mirror... difficulties they experienced during their travel screening at transportation hubs such as airports and train...

  17. Leprosy New Case Detection Trends and the Future Effect of Preventive Interventions in Pará State, Brazil: A Modelling Study

    NARCIS (Netherlands)

    H.J. de Matos (Haroldo José); D.J. Blok (David); S.J. de Vlas (Sake); J.H. Richardus (Jan Hendrik)

    2016-01-01

    textabstractBackground: Leprosy remains a public health problem in Brazil. Although the overall number of new cases is declining, there are still areas with a high disease burden, such as Pará State in the north of the country. We aim to predict future trends in new case detection rate (NCDR) and

  18. Construction of War Discourse on International News Agencies: Case Study Terrorist attacks November 13th 2015

    Directory of Open Access Journals (Sweden)

    Ángel TORRES-TOUKOUMIDIS

    2017-01-01

    Full Text Available This study analyzes warmongering rhetoric presented by international agencies Reuters, Al Arabiya, Al Jazeera and Associated Press (AP of the information related to the terrorist attacks in Paris on November 13th, 2015 for 15 days after the event. We have started from a quantitative and qualitative analysis of 550 information units using the software MAXQDA (v. 11.0.11. Subsequently, the semantic criteria of media discourse: functionality, significance and direction of the goal was applied on the selected sample. The results demonstrate the prevailing demonization of Islam, the exaltation of fear and panic in the discursive construction and it highlighted the spectacle of the information as a communicative strategy on the rhetorical guidance.

  19. War on Terror: Fantasy and Fiction Behind the Mythology of Terrorist Financing

    Directory of Open Access Journals (Sweden)

    El-Fatih A. Abdel Salam

    2009-06-01

    Full Text Available Documentary evidence shows that the series of financial crackdowns initiated since 9/11 have had virtually no impact on terrorism. This is because these efforts are based on a fundamental misconception on how terrorism works. The financial warriors’ predisposition to stereotypes about “Arabs and their money” allowed unsubstantiated rumours–such as Bin Laden’s personal fortune of $300 million–to become established as facts. This study exposes the extent to which Washington policymakers simply transposed the template for the war on drugs on to the war on terror, despite the fact that terrorism is not a profit–driven enterprise. The collateral damage inflicted on organisations like Al-Barakaat, the Somali remittance network, wrongly accused of channeling money to the terrorists, and others are counter-productive as they dent the image of the US in the Muslim world.

  20. Chronic thought suppression and posttraumatic symptoms: data from the Madrid March 11, 2004 terrorist attack.

    Science.gov (United States)

    Vázquez, Carmelo; Hervás, Gonzalo; Pérez-Sales, Pau

    2008-12-01

    Although a considerable number of people either witnessed directly or in the mass media the traumatic scenes of the terrorist attack that took place on March 11th, 2004 in Madrid, only a fraction of Madrid citizens developed posttraumatic symptoms. In this study, posttraumatic stress-related symptoms, degree of exposure, coping strategies related to the attack, and chronic attempts to avoid intrusive thoughts (i.e., thought suppression) were assessed in a general population Madrid sample (N=503) 2-3 weeks after the attacks. Our results showed that participants with higher scores in chronic thought suppression exhibited higher levels of PTSD symptoms. Higher scores in chronic thought suppression also correlated positively with the use of avoidant coping strategies after the attacks. We discuss the possible common roots of avoidance of intrusive thoughts and avoidant coping strategies and the implications of this relationship for the emergence of stress-related symptoms as well as for public health policies.

  1. Evaluation of a theory-driven e-learning intervention for future oral healthcare providers on secondary prevention of disordered eating behaviors.

    Science.gov (United States)

    DeBate, Rita D; Severson, Herbert H; Cragun, Deborah L; Gau, Jeff M; Merrell, Laura K; Bleck, Jennifer R; Christiansen, Steve; Koerber, Anne; Tomar, Scott L; McCormack Brown, Kelli R; Tedesco, Lisa A; Hendricson, William

    2013-06-01

    Oral healthcare providers have a clinical opportunity for early detection of disordered eating behaviors because they are often the first health professionals to observe overt oral and physical signs. Curricula regarding early recognition of this oral/systemic medical condition are limited in oral health educational programs. Web-based learning can supplement and reinforce traditional learning and has the potential to develop skills. The study purpose was to determine the efficacy of a theory-driven Web-based training program to increase the capacity of oral health students to perform behaviors related to the secondary prevention of disordered eating behaviors. Using the Reach, Effectiveness, Adoption, Implementation and Maintenance evaluation framework, a longitudinal group-randomized controlled trial involving 27 oral health classes from 12 oral health education programs in the United States was implemented to assess the efficacy of the Web-based training on attitudes, knowledge, self-efficacy and skills related to the secondary prevention of disordered eating behaviors. Mixed-model analysis of covariance indicated substantial improvements among students in the intervention group (effect sizes: 0.51-0.83) on all six outcomes of interest. Results suggest that the Web-based training program may increase the capacity of oral healthcare providers to deliver secondary prevention of disordered eating behaviors. Implications and value of using the Reach, Effectiveness, Adoption, Implementation and Maintenance framework are discussed.

  2. The future of pain research, education, and treatment: a summary of the IOM report "Relieving pain in America: a blueprint for transforming prevention, care, education, and research".

    Science.gov (United States)

    Steglitz, Jeremy; Buscemi, Joanna; Ferguson, Molly Jean

    2012-03-01

    The fifth column on Evidence-Based Behavioral Medicine is focused on the Institute of Medicine's (IOM) report entitled "Relieving Pain in America: A Blueprint for Transforming Prevention, Care, Education, and Research." The IOM has reported that chronic pain affects 116 million American adults, which is greater than the total of heart disease, cancer, and diabetes combined. It is recommended that data collection takes place at regular intervals using standardized questions, survey protocols, and electronic medical records with the aim of the identifying the following: subpopulations at risk; characteristics of acute and chronic pain; health consequences of pain, including death, disease, and disability; and longitudinal trends of pain. In addition, health education programs should be redesigned to include information about self-management, actions to prevent injuries at the individual and community level, advocacy for pain treatment, and support for improved prevention and control policies. Through teamwork between various professions, from physicians, nurses, and psychologists to physical therapists, pharmacists, and policy makers, advancements in pain awareness, education, research, and treatment should begin to materialize.

  3. Initiatives for proliferation prevention

    International Nuclear Information System (INIS)

    1997-04-01

    Preventing the proliferation of weapons of mass destruction is a central part of US national security policy. A principal instrument of the Department of Energy's (DOE's) program for securing weapons of mass destruction technology and expertise and removing incentives for scientists, engineers and technicians in the newly independent states (NIS) of the former Soviet Union to go to rogue countries or assist terrorist groups is the Initiatives for Proliferation Prevention (IPP). IPP was initiated pursuant to the 1994 Foreign Operations Appropriations Act. IPP is a nonproliferation program with a commercialization strategy. IPP seeks to enhance US national security and to achieve nonproliferation objectives by engaging scientists, engineers and technicians from former NIS weapons institutes; redirecting their activities in cooperatively-developed, commercially viable non-weapons related projects. These projects lead to commercial and economic benefits for both the NIS and the US IPP projects are funded in Russian, Ukraine, Kazakhstan and Belarus. This booklet offers an overview of the IPP program as well as a sampling of some of the projects which are currently underway

  4. Assessing the Knowledge Level, Attitudes, Risky Behaviors and Preventive Practices on Sexually Transmitted Diseases among University Students as Future Healthcare Providers in the Central Zone of Malaysia: A Cross-Sectional Study

    OpenAIRE

    Folasayo, Adigun Temiloluwa; Oluwasegun, Afolayan John; Samsudin, Suhailah; Saudi, Siti Nor Sakinah; Osman, Malina; Hamat, Rukman Awang

    2017-01-01

    This study was done to assess the knowledge, attitudes, risky behaviors and preventive practices related to sexually-transmitted diseases (STDs) among health and non-health sciences university students as future healthcare providers in Malaysia. A total of 700 health and non-health sciences university students (255 male; 445 female) aged between 17 and 30 years were surveyed by using a self-administered questionnaire. The majority (86.6%) had heard of STDs, and 50.4% knew STDs could present w...

  5. The Money Laundering Prevention System

    Directory of Open Access Journals (Sweden)

    Sonja Cindori

    2007-03-01

    Full Text Available The paper presents the money laundering and terrorist financing prevention system in Croatia. The basic concepts are defined, the principles and fundamentals of international regulations analysed, and the regulatory system in Croatia covered by statute and money laundering prevention Regulations is presented, in conjunction with a description of the organisation, remit and international actions of the Money Laundering Prevention Office.The infiltration of dirty money is a crucial problem from national economies. The purchase of shares, of real estate, the establishment of dirty investment funds and the use of the banking system for the embedding of such resources is a danger to the credibility of a whole country, and in particular to the security of the financial and banking system. Croatia has adopted statutory measures aimed at the effective detection and prevention of suspicious financial transactions, in other words the prevention of money laundering.Launderers constantly find new ways, make use of new non-financial channels and expand their activities to real estate, artworks and insurance. Hence it is necessary to keep up with European approaches and recommendations, to strive for further improvement of the laws and the modernisation of the system, and to adopt new regulations harmonised with international standards, particularly with Directive 2005/60/EC.

  6. Preventing Lone Wolf Terrorism: some CT Approaches Addressed

    Directory of Open Access Journals (Sweden)

    Edwin Bakker

    2011-12-01

    Full Text Available After a brief discussion of the epistemological and phenomenological difficulties associated with the concept of lone wolf terrorism, a number of possible counter-terrorist approaches are discussed. Lone operator terrorist acts should be considered ‘black swan’ occurrences that are almost impossible to categorize or systematize, let alone forecast. Thus, not the profile of the perpetrator, but the modus operandi offer clues for a better response to this particular threat. Furthermore, almost all lone operators do display a degree of commitment to, and identification with, extremist movements – providing leads for preventing new rounds of radicalization within this potential group of sympathizers or followers. With the apparent increase of Islamist lone wolf terrorism and fears for right-wing extremists wanting to follow the example of the Norwegian mass murderer A.B. Breivik, new questions need to be posed, addressing the role of virtual communities with which lone operators identify themselves. 

  7. Future challenges for occupational health services can be prevented by proactive collaboration with the companies using the services: a participatory and reflection project

    Directory of Open Access Journals (Sweden)

    Lydell M

    2017-05-01

    Full Text Available Marie Lydell,1 Cathrine Hildingh,1 Arne Söderbom,2 Kristina Ziegert1 1Center of Research on Welfare, Health and Sport (CVHI, School of Social and Health Sciences, 2Center for Innovation, Entrepreneurship and Learning Research (CIEL, School of Economics, Technology and Science, Halmstad University, Halmstad, Sweden Background: There is clearly a need for research in the field of occupational health service (OHS for applying new perspectives. Proactive collaboration is needed between the OHSs and the companies. The customers of the companies using the services should be able to safeguard themselves from the health problems caused by the work environment through proactive collaboration with the OHSs. Objective: The main purpose of this interdisciplinary study was to explore how the stakeholders reflected to create and agree on core values for future challenges in OHS, as seen from the perspectives of OHS professionals and customer companies. Methodology: An action research process was conducted. This study was divided into three phases. In phase I, the data were collected from interviews and diaries of interdisciplinary occupational health professionals (n=12. A focus group that sampled the eight managers of the customer companies was also included. In phase II, a questionnaire was developed with 24 questions focusing on examining the future challenges for OHS. The questionnaire was sent to customer companies (n=116. In phase III, a scoping review was undertaken. Results: Three categories emerged from the analysis: “Balancing complex situations” clarified the complexity regarding senior employees; “Working with a proactive approach” indicated the need for working with a new proactive approach supporting sustainable health; and “Collaborate internally and externally” showed good relationships between the customer and the OHS, which is a mutual responsibility to both the partners. Conclusion: The results outlined that it is necessary to

  8. Simulation of a terrorist attack with intent to a source of Iridium-192 and Radium Sulphate-226: procedures for radiation emergency actions

    International Nuclear Information System (INIS)

    Aguiar, Bruno Dias de

    2013-01-01

    The accomplishment of major public events comprises a previous radiological safety planning network, since both public safety and safeguards criteria are based upon risk factors, to which individuals and even the environment may be exposed to, moreover in radiological, nuclear and/or terrorist threats. Therefore, a preventive and extensive local radiological survey must be performed, aiming the detection of unexpected radioactive material, being it a sealed or unsealed source or even in the dispersed form. Once confirmed its presence, protective actions must be started up, with monitoring and restraint of the source/material, followed by dose and dose rate assessment in environment, as well as contamination in air and in surfaces in general. As a consequence, such measures must be carried out at once, according to specific protocols adopted by the responding team, as soon as the incident is confirmed. Aiming a better qualification in the attendance of major events, a simulated scenario is proposed in this study, comprising an incident with the malicious presence of a radioactive source in the Mario Filho Stadium (Maracana). (author)

  9. Future challenges for occupational health services can be prevented by proactive collaboration with the companies using the services: a participatory and reflection project

    Science.gov (United States)

    Lydell, Marie; Hildingh, Cathrine; Söderbom, Arne; Ziegert, Kristina

    2017-01-01

    Background There is clearly a need for research in the field of occupational health service (OHS) for applying new perspectives. Proactive collaboration is needed between the OHSs and the companies. The customers of the companies using the services should be able to safeguard themselves from the health problems caused by the work environment through proactive collaboration with the OHSs. Objective The main purpose of this interdisciplinary study was to explore how the stakeholders reflected to create and agree on core values for future challenges in OHS, as seen from the perspectives of OHS professionals and customer companies. Methodology An action research process was conducted. This study was divided into three phases. In phase I, the data were collected from interviews and diaries of interdisciplinary occupational health professionals (n=12). A focus group that sampled the eight managers of the customer companies was also included. In phase II, a questionnaire was developed with 24 questions focusing on examining the future challenges for OHS. The questionnaire was sent to customer companies (n=116). In phase III, a scoping review was undertaken. Results Three categories emerged from the analysis: “Balancing complex situations” clarified the complexity regarding senior employees; “Working with a proactive approach” indicated the need for working with a new proactive approach supporting sustainable health; and “Collaborate internally and externally” showed good relationships between the customer and the OHS, which is a mutual responsibility to both the partners. Conclusion The results outlined that it is necessary to take action to apply new proactive health promotions, with a focus on workplace health promotion. The results also indicated that interventions for senior employees are of importance. This study was done in collaboration with the stakeholders from the occupational health care service center and the managers from the customer companies

  10. Nutrient loads in the river mouth of the Río Verde basin in Jalisco, Mexico: how to prevent eutrophication in the future reservoir?

