WorldWideScience

Sample records for provocation explaining terrorist

  1. PROVOCATIVE PERFORMANCE, PROVOCATIVE THEATER: AESTHETIC INTERACTION

    Directory of Open Access Journals (Sweden)

    ROŞCA ANGELINA

    2017-12-01

    Full Text Available The author directs her attention to an yet-understudied area of theatre science, namely the aesthetic interaction between the provocative performance and the provocative theatre. The article sheds light on the conceptual coordinates of the performance placed among such artistic trends as Actionism, Conceptualism, Fluxus and Happening. Elements of performing arts infiltrated into the theatre long ago. And it is not just a co-occurrence within an artistic act, but an interference indeed. The provocative performance dispossesses the alternative arts of their distinct codes. First in the USA, then in Europe and eventually in the former Socialist Camp and the territory of the ex-USSR, the performance conquered the theatrical territory. This process has been accelerating since the dramatic theatre began to yield its positions to the post-dramatic one. Some of the overlapping points, which unite the performance with the spectacle in contemporary art, are followed in: the strategy of idiocy in provocative practices; the ready made; the corporeality; the pictorial.

  2. Underfunding in Terrorist Organizations

    Science.gov (United States)

    Shapiro, Jacob N.; Siegel, David A.

    A review of international terrorist activity reveals a pattern of financially strapped operatives working for organizations that seem to have plenty of money. To explain this observation, and to examine when restricting terrorists’ funds will reduce their lethality, we model a hierarchical terror organization in which leaders delegate financial and logistical tasks to middlemen, but cannot perfectly monitor them for security reasons. These middlemen do not always share their leaders’ interests: the temptation exists to skim funds from financial transactions. When middlemen are sufficiently greedy and organizations suffer from sufficiently strong budget constraints, leaders will not fund attacks because the costs of skimming are too great. Using general functional forms, we find important nonlinearities in terrorists’ responses to government counter-terrorism. Restricting terrorists’ funds may be ineffective until a critical threshold is reached, at which point cooperation within terrorist organizations begins to break down and further government actions have a disproportionately large impact.

  3. Provocative Video Scenarios

    DEFF Research Database (Denmark)

    Caglio, Agnese

    This paper presents the use of ”provocative videos”, as a tool to support and deepen findings from ethnographic investigation on the theme of remote videocommunication. The videos acted as a resource to also investigate potential for novel technologies supporting continuous connection between...... households. They were deployed online as part of a 6 months research project in collaboration with the Danish electronics manifacturer Bang & Olufsen, involving participants from different continents. The intention is to propose the integration of tools that have been always seen as part of the design domain...

  4. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  5. Profile of a Terrorist.

    Science.gov (United States)

    1988-04-01

    than those questions dealing with terrorists and their methods. Explosives are used routinely and plastique has entered the terrorist’s preferred...to handle. (12:23) The female Lebanese terrorist, May Mansin, easily concealed plastique in a body cavity and proceeded to blow a hole into the side

  6. On Provocation, Education and Entrepreneurship

    DEFF Research Database (Denmark)

    Hjorth, Daniel

    2011-01-01

    in processes of learning entrepreneurship, this article responds to previous calls for less economised entrepreneurship education focusing on its creative-relational nature. An affect-based theory of E3 brings together provocation, deterritorialisation (uprooting) and decoding/imagination, which calls for both......This essay develops an affect-based theory of entrepreneurial entrepreneurship education, something we summarise in a model of provocation-based entrepreneurial entrepreneurship education (the E3 model). Taking its starting point in an anecdote that illustrates the importance of provocation...... critique and creativity, and resonates with appreciations of paralogy as driver in learning processes. The implications of this conceptual model of learning entrepreneurship entrepreneurially are discussed, with particular focus on the role of the pedagogue and on the future of learning entrepreneurship....

  7. Understanding Terrorist Ideology

    National Research Council Canada - National Science Library

    Cragin, Kim

    2007-01-01

    This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level...

  8. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  9. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  10. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  11. Combatting the Terrorist Threat.

    Science.gov (United States)

    1985-05-22

    have supplied many terrorist groups with plastique and other explosives to build bombs. 3 Using these explosives they have produced vehicle bombs which...deceptive, if not dangerously naive.1 5 State Supported Terrorism State supported terrorism is not a new concept , however, it has only recently been...terrorist incidents. The product of that study was the tri-level US anti- terrorism program concept . 3 The program structure is shown in Figure 11. President

  12. On Deceiving Terrorists

    Science.gov (United States)

    2001-12-01

    developed. By way of contrast, the last two categories—theoretical works and doctrine—attempt to transcend the contextual limits of the first two... Busqueda , the Colombian National Police “Search Bloc,” which was tasked with apprehending Escobar (Bowden, 2001). Deceiving Terrorists Chain Network

  13. Interpretation of growth hormone provocative tests

    DEFF Research Database (Denmark)

    Andersson, A M; Orskov, H; Ranke, M B

    1995-01-01

    To compare interpretations of growth hormone (GH) provocative tests in laboratories using six different GH immunoassays (one enzymeimmunometric assay (EIMA, assay 1), one immunoradiometric assay (IRMA, assay 5), one time-resolved fluorimmunometric assay (TRFIA, assay 3) and three radioimmunoassays...

  14. From provocation to aggression: the neural network

    OpenAIRE

    Repple, J.; Pawliczek, C.M.; Voss, B.; Siegel, S.; Schneider, F.; Kohn, N.; Habel, U.

    2017-01-01

    Background In-vivo observations of neural processes during human aggressive behavior are difficult to obtain, limiting the number of studies in this area. To address this gap, the present study implemented a social reactive aggression paradigm in 29 healthy men, employing non-violent provocation in a two-player game to elicit aggressive behavior in fMRI settings. Results Participants responded more aggressively after high provocation reflected in taking more money from their opponents. Compar...

  15. Distilled water nasal provocation in hyperreactive patients.

    Science.gov (United States)

    Baudoin, T; Anzic, S A; Kalogjera, L

    1999-01-01

    Nonisotonic aerosol may act as a provocation agent in the upper and lower airways of hyperreactive individuals. The purpose of the study was to compare the results of nasal challenge with distilled water in patients with allergic rhinitis to those with noninfective nonallergic rhinitis (NINAR), with respect to the potential clinical use of the obtained data. A group of 68 ambulatory patients with allergic rhinitis or NINAR (39 perennial allergic, 6 seasonal, 23 NINAR) were challenged with 10 mL of distilled water aerosol after the baseline active anterior rhinomanometry. Patients with nasal polyposis at endoscopy, significant unilateral septal deviation, positive bacteriologic swab, recent nasal surgery, and uncertain anamnestic data about the medication taken 6 weeks before the provocation were excluded from the study. After 10 minutes of nasal provocation, rhinomanometry was repeated to assess the response. In 15 patients of the perennial allergic group, the same measurements were performed after a 2-week oral antihistamine and topical steroid therapy. Nasal resistance was significantly increased on the more patent side of the nose after nasal provocation with distilled water aerosol in allergic patients in comparison to the nasal resistance before provocation. In the patients with NINAR, the provocation resulted in a significant rise on the more patent side, but the total nasal airway resistance (NAR) levels were also significantly increased. The systemic antihistamine and topical steroid 2-week therapy in patients with perennial allergic rhinitis significantly reduced the response to nasal distilled water provocation. Nasal provocation with distilled water aerosol is a cheap, simple, and acceptable method that provides useful clinical data on the level of nonspecific nasal hyperreactivity and the therapy success.

  16. SPECIFICS AND FUNCTIONS OF THE PROVOCATIVE ACT

    Directory of Open Access Journals (Sweden)

    ROŞCA ANGELINA

    2017-12-01

    Full Text Available The author points out that the provocativeness that is at the basis of the creations belonging to different art trends (constructivism, futurism, surrealism, minimalism, conceptualism and so on played a key role in the art of the 20th – 21st centuries. At present, provocation has become the main strategy for the development of the theatrical process, which makes it necessary for theatre science to try to delineate the theoretical outline of what we call provocativity. The author, using worldknown theatrical cases, determines the specificity and functions of provocativity. The latter consists in the fact that the provocation, allows a clearer outline of the boundaries of art, broadening the permissibility framework and increasing the degree of tolerance in society, breaks the taboos, from the sexual to the social ones, contributes to changing the artistic paradigm, destroys stereotypes, radically changes conceptions, artistic means, methods, models of organizing the artistic process, impacts the emergence of radical aesthetics, carries out artistic and social reforms.

  17. Malevolent Creativity in Terrorist Organizations

    Science.gov (United States)

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  18. Reframing Practice through Provocative Co-design

    DEFF Research Database (Denmark)

    Christiansen, Lotte; Poulsen, Søren Bolvig; Morelli, Nicola

    2013-01-01

    changes in organisations, as it has the ability to force a shift in face (Goffman 1967) and the potential to motivate and enable stakeholders to reframe practice and initiate change initiatives. This is done by focusing on a service design project in which a provocative assignment in a co-design workshop...

  19. Provocative behavior of a victim and its difference from the provocation of a crime

    Directory of Open Access Journals (Sweden)

    Valeriy Anatolyevich Cherepakhin

    2015-03-01

    Full Text Available Objective to define the main elements of provocative behavior of a victim and its difference from the provocation of a crime. Methods dialectic approach to the study of social phenomena and historical and comparativelegal methods for the study of legal reality. Results scientific grounding of theoreticallegal bases of the ldquoprovocationrdquo institution and formulating proposals for improving its legislative regulation and increasing the efficiency of its law enforcement. Scientific novelty the article presents the author39s classification of the types and forms of provocative activity in the norms of both the General and the Specific parts. Practical value summarizing and analysis of the modern empirical data on the practice of implementation of the norms containing the features of provocation and elaboration of organizational and methodological recommendations based on the authorrsquos research. nbsp

  20. The Importance of Prolonged Provocation in Drug Allergy

    DEFF Research Database (Denmark)

    Fransson, Sara; Mosbech, Holger; Kappel, Mogens

    2017-01-01

    BACKGROUND: Drug provocation is the "Gold Standard" in drug allergy investigation. Recent studies suggest that a negative drug provocation on first dose should be followed by a prolonged provocation over several days. OBJECTIVE: To evaluate drug allergy investigations on the basis of drug...

  1. The personality profile of terrorist leaders: theoretical aspects and ways of measuring

    OpenAIRE

    Dimitrovska, Aleksandra; Dojcinovski, Metodija

    2015-01-01

    The main task of the psychology of terrorism is to explain the psychological aspects of terrorism, trying to provide answers about the behavior of the persons involved in terrorist activities. The literature suggests that there is no a single theory that explains the reasons and the way of "making the terrorists." While the first generation of research have viewed on terrorism as a pathology, explaining it predominantly through mental illness and psychopathic personality, th...

  2. Saudi Arabia: Terrorist Financing Issues

    National Research Council Canada - National Science Library

    Blanchard, Christoper M; Prados, Alfred B

    2007-01-01

    According to the U.S. State Department 2007 International Narcotics Control Strategy Report, Saudi donors and unregulated charities have been a major source of financing to extremist and terrorist groups over the past 25 years...

  3. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  4. The Power of the Provocative: Exploring World History Content

    Science.gov (United States)

    Ashkettle, Bryan L.

    2013-01-01

    This study addresses how my freshman world history students come to understand controversial issues as provocative within the secondary social studies classroom, and in what ways does their engagement with provocative issues influence their understanding of the content and the world around them. In addition, this research study seeks to discover…

  5. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  6. Playing the villain : understanding the punishment and portrayal of terrorists

    OpenAIRE

    Spens, Christiana

    2017-01-01

    Playing the Villain argues that the portrayal and punishment of terrorists in the Western media perpetuates colonialist attitudes, due to the visual connections between these modern images and past or fictional representations of iconic, punished villains. A theory of scapegoating related to intervisuality supports this argument, by explaining that as a ritual dependent on and developed by cultural history and mythology, scapegoating requires engagement with recognisable visual motifs that...

  7. The Decision Calculus of Terrorist Leaders

    OpenAIRE

    J. Tyson Chatagnier; Alex Mintz; Yair Samban

    2012-01-01

    This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizat...

  8. Religious cover to terrorist movement

    International Nuclear Information System (INIS)

    Zaidi, M.K.

    2005-01-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  9. Religious cover to terrorist movement

    Energy Technology Data Exchange (ETDEWEB)

    Zaidi, M K [US Department of Energy, Idaho Radiological and Environmental Sciences Laboratory (RESL), Idaho Falls (United States)

    2005-07-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  10. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  11. Defender's Edge: Utilizing Intelligent Agent Technology to Anticipate Terrorist Acts

    National Research Council Canada - National Science Library

    Scheiber, Lane

    2003-01-01

    ...), to the problem of anticipating terrorist acts. Two areas in which IAs could play a significant role are in the development and maintenance of a real-time picture of terrorist activity, and in predicting potential occurrences of terrorist acts...

  12. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  13. Can magnetic resonance imaging accurately predict concordant pain provocation during provocative disc injection?

    International Nuclear Information System (INIS)

    Kang, Chang Ho; Kim, Yun Hwan; Kim, Jung Hyuk; Chung, Kyoo Byung; Sung, Deuk Jae; Lee, Sang-Heon; Derby, Richard

    2009-01-01

    To correlate magnetic resonance (MR) image findings with pain response by provocation discography in patients with discogenic low back pain, with an emphasis on the combination analysis of a high intensity zone (HIZ) and disc contour abnormalities. Sixty-two patients (aged 17-68 years) with axial low back pain that was likely to be disc related underwent lumbar discography (178 discs tested). The MR images were evaluated for disc degeneration, disc contour abnormalities, HIZ, and endplate abnormalities. Based on the combination of an HIZ and disc contour abnormalities, four classes were determined: (1) normal or bulging disc without HIZ; (2) normal or bulging disc with HIZ; (3) disc protrusion without HIZ; (4) disc protrusion with HIZ. These MR image findings and a new combined MR classification were analyzed in the base of concordant pain determined by discography. Disc protrusion with HIZ [sensitivity 45.5%; specificity 97.8%; positive predictive value (PPV), 87.0%] correlated significantly with concordant pain provocation (P < 0.01). A normal or bulging disc with HIZ was not associated with reproduction of pain. Disc degeneration (sensitivity 95.4%; specificity 38.8%; PPV 33.9%), disc protrusion (sensitivity 68.2%; specificity 80.6%; PPV 53.6%), and HIZ (sensitivity 56.8%; specificity 83.6%; PPV 53.2%) were not helpful in the identification of a disc with concordant pain. The proposed MR classification is useful to predict a disc with concordant pain. Disc protrusion with HIZ on MR imaging predicted positive discography in patients with discogenic low back pain. (orig.)

  14. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  15. Australian Correctional Management Practices for Terrorist Prisoners

    Directory of Open Access Journals (Sweden)

    Nathan Tompson

    2018-03-01

    Full Text Available Management practices for incarcerated terrorists is an important counterterrorism policy consideration. Moreover, there is a misconception that once incarcerated, terrorists cease to be a risk. If correctional management regimes are implemented poorly, terrorist prisoners may be afforded the opportunity to remain active while incarcerated, including the recruitment of other prisoners, and the planning of future attacks. Equally, they may be viewed as role models or martyrs for sympathisers to aspire to. Despite the magnitude of the consequences, there is no agreed approach to managing Australian terrorist prisoners. As such, a dichotomy of dominant models has emerged; that is, to either segregate terrorist prisoners, or conversely, to disperse them throughout the wider prisoner population. Each strategy presents its own set of benefits and risks. This paper compares the management practices for terrorist prisoners in the states of New South Wales and Victoria to determine the strengths and vulnerabilities of each of these approaches. The paper concludes that policy-makers should consider reassessing current strategies. It suggests that a focus that extends the immediate containment considerations to encompass post-release factors would bring benefits for society.

  16. PROSECUTING SOMALIA PIRATES AS TERRORISTS

    Directory of Open Access Journals (Sweden)

    ODHIAMBO E.O.S., ONKWARE K., KASSILLY J., NTABO O. M.

    2011-01-01

    Full Text Available This article starts from the assumption that piracy resembles terrorism in many aspects and attempts to support it through both a theoretical investigation and practical examples. The argument it makes is that Somali pirates should be prosecuted as terrorists. Moreover, it emphasizes the idea that for Somalia’s neighboring countries and not only the implementation of such an approach consists in resorting to the antiterrorist conventions already in place. Thus, for example, Kenya Navy as a piracyfi ghting agency should rely on these conventions to justify the capture and prosecution of pirates in Kenyan courts. In this respect, we emphasize the idea that only by resorting to an established international legal framework can Kenya identify the tools to counter pirates’ actions within legal limits. Moreover, this should be paralleled by efforts towards rebuilding Somalia and its institutions if long-term solutions are to be envisaged in the eradication of piracy in the Indian Ocean. In conclusion, the article looks at the concepts of piracy, terrorism and development in the Horn of Africa, suggests that piracy is a form of Terrorism and, makes a series of recommendations.

  17. The Terrorist and the Media: Partners in Crime or Rituals and Harmless Observers?

    Science.gov (United States)

    Dowling, Ralph E.

    This paper explores the idea that the media "cause" or strongly motivate acts of terrorism. In an effort to refute this view the paper applies Kenneth Burke's dramatistic theory of communication to show that the motives and behavior of political terrorists can be explained without reference to the media coverage terrorism produces. The…

  18. Provocative Pedagogies in e-Learning: Making the Invisible Visible

    Science.gov (United States)

    Sinclair, Anne

    2009-01-01

    The purpose of this case study was to explore the experiences of participants (practicing teachers) involved in an online course entitled: "Reflective Practice for Teachers." Using a provocative pedagogy in the course, the teachers were challenged to confront beliefs and assumptions about teaching and learning and become active participants in the…

  19. Exogenous Testosterone Enhances the Reactivity to Social Provocation in Males

    Directory of Open Access Journals (Sweden)

    Lisa Wagels

    2018-03-01

    Full Text Available Testosterone affects human social behavior in various ways. While testosterone effects are generally associated with muscular strength and aggressiveness, human studies also point towards enhanced status–seeking motives after testosterone administration. The current study tested the causal influence of exogenous testosterone on male behavior during a competitive provocation paradigm. In this double blind, randomized, placebo (PL-controlled study, 103 males were assigned to a PL or testosterone group receiving a colorless PL or testosterone gel. To induce provocation, males played a rigged reaction time game against an ostensible opponent. When participants lost, the opponent subtracted money from the participant who in return could subtract money from the ostensible opponent. Participants subjectively indicated anger and self-estimated treatment affiliation (testosterone or PL administration. A trial-by-trial analysis demonstrated that provocation and success during the repeated games had a stronger influence on participants’ choice to reduce money from the opponent if they had received testosterone. Participants who believed to be in the testosterone group were angrier after the experiment and increased monetary reductions during the task course. In line with theories about mechanisms of testosterone in humans, provocation is shown to be necessary for the agency of exogenous testosterone. Thus, testosterone reinforces the conditional adjustment of aggressive behavior but not aggressive behavior per se. In contrast undirected frustration is not increased by testosterone but probably interferes with cognitive appraisals about biological mechanisms of testosterone.

  20. Exogenous Testosterone Enhances the Reactivity to Social Provocation in Males.

    Science.gov (United States)

    Wagels, Lisa; Votinov, Mikhail; Kellermann, Thilo; Eisert, Albrecht; Beyer, Cordian; Habel, Ute

    2018-01-01

    Testosterone affects human social behavior in various ways. While testosterone effects are generally associated with muscular strength and aggressiveness, human studies also point towards enhanced status-seeking motives after testosterone administration. The current study tested the causal influence of exogenous testosterone on male behavior during a competitive provocation paradigm. In this double blind, randomized, placebo (PL)-controlled study, 103 males were assigned to a PL or testosterone group receiving a colorless PL or testosterone gel. To induce provocation, males played a rigged reaction time game against an ostensible opponent. When participants lost, the opponent subtracted money from the participant who in return could subtract money from the ostensible opponent. Participants subjectively indicated anger and self-estimated treatment affiliation (testosterone or PL administration). A trial-by-trial analysis demonstrated that provocation and success during the repeated games had a stronger influence on participants' choice to reduce money from the opponent if they had received testosterone. Participants who believed to be in the testosterone group were angrier after the experiment and increased monetary reductions during the task course. In line with theories about mechanisms of testosterone in humans, provocation is shown to be necessary for the agency of exogenous testosterone. Thus, testosterone reinforces the conditional adjustment of aggressive behavior but not aggressive behavior per se . In contrast undirected frustration is not increased by testosterone but probably interferes with cognitive appraisals about biological mechanisms of testosterone.

  1. Specificity and sensitivity assessment of selected nasal provocation testing techniques

    Directory of Open Access Journals (Sweden)

    Edyta Krzych-Fałta

    2016-12-01

    Full Text Available Introduction: Nasal provocation testing involves an allergen-specific local reaction of the nasal mucosa to the administered allergen. Aim: To determine the most objective nasal occlusion assessment technique that could be used in nasal provocation testing. Material and methods : A total of 60 subjects, including 30 patients diagnosed with allergy to common environmental allergens and 30 healthy subjects were enrolled into the study. The method used in the study was a nasal provocation test with an allergen, with a standard dose of a control solution and an allergen (5,000 SBU/ml administered using a calibrated atomizer into both nostrils at room temperature. Early-phase nasal mucosa response in the early phase of the allergic reaction was assessed via acoustic rhinometry, optical rhinometry, nitric oxide in nasal air, and tryptase levels in the nasal lavage fluid. Results : In estimating the homogeneity of the average values, the Levene’s test was used and receiver operating characteristic curves were plotted for all the methods used for assessing the nasal provocation test with an allergen. Statistically significant results were defined for p < 0.05. Of all the objective assessment techniques, the most sensitive and characteristic ones were the optical rhinometry techniques (specificity = 1, sensitivity = 1, AUC = 1, PPV = 1, NPV = 1. Conclusions : The techniques used showed significant differences between the group of patients with allergic rhinitis and the control group. Of all the objective assessment techniques, those most sensitive and characteristic were the optical rhinometry.

  2. Provocative design for unprovocative designers : Strategies for triggering personal dilemmas

    NARCIS (Netherlands)

    Ozkaramanli, D.; Desmet, P.M.A.; Lloyd, Peter; Bohemia, Erik

    2016-01-01

    Traditional design approaches stimulate the creation of products that make daily interactions more efficient, comfortable, and pleasant. In contrast, provocative design approaches, such as critical design, have a different focus: they aim to challenge the status quo through products that expose

  3. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  4. Intelligence Constraints on Terrorist Network Plots

    Science.gov (United States)

    Woo, Gordon

    Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.

  5. Terrorist Financing: The 9/11 Commission Recommendation

    National Research Council Canada - National Science Library

    Weiss, Martin A

    2005-01-01

    .... The Commission recommended that the U.S. government shift the focus of its efforts to counter terrorist financing from a strategy based on seizing terrorist assets to a strategy based on exploiting intelligence gathered from financial investigations...

  6. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ...) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially designated terrorist. (a) The term specially designated terrorist means: (1...

  7. Immigration: Terrorist Grounds for Exclusion and Removal Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2008-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  8. Immigration: Terrorist Grounds for Exclusion and Removal of Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2007-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  9. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS General Definitions § 597.309 Foreign terrorist organization. The term foreign terrorist... respect to which the Secretary of State has notified Congress of the intention to designate as a foreign...

  10. Assaultive behavior. Does provocation begin in the front office?

    Science.gov (United States)

    Blair, D T

    1991-05-01

    1. Provocation is an important risk predictor because these issues can be recognized, assessed, and appropriate interventions can be implemented to reduce the associated risks. It is only by the reduction of such "non-fixed" risk factors that any reduction of assaults can be accomplished. 2. Involuntary admission, patients with dementia or organic brain disorder, physical or verbal limits, staff attitude, denial of the possibility of assaults, and the educational level and clinical experience of the staff may help provoke an assaultive episode. 3. An important step is assessing the assault to identify provocation due to certain medical causes, and to document the extent of degeneration in patients with dementia or organic brain disorder. Medical intervention would be indicated and would appropriately address the causes of some violent episodes.