    Science.gov (United States)

    Jayme-Torres, Gonzalo; Hansen, Anne M

    2017-10-04

    Since nutrients are emitted and mobilized in river basins, causing eutrophication of water bodies, it is important to reduce such emissions and subsequent nutrient loads. Due to processes of attenuation, nutrient loads are reduced during their mobilization in river basins. At the mouth of the Río Verde basin in western Mexico, the El Purgatorio dam is being constructed to supply water to the metropolitan area of the second most populated city in the country, Guadalajara. To analyze situations that allow protecting this future dam from eutrophication, nutrient loads in the mouth of the river basin were determined and their reduction scenarios evaluated by using the NEWS2 (Nutrient Export from Watersheds) model. For this, a nutrient emissions inventory was established and used to model nutrient loads, and modeling results were compared to an analysis of water quality data from two different monitoring sites located on the river. The results suggest that 96% of nitrogen and 99% of phosphorus emissions are attenuated in the watershed. Nutrient loads reaching the mouth of the river basin come mainly from wastewater discharges, followed by livestock activities and different land uses, and loads are higher as emissions are located closer to the mouth of the river basin. To achieve and maintain mesotrophic state of water in the future dam, different nutrient emission reduction scenarios were evaluated. According to these results, the reduction of 90% of the phosphorus loads in wastewater emissions or 75% of the phosphorus loads in wastewater emissions and at least 50% in emissions from livestock activities in the river basin are required.

  11. Future challenges for occupational health services can be prevented by proactive collaboration with the companies using the services: a participatory and reflection project.

    Science.gov (United States)

    Lydell, Marie; Hildingh, Cathrine; Söderbom, Arne; Ziegert, Kristina

    2017-01-01

    There is clearly a need for research in the field of occupational health service (OHS) for applying new perspectives. Proactive collaboration is needed between the OHSs and the companies. The customers of the companies using the services should be able to safeguard themselves from the health problems caused by the work environment through proactive collaboration with the OHSs. The main purpose of this interdisciplinary study was to explore how the stakeholders reflected to create and agree on core values for future challenges in OHS, as seen from the perspectives of OHS professionals and customer companies. An action research process was conducted. This study was divided into three phases. In phase I, the data were collected from interviews and diaries of interdisciplinary occupational health professionals (n=12). A focus group that sampled the eight managers of the customer companies was also included. In phase II, a questionnaire was developed with 24 questions focusing on examining the future challenges for OHS. The questionnaire was sent to customer companies (n=116). In phase III, a scoping review was undertaken. Three categories emerged from the analysis: "Balancing complex situations" clarified the complexity regarding senior employees; "Working with a proactive approach" indicated the need for working with a new proactive approach supporting sustainable health; and "Collaborate internally and externally" showed good relationships between the customer and the OHS, which is a mutual responsibility to both the partners. The results outlined that it is necessary to take action to apply new proactive health promotions, with a focus on workplace health promotion. The results also indicated that interventions for senior employees are of importance. This study was done in collaboration with the stakeholders from the occupational health care service center and the managers from the customer companies. The use of a participatory research design, including close

  12. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    ... and business elite, The government's failure to curtail these groups resulted from the enormous belief that these terrorists were not a direct threat to Greek's democracy Fortunately, in June of 2002...

  13. Involvement of Russian Organized Crime Syndicates, Criminal Elements in the Russian Military, and Regional Terrorist Groups in Narcotics Trafficking in Central Asia, the Caucasus, and Chechnya

    National Research Council Canada - National Science Library

    Curtis, Glenn E

    2002-01-01

    ... (Armenia, Azerbaijan, and Georgia), and in Chechnya. The purpose of the report is to reveal the role of Russian organized crime and Central Asian terrorist organizations in narcotics trafficking in those areas...

  14. Posse Comitatus and the Use of the Military in Denying Terrorist Access to the United States Along the Border with Mexico

    National Research Council Canada - National Science Library

    Thomas, Greg A

    2005-01-01

    .... The largely unsecured border we share with Mexico is an enticing avenue for illegal immigrants and drug smugglers but also, and more importantly, for potential terrorists hostile to the United States...

  15. [The role of the public health personnel in the Prevention Department (in the Hygiene Services and Public Health Care and Hygiene of Food and Nutrition): proposal for the future of public health care].

    Science.gov (United States)

    Brusaferro, Silvio; Marcolongo, Adriano; Schiava, Flavio; Bggio, Luca; Betta, Alberto; Buzzo, Armando; Cinquetti, Sandro; Coin, Paulo; Dal Fior, Tina; De Battisti, Fabio; De Marchi, Chiara; De Noni, Lucia; Donatoni, Luigi; Ferraresso, Anna; Gallo, Giovanni; Gallo, Lorenza; Gallo, Tolinda; Gottardello, Lorena; Menegon, Tiziana; Minuzzo, Michele; Paussi, Gianna; Pinna, Clara; Poli, Albino; Rossato, Luigi; Sbrogliò, Luca; Simeoni, Josef; Speccini, Manuela; Stoppato, Ugo; Superbi, Piero; Tardivo, Stefano; Urdich, Alessandro; Valsecchi, Massimo; Zamparo, Manuela

    2008-01-01

    A global and local discussion on Public Health relevance is taking place, including the future role and organization of its services. Noteworthy becomes the role played by Public Health Specialists. This work presents the results of a workshop, carried out following the Guilbert methodology, whose aim was to define Public Health Doctors functions and their related activities. The programme involved 30 professionals from Triveneto area (North Eastern Italy), working in Prevention Departments at National Health Service and Universities. The key-functions identified were: 1) Health status assessment and identification of community risk factors, 2) Health Promotion, 3) Prevention, 4) Protection, 5) Planning, 6) Communication, 7) Professional Training, 8) Alliances and resources for complex Public Health programs, 9) Crisis management in Public Health, 10) Research. For each function activities were identified, meaning concerning areas and contents that must be warranted by professionals. This experience allowed to share existing attitudes and experiences present in Triveneto area, and it can stand as a feasible instrument for different settings. Nevertheless, it appears mandatory explaining at each level in the society role and functions of Prevention Departments.

  16. Factors affecting adherence to short-course ARV prophylaxis for preventing mother-to-child transmission of HIV in sub-Saharan Africa: a review and lessons for future elimination.

    Science.gov (United States)

    Colombini, Manuela; Stöckl, Heidi; Watts, Charlotte; Zimmerman, Cathy; Agamasu, Enyonam; Mayhew, Susannah H

    2014-01-01

    Despite the biomedical potential to eliminate vertical HIV transmission, drug adherence to short regimens is often sub-optimal. To inform future programmes, we reviewed evidence on the factors influencing maternal and infant drug adherence to preventing MTCT drug regimens at delivery in sub-Saharan Africa. A literature review yielding 14 studies on adherence to drug regimes among HIV-positive pregnant women and mothers in sub-Saharan Africa was conducted. Rates of maternal adherence to preventive drug regimens at time of delivery varied widely across sites between 35 and 93.5%. Factors most commonly associated with low adherence to antiretroviral therapy (ARV) prophylaxis for preventing MTCT at the health system level include giving birth at home, quality and timing of HIV testing and counselling, and late distribution of nevirapine (NVP). Socio-demographic and demand-side factors include fear of stigma, lack of male involvement, fear of partner's reaction to disclosure, few antenatal (ANC) visits, young age and lack of education. With the implementation of the newly published WHO guidelines recommending triple-drug ARV regimen during pregnancy and breastfeeding for all women with HIV, it is important that women are able to adhere to recommended drug regimens. Service improvements should include clear and timely communication with women about the benefits of combined regimens and greater emphasis on patient confidentiality. Efforts must be made to help women overcome barriers that reduce adherence, such as financial logistical challenges, social stigma and women's fear of violence.

  17. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    International Nuclear Information System (INIS)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il'kaev, R.I.; Shapovalov, V.I.

    2004-01-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks

  18. How Belfius Bank's response to the terrorist attacks in Brussels helped embed business continuity in the company culture.

    Science.gov (United States)

    Jappens, Ludo

    2017-01-01

    Until 2015, major terrorist incidents in Belgium were considered a 'black swan'. However, the suicide attacks in Paris on 13th November, 2015 provided a wake-up call. Investigations revealed that the raid was prepared in Belgium by jihadists who grew up in Brussels and was coordinated by Belgian ISIS fighters in Syria. In an instant, it became clear that terror had been embedded in Belgian society and could erupt at any moment. At Belfius Bank Belgium, the subsequent months were a rollercoaster ride of terrorist-related events. Business activities were strongly affected, as the company's head office is located in the centre of Brussels. This paper focuses on the way Belfius responded to the events and how the lessons learned have helped to improve its business continuity and crisis management capability.

  19. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    Energy Technology Data Exchange (ETDEWEB)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il' kaev, R.I.; Shapovalov, V.I. [Russian Federal Nuclear Center - All-Russian Research Inst. of Experimental Physics, Sarov (Russian Federation)

    2004-07-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks.

  20. Serious electronic games as behavioural change interventions in healthcare-associated infections and infection prevention and control: a scoping review of the literature and future directions.

    Science.gov (United States)

    Castro-Sánchez, Enrique; Kyratsis, Yiannis; Iwami, Michiyo; Rawson, Timothy M; Holmes, Alison H

    2016-01-01

    The uptake of improvement initiatives in infection prevention and control (IPC) has often proven challenging. Innovative interventions such as 'serious games' have been proposed in other areas to educate and help clinicians adopt optimal behaviours. There is limited evidence about the application and evaluation of serious games in IPC. The purposes of the study were: a) to synthesise research evidence on the use of serious games in IPC to support healthcare workers' behaviour change and best practice learning; and b) to identify gaps across the formulation and evaluation of serious games in IPC. A scoping study was conducted using the methodological framework developed by Arksey and O'Malley. We interrogated electronic databases (Ovid MEDLINE, Embase Classic + Embase, PsycINFO, Scopus, Cochrane, Google Scholar) in December 2015. Evidence from these studies was assessed against an analytic framework of intervention formulation and evaluation. Nine hundred sixty five unique papers were initially identified, 23 included for full-text review, and four finally selected. Studies focused on intervention inception and development rather than implementation. Expert involvement in game design was reported in 2/4 studies. Potential game users were not included in needs assessment and game development. Outcome variables such as fidelity or sustainability were scarcely reported. The growing interest in serious games for health has not been coupled with adequate evaluation of processes, outcomes and contexts involved. Explanations about the mechanisms by which game components may facilitate behaviour change are lacking, further hindering adoption.

  1. Characterising the UK Terrorist Threat: The Problem with Non-Violent Ideology as a Focus for Counter-Terrorism and Terrorism as the product of ‘Vulnerability’

    OpenAIRE

    Anthony Richards

    2012-01-01

    This article investigates two particular aspects as to how the terrorist threat in the UK has been characterised, arguing that they both challenge conventional academic wisdom as to how terrorism should be conceptualised. While such conventional wisdom should always be open to challenge, and policymaking perspectives are different to those of academics, these two particular aspects as to how the terrorist threat has been perceived in the UK merit scrutiny, especially as counter-terrorism stra...

  2. 9/11, Act II : A Fine-Grained Analysis of Regional Variations in Traffic Fatalities in the Aftermath of the Terrorist Attacks

    OpenAIRE

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-01-01

    Terrorists can strike twice - first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variatio...

  3. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    OpenAIRE

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critica...