  11. Real Time Big Data Analytics for Predicting Terrorist Incidents

    Science.gov (United States)

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  12. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...

  13. Combatting Commercial Terrorists: The PKK Case

    Science.gov (United States)

    2015-12-01

    Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist

  14. Maternal risk factors in fetal alcohol syndrome: provocative and permissive influences.

    Science.gov (United States)

    Abel, E L; Hannigan, J H

    1995-01-01

    We present an hypothesis integrating epidemiological, clinical case, and basic biomedical research to explain why only relatively few women who drink alcohol during pregnancy give birth to children with alcohol-related birth defects (ARBDs), in particular, Fetal Alcohol Syndrome (FAS). We argue that specific sociobehavioral risk factors, e.g., low socioeconomic status, are permissive for FAS in that they provide the context for increased vulnerability. We illustrate how these permissive factors are related to biological factors, e.g., decreased antioxidant status, which in conjunction with alcohol, provoke FAS/ARBDs in vulnerable fetuses. We propose an integrative heuristic model hypothesizing that these permissive and provocative factors increase the likelihood of FAS/ARBDs because they potentiate two related mechanisms of alcohol-induced teratogenesis, specifically, maternal/fetal hypoxia and free radical formation.

  15. The Importance of Prolonged Provocation in Drug Allergy - Results From a Danish Allergy Clinic.

    Science.gov (United States)

    Fransson, Sara; Mosbech, Holger; Kappel, Mogens; Hjortlund, Janni; Poulsen, Lars K; Kvisselgaard, Ask D; Garvey, Lene H

    Drug provocation is the "Gold Standard" in drug allergy investigation. Recent studies suggest that a negative drug provocation on first dose should be followed by a prolonged provocation over several days. To evaluate drug allergy investigations on the basis of drug provocation, including prolonged provocation. Data from adult patients investigated for drug allergy in a Danish Allergy Clinic during the period 2010 to 2014 were entered into a database. Data included clinical details and results of provocations with suspected culprit drug (for penicillins performed only in specific IgE-negative patients). If provocation was negative on first dose, treatment was continued for 3 to 10 days. A total of 1,913 provocations were done in 1,659 patients, median age 46 years, of whom 1,237 (74.6%) were females. Drugs investigated were antibiotics, 1,776 (92.8%), of which 1,590 (89.5%) were penicillins; analgesics, 59 (3.1%); local anesthetics, 33 (1.7%); and other drugs, 45 (2.4%). In total, 211 of 1,913 (11.0%) provocations were positive. Causes were antibiotics, 198 (93.8%), of which 167 (84.3%) were penicillins; analgesics, 7 (3.3%); local anesthetics, 0; and other drugs, 6 (2.8%). Only 43 (20.4%) provocations were positive on first dose, whereas 95 (45.0%) turned positive more than 3 days later. Only 11.0% of the provocations were positive. Importantly, only 1 of 5 patients tested positive on the first dose, indicating that prolonged exposure should always be considered when drug provocation is included in allergy investigations. Most provocations were with penicillins, reflecting the pattern of antibiotic use in Denmark, which differs from that in other countries, especially outside Northern Europe. Copyright © 2017 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  16. Empathy Inhibits Aggression in Competition: The Role of Provocation, Emotion, and Gender.

    Science.gov (United States)

    Stanger, Nicholas; Kavussanu, Maria; McIntyre, David; Ring, Christopher

    2016-02-01

    Although the empathy-aggression relationship has been well documented, research has yet to establish whether emotions mediate and gender moderates this relationship in athletes, under conditions of low and high provocation. In this experiment, we assigned team-sport athletes to either a high (n = 40) or a low (n = 40) empathy group, and asked them to compete in a reaction-time task against a (fictitious) opponent, under conditions of low and high provocation. Empathy reduced aggression (i.e., intensity of electrical shock administered to the opponent) at low provocation in men, and at both low and high provocation in women. Guilt mediated the effect of empathy on aggression at low provocation in men; anger did not mediate any effects of empathy on aggression. Our findings indicate that the inhibitory effect of empathy on aggression and the mediating role of guilt are moderated by provocation and gender.

  17. Fixed drug eruption: topical provocation and subsequent phenomena

    Energy Technology Data Exchange (ETDEWEB)

    Mahboob, A; Haroon, T S [Shaikh Zayed FPGMI, Lahore (Pakistan). Dept. of Dermatology; Haroon, T S [King Edward Medical Univ., Lahore (Pakistan). Dept. of Dematology; Iqbal, Z; Iqbal, F [Shaikh Zayed FPGMI, Lahore (Pakistan). Dept. of Medicine

    2006-12-15

    To determine the usefulness of topical provocation in detecting the incriminated drug causing fixed eruption. Three hundred and five, clinically diagnosed cases of Fixed Drug Eruption (FDE) of either gender and of any age were subjected to topical provocation with different drugs by using concentration of 1% (n=203), 2% (n=210) and 5% (n=235) in white soft paraffin. Drug ointment of one strength was applied one at a time on normal skin of flexor surface of right or left forearm. The effects of tests on involved and uninvolved skin were observed for 48 hours. The changes in lesions like erythema, hyperpigmentation, itching, burning or appearance of new lesion were considered a positive response. In case of no change, the patients (n=5) were subjected to oral provocation test, by giving half to full therapeutic dose of the suspected drug depending upon the severity of the initial attack. A patient who exhibited see-sawing phenomenon with 5% metamizole TPT was given oral challenge with same drug. Control topical tests were repeated in equal number of normal persons with various drug ointments and in patients of FDE with white soft paraffin on normal and affected skin. One hundred and thirty-seven patients were males and one hundred and sixty-eight patients were females. Maximum number of patients belonged to third decade. With 1% drug preparations 12 out of 316, with 2% drug preparations 28 out of 422 and with 5% drug preparations, 312 out of 523 TPTs were positive. The comparison revealed a highly significant association (Chi-square 448.1 and p<0.000) among various strengths of preparations and positive response. Sulphamethoxazole was found to be the most commonly incriminated cause of FDE applied in 5% concentration yielded sensitivity rate of 91% compared to 4% with lower concentrations. Positive patch test was also observed with oxytetracycline. Five patients who were given oral provocation with different drugs were found to be positive to tinidazole, dapsone

  18. Fixed drug eruption: topical provocation and subsequent phenomena

    International Nuclear Information System (INIS)

    Mahboob, A.; Haroon, T.S.; Haroon, T.S.; Iqbal, Z.; Iqbal, F.

    2006-01-01

    To determine the usefulness of topical provocation in detecting the incriminated drug causing fixed eruption. Three hundred and five, clinically diagnosed cases of Fixed Drug Eruption (FDE) of either gender and of any age were subjected to topical provocation with different drugs by using concentration of 1% (n=203), 2% (n=210) and 5% (n=235) in white soft paraffin. Drug ointment of one strength was applied one at a time on normal skin of flexor surface of right or left forearm. The effects of tests on involved and uninvolved skin were observed for 48 hours. The changes in lesions like erythema, hyperpigmentation, itching, burning or appearance of new lesion were considered a positive response. In case of no change, the patients (n=5) were subjected to oral provocation test, by giving half to full therapeutic dose of the suspected drug depending upon the severity of the initial attack. A patient who exhibited see-sawing phenomenon with 5% metamizole TPT was given oral challenge with same drug. Control topical tests were repeated in equal number of normal persons with various drug ointments and in patients of FDE with white soft paraffin on normal and affected skin. One hundred and thirty-seven patients were males and one hundred and sixty-eight patients were females. Maximum number of patients belonged to third decade. With 1% drug preparations 12 out of 316, with 2% drug preparations 28 out of 422 and with 5% drug preparations, 312 out of 523 TPTs were positive. The comparison revealed a highly significant association (Chi-square 448.1 and p<0.000) among various strengths of preparations and positive response. Sulphamethoxazole was found to be the most commonly incriminated cause of FDE applied in 5% concentration yielded sensitivity rate of 91% compared to 4% with lower concentrations. Positive patch test was also observed with oxytetracycline. Five patients who were given oral provocation with different drugs were found to be positive to tinidazole, dapsone

  19. Provocative questions in cancer epidemiology in a time of scientific innovation and budgetary constraints.

    Science.gov (United States)

    Lam, Tram Kim; Schully, Sheri D; Rogers, Scott D; Benkeser, Rachel; Reid, Britt; Khoury, Muin J

    2013-04-01

    In a time of scientific and technological developments and budgetary constraints, the National Cancer Institute's (NCI) Provocative Questions Project offers a novel funding mechanism for cancer epidemiologists. We reviewed the purposes underlying the Provocative Questions Project, present information on the contributions of epidemiologic research to the current Provocative Questions portfolio, and outline opportunities that the cancer epidemiology community might capitalize on to advance a research agenda that spans a translational continuum from scientific discoveries to population health impact.

  20. 9/11, Act II : A Fine-Grained Analysis of Regional Variations in Traffic Fatalities in the Aftermath of the Terrorist Attacks

    OpenAIRE

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-01-01

    Terrorists can strike twice - first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variatio...

  1. When Do Governments Concede to Terrorists

    Science.gov (United States)

    2014-06-01

    crisis, 146 people were taken hostage by the terrorist group Tupac Amaru (MRTA) at the Japanese Embassy in Peru . Six of those were American...hispanic_heritage/article-9475994 FARC-EP. (2009). Chronology of resistance: FARC-EP, a history of struggle. Retrieved from http://resistencia- colombia.org...index.php?option=com_content&view=article&id=463: chronology - of-resistance-farc-ep-a-history-of-struggle&catid=50&Itemid=85 Gladwell, M. (2000). The

  2. Complexity explained

    CERN Document Server

    Erdi, Peter

    2008-01-01

    This book explains why complex systems research is important in understanding the structure, function and dynamics of complex natural and social phenomena. Readers will learn the basic concepts and methods of complex system research.

  3. Will it ever be possible to profile the terrorist?

    OpenAIRE

    Rae, Jonathan A.

    2012-01-01

    This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise th...

  4. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  5. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  6. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    .... Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to develop new computer skills, or develop alliances with criminal...

  7. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  8. Effect of the nasal cycle on congestive response during bilateral nasal allergen provocation

    Directory of Open Access Journals (Sweden)

    Tomasz Gotlib

    2014-06-01

    Full Text Available Background. Bilateral nasal allergen provocation usually produces more pronounced obstruction of one nasal passage. It was found that this could be related to the stage of the nasal cycle before the provocation. objective. To discover whether the stage of the nasal cycle is decisive for asymmetry in congestive response observed during bilateral allergen nasal provocation. methods. Two bilateral nasal allergen provocations were performed in a group of 26 pollen-sensitive volunteers. Acoustic rhinometry measurements were taken during the nasal cycle, and then after the provocation. A cross-sectional area at the level of the inferior turbinate (CSA-2 was measured. Consecutive challenges were performed in the opposite phase of the nasal cycle: the side which had been wide just before the first challenge, was narrow before the second provocation. results. Asymmetry in CSA-2 reduction between the nasal passages was observed in most cases. Significant difference was observed between mean CSA-2 reduction rate (reactivity of the side that responded with greater congestion, and the opposite side. No significant difference was found in mean CSA-2 reduction rate between the side which was narrow, and the side which was wide before provocation. conclusions. Asymmetry of congestive response during bilateral nasal allergen provocation is not dependent on the stage of the nasal cycle preceding the challenge.

  9. Provocative Containment and the Drift of Social-Scientific Realism

    DEFF Research Database (Denmark)

    Lezaun, Javier; Muniesa, Fabian; Vikkelsø, Signe

    2013-01-01

    The post-World War II period gave rise to a large number of social-scientific techniques for investigating and intervening in social reality. A particular group of these, exemplified here by the experiments of Moreno, Lewin, Bion, Milgram and Zimbardo, worked by establishing suggestive micro......-realities in which participants were exposed to, or experimented with, selected ‘social problems’. We investigate the nature of these techniques – being simultaneously highly artificial and disturbingly realistic – and propose the notion of ‘provocative containment’ to understand their operation and effects. We...... point to five ingredients of their characteristic mode of operation – expressionism, incitement, trauma, distillation and technology – and argue that they do not serve to represent a simplified version of social reality, but rather to ‘realize’ particular forms of social life intrinsic to the medium...

  10. Personality and Fear of Terrorist attacks in Ghana: The mediating ...

    African Journals Online (AJOL)

    The study aimed at determining whether or not neuroticism would account for more variance in predicting risk perception and fear of terrorist attack in Ghana compared to conscientiousness. Moreover, it sought to examine the mediating effect of risk perception on the relationship between neuroticism and fear of terrorist ...

  11. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    Science.gov (United States)

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  12. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  13. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a

  14. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  15. SPSS explained

    CERN Document Server

    Hinton, Perry R; Brownlow, Charlotte

    2014-01-01

    SPSS Explained provides the student with all that they need to undertake statistical analysis using SPSS. It combines a step-by-step approach to each procedure with easy to follow screenshots at each stage of the process. A number of other helpful features are provided: regular advice boxes with tips specific to each test explanations divided into 'essential' and 'advanced' sections to suit readers at different levels frequently asked questions at the end of each chapter. The first edition of this popular book has been fully updated for IBM SPSS version 21 and also includes: chapters that expl

  16. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  17. Astronomy Explained

    Science.gov (United States)

    North, Gerald

    Every year large numbers of people take up the study of astronomy, mostly at amateur level. There are plenty of elementary books on the market, full of colourful photographs, but lacking in proper explanations of how and why things are as they are. Many people eventually wish to go beyond the 'coffee-table book' stage and study this fascinating subject in greater depth. This book is written for them. In addition, many people sit for public examinations in this subject each year and this book is also intended to be of use to them. All the topics from the GCSE syllabus are covered here, with sample questions at the end of each chapter. Astronomy Explained provides a comprehensive treatment of the subject in more depth than is usually found in elementary works, and will be of interest to both amateur astronomers and students of astronomy.

  18. Categorizing terrorist entities listed by the European Union according to terrorist groups’ underlying motives

    Directory of Open Access Journals (Sweden)

    Liane Rothenberger

    2015-10-01

    Full Text Available States and international organizations have compiled lists of a great variety of terrorist groups. The current European Union list includes 44 entities. This study analyzes the underlying motives of the terrorist organizations named in this list. In order to understand the groups’ motivations and consequently be able to advise on methods of countering them with communication strategies, we employ a three-item typology provided by Waldmann (2001. The results show that only five of the 44 groups were religiously motivated to commit terrorism. Most of the groups (n=20 had nationalist-separatist motives, and 19 groups displayed social-revolutionary motives. Based on the respective motives, differing counter-terrorism strategies are proposed, e.g., developing rhetorical counter-narratives that address and reduce the groups’ motivational and identity-generating characteristics.

  19. Political terrorism and affective polarization in "black" and "red" terrorists in Italy during the years 1968-1988.

    Science.gov (United States)

    Pacini, Matteo; Maremmani, Icro

    2018-04-01

    Psychiatric evaluations of violent political crime were mostly performed on a case-by-case basis in a forensic environment, which made them unduly dependent on categories of presumed dangerousness and legal responsibility, rather than on a clinical definition of their mental status. In referring to such "clinical" definitions, the disorder we have in mind is not limited to the major, agitated psychotic manias or mixed states. The presence of a dominant temperament, or protracted hypomania, is enough by itself to explain an individual's engagement in a wide range of activities, not necessarily sociopathic or violent. We put forward the hypothesis that formal and transpolitical radical choices, either in favor of an illegal lifestyle or of activities involving a high level of risk, may be linked with certain mental states, especially when considering small clandestine groups showing a high level of internal ideological consensus, and a no-return attitude toward a commitment to radical choices. Available data about the psycho(patho)logical profile of terrorists are still hard to come by. The only available studies are those on identified living terrorists (judging by the trials of those who personally admitted to having been terrorists), and statistical data imply a number of documented cases belonging to the same terrorist organization. In Italy, the period often called the "years of lead [bullets]" displays an interesting viewpoint for the study of terrorist psychology, for two main reasons: first of all, it is a historically defined period (1968-1988), and second, the number of ascertained participants in terrorist activities was quite large.

  20. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  1. Terrorists on Trial: A Performative Perspective

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-03-01

    Full Text Available On 30 March 2011, ICCT organised an Expert Meeting entitled “Terrorism Trials as Theatre: A Performative Perspective”. The Expert Meeting applied a performative perspective to three well known and recent trials in different parts of the world: the trials against the Dutch Hofstad Group, the Mumbai 2008 Terrorist Attack Trial and the Guantanamo Military Tribunals. As such, the Expert Meeting did not concentrate solely on the immediate judicial performance of the magistrates and/or the defence; instead, the trials were put in their wider sociological context, adopting notions of social drama and communication sciences. This Expert Meeting Paper is a further adaptation of the Discussion Paper that was used as basis for debate during the Meeting.

  2. Conceptualizing Terrorist Violence and Suicide Bombing

    Directory of Open Access Journals (Sweden)

    Murad Ismayilov

    2010-01-01

    Full Text Available This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts to address the question of whether suicide terrorism represents a "coherent phenomenon," and whether there is, or may be, a generalized pattern which could account for all possible causes of martyrdom operations.

  3. Near-space airships against terrorist activities

    Science.gov (United States)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  4. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  5. Psychobiological characteristics of dissociative identity disorder: a symptom provocation study.

    Science.gov (United States)

    Reinders, A A T Simone; Nijenhuis, Ellert R S; Quak, Jacqueline; Korf, Jakob; Haaksma, Jaap; Paans, Anne M J; Willemsen, Antoon T M; den Boer, Johan A

    2006-10-01

    Dissociative identity disorder (DID) patients function as two or more identities or dissociative identity states (DIS), categorized as 'neutral identity states' (NIS) and 'traumatic identity states' (TIS). NIS inhibit access to traumatic memories thereby enabling daily life functioning. TIS have access and responses to these memories. We tested whether these DIS show different psychobiological reactions to trauma-related memory. A symptom provocation paradigm with 11 DID patients was used in a two-by-two factorial design setting. Both NIS and TIS were exposed to a neutral and a trauma-related memory script. Three psychobiological parameters were tested: subjective ratings (emotional and sensori-motor), cardiovascular responses (heart rate, blood pressure, heart rate variability) and regional cerebral blood flow as determined with H(2)(15)O positron emission tomography. Psychobiological differences were found for the different DIS. Subjective and cardiovascular reactions revealed significant main and interactions effects. Regional cerebral blood flow data revealed different neural networks to be associated with different processing of the neutral and trauma-related memory script by NIS and TIS. Patients with DID encompass at least two different DIS. These identities involve different subjective reactions, cardiovascular responses and cerebral activation patterns to a trauma-related memory script.

  6. Assessment of bronchial provocation by sup(81m)Kr ventilation image in asthmatic children

    International Nuclear Information System (INIS)

    Sugimoto, Kazuo; Toba, Tsuyoshi; Uchiyama, Guio; Arimizu, Noboru.

    1982-01-01

    Allergen- or mediator-induced bronchospasm was studied by sup(81m)Kr ventilation image to determine it's sensitivity and safety as an assessment method. Twelve children with house dust sensitive asthma were subjected to inhalation of house dust, prostaglandin F sub(2α), or methacholine by ultrasonic nebulizer with sup(81m)Kr gas. During the examination dynamic ventilation images of both lungs were monitored on oscilloscope to see the changes in the ventilation images. This kind of provocation test has the following advantages compared to the conventional provocation tests. 1) There is no induction of severe attack by provocation when inhalation of antigen of mediator is stopped at the initiation of change on the ventilation image. 2) There is no overload to the patient as compared to the conventional provocation tests. 3) Analysis of the ventilation images stored in the computer can reveal the area of ventilation disturbance in the lung and the changes can be expressed quantitatively. (author)

  7. Association between composites of selected motion palpation and pain provocation tests for sacroiliac joint disorders.

    Science.gov (United States)

    Soleimanifar, Manijeh; Karimi, Noureddin; Arab, Amir Massoud

    2017-04-01

    The sacroiliac joint (SIJ) has been implicated as a potential source of low back and buttock pain. Several types of motion palpation and pain provocation tests are used to evaluate SIJ dysfunction. The purpose of this study was to investigate the relationship between motion palpation and pain provocation tests in assessment of SIJ problems. This study is Descriptive Correlation. 50 patients between the ages of 20 and 65 participated. Four motion palpation tests (Sitting flexion, Standing flexion, Prone knee flexion, Gillet test) and three pain provocation tests (FABER, Posterior shear, Resisted abduction test) were examined. Chi-square analysis was used to assess the relationship between results of the individuals and composites of these two groups of tests. No significant relationship was found between these two groups of tests. It seems that motion palpation tests assess SIJ dysfunction and provocative tests assessed SIJ pain which do not appear to be related. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. WAP explained

    International Nuclear Information System (INIS)

    Kaiser, M.J.; Pulsipher, A.G.

    2004-01-01

    The Weatherization Assistance Program (WAP) is a federal block grant program administered by all 50 states and the District of Columbia through community action agencies, state energy offices, local government, and other nonprofit organizations to provide weatherization services to eligible households. The WAP was established in 1976 to increase the energy efficiency, reduce the energy expenditures, and improve the health and safety of low-income households, especially those households that are particularly vulnerable such as families with children, persons with disabilities, and the elderly. The manner in which WAP funds have been allocated to states, however, has been a contentious issue since the inception of the program. Southern states have argued that too much of the federal funding goes to cold-climate and rural states. Northern states disagree. In 1990, Congress amended the Energy Conservation and Production Act and required the Department of Energy to develop a new funding formula. The Department of Energy currently uses a three-factor formula developed in 1995 in conjunction with a two-factor formula developed in 1977 and a hold-harmless provision to allocate WAP funding. The purpose of this paper is to explain the WAP allocation mechanism and the assumptions associated with the 1977 and the 1995 funding formula. The factors that compose each funding formula are critically assessed and various implementation issues are reviewed, including the selection of the trigger point and program capacity levels. It is not possible to define the need for weatherization assistance objectively and in a unique manner, and this ambiguity is the main reason why the WAP allocation mechanism is expected to remain a lively topic of debate and contention

  9. Bancroftian filariasis: long-term effect of the DEC provocative day test on microfilaraemia

    DEFF Research Database (Denmark)

    Simonsen, Poul Erik; Meyrowitsch, Dan Wolf; Makunde, W.H.

    1997-01-01

    The diethylcarbamazine (DEC) provocative day test has been widely used for daytime diagnosis of Wuchereria bancrofti infections in areas where microfilariae exhibit nocturnal periodicity. Since DEC is also the primary drug for treatment of bancroftian filariasis, we examined the long term effect...... amicrofilaraemic. No significant reduction of microfilaraemia was observed in the placebo group. The results imply that the DEC provocative day test should not be used as a diagnostic tool in follow-up studies on microfilaraemias....

  10. 9/11, Act II: a fine-grained analysis of regional variations in traffic fatalities in the aftermath of the terrorist attacks.

    Science.gov (United States)

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-12-01

    Terrorists can strike twice--first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variations in increased driving. Two factors, in turn, explained these variations in increased driving. The weaker factor was proximity to New York City, where stress reactions to the attacks were previously shown to be greatest. The stronger factor was driving opportunity, which was operationalized both as number of highway miles and as number of car registrations per inhabitant. Thus, terrorists' second strike exploited both fear of dread risks and, paradoxically, an environmental structure conducive to generating increased driving, which ultimately increased fatalities.

  11. Survival of the Fittest: Why Terrorist Groups Endure

    Directory of Open Access Journals (Sweden)

    Joseph K. Young

    2014-04-01

    Full Text Available Why do terrorist groups endure? This question is relevant to scholars and policy makers alike. In the past, this issue was not been addressed in a systematic fashion. Recent work investigates this question using data on transnational groups and finds that factors associated with the home country can influence the duration the group endures. Applying the theory of outbidding to terrorist group survival, we argue that strategic competition among groups predicts group duration. Using the Global Terrorism Database, we develop a dataset using the terrorist group as the unit of analysis to model the duration of group activity and thus include the largest sample of groups yet. Controlling for previous explanations of both group duration and terrorism, we find a robust effect for the impact that group competition has on terrorist group survival.