  4. Review of Studies of the Economic Impact of the September 11, 2001, Terrorist Attacks on the World Trade Center

    Science.gov (United States)

    2002-05-29

    of the Budget, • New York City Partnership and Chamber of Commerce , Washington, DC 20548 Report Documentation Page Report Date 29MAY2002 Report Type...700R Impact of Terrorist Attacks on the World Trade Center 10 Eight Studies (cont’d) ! New York City Partnership and Chamber of Commerce , Economic...Center 29 Observations Observations The New York City Partnership and Chamber of Commerce study generated the most comprehensive estimates—direct and

  5. What Are We Really Afraid Of? The Practitioner View of the Terrorist Threat in the United States

    Science.gov (United States)

    2005-03-01

    like intelligence gathering and courier work • 80% single • Familiarity with home ground. Thus terrorists come from both rural and urban areas • 66...codes also help disaggregate intra- - 114 - state regions by identifying urban areas from suburban and rural . Finally, through geographic mapping...National Laboratory for Tourism and eCommerce (NLTEC), University of Illinois at Urbana-Champaign. 2002. Self-Selection Biases in the Internet

  6. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  7. Serious electronic games as behavioural change interventions in healthcare-associated infections and infection prevention and control: a scoping review of the literature and future directions

    Directory of Open Access Journals (Sweden)

    Enrique Castro-Sánchez

    2016-10-01

    Full Text Available Abstract Background The uptake of improvement initiatives in infection prevention and control (IPC has often proven challenging. Innovative interventions such as ‘serious games’ have been proposed in other areas to educate and help clinicians adopt optimal behaviours. There is limited evidence about the application and evaluation of serious games in IPC. The purposes of the study were: a to synthesise research evidence on the use of serious games in IPC to support healthcare workers’ behaviour change and best practice learning; and b to identify gaps across the formulation and evaluation of serious games in IPC. Methods A scoping study was conducted using the methodological framework developed by Arksey and O’Malley. We interrogated electronic databases (Ovid MEDLINE, Embase Classic + Embase, PsycINFO, Scopus, Cochrane, Google Scholar in December 2015. Evidence from these studies was assessed against an analytic framework of intervention formulation and evaluation. Results Nine hundred sixty five unique papers were initially identified, 23 included for full-text review, and four finally selected. Studies focused on intervention inception and development rather than implementation. Expert involvement in game design was reported in 2/4 studies. Potential game users were not included in needs assessment and game development. Outcome variables such as fidelity or sustainability were scarcely reported. Conclusions The growing interest in serious games for health has not been coupled with adequate evaluation of processes, outcomes and contexts involved. Explanations about the mechanisms by which game components may facilitate behaviour change are lacking, further hindering adoption.

  8. Operation the laboratory for NBC protection and bio monitoring in the case of terrorist attack with NBC weapons

    International Nuclear Information System (INIS)

    Tusek, D.; Vucemilovic, A; Klobucar, J.

    2009-01-01

    The aim of this study was to develop efficacy of Operation the Laboratory for NBC protection and Bio monitoring in the case of terrorist attack with chemical weapons. When is necessary quickly, adeptly Operation and unambiguous confirmation about use chemical warfare agent, the Laboratory must be ready and qualified for reaction. The Laboratory had to develop capability for the timely sampling and unambiguous identification chemical warfare agents in a battlefield or in case of the terrorist attack. The need for quality sample collection and analyses is critical to verify use of chemical weapon (CW) by an enemy or terrorists. Collection, packaging, transport and analysis of samples must be carried out on proper way and quickly enough for military, medical or political purposes. Precise records must accompany each sample but these records must not contaminate samples anyway. All sampling team personnel have to be equipped with appropriate equipment and qualified in its handling. After arriving samples at our Laboratory, we will handle with them on standard procedures; carry out preparation such as Headspace, Liquid/liquid extraction, Solid phase extraction, Liquid/solid extraction, concentration and derivatization. After that we will analyze samples by gas-chromatography mass-spectrometry (GC/MS) method.(author)

  9. Social integration buffers stress in New York police after the 9/11 terrorist attack.

    Science.gov (United States)

    Schwarzer, Ralf; Bowler, Rosemarie M; Cone, James E

    2014-01-01

    Being socially integrated is regarded as a protective factor enabling people to cope with adversity. The stress-buffering effect reflects an interaction between stress and a social coping resource factor on subsequent outcomes. This study, based on 2943 police officers, examines mental health outcomes among officers who responded to the 9/11 terrorist attack on the World Trade Center. The Wave 1 data collection took place between September 2003 and November 2004 with a follow-up study (Wave 2) conducted from November 2006 through December 2007. A moderated mediation model was specified that uses event exposure as a distal predictor, earlier stress response as a mediator, and later stress response as an outcome, and social integration as a moderator of this relationship. The mediation hypothesis was confirmed, and moderation occurred at two stages. First, there was a multiplicative relationship between exposure levels and social integration: The higher the exposure level, the more stress responses occur, but this effect was buffered by a high level of social integration. Second, Wave 1 stress interacted with social integration on Wave 2 stress: The more the police officers were socially integrated, the lower the Wave 2 stress, which happened in a synergistic manner. The findings contribute to the understanding of mediating and moderating mechanisms that result in health outcomes such as posttraumatic stress disorder or resilience.

  10. Extremist Radicalism and Terrorist Inroads in West Africa: Understanding the Threat

    Directory of Open Access Journals (Sweden)

    Solomon Kofi Amoah

    2017-12-01

    Full Text Available While research has not yet established the regional consequences of terrorism, its immediate effects on states that have been hit (i.e. Mali, Niger, Burkina Faso and Nigeria, and the spill over effects in neighbouring countries cannot be discounted. This paper analyses the challenge of violent extremism in Africa based on existing evidence from across the West African sub- region. It pays particular attention to the recruitment of young people in Africa into extremist causes on the continent and beyond and proffers measures for their curtailment. The paper argues that terrorism in contemporary Africa undermines democratization, good governance, peace and security and regional development. It also recommends three-pronged strategies for addressing the miasma of extremist radicalism and its associated violence in West Africa, namely, governance, development and security reforms. While it may be difficult to absolutely curtail the activities of terrorist organizations in West Africa. Countries with minimal vulnerabilities like Ghana, Sierra Leone, Liberia and others should intensify efforts towards increased border and cyber security surveillance, sustained de-radicalization programmes and youth empowerment programmes to curb unemployment in earnest.

  11. Holy Terror, Batman! Frank Miller’s Dark Knight and the Superhero as Hardboiled Terrorist

    Directory of Open Access Journals (Sweden)

    Daniele Croci

    2016-05-01

    Full Text Available Conceived in the late thirties as “bold humanist response to Depression-era fears of runaway scientific advance and soulless industrialism” (Morrison 2012, 6, the superhero has flourished as one of the most resilient archetypes of American popular culture. This essay analyses the literary and cultural contaminations that have engendered an unprecedented revision of the paradigm since the 1980s. In particular, it will take into account three graphic novels by American cartoonist Frank Miller (1957 - , one of leading figures of the mainstream comics renaissance, whose ideas have indelibly influenced the artistic development of both medium and genre. The Dark Knight Returns (1986, The Dark Knight Strikes Again (2002 and Holy Terror (2011 constitute an ideal Batman trilogy that charts the character’s evolution as political counterpoint to the perceived crisis of American identity. In this regard, Reaganism and 9/11 are polarized as historical discontinuities triggering the need for a new kind of a criminal (superhero. It will be in fact demonstrated how the novels hybridise the latent generic links to hardboiled pulp novels (R. Chandler, D. Hammet with narrative and aesthetics elements appropriated from the culturally-received concepts of terrorism and terrorists. This fruitful contamination on the one hand “play[s] with reader assumptions about genre” (Baetens and Frey 2015, 46, while on the other hand deconstructs the ideological underpinnings of the archetype, as the moral dichotomy and the alienation of justice from the law.

  12. Toxicology of organophosphorus compounds in view of an increasing terrorist threat.

    Science.gov (United States)

    Worek, Franz; Wille, Timo; Koller, Marianne; Thiermann, Horst

    2016-09-01

    The implementation of the Chemical Weapon Convention (CWC), prohibiting the development, production, storage and use of chemical weapons by 192 nations and the ban of highly toxic OP pesticides, especially class I pesticides according to the WHO classification, by many countries constitutes a great success of the international community. However, the increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents new challenges to our societies. Almost seven decades of research on organophosphorus compound (OP) toxicology was mainly focused on a small number of OP nerve agents despite the fact that a huge number of OP analogues, many of these agents having comparable toxicity to classical nerve agents, were synthesized and published. Only limited physicochemical, toxicological and medical information on nerve agent analogues is available in the open literature. This implies potential gaps of our capabilities to detect, to decontaminate and to treat patients if nerve agent analogues are disseminated and may result in inadequate effectiveness of newly developed countermeasures. In summary, our societies may face new, up to now disregarded, threats by toxic OP which calls for increased awareness and appropriate preparedness of military and civilian CBRN defense, a broader approach for new physical and medical countermeasures and an integrated system of effective detection, decontamination, physical protection and treatment.

  13. An autopsy case related to a terrorist attack using a ball-bearing bomb.

    Science.gov (United States)

    Takamiya, Masataka; Biwasaka, Hitoshi; Niitsu, Hisae; Saigusa, Kiyoshi; Aoki, Yasuhiro

    2009-03-01

    We encountered an autopsy case related to a terrorist attack using a ball-bearing bomb. The decedent was a 51-year-old male without significant medical histories. During dinner in a restaurant, the perpetrator suddenly exploded a ball-bearing bomb, the blast from which blew the victim off his chair. The victim was found to be unresponsive, and pronounced dead. X-ray photographs taken before autopsy revealed six spherical shadows. Three penetrating wounds in the head, one in the neck and chest, and two in the left upper arm were observed in vivo. Six projectiles recovered from the body were identified as ball-bearings, one of which traveled through the midbrain, diencephalon, and left temporal lobe. Although blast injuries and penetrating wounds are often combined in bomb attack victims, penetrating brain injury would be the cause of death in this case. Lethal injuries to major organs can thus occur even though the destructive force of a ball-bearing bomb is weak. X-ray films were informative for detecting the ball-bearings in this case, suggesting that autopsy imaging is essential in cases of terrorism victims.

  14. The counter-terrorist campus: Securitisation theory and university securitisation – Three Models

    Directory of Open Access Journals (Sweden)

    Liam Gearon

    2017-02-01

    Full Text Available With intensified threats to global security from international terrorism, universities have become a focus for security concerns and marked as locus of special interest for the monitoring of extremism and counter-terrorism efforts by intelligence agencies worldwide. Drawing on initiatives in the United Kingdom and United States, I re-frame three – covert, overt and covert–overt – intersections of education, security and intelligence studies as a theoretical milieu by which to understand such counter-terrorism efforts. Against the backdrop of new legislative guidance for universities in an era of global terrorism and counter-terrorism efforts by security and intelligence agencies and their Governments, and through a review of Open-Source security/intelligence concerning universities in the United Kingdom and the United States, I show how this interstitial (covert, overt and covert– overt complexity can be further understood by the overarching relationship between securitisation theory and university securitisation. An emergent securitised concept of university life is important because de facto it will potentially effect radical change upon the nature and purposes of the university itself. A current-day situation replete with anxiety and uncertainty, the article frames not only a sharply contested and still unfolding political agenda for universities but a challenge to the very nature and purposes of the university in the face of a potentially existential threat. Terrorism and counterterrorism, as manifest today, may well thus be altering the aims and purposes of the university in ways we as yet do not fully know or understand. This article advances that knowledge and understanding through a theoretical conceptualisation: the counter-terrorist campus.

  15. Restoration projects for decontamination of facilities from chemical, biological and radiological contamination after terrorist actions

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Lumley, T.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Division, Environmental Technology Centre, Science and Technology Branch; Payette, P.; Laframboise, D.; Best, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Krishnan, J.; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Winnipeg, MB (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada); Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada)

    2006-07-01

    This paper reviewed studies that identified better decontamination methods for chemical, biological and radiological/nuclear (CBRN) attacks. In particular, it reviewed aspects of 3 projects in which procedures were tested and validated for site restoration. Cleanup targets or standards for decontaminating buildings and materials after a CBRN attack were also developed. The projects were based on physicochemical and toxicological knowledge of potential terrorist agents and selected surface matrices. The projects also involved modeling and assessing environmental and health risks. The first multi-agent project involved gathering information on known procedures for restoration of areas including interiors and exteriors of buildings, contents, parking lots, lawn, and vehicles. Air inside the building was included. The efficacy of some of the proposed concepts was tested. Results included the determination of appropriate surrogates for anthrax and tests of liquid and gaseous biocides on the surrogates. The development of new contamination procedures using peroxyacetic acid were also discussed. The second project involved decontamination tests on CBRN using specially-constructed buildings at the Counter-terrorism Technology Centre at Defence Research and Development Canada in Suffield. The buildings will be contaminated with chemical and biological agents and with short-lived radionuclides. They will be decontaminated using the best-performing technologies known. Information collected will include fate of the contaminant and decontamination products, effectiveness of the restoration methods, cost and duration of cleanup and logistical problems. The third project is aimed at developing cleanup standards for decontaminating buildings and construction materials after a chemical or biological attack. It will create as many as 12 algorithms for the development of 50 standards which will help cleanup personnel and first-responders to gauge whether proposed methods can achieve

  16. The restoration project : decontamination of facilities from chemical, biological and radiological contamination after terrorist action

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science Div; Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Duncan, L.; Best, M.; Krishnan; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    Bioterrorism poses a real threat to the public health and national security, and the restoration of affected facilities after a chemical, biological or radiological attack is a major concern. This paper reviewed aspects of a project conducted to collect information, test and validate procedures for site restoration after a terrorist attack. The project began with a review of existing technology and then examined new technologies. Restoration included pickup, neutralization, decontamination, removal and final destruction and deposition of contaminants as well as cleaning and neutralization of material and contaminated waste from decontamination. The project was also intended to test existing concepts and develop new ideas. Laboratory scale experiments consisted of testing, using standard laboratory techniques. Radiation decontamination consisted of removal and concentration of the radioisotopes from removal fluid. General restoration guidelines were provided, as well as details of factors considered important in specific applications, including growth conditions and phases of microorganisms in biological decontamination, or the presence of inhibitors or scavengers in chemical decontamination. Various agents were proposed that were considered to have broad spectrum capability. Test surrogates for anthrax were discussed. The feasibility of enhanced oxidation processes was examined in relation to the destruction of organophosphorus, organochlorine and carbamate pesticides. The goal was to identify a process for the treatment of surfaces contaminated with pesticides. Tests included removal from carpet, porous ceiling tile, steel plates, and floor tiles. General radiation contamination procedures and techniques were reviewed, as well as radiological decontamination waste treatment. It was concluded that there is no single decontamination technique applicable for all contaminants, and decontamination methods depend on economic, social and health factors. The amount of

  17. Designing Supervision under the Preventive Anti-Money Laundering Policy in the European Union

    Directory of Open Access Journals (Sweden)

    Melissa van den Broek

    2014-12-01

    Full Text Available Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing is currently one of the main instruments which regulates efforts to combat money laundering (and terrorist financing in the European Union. Respecting national procedural autonomy, this directive leaves a high degree of freedom for the Member States in designing their own supervisory architectures under the preventive anti-money laundering policy. This contribution adopts a systematic approach to the institutional differences between the EU Member States and presents four models of supervision that are currently present in the European Union. It explains the main characteristics of these models, categorises the EU Member States accordingly and analyses the potential strengths and weaknesses of each model, thereby providing a first indication of their effectiveness.