  12. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  13. Suits Against Terrorist States by Victims of Terrorism

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2008-01-01

    ... assets to satisfy judgments. After a court ruled that Congress never created a cause of action against terrorist States themselves, but only against their officials, employees, and agents, plaintiffs have based claims on state law...

  14. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    ... organizations and consider attempting a cyberattack against the critical infrastructure. Cybercrime increased dramatically between 2004 and 2005, and several recent terrorist events appear to have been funded partially through online credit card fraud...

  15. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group...

  16. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group...

  17. The Development of Decision Aids for Counter-Terrorist Applications

    Science.gov (United States)

    1980-12-01

    I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8

  18. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  19. Closing the gap : measuring the social identity of terrorists

    OpenAIRE

    Ludwick, Keith W.

    2008-01-01

    CHDS State/Local Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to...

  20. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  1. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  2. Provocation of symmetry/ordering symptoms in Anorexia nervosa: a functional neuroimaging study.

    Science.gov (United States)

    Suda, Masashi; Brooks, Samantha J; Giampietro, Vincent; Uher, Rudolf; Mataix-Cols, David; Brammer, Michael J; Williams, Steven C R; Treasure, Janet; Campbell, Iain C

    2014-01-01

    Anorexia nervosa (AN), obsessive-compulsive disorder (OCD), and obsessive-compulsive personality disorder (OCPD) are often co-morbid; however, the aetiology of such co-morbidity has not been well investigated. This study examined brain activation in women with AN and in healthy control (HC) women during the provocation of symmetry/ordering-related anxiety. During provocation, patients with AN showed more anxiety compared to HCs, which was correlated with the severity of symmetry/ordering symptoms. Activation in the right parietal lobe and right prefrontal cortex (rPFC) in response to provocation was reduced in the AN group compared with the HC group. The reduced right parietal activation observed in the AN group is consistent with parietal lobe involvement in visuospatial cognition and with studies of OCD reporting an association between structural abnormalities in this region and the severity of 'ordering' symptoms. Reduced rPFC activation in response to symmetry/ordering provocation has similarities with some, but not all, data collected from patients with AN who were exposed to images of food and bodies. Furthermore, the combination of data from the AN and HC groups showed that rPFC activation during symptom provocation was inversely correlated with the severity of symmetry/ordering symptoms. These data suggest that individuals with AN have a diminished ability to cognitively deal with illness-associated symptoms of provocation. Furthermore, our data also suggest that symptom provocation can progressively overload attempts by the rPFC to exert cognitive control. These findings are discussed in the context of the current neurobiological models of AN.

  3. Provocation of symmetry/ordering symptoms in Anorexia nervosa: a functional neuroimaging study.

    Directory of Open Access Journals (Sweden)

    Masashi Suda

    Full Text Available Anorexia nervosa (AN, obsessive-compulsive disorder (OCD, and obsessive-compulsive personality disorder (OCPD are often co-morbid; however, the aetiology of such co-morbidity has not been well investigated. This study examined brain activation in women with AN and in healthy control (HC women during the provocation of symmetry/ordering-related anxiety. During provocation, patients with AN showed more anxiety compared to HCs, which was correlated with the severity of symmetry/ordering symptoms. Activation in the right parietal lobe and right prefrontal cortex (rPFC in response to provocation was reduced in the AN group compared with the HC group. The reduced right parietal activation observed in the AN group is consistent with parietal lobe involvement in visuospatial cognition and with studies of OCD reporting an association between structural abnormalities in this region and the severity of 'ordering' symptoms. Reduced rPFC activation in response to symmetry/ordering provocation has similarities with some, but not all, data collected from patients with AN who were exposed to images of food and bodies. Furthermore, the combination of data from the AN and HC groups showed that rPFC activation during symptom provocation was inversely correlated with the severity of symmetry/ordering symptoms. These data suggest that individuals with AN have a diminished ability to cognitively deal with illness-associated symptoms of provocation. Furthermore, our data also suggest that symptom provocation can progressively overload attempts by the rPFC to exert cognitive control. These findings are discussed in the context of the current neurobiological models of AN.

  4. Grasping the climate crisis. A Provocation from the Taellberg Foundation

    Energy Technology Data Exchange (ETDEWEB)

    Ekman, Bo (Taellberg Foundation, Stockholm (SE)); Rockstroem, Johan (Stockholm Environment Inst., Stockholm (SE)); Wijkman, Anders (European Parliament, Brussels (BE)) (and others)

    2008-12-15

    The main purpose of this publication is to challenge the widespread perception that nations are dealing effectively with climate change when, in fact, almost nothing is happening yet at the global scale. As we all know, the depressing truth is that since the signing of the Kyoto Protocol, carbon dioxide emissions have in fact accelerated, from 1.3 percent per year in the 1990s, to a staggering 3.3 percent per year from 2000 to 2006. Camouflaging the seriousness of the problem is dangerous as it gives the broader public the impression that the situation is under control, when, in fact, it is not. The Taellberg Provocation contains three sections. The first section is entitled 'At the point of no return: an introduction to our thinking'. Here we describe how the current political and economic systems promote national interests over the interests of the whole. This institutional shortcoming undermines the integrity of both the climate and ecological systems. We also highlight the moral obligation of industrialised nations to support developing countries onto a sustainable development path. And finally, we emphasise that unless nations are legally bound to new norms of collective responsibility, it will be impossible to align human activity within the Earth's ecological boundaries. The second section is entitled 'Reflections on the problems and challenges in the current climate negotiations'. In this section, we highlight four critical considerations that have not received sufficient attention in the post-2012 negotiations and which must be addressed as a matter of urgency. They include: the disregard for the wider ecosystem challenges; the failure to include the most recent scientific findings combined with a lack of understanding of the fundamental risk of planetary tipping points: insufficient consideration of the imperatives of ethics and equity; and limited attention to the role that global governance reform plays in ensuring the ultimate

  5. Systemic provocation in doxycycline induced fixed drug eruption: a case report

    Directory of Open Access Journals (Sweden)

    Anik Murwaningsih Rosmarini Estri Sih Hananti Niken Indrastuti

    2014-04-01

    Full Text Available Fixed drug eruption (FDE is recurrent lesions that upon repeated uptake of causative drug, always appears at the same skin and mucosal site. Determination of causal relationship in drug allergy is very important. In this case report, cases of doxycycline-induced FDE was reported. The subject of the research was a 29-year-old male, referred by dermatologist, with history of reccurent FDE. Physical examination revealed an oval well demarcated patch hyperpigmentation. Patch test was perfomed on previous involved and uninvolved site. The result of the patch test was irrelevant. Retesting patch test gave similar result. Systemic provocation test or drug provocation test (DPT  with doxcycline were done with suspected drug under ambulatory survelance and gave positive result. In this case, the DPT succeeded to identify doxycycline as the causal agent of FDE. The work-up of a suspected drug hypersensitivity includes a detailed clinical history, physical examination, skin tests, and provocation tests. The DPT is recommended to confirm drug’s hypersensitivity reactions. Systemic provocation test is considered as the gold standard for diagnosing FDE. Keywords:   fixed drug eruption - doxycycline - causal relationship - patch test - systemic provocation test

  6. COMMUNICATIVE PROVOCATION AS A STRATEGY OF DESTRUCTIVE BEHAVIOUR IN EVERY-DAY CONFLICT

    Directory of Open Access Journals (Sweden)

    Volkova Olga Sergeevna

    2014-12-01

    Full Text Available The article is concentrated on the issue of systematization and classification of strategies and tactics of individual's verbal behavior in a number of typical situations associated with disharmonious communication. Its scientific originality is defined by the necessity to present the provocation phenomenon as a category of communicative linguistics and linguistic pragmatics. The use of discourse analysis and descriptive pragmatic interpretation of real communication forms have enabled the revelation of various patterns of destructive verbal behavior that could provoke a communicative conflict. Communicative provocation is described as a strategy of destructive behavior aimed at dragging a communication partner into a conflict interaction or creating conditions for its occurrence. The provocation strategy is implemented in disharmonious interactions by means of individual or complex communication tactics including not only the aggressive ones: indignation, reproach, deliberate false informing, exaggerated demonstration of emotions, but also such tolerant tactics as praise, advice, apology, assurances, admiration, persuasion, etc. Two forms of communicative provocation are represented in the article. A direct provocation presupposes personal involvement of a provocateur in the conflict interaction while an indirect one allows its initiator stay aside from the open confrontation. In the latter case the provocateur stimulates and demonstrates the parties' conflict of interests, which leads to the communication harmony disruption.

  7. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  8. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  9. Peak nasal inspiratory flow as outcome for provocation studies in allergen exposure chambers

    DEFF Research Database (Denmark)

    Boelke, Georg; Berger, Uwe; Bergmann, Karl-Christian

    2017-01-01

    : In a randomized controlled blinded setting subjects suffering from allergic rhinitis were exposed to grass pollen, birch pollen, house dust mite and/or placebo in the GA(2)LEN chamber. Different allergen concentrations were used to evaluate symptom severities. Patients had to perform PNIF before and every 30 min...... during a challenge using a portable PNIF meter. RESULTS: 86 subjects participated in 203 challenges, altogether. House dust mite provocations caused the greatest reduction in PNIF values, followed by grass pollen and birch pollen. Provocations with every allergen or pollen concentration led...... symptoms. CONCLUSION: PNIF is a helpful and feasible tool for conducting provocation trials with allergens, especially grass pollen and house dust mite, in an AEC....

  10. North Korea's satellite launch: provocation and ballistic progress

    International Nuclear Information System (INIS)

    Sitt, Bernard

    2013-12-01

    North Korea's putting into orbit of a small meteorological satellite using an Unha-3 launcher on the 13 December 2013, a year on from Kim Jong-il's passing, smacks of provocation. The launch of an SLV that is closely related to the Taepodong-2 and that has numerous characteristics in common with a long-range ballistic missile contravened Security Council Resolutions 1695 (2006), 1718 (2006), and 1874 (2009), adopted in response to nuclear and ballistic tests carried out by Pyongyang. These resolutions implemented a progressively more strenuous regime of sanctions, which cannot fail to have marked the North Korean dictatorship, at least in economic and financial terms. The provisional successes and failures of the Six-party talks, mediated by China, which have been at a dead-end since 2009 bear witness to the unpredictability of the North's reactions. Pyongyang's double-agenda is, nonetheless, relatively easily to discern. Firstly, with this successful launch, North Korea has redeemed the failure of the first Unha-3 launch on the 13 April 2012, at the same time as Kim Jong-un took power and the country was celebrating the centenary of the birth of its founder, Kim Il-sung. This success evidently helps to bolster both the young leader's prestige on the domestic front and his sway over the army. Simultaneously, and beyond any symbolic value, North Korea's development of long-range ballistic capabilities constitutes veritable progress, on the back of a series of failures since 2006. Naturally, the reliability of the Unha-3 launcher (or of an improved Taepodong-2) is by no means guaranteed. Moreover, its payload is limited, since it can presently only launch small satellites, and thus well below the capacity needed to carry a nuclear weapon. If this is indeed North Korea's objective in years to come, it will need to make considerable technological progress, including the development of sufficiently small nuclear devices, which would necessitate further nuclear tests. In

  11. Violent offenders respond to provocations with high amygdala and striatal reactivity

    DEFF Research Database (Denmark)

    da Cunha-Bang, Sofi; Fisher, Patrick M.; Hjordt, Liv Vadskjær

    2017-01-01

    magnetic resonance imaging point-subtraction aggression paradigm in 44 men, of whom 18 were incarcerated violent offenders and 26 were control non-offenders. We measured brain activation following provocations (monetary subtractions), while the subjects had the possibility to behave aggressively or pursue...... monetary rewards. The violent offenders behaved more aggressively than controls (aggression frequency 150 us 84, P = 0.03) and showed significantly higher brain reactivity to provocations within the amygdala and striatum, as well as reduced amygdala-prefrontal and striato-prefrontal connectivity. Amygdala...

  12. [Intragastric provocation and antigen-induced in vitro histamine liberation by the food additive E 102].

    Science.gov (United States)

    Schaubschläger, W; Ruschmeyer, J; Zabel, P; Schlaak, M

    1988-06-01

    Adverse reactions to tartrazine have been known since 1958. The mechanism of this reaction, a not IgE-mediated, anaphylactoid reaction, is not fully understood. The demonstration of this adverse reaction by provocative challenge feeding may be problematic by a score of subjective symptoms because of the placebo effect. This report deals with the intragastral provocation under endoscopic control with tartrazine and tartrazine-induced histamine release in vitro from gastric mucosa and from blood. Two patients with anamnestically suspected adverse reactions to tartrazine were studied. Correspondence of in vivo and in vitro testing with tartrazine could be demonstrated.

  13. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  14. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  15. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  16. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions t...... to 9/11. Novels by Safran Foer (Extremely Loud and Incredibly Close) and Don DeLillo (Falling Man) focus on the personal and private consequences whereas Mohsin Hamid (The Reluctant Fundamentalist) includes the other side....

  17. Advances in the use of inhalation provocation tests in clinical evaluation

    NARCIS (Netherlands)

    Hargreave, F. E.; Ramsdale, E. H.; Sterk, P. J.; Juniper, E. F.

    1985-01-01

    Recent advances in the use of inhalation provocation tests in the clinical evaluation of asthma have been made with methacholine and histamine tests. The tests can be better standardized and the results more accurately interpreted. The ease of stimulation of bronchoconstriction by methacholine and

  18. Children's Moral Reasoning about Family and Peer Violence: The Role of Provocation and Retribution.

    Science.gov (United States)

    Astor, Ron A.

    1994-01-01

    Examined violent and nonviolent inner-city children's moral reasoning about violence in family and peer situations. All of the children condemned unprovoked violence. With provoked situations, the violent group focused more on the immorality of the provocation and perceived force akin to reciprocal justice, whereas the nonviolent group perceived…

  19. Social provocation modulates decision making and feedback processing: Examining the trajectory of development in adolescent participants

    Directory of Open Access Journals (Sweden)

    Hannah L. Pincham

    2015-10-01

    Full Text Available Increasingly, research is turning to the ways in which social context impacts decision making and feedback processing in adolescents. The current study recorded electroencephalography to examine the trajectory of development across adolescence, with a focus on how social context impacts cognition and behaviour. To that end, younger (10–12 years and older (14–16 years adolescents played a modified Taylor Aggression Paradigm against two virtual opponents: a low-provoker and a high-provoker. During the task's decision phase (where participants select punishment for their opponent, we examined two event-related potentials: the N2 and the late positive potential (LPP. During the outcome phase (where participants experience win or loss feedback, we measured the feedback related negativity (FRN. Although N2 amplitudes did not vary with provocation, LPP amplitudes were enhanced under high provocation for the younger group, suggesting that emotional reactivity during the decision phase was heightened for early adolescents. During the outcome phase, the FRN was reduced following win outcomes under high provocation for both groups, suggesting that a highly provocative social opponent may influence the reward response. Collectively, the data argue that social context is an important factor modulating neural responses in adolescent behavioural and brain development.

  20. Men with high serotonin 1B receptor binding respond to provocations with heightened amygdala reactivity

    DEFF Research Database (Denmark)

    da Cunha-Bang, Sofi; Fisher, Patrick M; Hjordt, Liv V

    2018-01-01

    Serotonin signalling influences amygdala reactivity to threat-related emotional facial expressions in healthy adults, but in vivo serotonin signalling has never been investigated in the context of provocative stimuli in aggressive individuals. The aim of this study was to evaluate associations...

  1. Pussy Provocations: Feminist Protest and Anti-Feminist Resurgence in Russia

    Directory of Open Access Journals (Sweden)

    Jessica Mason

    2018-03-01

    Full Text Available The Russian feminist punk-art group Pussy Riot sparked a remarkable series of responses with their provocative “punk prayer” in a Moscow cathedral in 2012. This article analyzes the social, political, and cultural dynamics of provocation (provokatsiya by examining everyday conversations, speeches, articles and other linguistic acts through which Russian Orthodox, feminist, and left-leaning and liberal participants in the anti-Putin opposition made sense of Pussy Riot. A provocation violates norms in ways that compel observers to name and defend those norms. This process simultaneously invigorates norms and helps people shore up their own senses of self amid uncertainty. Yet what observers identify as the provocation — what norms are perceived to be violated — shapes what values they reinforce. Responding to Pussy Riot, Russian Orthodox activists asserted themselves as defenders of tradition against the forces of Western cultural imperialism, including feminism and LGBT rights. Yet most responses from the anti-Putin opposition focused on norms related to speech and protest rights, while Russian feminists were often reluctant even to claim Pussy Riot as feminist at all. Due to this asymmetry, Pussy Riot’s feminist protest revitalized anti-feminism in Russia without a concomitant strengthening of feminist values among supporters.

  2. Designing to bring the field to the showroom through open-ended provocation.

    NARCIS (Netherlands)

    Kelly, J.; Wensveen, S.A.G.

    2014-01-01

    Engaging formats are required to communicate designerly understandings of field studies to a broader audience within organisations. Here we present a case where the format of an exhibition, consisting of a collection of open-ended provocative design concepts, has been used to disseminate knowledge

  3. Laryngeal effects of nasal allergen provocation in singers with allergic rhinitis

    NARCIS (Netherlands)

    Verguts, Monique M. L.; Eggermont, Anita; Decoster, Wivine; de Jong, Felix I. C. R. S.; Hellings, Peter W.

    2011-01-01

    In spite of our recent insight into nasobronchial interaction mechanisms in allergic airway disease, the association between allergic rhinitis and voice complaints remains obscure. To evaluate the effects of nasal allergen provocation and seasonal grass pollen exposure on subjective and objective

  4. Making Choices: Simultaneous Report and Provocative Statements, Tools for Appreciative Inquiry

    Science.gov (United States)

    Nelson, Eric M.; Wright, Christine M.

    2011-01-01

    Many educators find that students do not participate actively in class, and are constantly seeking a variety of techniques to encourage student participation. The focus of this paper is to show how simultaneous report and provocative statements can be combined to foster appreciative inquiry, thereby, creating a learning environment with greater…

  5. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  6. How and Why Do Terrorist Organizations Use the Internet?

    Directory of Open Access Journals (Sweden)

    Karolina Wojtasik

    2017-12-01

    Full Text Available The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula and ISIS (the so-called Islamic State. While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists.

  7. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  8. Protecting chemical plants against terrorist attacks: a review

    NARCIS (Netherlands)

    Khakzad Rostami, N.; Reniers, G.L.L.M.E.

    2015-01-01

    Protection of hazardous establishments such as chemical plants intentional incidents has drawn attention from safety and security experts since 9/11 terrorist attacks in the U.S. Although major steps have been taken since, the recent intentional incidents in two chemical plants in France in June and

  9. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    NARCIS (Netherlands)

    Farnham, N.T.; Liem, M.C.A.

    2017-01-01

    The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research.

  10. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  11. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  12. Freed: Ripples of the Convicted and Released Terrorist in America

    Science.gov (United States)

    2011-03-01

    Singapore, Malaysia , Indonesia, Thailand, and the Philippines (The International Conference on Terrorist Rehabilitation, 2009). No single methodology to...2009, p. 16). Care Rehabilitation Centers include group meals, art therapy, recreation and other leisure activity to “build teamwork but also

  13. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    Science.gov (United States)

    2007-01-22

    called “Digital Pearl Harbor” (DPH), with the result that 79% of the gamers said that a strategic cyberattack against the United States was likely...terrorist sponsors, five of them — North Korea , Sudan, Syria, Libya, and Cuba — are described as a diminishing concern for terrorism. Only Iran remains

  14. Clinical tube weaning supported by hunger provocation in fully-tube-fed children.

    Science.gov (United States)

    Hartdorff, Caroline M; Kneepkens, C M Frank; Stok-Akerboom, Anita M; van Dijk-Lokkart, Elisabeth M; Engels, Michelle A H; Kindermann, Angelika

    2015-04-01

    Children with congenital malformations, mental retardation, and complex early medical history frequently have feeding problems. Although tube feeding is effective in providing the necessary energy and nutrients, it decreases the child's motivation to eat and may lead to oral aversion. In this study, we sought to confirm our previous results, showing that a multidisciplinary clinical hunger provocation program may lead to quick resumption of oral feeding. In a crossover study, 22 children of 9 to 24 months of age who were fully dependent on tube feeding were randomly assigned to one of two groups: group A, intervention group (2-week multidisciplinary clinical hunger provocation program); and group B, control group (4-week outpatient treatment by the same multidisciplinary team). Patients failing one treatment were reassigned to the other treatment group. Primary outcome measures were at least 75% orally fed at the conclusion of the intervention and fully orally fed and gaining weight 6 months after the intervention. In group A, 9/11 patients were successfully weaned from tube feeding (2 failures: 1 developed ulcerative colitis, 1 drop-out). In group B, only 1 patient was weaned successfully; 10/11 were reassigned to the clinical hunger provocation program, all being weaned successfully. Six months after the intervention, 1 patient had to resume tube feeding. In total, in the control group, 1/11 (9%) was weaned successfully as compared with 18/21 (86%) in the hunger provocation group (P hunger provocation is an effective short-term intervention for weaning young children from tube feeding.

  15. TERRITORIAL RISK ASSESMENT AFTER TERRORIST ACT: EXPRESS MODEL

    Directory of Open Access Journals (Sweden)

    M. M. Biliaiev

    2018-02-01

    Full Text Available Purpose. The paper involves the development of a method to assess the territorial risk in the event of a terrorist attack using a chemical agent. Methodology. To describe the process of chemical agent scattering in the atmosphere, ejected in the event of a terrorist attack, the equation of mass transfer of an impurity in atmospheric air is used. The equation takes into account the velocity of the wind flow, atmospheric diffusion, the intensity of chemical agent emission, the presence of buildings near the site of the emission of a chemically hazardous substance. For numerical integration of the modeling equation, a finite difference method is used. A feature of the developed numerical model is the possibility of assessing the territorial risk in the event of a terrorist attack under different weather conditions and the presence of buildings. Findings. A specialized numerical model and software package has been developed that can be used to assess the territorial risk, both in the case of terrorist attacks, with the use of chemical agents, and in case of extreme situations at chemically hazardous facilities and transport. The method can be implemented on small and medium-sized computers, which allows it to be widely used for solving the problems of the class under consideration. The results of a computational experiment are presented that allow estimating possibilities of the proposed method for assessing the territorial risk in the event of a terrorist attack using a chemical agent. Originality. An effective method of assessing the territorial risk in the event of a terrorist attack using a chemically hazardous substance is proposed. The method can be used to assess the territorial risk in an urban environment, which allows you to obtain adequate data on possible damage areas. The method is based on the numerical integration of the fundamental mass transfer equation, which expresses the law of conservation of mass in a liquid medium. Practical

  16. Psychogenic chemical sensitivity: psychogenic pseudoseizures elicited by provocation challenges with fragrances.

    Science.gov (United States)

    Staudenmayer, H; Kramer, R E

    1999-08-01

    A middle-aged woman with a 10-year history of disability attributed to chemical sensitivities complained that exposure to specific fragrances immediately elicited seizures. Video-EEG monitoring was performed in a hospital neurodiagnostic laboratory during provocative challenge studies employing fragrances identified by the patient as reliably inducing symptoms. The baseline clinical EEG was normal. Immediately after each provocation with air deodorant and perfume, she consistently showed both generalized tonic/clonic and multifocal myoclonic jerking, at times was nonresponsive, spoke with slurred speech, and complained of right-sided paralysis and lethargy. None of these events were associated with any EEG abnormalities. Psychological assessment (MMPI-2, MCMI-II) revealed personality traits that predisposed her to somatization and beliefs about environmental sensitivities. The convulsions were a manifestation of psychogenic pseudoseizures that had been iatrogenically reinforced.