  18. Can Basel III Prevent Future Financial Crisis?

    OpenAIRE

    Madzova, Violeta

    2012-01-01

    The financial sector is crucial for the smooth functioning of the economy. For this reason, the authorities use financial regulation as a means to ensure the stability of the banking system and to correct those ‘market failures’ that would otherwise threaten the solidity of financial institutions. Recently introduced Basel III on the new bank capital and liquidity standards, (that is going to be implemented gradually starting from 2013 till 2019) is changing the way that banks address the...

  19. Energy futures

    International Nuclear Information System (INIS)

    Treat, J.E.

    1990-01-01

    This book provides fifteen of the futures industry's leading authorities with broader background in both theory and practice of energy futures trading in this updated text. The authors review the history of the futures market and the fundamentals of trading, hedging, and technical analysis; then they update you with the newest trends in energy futures trading - natural gas futures, options, regulations, and new information services. The appendices outline examples of possible contracts and their construction

  20. How identity crisis, relative deprivation, personal characteristics, and empathy contribute to the engagement of Western individuals in Islamist terrorist behavior

    Directory of Open Access Journals (Sweden)

    Khouwaga Yusoufzai

    2017-02-01

    Full Text Available The growing sense of insecurity in the Western world due to home-grown Islamist terrorism prompts further research on the topic. Based on previous literature, the current paper attempts to determine whether factors can be identified which contribute to Western individuals joining Islamic extremist organizations and engaging in terrorist behavior in the West. Four factors are discussed: While extensive scientific literature supports the view that identity crises and relative deprivation play a crucial role in turning Western individuals to terrorism, evidence on the role of personal characteristics and empathy, on the other hand, is still too scarce to allow any clear scientific judgment.

  1. What we need to know ...and when. Educating the public about nuclear terrorist risks can help raise levels of security

    International Nuclear Information System (INIS)

    Khripunov, I.

    2006-01-01

    Nuclear power infrastructures could be the target of terrorist acts of theft, sabotage, unauthorized access or other malicious acts given their radiological and chemical content and potential for building weapons. Attacks on its major components, including fuel production, reactors, waste handling, and reprocessing facilities, would lead to serious consequences-even if there is little or no damage to a nuclear power plant itself and other related structures. Public fear of nuclear radiation, in combination with a possibly massive resultant blackout and other aggravating factors, could create significant distress and panic. In other words, successful terrorist attempts to attack nuclear power infrastructure can easily bring about systemic disaster. Systemic risks impact society on a large scale and their effects may spread much further from the original hazardous source. Those risks widely affect systems that society depends on, such as health, transport, environment, telecommunications. Their consequences may be technical, social, environmental, psychological and economic and involve different stakeholders. In this context, however, one important stakeholder has been under-appreciated, under-utilized and somewhat misunderstood: the general public. The nuclear power infrastructure must learn how to efficiently communicate to the public and develop better options for public risk communication that relate to deliberate attacks or accidents. The public is also a challenging stockholder because citizens are deeply split regarding the acceptability and value of nuclear power generation and tend to express their feelings emotionally. However, there is growing recognition that because of skyrocketing oil prices and evidence of the greenhouse effect, nuclear power may be approaching renaissance. Hence, the public must no longer be looked upon only as potential victims or panicked masses but rather as an important contributing factor for better nuclear security throughout

  2. Futuring for Future Ready Librarians

    Science.gov (United States)

    Figueroa, Miguel A.

    2018-01-01

    Futurists and foresight professionals offer several guiding principles for thinking about the future. These principles can help people to think about the future and become more powerful players in shaping the preferred futures they want for themselves and their communities. The principles also fit in well as strategies to support the Future Ready…

  3. International legal problem in combating 'Islamic State' terrorist group in Syria

    Directory of Open Access Journals (Sweden)

    Stevanović Miroslav

    2015-01-01

    Full Text Available 'Islamic State of Iraq and Syria' (ISIS has occupied parts of internationally recognized states and exerts further territorial pretensions. ISIS, also, implements a repressive rule, through violations of human rights and humanitarian law, which may constitute international crimes. In facing the threat od ISIS, the perception of international terrorism is important since this group has the features of a territorial entity. So far, facing with the threat of ISIS has been reduced to a model that is adopted by the UN Security Council against the terrorist network Al-Qaida. An international coalition of states, led by the United States, has undertaken air strikes on positions ISIS, on several grounds: the responsibility to protect, the protection of national security, and at the request of Iraq. At the same time, the strikes are applied in Syria, which can not be accountable for the actions of ISIS and has not requested international assistance. International law does not allow actions which would aim to destroy or jeopardize the territorial integrity or political independence of any sovereign and independent state, which is acting in accordance with the principle of equal rights and self-determination of peoples, and is hence governed by a representative government. The UNSC resolution 2249 remains short of recommending international armed action under the aegis of UNSC, but represents a step forward in recognizing the responsibility of this body in facing ISIS, at least as far as the 'destruction of refuge' is concerned. The use of force in the territory of Syria, without the express authorization of the UNSC is illegal, because terrorism does not constitute grounds for the use of force against countries. But, it opens broader issues of responsibility for the development of ISIS and the humanitarian crisis in the Middle East, as well as the functioning of the system of collective security. Overcoming the current crisis UNSC implies not just a

  4. Restorative Encounters in Terrorist Victimization in Spain: Theoretical Reflections and Practical Insights from Social Work

    Directory of Open Access Journals (Sweden)

    Alberto Jose Olalde

    2014-07-01

    Full Text Available After the ceasefire announcement by the terrorist organization ETA in 2011, new horizons and scenarios of peace have opened in the Basque Country, a land that has been badly hurt by violence over several decades.Restorative justice, a new paradigm for an old kind of justice, the reparation of the harm caused to victims and their consequent importance in the judicial process, has been knocking at our door for a long time. Since the beginning of this decade, following European trends, our country has begun to implement restorative justice at different levels.This article wants to bring the reader closer to understanding of the possibilities which restorative justice offers to the victims of terrorism. We describe the central elements of the restorative encounters held between ex-members of ETA and direct or indirect victims. Furthermore, we support our restorative intervention with theoretical arguments and practical examples from social work. Tras el anuncio del cese de la actividad armada por parte de la organización armada ETA, en 2011, nuevos escenarios y horizontes de pacificación se abren en la historia para esta tierra, castigada por la violencia durante decenas de años.La Justicia restaurativa, un nuevo paradigma para una vieja reivindicación, la reparación de la víctima y su protagonismo en la resolución y abordaje de las consecuencias de los conflictos penales, lleva años asomando a nuestro contexto. Tras la incorporación de España a principios de esta década a las corrientes europeas, se constata la validación de la práctica restaurativa.Este artículo quiere acercar a la persona lectora la comprensión de las posibilidades de justicia restaurativa en victimización terrorista. Describimos los elementos centrales de los encuentros restaurativos celebrados entre ex miembros de ETA y víctimas directas e indirectas. Y nos apoyamos en elementos teóricos y prácticos del trabajo social para nuestra intervención restaurativa.

  5. Rising threat of terrorist bomb blasts in Karachi--a 5-year study.

    Science.gov (United States)

    Mirza, Farhat Hussain; Parhyar, Hamid Ali; Tirmizi, Syed Zubair Ahmed

    2013-08-01

    This study aims to determine the frequency of injuries and fatalities associated with terrorist bomb explosions in the city of Karachi from 1 January 2007 to 31 December 2011. Moreover, this study is aimed to determine age and sex vulnerability among the victims of blast explosion. A descriptive cross-sectional study was conducted. The study was carried out at mortuaries and medicolegal sections at Jinnah Postgraduate Medical Center, Civil Hospital and Abbasi-Shaheed Hospital Karachi, the three main hospitals, which cater to all these cases of Karachi. The study included all bomb blast victims examined and autopsied from January 2007 to December 2011 at Jinnah Postgraduate Medical Center, Civil Hospital and Abbassi Shaheed Hospital Karachi. Details of 1142 cases were collected for those medicolegal deaths and injured persons, identified to be the victims of bomb blasts from January 2007 to December 2011. Data were collected on a preformed proforma from the mortuaries and medicolegal sections of these three public sector hospitals. The variables investigated include age, gender, year-wise distribution of the injured and the dead along with the cause of death and body parts injured in survivors. Out of the total 11,109 autopsies during the study period, 249 (2.24%) were carried out on deaths due to bomb blasts. Similarly, 135,065 injury cases were reported during the study period out of which 893 (0.66%) cases were due to bomb blasts. An initial peak in the year 2007, followed by a decline in 2008 and since then a steady rise of bomb blast incidences with casualties and fatalities, has been observed. The highest numbers of injured victims were reported in the year 2010 and fatalities in 2007. Among 1142 cases, 95.18% were male and 4.82% female with a male to female ratio of 19.76:1. Persons of ages between 15 and 45 years were chiefly involved. Shock due to multiple injuries was the leading cause of death, followed by head injury with or without haemorrhage. The

  6. Managing mild casualties in mass-casualty incidents: lessons learned from an aborted terrorist attack.

    Science.gov (United States)

    Bloch, Yuval H; Leiba, Adi; Veaacnin, Nurit; Paizer, Yohanan; Schwartz, Dagan; Kraskas, Ahuva; Weiss, Gali; Goldberg, Avishay; Bar-Dayan, Yaron

    2007-01-01

    Mildly injured and "worried well" patients can have profound effects on the management of a mass-casualty incident. The objective of this study is to describe the characteristics and lessons learned from an event that occurred on 28 August 2005 near the central bus station in Beer-Sheva, Israel. The unique profile of injuries allows for the examination of the medical and operational aspects of the management of mild casualties. Data were collected during and after the event, using patient records and formal debriefings. They were processed focusing on the characteristics of patient complaints, medical response, and the dynamics of admission. A total of 64 patients presented to the local emergency department, including two critical casualties. The remaining 62 patients were mildly injured or suffered from stress. Patient presentation to the emergency department was bi-phasic; during the first two hours following the attack (i.e., early phase), the rate of arrival was high (one patient every three minutes), and anxiety was the most frequent chief complaint. During the second phase, the rate of arrival was lower (one patient every 27 minutes), and the typical chief complaint was somatic. Additionally, tinnitus and complaints related to minor trauma also were recorded frequently. Psychiatric consultation was obtained for 58 (91%) of the patients. Social services were involved in the care of 47 of the patients (73%). Otolaryngology and surgery consultations were obtained for 45% and 44%, respectively. The need for some medical specialties (e.g., surgery and orthopedics) mainly was during the first phase, whereas others, mainly psychiatry and otolaryngology, were needed during both phases. Only 13 patients (20%) needed a consultation from internal medicine. Following a terrorist attack, a large number of mildly injured victims and those experiencing stress are to be expected, without a direct relation to the effectiveness of the attack. Mildly injured patients tend to

  7. 9/11, Act II: a fine-grained analysis of regional variations in traffic fatalities in the aftermath of the terrorist attacks.

    Science.gov (United States)

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-12-01

    Terrorists can strike twice--first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variations in increased driving. Two factors, in turn, explained these variations in increased driving. The weaker factor was proximity to New York City, where stress reactions to the attacks were previously shown to be greatest. The stronger factor was driving opportunity, which was operationalized both as number of highway miles and as number of car registrations per inhabitant. Thus, terrorists' second strike exploited both fear of dread risks and, paradoxically, an environmental structure conducive to generating increased driving, which ultimately increased fatalities.

  8. Future food.

    Science.gov (United States)

    Wahlqvist, Mark L

    2016-12-01

    Food systems have changed markedly with human settlement and agriculture, industrialisation, trade, migration and now the digital age. Throughout these transitions, there has been a progressive population explosion and net ecosystem loss and degradation. Climate change now gathers pace, exacerbated by ecological dysfunction. Our health status has been challenged by a developing people-environment mismatch. We have regarded ecological conquest and innovative technology as solutions, but have not understood how ecologically dependent and integrated we are. We are ecological creatures interfaced by our sensoriness, microbiomes, shared regulatory (endocrine) mechanisms, immune system, biorhythms and nutritional pathways. Many of us are 'nature-deprived'. We now suffer what might be termed ecological health disorders (EHD). If there were less of us, nature's resilience might cope, but more than 9 billion people by 2050 is probably an intolerable demand on the planet. Future food must increasingly take into account the pressures on ecosystem-dependent food systems, with foods probably less biodiverse, although eating in this way allows optimal health; energy dysequilibrium with less physical activity and foods inappropriately energy dense; and less socially-conducive food habits. 'Personalised Nutrition', with extensive and resource-demanding nutrigenomic, metabolomic and microbiomic data may provide partial health solutions in clinical settings, but not be justified for ethical, risk management or sustainability reasons in public health. The globally prevalent multidimensional malnutritional problems of food insecurity, quality and equity require local, regional and global action to prevent further ecosystem degradation as well as to educate, provide sustainable livelihoods and encourage respectful social discourse and practice about the role of food.

  9. Future accelerators (?)

    Energy Technology Data Exchange (ETDEWEB)

    John Womersley

    2003-08-21

    I describe the future accelerator facilities that are currently foreseen for electroweak scale physics, neutrino physics, and nuclear structure. I will explore the physics justification for these machines, and suggest how the case for future accelerators can be made.

  10. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: Case study of New Jersey

    International Nuclear Information System (INIS)

    Greenberg, Michael; Mantell, Nancy; Lahr, Michael; Felder, Frank; Zimmerman, Rae

    2007-01-01

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened

  11. Reducing Mortality from Terrorist Releases of Chemical and Biological Agents: I. Filtration for Ventilation Systems in Commercial Building

    Energy Technology Data Exchange (ETDEWEB)

    Thatcher, Tracy L.; Daisey, Joan M.

    1999-09-01

    There is growing concern about potential terrorist attacks involving releases of chemical and/or biological (CB) agents, such as sarin or anthrax, in and around buildings. For an external release, the CB agent can enter the building through the air intakes of a building's mechanical ventilation system and by infiltration through the building envelope. For an interior release in a single room, the mechanical ventilation system, which often recirculates some fraction of the air within a building, may distribute the released CB agent throughout the building. For both cases, installing building systems that remove chemical and biological agents may be the most effective way to protect building occupants. Filtration systems installed in the heating, ventilating and air-conditioning (HVAC) systems of buildings can significantly reduce exposures of building occupants in the event of a release, whether the release is outdoors or indoors. Reduced exposures can reduce the number of deaths from a terrorist attack. The purpose of this report is to provide information and examples of the design of filtration systems to help building engineers retrofit HVAC systems. The report also provides background information on the physical nature of CB agents and brief overviews of the basic principles of particle and vapor filtration.

  12. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: case study of New Jersey

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, M.; Mantell, N.; Lahr, M.; Felder, F. [Rutgers University, New Brunswick, NJ (United States). Edward J. Bloustein School; Zimmerman, R. [New York University (United States). Robert F. Wagner School of Public Service

    2007-01-15

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened. (author)

  13. Information Communication Technology & Crime: the Future of Criminology

    Directory of Open Access Journals (Sweden)

    Antinori A.

    2008-12-01

    ? What about Infowar, Netwar & Mediawar? What can be said about criminology and its relationship to technology? What is the impact of Open Source INTelligence? Today criminologists have an obligation to understand the importance of digital culture and acquire the skills in Information Communication Technology required to prevent and counteract crime. They must also use their skills in the open-source ocean to envisage future trends in crime.

  14. Radiation Detection System for Prevention of Radiological and Nuclear Terrorism

    International Nuclear Information System (INIS)

    Kwak, Sung-Woo; Yoo, Ho-Sik; Jang, Sung-Sun; Kim, Jae-Kwang; Kim, Jung-Soo

    2007-01-01

    After the September 11 terrorist attack, the threat of a potential for a radiological or nuclear terrorist attack became more apparent. The threats relating to radiological or nuclear materials include a Radiological Dispersion Device (RDD), an Improved Nuclear Device (IND) or a State Nuclear Device (such as a Soviet manufactured suitcase nuclear weapon). For more effective countermeasures against the disaster, multilayer protection concept - prevention of smuggling of radioactive or nuclear material into our country through seaports or airports, detection and prevention of the threat materials in transit on a road, and prevention of their entry into a target building - is recommended. Due to different surrounding circumstances of where detection system is deployed, different types of radiation detection systems are required. There have been no studies on characteristics of detection equipment required under Korean specific conditions. This paper provides information on technical requirements of radiation detection system to achieve multi-layer countermeasures for the purpose of protecting the public and environment against radiological and nuclear terrorism

  15. Measures to prevent, intercept and respond to illicit uses of nuclear material and radioactive sources. Proceedings

    International Nuclear Information System (INIS)

    2002-01-01

    As nuclear programmes have evolved, the quantities of nuclear material in use or storage, and the number of facilities operating or shut down has increased. In particular, the dismantling of nuclear weapons has resulted in greatly increased stockpiles of weapons usable plutonium and highly enriched uranium. Concern over the security of these and related materials has been further raised by the continued occurrence of cases of illicit trafficking. The risks are theft, leading to trafficking and possible illicit use, and sabotage which could lead to the creation of radiological hazards. The challenge is threefold: prevention, detection and interception, and response. Prevention starts with effective national systems for accountancy, control and protection. Detection and interception involves effective measures to combat illicit trafficking, and response requires planning for the consequences of theft and sabotage. Responsibilities in these fields are national, but nuclear security also has a powerful international dimension. The consequences of failures in national measures reach beyond national boundaries. The effectiveness of national nuclear security can be enhanced through international measures: through agreed international norms, standards and guides, through training and advice, through information exchange and the sharing of experience, and through developing common understandings and perceptions. The Stockholm Conference contributed by focusing on the threats, including terrorist, to nuclear and other radioactive materials; on how to assess them and on how to develop the appropriate security measures. National measures to protect nuclear material and facilities and the continuing development of international standards and obligations were described. The conference discussed the patterns and trends in the illicit trafficking of nuclear and other radioactive materials and national and international measures to combat such trafficking. Finally, it considered

  16. Measures to prevent, intercept and respond to illicit uses of nuclear material and radioactive sources. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-08-01

    As nuclear programmes have evolved, the quantities of nuclear material in use or storage, and the number of facilities operating or shut down has increased. In particular, the dismantling of nuclear weapons has resulted in greatly increased stockpiles of weapons usable plutonium and highly enriched uranium. Concern over the security of these and related materials has been further raised by the continued occurrence of cases of illicit trafficking. The risks are theft, leading to trafficking and possible illicit use, and sabotage which could lead to the creation of radiological hazards. The challenge is threefold: prevention, detection and interception, and response. Prevention starts with effective national systems for accountancy, control and protection. Detection and interception involves effective measures to combat illicit trafficking, and response requires planning for the consequences of theft and sabotage. Responsibilities in these fields are national, but nuclear security also has a powerful international dimension. The consequences of failures in national measures reach beyond national boundaries. The effectiveness of national nuclear security can be enhanced through international measures: through agreed international norms, standards and guides, through training and advice, through information exchange and the sharing of experience, and through developing common understandings and perceptions. The Stockholm Conference contributed by focusing on the threats, including terrorist, to nuclear and other radioactive materials; on how to assess them and on how to develop the appropriate security measures. National measures to protect nuclear material and facilities and the continuing development of international standards and obligations were described. The conference discussed the patterns and trends in the illicit trafficking of nuclear and other radioactive materials and national and international measures to combat such trafficking. Finally, it considered

  17. Conduct of Occupational Health During Major Disasters: A Comparison of Literature on Occupational Health Issues in the World Trade Center Terrorist Attack and the Fukushima Nuclear Power Plant Accident.

    Science.gov (United States)

    Toyoda, Hiroyuki; Mori, Koji

    2017-01-01

    Workers who respond to large-scale disasters can be exposed to health hazards that do not exist in routine work. It is assumed that learning from past cases is effective for preparing for and responding to such problems, but published information is still insufficient. Accordingly, we conducted a literature review about the health issues and occupational health activities at the World Trade Center (WTC) terrorist attack and at the Fukushima Nuclear Power Plant accident to investigate how occupational health activities during disasters should be conducted. Seven studies about the WTC attack were extracted and categorized into the following topics: "in relation to emergency systems including occupational health management"; "in relation to improvement and prevention of health effects and occupational hygiene"; and "in relation to care systems aimed at mitigating health effects." Studies about the Fukushima Nuclear Power Plant accident have been used in a previous review. We conclude that, to prevent health effects in workers who respond to large-scale disasters, it is necessary to incorporate occupational health regulations into the national response plan, and to develop practical support functions that enable support to continue for an extended period, training systems for workers with opportunities to report accidents, and care systems to mitigate the health effects.

  18. Efforts of Uzbekistan to prevent nuclear terrorism and smuggling of radioactive and nuclear materials

    International Nuclear Information System (INIS)

    Petrenko, V.D.; Karimov, Yu.N.; Podkovirin, A.I.; Shipilov, N.N.; Yuldashev, B.S.; Fazylov, M.I.

    2005-01-01

    Uzbekistan is located on the cross-roads from the north-Russia, Western Europe-to the south-Afghanistan, Iran, Iraq and others. The appearance of terrorist organizations urged some Asian countries to make the nuclear weapons, the making the task of stopping the transportation of nuclear materials and technologies from the north (from countries possessing nuclear weapon) to the south (to countries desiring to have weapons and its components) a reality. To resolve this problem, on the main transportation routes, 'Yantar' stationary radiation monitors of Russian production were installed, and development and production of monitors of our own make was started. This paper covers these works as well as those on preventing possible terrorist attacks on nuclear objects of Uzbekistan

  19. Increased Incidence Rate of Trauma- and Stressor-Related Disorders in Denmark After the September 11, 2001, Terrorist Attacks in the United States

    DEFF Research Database (Denmark)

    Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M

    2016-01-01

    The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined...

  20. Improving Resource Allocation Decisions to Reduce the Risk of Terrorist Attacks on Passenger Rail Systems

    Science.gov (United States)

    2016-12-01

    Rails: Analyzing Current Challenges, and Future Solutions (Syracuse: Maxwell School of Citizenship and Public Affairs, 2008), 18. 3 U.S. Department...Nicholas Armstrong et al., Securing America’s Passenger Rails: Analyzing Current Challenges, and Future Solutions (Syracuse: Maxwell School of Citizenship ...as a broken rail, a faulty wire connection, or an act of terrorism, could result in a shutdown. Communication systems use centralized digital

  1. Assessing the Knowledge Level, Attitudes, Risky Behaviors and Preventive Practices on Sexually Transmitted Diseases among University Students as Future Healthcare Providers in the Central Zone of Malaysia: A Cross-Sectional Study

    Directory of Open Access Journals (Sweden)

    Adigun Temiloluwa Folasayo

    2017-02-01

    Full Text Available This study was done to assess the knowledge, attitudes, risky behaviors and preventive practices related to sexually-transmitted diseases (STDs among health and non-health sciences university students as future healthcare providers in Malaysia. A total of 700 health and non-health sciences university students (255 male; 445 female aged between 17 and 30 years were surveyed by using a self-administered questionnaire. The majority (86.6% had heard of STDs, and 50.4% knew STDs could present without symptoms. HIV remains the best known STD (83.6% by the students, while chlamydia (26% and trichomoniasis (21.0% were rarely known. Gender, age group, educational level and faculty type were strongly associated with knowledge level (p-values < 0.05. Most of them (88.8% were aware that STD screening was important while use of condoms was protective (63.8%. The majority of them strongly felt that treatment should be sought immediately if they (85.5% and their partners (87.4% have symptoms. Among the sexually-active students, 66.7% and 18% had sexual intercourse with multiple partners and commercial sex workers, while 17.4% and 9.4% took alcohol and drugs before having sex, respectively. By logistic regression analysis, students aged 24–30 years old (an odds ratio (AOR = 0.57, 95% confidence interval (CI = 0.377–0.859 and faculty type (AOR = 5.69, 95% CI = 4.019–8.057 were the significant predictors for the knowledge level. Knowledge on the non-HIV causes of STDs is still lacking, and the risky behavior practiced by the sexually-active students in this study is alarming. There is a need to revisit the existing STD education curriculum in both schools and universities so that appropriate intervention on STDs can be implemented.

  2. Assessing the Knowledge Level, Attitudes, Risky Behaviors and Preventive Practices on Sexually Transmitted Diseases among University Students as Future Healthcare Providers in the Central Zone of Malaysia: A Cross-Sectional Study.

    Science.gov (United States)

    Folasayo, Adigun Temiloluwa; Oluwasegun, Afolayan John; Samsudin, Suhailah; Saudi, Siti Nor Sakinah; Osman, Malina; Hamat, Rukman Awang

    2017-02-08

    This study was done to assess the knowledge, attitudes, risky behaviors and preventive practices related to sexually-transmitted diseases (STDs) among health and non-health sciences university students as future healthcare providers in Malaysia. A total of 700 health and non-health sciences university students (255 male; 445 female) aged between 17 and 30 years were surveyed by using a self-administered questionnaire. The majority (86.6%) had heard of STDs, and 50.4% knew STDs could present without symptoms. HIV remains the best known STD (83.6%) by the students, while chlamydia (26%) and trichomoniasis (21.0%) were rarely known. Gender, age group, educational level and faculty type were strongly associated with knowledge level ( p -values students, 66.7% and 18% had sexual intercourse with multiple partners and commercial sex workers, while 17.4% and 9.4% took alcohol and drugs before having sex, respectively. By logistic regression analysis, students aged 24-30 years old (an odds ratio (AOR) = 0.57, 95% confidence interval (CI) = 0.377-0.859) and faculty type (AOR = 5.69, 95% CI = 4.019-8.057) were the significant predictors for the knowledge level. Knowledge on the non-HIV causes of STDs is still lacking, and the risky behavior practiced by the sexually-active students in this study is alarming. There is a need to revisit the existing STD education curriculum in both schools and universities so that appropriate intervention on STDs can be implemented.