  17. Hostile attribution biases for relationally provocative situations and event-related potentials.

    Science.gov (United States)

    Godleski, Stephanie A; Ostrov, Jamie M; Houston, Rebecca J; Schlienz, Nicolas J

    2010-04-01

    This exploratory study investigates how hostile attribution biases for relationally provocative situations may be related to neurocognitive processing using the P300 event-related potential. Participants were 112 (45 women) emerging adults enrolled in a large, public university in upstate New York. Participants completed self-report measures on relational aggression and hostile attribution biases and performed an auditory perseveration task to elicit the P300. It was found that hostile attribution biases for relational provocation situations was associated with a larger P300 amplitude above and beyond the role of hostile attribution biases for instrumental situations, relational aggression, and gender. Larger P300 amplitude is interpreted to reflect greater allocation of cognitive resources or enhanced "attending" to salient stimuli. Implications for methodological approaches to studying aggression and hostile attribution biases and for theory are discussed, as well as implications for the fields of developmental psychology and psychopathology. Copyright 2010 Elsevier B.V. All rights reserved.

  18. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  19. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  20. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  1. Surgical resource utilization in urban terrorist bombing: a computer simulation.

    Science.gov (United States)

    Hirshberg, A; Stein, M; Walden, R

    1999-09-01

    The objective of this study was to analyze the utilization of surgical staff and facilities during an urban terrorist bombing incident. A discrete-event computer model of the emergency room and related hospital facilities was constructed and implemented, based on cumulated data from 12 urban terrorist bombing incidents in Israel. The simulation predicts that the admitting capacity of the hospital depends primarily on the number of available surgeons and defines an optimal staff profile for surgeons, residents, and trauma nurses. The major bottlenecks in the flow of critical casualties are the shock rooms and the computed tomographic scanner but not the operating rooms. The simulation also defines the number of reinforcement staff needed to treat noncritical casualties and shows that radiology is the major obstacle to the flow of these patients. Computer simulation is an important new tool for the optimization of surgical service elements for a multiple-casualty situation.

  2. Impulsivity and suicidality: the mediating role of painful and provocative experiences.

    Science.gov (United States)

    Bender, Theodore W; Gordon, Kathryn H; Bresin, Konrad; Joiner, Thomas E

    2011-03-01

    Multiple studies have reported a link between high levels of impulsivity and suicidal behavior. Joiner's (2005) explanation for this link is that impulsive individuals have a greater tendency to experience painful and provocative events that habituate them to fear and pain, which leads to an acquired capability for engaging in suicidal behavior. Study 1 tested Joiner's (2005) hypothesis in a sample of 182 undergraduate students who completed self-report questionnaires on impulsivity, frequency of painful and provocative events, and acquired capability for suicide. In addition to self-report, pain tolerance (an aspect of acquired capability for suicide) was measured with a pressure algometer. Study 2 sought to replicate our findings from Study 1 in a sample of 516 clinical outpatients using a multi-faceted measure of impulsivity. Consistent with prediction, product of coefficients tests for mediation (MacKinnon et al., 2002) revealed that impulsivity has an indirect relationship with acquired capability for suicidal behavior, and that this relationship is mediated by painful and provocative events. Data from our studies are cross-sectional in nature, which does not allow for conclusions about the temporal ordering of our variables. In addition, self-report was used to measure most variables. Future research may benefit from a longitudinal design and the inclusion of other modes of assessment (e.g., behavioral measures of impulsivity). Our findings suggest that the link between impulsivity and suicidal behavior occurs because impulsive people tend to have a greater capability for suicidal behavior, which they have acquired through experiencing painful and provocative events. Copyright © 2010 Elsevier B.V. All rights reserved.

  3. Provocative Endoscopy to Identify Bleeding Site in Upper Gastrointestinal Bleeding: A Novel Approach in Transarterial Embolization.

    Science.gov (United States)

    Kamo, Minobu; Fuwa, Sokun; Fukuda, Katsuyuki; Fujita, Yoshiyuki; Kurihara, Yasuyuki

    2016-07-01

    This report describes a novel approach to endoscopically induce bleeding by removing a clot from the bleeding site during angiography for upper gastrointestinal (UGI) hemorrhage. This procedure enabled accurate identification of the bleeding site, allowing for successful targeted embolization despite a negative initial angiogram. Provocative endoscopy may be a feasible and useful option for angiography of obscure bleeding sites in patients with UGI arterial hemorrhage. Copyright © 2016 SIR. Published by Elsevier Inc. All rights reserved.

  4. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  5. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  6. The Effect Terrorist Labels Have on Military Operations

    Science.gov (United States)

    2012-05-17

    Department until 2008.44 Nelson Mandela , the renowned member of the ANC and Nobel Prize laureate, became president of South Africa in 1994 and is...celebrated internationally as one of the most prolific and revolutionary leaders of the 20th century. Mandela received all these awards and accolades—many...models or key players during 44 Mimi Hall, "U.S. has Mandela on Terrorist List," USA Today, http

  7. MOTIVATION SPECIFIC FOR YOUNGSTERS INVOLVED INTO TERRORIST OPERATION

    OpenAIRE

    Beslan Alexeyevich Tarchokov

    2015-01-01

    The paper made an attempt to explore preconditions, motives, reasons and factors capable of facilitating youth’ involvement into terrorist operations, emergence of youth terrorism and its spreading around, including the specifics of social and economic domains, of ideology and politics, psychology and law, etc. all of them taken on the scene of nowadays globalized society. Specifying in greater detail the causes and circumstances that contributed to involvement of young Russians into terroris...

  8. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  9. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  10. Transition from Terrorist Event Management to Consequence Management, Executive Summary

    Science.gov (United States)

    1982-03-31

    hUMIEe " BDM/W-82-l1 5-TR AUTO11(o 1. CONTR ACT OR GRANT NumURe) J. C. Evanis, M. K. Pilgrim, C. J. Potter EMW-C-0744 9. PER•O^•ING ORGANIZATIN NAME...should, and is expected to, provide leadership in this regard. There exists a variety of experience and planning for responding to terrorist events. The

  11. Have the Mexican Drug Cartels Evolved into a Terrorist Insurgency?

    Science.gov (United States)

    2013-06-14

    individual police officers and journalists.55 Originally, the Gulf Cartel recruited them from Mexico’s Special Operations Forces, known as Grupo Aeromóvil de ...fluid situation surrounding the Mexican drug war has led to much speculation about how to classify the powerful drug cartels conducting it. There is... conducting it. There is literature debating whether the cartels are merely a criminal enterprise or whether the cartels represent a new terrorist

  12. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  13. Neurofunctional correlates of posttraumatic stress disorder: a PET symptom provocation study.

    Science.gov (United States)

    Pissiota, Anna; Frans, Orjan; Fernandez, Manuel; von Knorring, Lars; Fischer, Håkan; Fredrikson, Mats

    2002-04-01

    Patients with combat-related posttraumatic stress disorder (PTSD) show altered cognitive and affective processing and symptomatic responding following exposure to trauma reminders. Previous symptom provocation studies using brain imaging have involved Vietnam veterans. In this study neural correlates were investigated in patients with PTSD resulting from trauma in more recent war zones. (15)Oxygen water and positron emission tomography were used to measure regional cerebral blood flow (rCBF) in patients with war- and combat-related chronic PTSD during exposure to combat and neutral sounds. Self-reports and heart rate confirmed symptomatic responding during traumatic stimulation. The war-related condition, as compared to the neutral, increased rCBF in the right sensorimotor areas (Brodmann areas 4/6), extending into the primary sensory cortex (areas 1/2/3), and the cerebellar vermis. RCBF also increased in the right amygdala and in the periaqueductal gray matter adjacent to the pons. During provocation rCBF was lowered in the right retrosplenial cortex (areas 26/29/30 extending into area 23). Symptom provocation in PTSD promote sensorimotor, amygdaloid and midbrain activation. We conclude that perceptually induced symptom activation in PTSD is associated with an emotionally determined motor preparation and propose that subcortically initiated rather than cortically controlled memory mechanisms determine this pattern.

  14. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  15. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  16. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  17. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  18. Severe accidents and terrorist threats at nuclear reactors

    International Nuclear Information System (INIS)

    Pollack, G.L.

    1987-01-01

    Some of the key areas of uncertainty are the nature of the physical and chemical interactions of released fission products and of the interactions between a molten core and concrete, the completeness and validity of the computer codes used to predict accidents, and the behavior of the containment. Because of these and other uncertainties, it is not yet possible to reliably predict the consequences of reactor accidents. It is known that for many accident scenarios, especially less severe ones or where the containment is not seriously compromised, the amount of radioactive material expected to escape the reactor is less, even much less, than was previously calculated. For such accidents, the predictions are easier and more reliable. With severe accidents, however, there is considerable uncertainty as to the predicted results. For accidents of the type that terrorists might cause - for example, where the sequence of failure would be unexpected or where redundant safety features are caused to fail together - the uncertainties are still larger. The conclusion, then, is that there are potential dangers to the public from terrorist actions at a nuclear reactor; however, because of the variety of potential terrorist threats and the incompleteness of the knowledge about the behavior of reactor components and fission products during accidents, the consequences cannot yet be assessed quantitatively

  19. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  20. Impunity for International Terrorists? Key Legal Questions and Practical Considerations

    Directory of Open Access Journals (Sweden)

    Christophe Paulussen

    2012-04-01

    Full Text Available This Research Paper discusses several of the key questions related to the subject of impunity of international terrorists, taking both a fundamental and a more practical approach within the context of international law. First, it reflects on a number of core definitional and theoretical questions which have been pushed into the background of day‐to‐day reality, by the actual fight against terrorism. For instance: what does the concept of impunity entail exactly and which kinds of standards could be used in measuring impunity? Is it clear what falls under the header of international terrorism and can it in fact be argued that international terrorists enjoy impunity? In practical terms, the paper explores a number of questions related to the actual prosecution of terrorism. What are the obstacles that national prosecutors face every day when prosecuting suspects of international terrorism? To what extent does a rule that prima facie seems ideal to fight terrorism (aut dedere aut judicare: either extradite or prosecute apply to terrorist offences? And what is the role of international criminal law – and the international criminal tribunals – in fighting terrorism? The Paper concludes with a series of recommendations.

  1. Compatibility of Clinical Manifestation with Skin Prick Test Result and Food Provocation Test in Food Cross Reaction

    OpenAIRE

    Lubis, Azwin; Barlianto, Wisnu; Endaryanto, Anang; Harsono, Ariyanto

    2017-01-01

    Background: Subjective diagnostic test of food allergy is hugely biased, resulting in irrational diet avoidance. Additional objective tools by skin prick test following food provocation test resulting more accurate cause and prevalence on population. Purpose: To evaluate the compatibility of clinical symptoms with skin prick test and provocation test for imunoglobulin E (IgE) mediated food allergy in Dr. Soetomo Hospital Surabaya. Methods: Cross sectional observational analytic study. Patient...

  2. Anti-money laundering and counter-terrorist financing in the Luxembourg investment fund market

    OpenAIRE

    Dietz, Andrea

    2017-01-01

    The field of Anti-Money Laundering and Counter-Terrorist Financing in their current form have had an important impact on the financial world for almost half a century. Today, Money Laundering and Terrorist Financing pose a threat to the integrity of the financial markets and systems worldwide. The intention behind implementing a regulatory Anti-Money Laundering and Counter-Terrorist Financing framework is to cut off the financial resources of criminals and to follow back the traces that finan...

  3. Terrorist use of the Internet: exploitation and support through ICT infrastructure

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-03-01

    Full Text Available methods of fundraising are also possible. Electronic money transfer, laundering and generating support through front organisations are all fundraising methods used by terrorists (Goodman, Kirk & Kirk 2007). According to the Financial Action Task Force... agent. This allows terrorist groups to move money around without actually delivering the auctioned goods or services. Online casinos can be used for both laundering and storing money. When dealing with large sums of money, terrorists can place...

  4. The Next Terrorist Attack: Not If, But When...Are We Prepared?

    National Research Council Canada - National Science Library

    Lynch, David

    2004-01-01

    .... Since lessons learned from past attacks call attention to the terrorists' ability to overcome military defenses, the importance of well-developed, exercised response plans cannot be overstated...