  3. Personalized telehealth in the future

    DEFF Research Database (Denmark)

    Dinesen, B.; Nonnecke, B.; Lindeman, David

    2016-01-01

    of telehealth services and benefits, presents fundamental principles that must be addressed to advance the status quo, and provides a framework for current and future research initiatives within telehealth for personalized care, treatment, and prevention. A broad, multinational research agenda can provide...... research agenda for future telehealth applications within chronic disease management....

  4. The nuclear specific danger prevention in the Bundesamt fuer Strahlenschutz; Die nuklearspezifische Gefahrenabwehr im Bundesamt fuer Strahlenschutz

    Energy Technology Data Exchange (ETDEWEB)

    Lange, Britta [Bundesamt fuer Strahlenschutz, Berlin (Germany). Arbeitsgruppe Nuklearspezifische Gefahrenabwehr (AG-NGA)

    2016-07-01

    The nuclear-related danger prevention (NGA: nuklearspezifische Gefahrenabwehr) in the BfS is usually seen as part of emergency planning. NGA is dealing with incidents resulting from possible or verified radioactive material abuse. It is always assumed or expected that there is a criminal or in the worst case terroristic intention. Therefore the NGA operation is usually of a radiological situation a combination with police actions inducing enhanced challenges to planning, communication and cooperation.

  5. Future Textiles

    DEFF Research Database (Denmark)

    Hansen, Anne-Louise Degn; Jensen, Hanne Troels Fusvad; Hansen, Martin

    2011-01-01

    Magasinet Future Textiles samler resultaterne fra projektet Future Textiles, der markedsfører området intelligente tekstiler. I magasinet kan man læse om trends, drivkræfter, udfordringer samt få ideer til nye produkter inden for intelligente tekstiler. Områder som bæredygtighed og kundetilpasning...

  6. Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters

    Energy Technology Data Exchange (ETDEWEB)

    Denise Baclawski

    2010-03-08

    The University of Nevada, Reno Fire Science Academy (FSA) applied for grant funding to develop and deliver programs for municipal, rural, and volunteer firefighters. The FSA specializes in preparing responders for a variety of emergency events, including flammable liquid fires resulting from accidents, intentional acts, or natural disasters. Live fire training on full scale burnable props is the hallmark of FSA training, allowing responders to practice critical skills in a realistic, yet safe environment. Unfortunately, flammable liquid live fire training is often not accessible to municipal, rural, or volunteer firefighters due to limited department training budgets, even though most department personnel will be exposed to flammable liquid fire incidents during the course of their careers. In response to this training need, the FSA developed a course during the first year of the grant (Year One), Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters. During the three years of the grant, a total of 2,029 emergency responders received this training. In Year Three, two new courses, a train-the-trainer for Responding to Terrorist Incidents in Your Community and Management of Large-Scale Disasters for Public Officials were developed and pilot tested during the Real-World Disaster Management Conference held at the FSA in June of 2007. Two research projects were conducted during Years Two and Three. The first, conducted over a two year period, evaluated student surveys regarding the value of the flammable liquids training received. The second was a needs assessment conducted for rural Nevada. Both projects provided important feedback and a basis for curricula development and improvements.

  7. Futures Brokerages Face uncertain Future

    Institute of Scientific and Technical Information of China (English)

    WANG PEI

    2006-01-01

    @@ 2005 was a quiet year for China's futures market.After four new trading products, including cotton, fuel oil and corn, were launched on the market in 2004, the development of the market seemed to stagnate. The trade value of the futures market totaled 13.4 trillion yuan (US$ 1.67 trillion) in 2005, down 8.5 percent year-on-year. Although the decrease is quite small and the trade value was still the second highest in the market's history, the majority of futures brokerage firms were running in the red. In some areas, up to 80 percent of futures companies made losses.

  8. Perspective on the future

    International Nuclear Information System (INIS)

    Warren, B.C.

    1990-01-01

    To anticipate future developments in the area of low-level radioactive waste (LLRW) management, an understanding of the following questions is necessary: what are the current regulatory policies, and What is the view toward proposed changes that affect the treatment of disposal of LLRW? The problem preventing resolution is proponents for change versus proponents for maintaining tradition. The paper discusses the author's anticipations for crises to develop prior to a decision-making mode

  9. Chemical Accident Prevention: Site Security

    Science.gov (United States)

    This chemical safety alert assists facilities that routinely handle extremely hazardous substances, along with SERCs, LEPCs, and emergency responders, in their efforts to reduce criminally caused releases and vulnerability to terrorist activity.

  10. Sustainable Futures

    Science.gov (United States)

    Sustainable Futures is a voluntary program that encourages industry to use predictive models to screen new chemicals early in the development process and offers incentives to companies subject to TSCA section 5.

  11. Salmonella Prevention

    Science.gov (United States)

    ... and in vegetable and fruit harvesting and packing operations may help prevent salmonellosis caused by contaminated foods. Better education of food industry workers in basic food safety and restaurant inspection procedures may prevent cross-contamination and other ...

  12. Future Generations

    Centers for Disease Control (CDC) Podcasts

    2007-11-01

    This podcast gives action steps and reasons to control diabetes, with a focus on American Indians.  Created: 11/1/2007 by National Diabetes Education Program (NDEP), a joint program of the Centers for Disease Control and Prevention and the National Institutes of Health.   Date Released: 11/4/2007.

  13. Future perspectives

    International Nuclear Information System (INIS)

    Anon.

    1987-01-01

    International involvement in particle physics is what the International Committee for Future Accelerators (ICFA) is all about. At the latest Future Perspectives meeting at Brookhaven from 5-10 October (after a keynote speech by doyen Viktor Weisskopf, who regretted the emergence of 'a nationalistic trend'), ICFA reviewed progress and examined its commitments in the light of the evolving world particle physics scene. Particular aims were to review worldwide accelerator achievements and plans, to survey the work of the four panels, and to discuss ICFA's special role in future cooperation in accelerator construction and use, and in research and development work for both accelerators and for detectors

  14. Future Contingents

    DEFF Research Database (Denmark)

    Øhrstrøm, Peter; Hasle., Per F. V.

    2015-01-01

    contingent statements. The problem of future contingents is interwoven with a number of issues in theology, philosophy, logic, semantics of natural language, computer science, and applied mathematics. The theological issue of how to reconcile the assumption of God's foreknowledge with the freedom and moral...... accountability of human beings has been a main impetus to the discussion and a major inspiration to the development of various logical models of time and future contingents. This theological issue is connected with the general philosophical question of determinism versus indeterminism. Within logic, the relation...... about the future. Finally, it should be mentioned that temporal logic has found a remarkable application in computer science and applied mathematics. In the late 1970s the first computer scientists realised the relevance of temporal logic for the purposes of computer science (see Hasle and Øhrstrøm 2004)....

  15. Future Contingents

    DEFF Research Database (Denmark)

    Øhrstrøm, Peter; Hasle., Per F. V.

    2011-01-01

    contingent statements. The problem of future contingents is interwoven with a number of issues in theology, philosophy, logic, semantics of natural language, computer science, and applied mathematics. The theological issue of how to reconcile the assumption of God's foreknowledge with the freedom and moral...... accountability of human beings has been a main impetus to the discussion and a major inspiration to the development of various logical models of time and future contingents. This theological issue is connected with the general philosophical question of determinism versus indeterminism. Within logic, the relation...... about the future. Finally, it should be mentioned that temporal logic has found a remarkable application in computer science and applied mathematics. In the late 1970s the first computer scientists realised the relevance of temporal logic for the purposes of computer science (see Hasle and Øhrstrøm 2004)....

  16. Future Savvy

    DEFF Research Database (Denmark)

    Gordon, Adam

    There's no shortage of predictions available to organizations looking to anticipate and profit from future events or trends. Apparently helpful forecasts are ubiquitous in everyday communications such as newspapers and business magazines, and in specialized sources such as government and think......-tank forecasts, consultant reports, and stock-market guides. These resources are crucial, but they are also of very mixed quality. How can decision-makers know which predictions to take seriously, which to be wary of, and which to throw out entirely? Future Savvy provides analytical filters to judging predictive...... systematic "forecast filtering" to reveal strengths and weakness in the predictions they face. Future Savvy empowers both business and policy/government decision-makers to use forecasts wisely and so improve their judgment in anticipating opportunities, avoiding threats, and managing uncertainty....

  17. How Terrorist Groups End: Lessons for Countering al Qa’ida

    Science.gov (United States)

    2008-01-01

    Soda tribe recently helped U.S. forces find IEDs [improvised explosive devices] that had been planted by their own tribesmen, and they have...necessary “preventive medicine ” to thwart Soviet inroads.34 Komer argued that the police were in regular contact with the popula- tion; could serve...PO Kosovo Liberation Army (Macedonia, Serbia, Montenegro ) 1992–1999 10,000s LM PF N TC V Ku Klux Klan (U.S.) 1866– 1,000s H F RW SR — Kuki Liberation

  18. Energy Futures

    DEFF Research Database (Denmark)

    Davies, Sarah Rachael; Selin, Cynthia

    2012-01-01

    foresight and public and stakeholder engagement are used to reflect on?and direct?the impacts of new technology. In this essay we draw on our experience of anticipatory governance, in the shape of the ?NanoFutures? project on energy futures, to present a reflexive analysis of engagement and deliberation. We...... draw out five tensions of the practice of deliberation on energy technologies. Through tracing the lineages of these dilemmas, we discuss some of the implications of these tensions for the practice of civic engagement and deliberation in a set of questions for this community of practitioner-scholars....

  19. The future of FRMAC assessment

    International Nuclear Information System (INIS)

    Laiche, Thomas P.

    2010-01-01

    FRMAC was born out of circumstances 25 years ago when 17 federal agencies descended on the states with good intention during the Three-Mile Island nuclear power plant incident. At that time it quickly became evident that a better way was needed to support state and local governments in their time of emergency and recovery process. FRMAC's single voice of Federal support coordinates the multiple agencies that respond to a radiological event. Over the years, FRMAC has exercised, evaluated, and honed its ability to quickly respond to the needs of our communities. As the times have changed, FRMAC has expanded its focus from nuclear power plant incidents, to threats of a terrorist radiological dispersal device (RDD), to the unthinkable - an Improvised nuclear device (IND). And just as having the right tools are part of any trade, FRMAC's tool set has and is evolving to meet contemporary challenges - not just to improve the time it takes to collect data and assess the situation, but to provide a quality and comprehensive product that supports a stressed decision maker, responsible for the protection of the public. Innovations in the movement of data and information have changed our everyday lives. So too, FRMAC is capitalizing on industry innovations to improve the flow of information: from the early predictive models, to streamlining the process of getting data out of the field; to improving the time it takes to get assessed products in to the hands of the decision makers. FRMAC is focusing on the future through the digital age of electronic data processing. Public protective action and dose avoidance is the challenge.

  20. Iraq's future

    International Nuclear Information System (INIS)

    Henderson, S.

    1998-01-01

    The large oil reserves of Iraq make it an important player in the long-term political energy world. This article briefly reviews the oil industry''s development and current status in Iraq and discusses the planned oil and gas field development. Finally there is a political discussion regarding the future of Iraq in terms of religion, race and neighbouring countries. (UK)

  1. Bitcoin futures

    DEFF Research Database (Denmark)

    Brøgger, Søren Bundgaard

    2018-01-01

    Med introduktionen af et futures-marked er Bitcoin-eksponering blevet tilgængelig for en bredere gruppe af investorer, som hidtil ikke har kunnet eller villet tilgå det underliggende marked for Bitcoin. Artiklen finder, at kontrakterne umiddelbart favoriserer spekulanter på bekostning af hedgers og...

  2. The correlation between diversion (Article 113 of the Criminal Code of Ukraine and terrorist act (Article 258 of the Criminal Code of Ukraine

    Directory of Open Access Journals (Sweden)

    Андрій Сергійович Климосюк

    2018-03-01

    During the investigating of the punishability for these crimes, it was found that in some cases the actual infliction of harm by a s diversion causes the necessity for additional qualifications by Part 2 of Art. 115 or Part 3 of Art. 258 of the Criminal Code of Ukraine. It is proved that the norm of diversion can be competed with the norm of a terrorist act as a whole (Article 113 of the Criminal Code of Ukraine and as part of the whole (Article 258 of the Criminal Code of Ukraine, and in such cases the preference in enforcement should be qualified as a diversion. Examples given in this article are an illustrations of an ideal and actual set of diversion e and terrorist act.

  3. Terrorism and Counter-Terrorism Strategies in a Globalised World : alternative perceptiveness of terrorist emergence theory and policing strategies confrontation with human rights

    OpenAIRE

    Kikkas, Margit

    2015-01-01

    Globalisation and development in technology have advanced terrorism to reach a broader target audience. Especially focussing at the international co-operation strategies and combined social networks, terrorist activities have an direct- and indirect effect on private households, international commerce and local governments. Security institutions and state organisations use various combinations of counter- terrorism measures, that are mostly social-, political-, or financial in nature. Neverth...

  4. The EU Legislative Framework Against Money Laundering and Terrorist Finance:A Critical Analysis in the Light of Evolving Global Standards

    OpenAIRE

    Gilmore, William; Mitsilegas, Valsamis

    2007-01-01

    This article examines the evolution of the EU anti-money laundering legislative framework (which in recent years has also included measures to counter terrorist finance), by focusing in particular on recent legislation such as the third money laundering Directive and the Regulation on controls of cash entering the EU, both adopted in 2005. The analysis highlights the relationship between these instruments and international initiatives in the field (in particular FATF standards), and addresses...

  5. Long-Term Memory for the Terrorist Attack of September 11: Flashbulb Memories, Event Memories, and the Factors that Influence Their Retention

    Science.gov (United States)

    Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.

    2009-01-01

    More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…

  6. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following a Chemical Terrorist Attack: Decision Criteria for Multipathway Exposure Routes

    OpenAIRE

    Watson, Annetta; Dolislager, Fredrick; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Love, Adam H.

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and de...

  7. Prevention: Exercise

    Medline Plus

    Full Text Available ... Steroid Injections Lumbar Zygapophysical (Facet) Joint Injections PREVENTION Lifestyle Choices 10 Tips for a Healthy Back Smoking Weight Patient Safety Exercise Strengthening Strengthen ...

  8. Which future for nuclear counter-proliferation?

    International Nuclear Information System (INIS)

    Duval, M.

    2010-01-01

    Dealing with the case of nuclear weapons possessed by nuclear states (but not eventually by terrorists), the author first identifies the constants of counter-proliferation: it is linked to interest conflicts between those who try to preserve their monopoly and those who try to acquire a new weapon either because of a threat or for reasons of regional prestige, the evolution from use to deterrence, the appearance of new actors after the USA and Russia, the role of nuclear tactical weapons, and the future of Russian weapons and know-how. He presents the international counter-proliferation context: the Non Proliferation Treaty (NPT), the IAEA and its controls, the Nuclear Supplier Group (NSG), the nuclear-free zones, the Comprehensive Test Ban Treaty (CTBT), the Missile Technology Control Regime (MTCR). He describes how and why proliferation occurs: uranium enrichment and plutonium technology, political reasons in different parts of the world. Then, he gives an overview of the proliferation status by commenting the cases of Israel, Iraq, India, Pakistan, North Korea, and Iran. He discusses the future of proliferation (involved countries, existence of a nuclear black market) and of counter-proliferation as far as Middle-East and North Korea are concerned. He tries finally to anticipate the consequences for nuclear deterrence strategy, and more particularly for Europe and France

  9. Robot Futures

    DEFF Research Database (Denmark)

    Christoffersen, Anja; Grindsted Nielsen, Sally; Jochum, Elizabeth Ann

    Robots are increasingly used in health care settings, e.g., as homecare assistants and personal companions. One challenge for personal robots in the home is acceptance. We describe an innovative approach to influencing the acceptance of care robots using theatrical performance. Live performance...... is a useful testbed for developing and evaluating what makes robots expressive; it is also a useful platform for designing robot behaviors and dialogue that result in believable characters. Therefore theatre is a valuable testbed for studying human-robot interaction (HRI). We investigate how audiences...... perceive social robots interacting with humans in a future care scenario through a scripted performance. We discuss our methods and initial findings, and outline future work....

  10. Future directions

    International Nuclear Information System (INIS)

    Lutz, R.J. Jr.

    2004-01-01

    Topics presented concerning the future developments in risk analysis are: safety goals, US severe accident policy, code developments, research programs, analyses and operation action, linking with the deterministic analyses. Principle consideration in risk is defined as protection of both general population, and nearby residents. The principal goal should be consistent with risk of other man-caused activities, the cost benefit after minimum safety levels are achieved, and proportional to benefits to be gained

  11. Exploring the Iran-Hezbollah Relationship: A Case Study of how State Sponsorship affects Terrorist Group Decision-Making

    Directory of Open Access Journals (Sweden)

    Marc R. DeVore

    2012-10-01

    Full Text Available Understanding the impact of state sponsorship on the decision-making of violent non-state actors is among the more important issues to scholars of security studies. This article addresses the issue by examining the relationship between Iran and Lebanon’s Hezbollah. To preview its conclusions, there are two main perspectives to consider with regard to the terrorist group – state sponsor relationship. First, state support has a powerful, yet indirect effect on violent non-state actor decision-making by shaping the options available to groups’ leaders.  Second, state sponsors can also directly leverage their aid to shape the strategic decisions of armed non-state actors, forcing their clients to either expand or restrict their activities. Because of inevitable lacunae and contradictions amongst published accounts, this study relies heavily upon primary sources and data collected during field research in Lebanon, including interviews with leaders from Hezbollah, the Lebanese Army, the United Nations' Peacekeeping Mission in Southern Lebanon (UNIFIL and the rival Shia organization, Amal.

  12. Forecasting the “Arab Spring” of 2011: Terrorist Incident Data from 2000-2010 Offered No Early Warning

    Directory of Open Access Journals (Sweden)

    Richard J. Chasdi

    2013-04-01

    Full Text Available One of the single most predominant questions associated with the so-called “Arab Spring” is whether or not any social research indicators associated with terrorism data are available with predictive value for such profound structural political changes. The underlying aim of this “Research Note” is to take a first pass at the terrorism data and to compare certain terrorism data trends for four countries that experienced successful regime change in 2011, namely Tunisia, Egypt, Libya, and Yemen, to terrorism trends in nine countries where political strains and tensions did not result in full blown regime change. In this essay, those countries include Bahrain, Syria, Jordan, Morocco, Algeria, Kuwait, UAE, Lebanon, and Saudi Arabia. From the start, it should be clear that even though there was non-violent protest in many of these countries, this analysis places singular attention on what both Gurr and Ross and Miller call “oppositional” or “insurgent” terrorism where terrorist assaults are directed at state governments.

  13. Profiles of referrals to a psychiatric service: a descriptive study of survivors of the Nairobi US Embassy terrorist bomb blast.

    Science.gov (United States)

    Ndetei, D M; Omar, A; Mutiso, V N; Ongecha, F A; Kokonya, D A

    2009-11-01

    To document the socio-demographic characteristics and psychiatric profiles of the survivors of the Nairobi United States Embassy terrorist bomb blast referred to a psychiatric and psychotherapy (counselling) service. This was a descriptive cross-sectional study. Clinical interviews and structured questionnaires for post-traumatic stress disorder (PTSD) and stress were administered. Survivors of the bomb blast referred to a psychiatric and psychotherapy service one year or more after the bombing were included in the study. These survivors had been treated using psychopharmacotherapy and individualised (not group) therapy/counselling. Eighty-three consecutive referrals to a psychiatric service participated in this study. There were more males and the sample was generally well educated. The referrals made contact with the referring agency for a number of reasons including seeking psychological, financial and medical assistance. All the patients reported varying degrees of psychiatric symptoms and functional impairment on various aspects of social occupational functioning. High scores for PTSD and other related stress were recorded one or more years after the bombing. Although the survivors indicated that initial counselling following the blast had helped them, they still scored high on PTSD suggesting that clinically, the initial counselling had little, if any impact on the development of PTSD. There is need for a holistic approach to the management of psychotrauma in individuals.

  14. An Estimation of a Nonlinear Dynamic Process Using Latent Class Extended Mixed Models: Affect Profiles After Terrorist Attacks.

    Science.gov (United States)

    Burro, Roberto; Raccanello, Daniela; Pasini, Margherita; Brondino, Margherita

    2018-01-01

    Conceptualizing affect as a complex nonlinear dynamic process, we used latent class extended mixed models (LCMM) to understand whether there were unobserved groupings in a dataset including longitudinal measures. Our aim was to identify affect profiles over time in people vicariously exposed to terrorism, studying their relations with personality traits. The participants were 193 university students who completed online measures of affect during the seven days following two terrorist attacks (Paris, November 13, 2015; Brussels, March 22, 2016); Big Five personality traits; and antecedents of affect. After selecting students whose negative affect was influenced by the two attacks (33%), we analysed the data with the LCMM package of R. We identified two affect profiles, characterized by different trends over time: The first profile comprised students with lower positive affect and higher negative affect compared to the second profile. Concerning personality traits, conscientious-ness was lower for the first profile compared to the second profile, and vice versa for neuroticism. Findings are discussed for both their theoretical and applied relevance.

  15. Preventing falls and fractures.

    Science.gov (United States)

    Ulfarsson, J; Robinson, B E

    1994-11-01

    One of four persons over age 65 in the community falls; those over age 75 in institutions fall more frequently. Falls, a complex phenomena suggesting present disease and predicting future disability, are caused by interactions between the environment and dynamic balance which is determined by the quality of sensory input, central processing, and motor responses. Clinical factors which predispose to falling often produce observable disturbances in gait and balance, making observation critical in assessment. Acute illness and drug therapy produce particularly preventable falls. Therapeutic exercise and environmental modification for safety are the clinical interventions most likely to successfully prevent fall-related injury.

  16. Preventative Maintenance.

    Science.gov (United States)

    Migliorino, James

    Boards of education must be convinced that spending money up front for preventive maintenance will, in the long run, save districts' tax dollars. A good program of preventive maintenance can minimize disruption of service; reduce repair costs, energy consumption, and overtime; improve labor productivity and system equipment reliability; handle…

  17. The challenge of defining standards of prevention in HIV prevention trials

    NARCIS (Netherlands)

    Philpott, Sean; Heise, Lori; McGrory, Elizabeth; Paxton, Lynn; Hankins, Catherine; Alexander, Lorraine; Apuuli, David Kihumuro; Baeten, Jared; Birx, Deborah; de Bruyn, Guy; Bukusi, Elizabeth; Burns, David; Calazans, Gabriela; Campbell, James; Caswell, Georgina; Coutinho, Alex; Dawson, Liza; Dhai, Amaboo; Dube, Samukeliso; Ecuru, Julius; Essack, Zaynab; Farley, Timothy; Gafos, Mitzy; Irungu, Pauline; Kaleebu, Pontiano; Kamali, Anatoli; Kestelyn, Evelyne; Kublin, James; Lohse, Nicolai; Lutalo, Tom; Macklin, Ruth; Mâsse, Benôıt; Mauney, Chris; McCormack, Sheena; Miller, Lori; Mfutso-Bengo, Joseph; Misra, Rajender; Muganwa, Margaret; Ndase, Patrick; Nel, Annalene; Nielsen, Leslie; Nkala, Busisiwe; O'Reilly, Kevin; Okware, Sam; Paicheler, Geneviève; Rees, Helen; Rerks-Ngarm, Supachai; Ridzon, Renee; Rosenberg, Zeda; Singh, Jerome

    2011-01-01

    As new HIV prevention tools are developed, researchers face a number of ethical and logistic questions about how and when to include novel HIV prevention strategies and tools in the standard prevention package of ongoing and future HIV prevention trials. Current Joint United Nations Programme on

  18. Future climate

    International Nuclear Information System (INIS)

    La Croce, A.

    1991-01-01

    According to George Woodwell, founder of the Woods Hole Research Center, due the combustion of fossil fuels, deforestation and accelerated respiration, the net annual increase of carbon, in the form of carbon dioxide, to the 750 billion tonnes already present in the earth's atmosphere, is in the order of 3 to 5 billion tonnes. Around the world, scientists, investigating the probable effects of this increase on the earth's future climate, are now formulating coupled air and ocean current models which take account of water temperature and salinity dependent carbon dioxide exchange mechanisms acting between the atmosphere and deep layers of ocean waters

  19. Hospitalizations for asthma among adults exposed to the September 11, 2001 World Trade Center terrorist attack.

    Science.gov (United States)

    Miller-Archie, Sara A; Jordan, Hannah T; Alper, Howard; Wisnivesky, Juan P; Cone, James E; Friedman, Stephen M; Brackbill, Robert M

    2018-04-01

    We described the patterns of asthma hospitalization among persons exposed to the 2001 World Trade Center (WTC) attacks, and assessed whether 9/11-related exposures or comorbidities, including posttraumatic stress disorder (PTSD) and gastroesophageal reflux symptoms (GERS), were associated with an increased rate of hospitalization. Data for adult enrollees in the WTC Health Registry, a prospective cohort study, with self-reported physician-diagnosed asthma who resided in New York State on 9/11 were linked to administrative hospitalization data to identify asthma hospitalizations during September 11, 2001-December 31, 2010. Multivariable zero-inflated Poisson regression was used to examine associations among 9/11 exposures, comorbid conditions, and asthma hospitalizations. Of 11 471 enrollees with asthma, 406 (3.5%) had ≥1 asthma hospitalization during the study period (721 total hospitalizations). Among enrollees diagnosed before 9/11 (n = 6319), those with PTSD or GERS had over twice the rate of hospitalization (adjusted rate ratio (ARR) = 2.5, 95% CI = 1.4-4.1; ARR = 2.1, 95% CI = 1.3-3.2, respectively) compared to those without. This association was not statistically significant in enrollees diagnosed after 9/11. Compared to higher educational attainment, completing less than college was associated with an increased hospitalization rate among participants with both pre-9/11- and post-9/11-onset asthma (ARR = 1.9, 95% CI = 1.2-2.9; ARR = 2.6, 95% CI = 1.6-4.1, respectively). Sinus symptoms, exposure to the dust cloud, and having been a WTC responder were not associated with asthma hospitalization. Among enrollees with pre-9/11 asthma, comorbid PTSD and GERS were associated with an increase in asthma hospitalizations. Management of these comorbidities may be an important factor in preventing hospitalization.

  20. Preventive analgesia

    DEFF Research Database (Denmark)

    Dahl, Jørgen B; Kehlet, Henrik

    2011-01-01

    This paper will discuss the concepts of pre-emptive and preventive analgesia in acute and persistent postsurgical pain, based on the most recent experimental and clinical literature, with a special focus on injury-induced central sensitization and the development from acute to chronic pain. Recent...... of preventive analgesia for persistent postoperative pain are promising. However, clinicians must be aware of the demands for improved design of their clinical studies in order to get more conclusive answers regarding the different avenues for intervention. Summary: The concept of preventive analgesia is still...

  1. Do ICBMs Have a Future

    Science.gov (United States)

    2015-06-01

    21st century signaled the beginning of a cultural shift towards stopping terror organizations. The initial problem was how to stop the attacks from...hardly deter militias such as the Taliban, or terrorists such as those who attacked New York, Washington, London, Madrid, and Mumbai in recent

  2. Future development

    International Nuclear Information System (INIS)

    Zavitz, J.; Hetherington, C.

    1997-01-01

    Issues regarding future development by oil and gas companies in Canada's Arctic and the Beaufort Sea were discussed. It was suggested in the Berger report that Northern development should be under the control of the people whose lives and economy are being changed. Aboriginal people are now much more sophisticated politically, and have a better understanding of what is involved. Most of them would like the financial benefits from development, but the development would have to be on their terms. Most people involved with Arctic oil exploration feel that there is enough oil in the Arctic to warrant production. (Reserves in the Beaufort Sea are estimated at two billion barrels of good quality oil). If development were to continue, there exist two methods of transportation to move the oil to market. Gulf, Imperial Oil and Panarctic favour the use of pipelines, whereas Dome Petroleum Ltd. favours the use of ice-breaking tankers. In each case the favored option seems to depend upon the location of the company's leases, the capital and operating costs, and the potential environmental impacts. Undoubtedly, any future development will be guided by the scientific information and technical expertise of oil industry pioneers of the 1960s and the 1970s, and the wisdom gained from the experiences of the many participants whose views and insights are recorded in this book

  3. Prevention: Exercise

    Medline Plus

    Full Text Available ... Tips for a Healthy Back Smoking Weight Patient Safety Exercise Strengthening Strengthen Your Core! Stretching/Flexibility Aerobic ... Strength Training for the Elderly Other Back Pack Safety Pregnancy and Back Pain Preventing Osteoporosis Back Pain ...

  4. Preventing Rejection

    Science.gov (United States)

    ... After the transplant Preventing rejection Post-transplant medications Types of immunosuppressants Switching immunosuppressants Side effects Other medications Generic and brand name drugs Post-transplant tests Infections and immunity Lifestyle changes Health concerns Back to work or ...

  5. Prevent Cyberbullying

    Science.gov (United States)

    ... Tips for Teachers Report Cyberbullying Print Share Prevent Cyberbullying Be Aware of What Your Kids are Doing ... Signs a Child is Being Cyberbullied or is Cyberbullying Others Many of the warning signs that cyberbullying ...

  6. Preventing Suicide

    Science.gov (United States)

    ... protective factors listed below: Skills in problem solving, conflict resolution, and nonviolent ways of handling disputes Effective ... 2017 Page last updated: August 9, 2017 Content source: National Center for Injury Prevention and Control, Division ...

  7. Prevention: Exercise

    Medline Plus

    Full Text Available ... A SPECIALIST Prevention Strengthening Exercise Committee Exercise Committee Core Strengthening Many popular forms of exercise focus on ... acute pain, you should stop doing it. Transverse Core Strengthening This strengthens the muscles that cross from ...

  8. Prevention: Exercise

    Medline Plus

    Full Text Available ... Training for the Elderly Other Back Pack Safety Pregnancy and Back Pain Preventing Osteoporosis Back Pain Basics ... increases your back pain after five repetitions, or causes acute pain, you should stop doing it. Transverse ...

  9. Preventing accidents

    Science.gov (United States)

    2005-08-01

    As the most effective strategy for improving safety is to prevent accidents from occurring at all, the Volpe Center applies a broad range of research techniques and capabilities to determine causes and consequences of accidents and to identify, asses...

  10. Prevention: Exercise

    Medline Plus

    Full Text Available ... 10 Tips for a Healthy Back Smoking Weight Patient Safety Exercise Strengthening Strengthen Your Core! Stretching/Flexibility ... Pain Preventing Osteoporosis Back Pain Basics Book RESOURCES Patient Information Feature Articles Patient Q&A Success Stories ...

  11. Prevention: Exercise

    Medline Plus

    Full Text Available ... Preventing Osteoporosis Back Pain Basics Book RESOURCES Patient Information Feature Articles Patient Q&A Success Stories Definitions Anatomy of the Spine Definitions A-Z Spine Specialists Videos 9 ...

  12. HIV Prevention

    Centers for Disease Control (CDC) Podcasts

    2012-02-01

    Dr. Kevin Fenton, Director of CDC’s National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention, talks about steps people can take to protect their health from HIV.  Created: 2/1/2012 by National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention (NCHHSTP).   Date Released: 2/1/2012.

  13. Nuclear Export Control Policy in Korea - Present and future

    International Nuclear Information System (INIS)

    Kim, Jongsook

    2008-01-01

    The International community has been facing with the continued challenges for possession and proliferation of WMD over the past years. In addition, it is known that the terrorist groups are interested in acquiring WMD. The black market of WMD related materials and technologies show also the one of seriousness of our challenges. A number of international treaties, agreements and initiatives to control the proliferation of weapons of N, B, C and their delivery system have been existed to deal with these challenges, but their missions are challenged greatly in recent a series of nuclear issues by Iran and North Korea. The paper reviews the current international export control status and Korea export control system and policy. It also addresses some agenda to be done as future export control policy in Korea

  14. Future Talks,

    Directory of Open Access Journals (Sweden)

    Catherine Defeyt

    2010-11-01

    Full Text Available La conservation des matériaux modernes et les difficultés qui la caractérisent étaient l’objet du colloque international Future Talks, organisé par Die Neue Sammlung, The International Design Museum, les 22 et 23 octobre 2009 à Munich. Conservateurs-restaurateurs spécialisés, représentants des  institutions muséales les plus prestigieuses d’Europe et d’outre-Atlantique ainsi que chercheurs en sciences appliquées y ont présenté leurs travaux et recherches. En matière de design, d’art moderne e...

  15. Politics of Feminine Abuse: Political Oppression and Masculine Obstinacy in Doris Lessing’s The Good Terrorist

    Directory of Open Access Journals (Sweden)

    Pedram Lalbakhsh

    2012-07-01

    Full Text Available This paper studies the male-dominated world of Doris Lessing’s novel The Good Terrorist. Alice Mellings, the protagonist of the novel, is a political activist whose reliance on male figures in the story—the leaders of a subdivision of a political party—ends in disillusionment and frustration. Looking at this novel from a socialist feminist point of view, Alice Mellings is found to be a minor member, exploited and abused, who has to follow the orders and instructions of her inept superiors—all male. While Alice is the one who guarantees the continuation of activism (doing all kinds of jobs needed to keep the squat alive, she is never allowed to have a role in decision making. She is a member whose identity is defined by male superiors and is considered as a half-human whose services are to be enjoyed only. However, the findings of this study prove Alice as one who has her own voice at the end. The novel’s closing is marked with an engendered New Woman who is aware of the political abuse and whose independent unbound identity stands much higher than the political oppression and masculine obstinacy that had imprisoned her for so long. She is a different woman at the end; one who knows her power, believes in it and decides to fight and not to surrender. And this is a new consciousness that Lessing raises: discover your feminine power, have a firm belief in it and use it to win.

  16. Cancer prevention.

    Science.gov (United States)

    Tubiana, M

    1999-01-01

    Over 70% of human cancers are associated with lifestyle and about half of cancer deaths could be prevented by relatively simple individual actions: no smoking, moderate consumption of alcohol, increased consumption of fruit and vegetables, avoidance of sunbathing, obesity and a too high consumption of saturated lipids. Most of these efforts would also markedly decrease the incidence of cardiovascular and respiratory diseases. However, the concept of prevention is currently neither well accepted nor understood by the medical community and the general public. It is often felt that it restricts freedom, imposes a choice between pleasure and duty, and that passing judgement on lifestyle is a form of intolerance. The case of tobacco illustrates the difficulties encountered by prevention, notably among adolescents. The fight against smoking requires information, a societal approach (ban on advertising, increase in price), and a reduction of the example given by adult smoking (parents, peers, teachers, physicians, TV presenters, movie stars, have a great influence on adolescents), while tobacco cessation programs must be promoted. The various approaches should be integrated into a global program of health prevention, including health education at school from 5 to 12 years of age. The efficacy of each of the global program's components should be evaluated. Misconceptions such as overestimation of the impact of pollution on health should also be corrected. Health is created and experienced by people within the setting of their daily lives, in particular during childhood. Prevention is the responsibility of individual members of the community but also of the community as a whole.

  17. Narrative Means to Preventative Ends: A Narrative Engagement Framework for Designing Prevention Interventions

    Science.gov (United States)

    Miller-Day, Michelle; Hecht, Michael L.

    2013-01-01

    This paper describes a Narrative Engagement Framework (NEF) for guiding communication-based prevention efforts. This framework suggests that personal narratives have distinctive capabilities in prevention. The paper discusses the concept of narrative, links narrative to prevention, and discusses the central role of youth in developing narrative interventions. As illustration, the authors describe how the NEF is applied in the keepin’ it REAL adolescent drug prevention curriculum, pose theoretical directions, and offer suggestions for future work in prevention communication. PMID:23980613

  18. The day Norway cried: Proximity and distress in Norwegian citizens following the 22nd July 2011 terrorist attacks in Oslo and on Utøya Island.

    Science.gov (United States)

    Thoresen, Siri; Aakvaag, Helene Flood; Wentzel-Larsen, Tore; Dyb, Grete; Hjemdal, Ole Kristian

    2012-01-01

    Terrorism may create fear and stress reactions not only in the direct victims, but also in the general population. This study investigated emotional responses in the Norwegian population following the 22nd July 2011 terrorist attacks. We hypothesized that Oslo residents would report a higher level of fear responses compared with people living outside Oslo and that proximity would be associated with early distress and later post-traumatic stress reactions. Representative samples were drawn from the Norwegian Population Registry. Telephone interviews were conducted 4-5 months after the attacks. The response rate for the Oslo sample (N=465) was 24% of the total sample, and 43% of those who were actually reached by phone and asked to participate. Corresponding figures for the sample living outside Oslo (N=716) were 19% and 30%. Our results show strong immediate emotional responses, particularly sadness and a feeling of unreality, in both samples. Jumpiness and other fear responses were significantly higher among Oslo residents. Current level of risk perception was low 4-5 months after the attacks; however, a significant minority reported to feel less safe than before. Geographical and psychological proximity were associated with early emotional responses. Psychological proximity was significantly associated with post-traumatic stress reactions, while measures of geographical proximity were not. Immediate emotional responses, first-week reactions, and first-week jumpiness were uniquely and significantly associated with post-traumatic stress reactions. Post-traumatic stress reactions were elevated in ethnic minorities. The terrorist attacks seem to have had a significant effect on the Norwegian population, creating sadness and insecurity, at least in the short term. Proximity to the terrorist attacks was strongly associated with distress in the population, and early distress was strongly related to later post-traumatic stress reactions. Our results indicate that

  19. "Second class loss": political culture as a recovery barrier--the families of terrorist casualties' struggle for national honors, recognition, and belonging.

    Science.gov (United States)

    Lebel, Udi

    2014-01-01

    Israeli families of terrorist victims have undertaken initiatives to include their dearest in the national pantheon. The objections opposed the penetration of "second-class loss" into the symbolic closure of heroic national bereavement. The "hierarchy of bereavement" is examined through the lens of political culture organized around the veneration held for the army fallen and their families, which has symbolic as well as rehabilitative outcomes. Families of civilian terror victims claims for similar status and treatment had to frame their loss as national in the eyes of the social policy. The article claimed linkage between collective memory and rehabilitation.

  20. Prevention and preparedness for response to nuclear and radiological threats

    International Nuclear Information System (INIS)

    Pradeepkumar, K.S.

    2016-01-01

    Challenges from smuggled or illegally transported radioactive sources with malevolent intention of causing potential threats to the society are much higher to those potential radiological emergencies from misplaced, orphan or lost radioactive sources. Large number of radioactive sources world over is transported for its application in various fields. The emergency preparedness and response system is less developed for potential radiological emergencies caused by them compared to those at nuclear facilities which are kept in readiness to respond to any kind of emergency. After the terrorist attack on WTC of 2001, there is significant concern world over about the malicious use of nuclear and other radioactive material. This calls for prevention of stealing/smuggling of radioactive materials and improving the emergency response system. Use of Radiological Dispersal Device (RDD) and Improvised Nuclear Device (IND) are considered as possible radiological and nuclear threats, can lead to large area contamination in addition to the injuries caused by blast and thermal effects. (author)