  5. Explaining Away Intuitions

    Directory of Open Access Journals (Sweden)

    Jonathan Ichikawa

    2009-12-01

    Full Text Available What is it to explain away an intuition? Philosophers regularly attempt to explain intuitions away, but it is often unclear what the success conditions for their project consist in. I attempt to articulate some of these conditions, taking philosophical case studies as guides, and arguing that many attempts to explain away intuitions underestimate the challenge the project of explaining away involves. I will conclude, therefore, that explaining away intuitions is a more difficult task than has sometimes been appreciated; I also suggest, however, that the importance of explaining away intuitions has often been exaggerated.

  6. Utility of pharmacologic provocative neurological testing before embolization of occipital lobe arteriovenous malformations.

    Science.gov (United States)

    Tawk, Rabih G; Tummala, Ramachandra P; Memon, Muhammad Z; Siddiqui, Adnan H; Hopkins, L Nelson; Levy, Elad I

    2011-01-01

    Endovascular treatment is an established option for treatment of cerebral arteriovenous malformations (AVMs). However, embolization has been associated with postprocedural neurological complications. We sought to evaluate the usefulness of intra-arterial pharmacologic provocative (superselective Wada) testing before embolization of occipital lobe AVMs. We performed a retrospective review of cases of occipital AVMs that were embolized at our institution (Millard Fillmore Gates Hospital) while the patient was under conscious sedation. Visual field testing was performed before and after superselective Wada testing and again after embolization. After microcatheterization of the target feeding pedicle, amobarbital (or, occasionally, methohexital) was administered, followed immediately by neurological testing. If the provocative test results were negative, the evaluated feeder was embolized with a liquid agent. Complications were categorized as transient or permanent neurological deficit, visual field loss, ischemic or hemorrhagic stroke, and death. Thirteen patients with occipital AVMs underwent 39 Wada tests of 34 pedicles before embolization during 26 endovascular treatment sessions. Patients were treated under conscious sedation with local anesthesia. The mean age of these patients was 43.5 years (range 16-62 years); 6 were women. Testing induced a neurological deficit in six patients. A positive test result led us to abort embolization attempts in four pedicles. In the two remaining cases, advancement of the catheter tip distally within the feeding pedicle allowed us to proceed with embolization after initial test failure. Neither patient developed a visual field deficit after embolization. Despite passing the Wada test before embolization, one other patient had a visual deficit that was detected a few hours after the procedure; this deficit lessened but was permanent. No further ischemic complications and no hemorrhagic complications occurred. Pharmacologic

  7. Preoperative cellulose porous beads for therapeutic embolization of meningioma: provocation test and technical considerations

    International Nuclear Information System (INIS)

    Kai, Yutaka; Morioka, Motohiro; Yano, Shigetoshi; Nakamura, Hideo; Makino, Keishi; Mizuno, Takamasa; Takeshima, Hideo; Kuratsu, Jun-ichi; Hamada, Jun-ichiro

    2007-01-01

    Cellulose porous beads (CPBs) are exceptionally uniform in size and nonabsorbable and they provide highly effective tumor devascularization. The risk of cranial nerve palsy must not be overlooked when embolization with CPBs is considered in meningioma patients. We attempted to identify patients at risk of cranial nerve palsy after meningioma embolization. Prior to preoperative superselective embolization with 200 μm diameter CPBs, 141 patients with meningioma underwent provocation test with lidocaine and amytal. They were divided into two groups on the basis of whether they were or were not considered eligible for embolization. We evaluated the differences between the two groups with respect to tumor anatomy, angiographic findings, and clinical presentation and recorded complications associated with the embolization of the meningioma. Of the 141 patients, 128 underwent CPB embolization (group 2); 13 were not embolized because their provocation test results were positive (group 1, n = 11) or because they showed vasospasm (n = 2). Group 1 patients had meningioma in the cavernous sinus or petroclival region. Characteristically, the feeders were of middle meningeal artery origin and exhibited a posteromedial course toward the petrous apex or cavernous sinus. In group 2 patients the middle meningeal artery was the feeder, but it lacked branches coursing posteromedially. Three of these patients experienced complications which included intratumoral hemorrhage (n 2) and post-embolization hearing disturbance (n = 1). Patients with meningioma whose tumor-feeding arteries run posteromedially toward the petrous apex or cavernous sinus are at increased risk of post-embolization cranial nerve palsy. Appropriate protocols, including lidocaine and amytal provocation tests, may reduce the risk of complications after CPB embolization of the external carotid territory in this group of patients. (orig.)

  8. Preoperative cellulose porous beads for therapeutic embolization of meningioma: provocation test and technical considerations

    Energy Technology Data Exchange (ETDEWEB)

    Kai, Yutaka; Morioka, Motohiro; Yano, Shigetoshi; Nakamura, Hideo; Makino, Keishi; Mizuno, Takamasa; Takeshima, Hideo; Kuratsu, Jun-ichi [Kumamoto University, Department of Neurosurgery, Graduate School of Medical Sciences, Kumamoto (Japan); Hamada, Jun-ichiro [Kanazawa University, Department of Neurosurgery, Graduate School of Medical Sciences, Kanazawa (Japan)

    2007-05-15

    Cellulose porous beads (CPBs) are exceptionally uniform in size and nonabsorbable and they provide highly effective tumor devascularization. The risk of cranial nerve palsy must not be overlooked when embolization with CPBs is considered in meningioma patients. We attempted to identify patients at risk of cranial nerve palsy after meningioma embolization. Prior to preoperative superselective embolization with 200 {mu}m diameter CPBs, 141 patients with meningioma underwent provocation test with lidocaine and amytal. They were divided into two groups on the basis of whether they were or were not considered eligible for embolization. We evaluated the differences between the two groups with respect to tumor anatomy, angiographic findings, and clinical presentation and recorded complications associated with the embolization of the meningioma. Of the 141 patients, 128 underwent CPB embolization (group 2); 13 were not embolized because their provocation test results were positive (group 1, n = 11) or because they showed vasospasm (n = 2). Group 1 patients had meningioma in the cavernous sinus or petroclival region. Characteristically, the feeders were of middle meningeal artery origin and exhibited a posteromedial course toward the petrous apex or cavernous sinus. In group 2 patients the middle meningeal artery was the feeder, but it lacked branches coursing posteromedially. Three of these patients experienced complications which included intratumoral hemorrhage (n = 2) and post-embolization hearing disturbance (n = 1). Patients with meningioma whose tumor-feeding arteries run posteromedially toward the petrous apex or cavernous sinus are at increased risk of post-embolization cranial nerve palsy. Appropriate protocols, including lidocaine and amytal provocation tests, may reduce the risk of complications after CPB embolization of the external carotid territory in this group of patients. (orig.)

  9. Suits Against Terrorist States by Victims of Terrorism

    Science.gov (United States)

    2008-05-01

    Nat’l City Bank v. Banco Para El Comercio Exterior de Cuba, 462 U.S. 611 (1983) (“Bancec”) to judgments against designated terrorist States. Bancec held...to determine both whether an exception to the Cuban Government’s immunity from garnishment also applies to [ Empresa de Telecomunicaciones de Cuba, S.A...was eventually reversed on other grounds by the U.S. Court of Appeals for the Eleventh Circuit — Alejandre v. Telefonica Larga Distancia de Puerto Rico

  10. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  11. Hidden Markov models for the activity profile of terrorist groups

    OpenAIRE

    Raghavan, Vasanthan; Galstyan, Aram; Tartakovsky, Alexander G.

    2012-01-01

    The main focus of this work is on developing models for the activity profile of a terrorist group, detecting sudden spurts and downfalls in this profile, and, in general, tracking it over a period of time. Toward this goal, a $d$-state hidden Markov model (HMM) that captures the latent states underlying the dynamics of the group and thus its activity profile is developed. The simplest setting of $d=2$ corresponds to the case where the dynamics are coarsely quantized as Active and Inactive, re...

  12. Evaluation of Perfusion and Thermal Parameters of Skin Tissue Using Cold Provocation and Thermographic Measurements

    Directory of Open Access Journals (Sweden)

    Strąkowska Maria

    2016-09-01

    Full Text Available Measurement of the perfusion coefficient and thermal parameters of skin tissue using dynamic thermography is presented in this paper. A novel approach based on cold provocation and thermal modelling of skin tissue is presented. The measurement was performed on a person’s forearm using a special cooling device equipped with the Peltier module. The proposed method first cools the skin, and then measures the changes of its temperature matching the measurement results with a heat transfer model to estimate the skin perfusion and other thermal parameters. In order to assess correctness of the proposed approach, the uncertainty analysis was performed.

  13. Don't panic. A guide to tryptophan depletion with disorder-specific anxiety provocation.

    Science.gov (United States)

    Hood, S D; Bell, C J; Argyropoulos, S V; Nutt, D J

    2016-11-01

    The 2002 paper "Does 5-HT restrain panic? A tryptophan depletion study in panic disorder patients recovered on paroxetine" by Bell and colleagues - reprinted in this issue of the Journal - reports on a study undertaken in the halcyon days of David Nutt's Psychopharmacology Unit at the University of Bristol, England. In this invited commentary authors of the original work discuss the impact of this paper on the field of acute tryptophan depletion research (especially in the field of clinical anxiety disorders) and the development of disorder-specific anxiogenic provocations over the past decade. © The Author(s) 2016.

  14. Aggression in Children with Conduct Problems and Callous-Unemotional Traits: Social Information Processing and Response to Peer Provocation.

    Science.gov (United States)

    Helseth, Sarah A; Waschbusch, Daniel A; King, Sara; Willoughby, Michael T

    2015-11-01

    Callous/unemotional traits (CU) moderate children's conduct problems (CP) in numerous domains, including social functioning. The present study examined whether CU traits also moderate the aggressiveness of children's social information processing (SIP) and responses to varying intensities of peer provocation. Sixty elementary school-age children (46 males) were grouped into those without CP or CU (controls, n = 32), those with CP but not CU (CP-only; n = 14), and those with both CP and CU (CPCU, n = 14). Participants completed a task that measured two aspects of SIP (response generation and hostile attribution bias) and a computerized reaction time task (CRTT) that measured behavior, affect, and communication before and after provocation under instrumental and hostile aggressive conditions. Children with CPCU generated more aggressive responses than controls on measures of SIP. On the CRTT, all children exhibited reactive aggression following high provocation, but only children with CPCU exhibited proactive aggression, and reactive aggression following low provocation; no differences in affect were found. In a series of exploratory analyses, CPCU children communicated antisocially, while CP-only communicated prosocially. Finally, children with CPCU did not seem to hold a grudge following the final instance of provocation, instead gradually returning to baseline like their non-CU peers. These distinct social cognitive and behavioral profiles hint at different etiologies of CP and CPCU, underscoring the variability of aggression in these populations.

  15. Scientific Support of Terrorist Actions by Commercial Grey Area Literature

    International Nuclear Information System (INIS)

    Katzung, W.

    2007-01-01

    The publication of the Al-Quaida handbook and time and time again notes of the possibility for getting special scientific knowledge from the internet have decreased the attention for an other important source of scientific support for terrorist education and/or actions. This is the commercial available and distributed grey area literature provided by a huge amount of (book) sellers and publishing houses. Most of this literature (hard copies and CDs) with dangerous subject matter is published in the US and may be ordered fast and with low costs using the internet. This kind of support for real and potential terrorists stands strongly in contradiction to the official policy and the 'unconditional' war against terrorism. With the presented poster the above described problem should be a little bit put in the focus of the CBMTS community and so to the authorities, too. By means of selected examples from different branches, such as Narcotics, Explosives, unusual Killing Methods, special Poisons / Toxins and, last not least, CW agents inclusive application methods and devices the highly charged situation is tried to shown. (author)

  16. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  17. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  18. TePiTri : a screening method for assessing terrorist-related pipeline transport risks

    NARCIS (Netherlands)

    Reniers, G.; Dullaert, W.E.H.

    2012-01-01

    The article proposes an approach to determine relative terrorist-related security risk levels of pipeline transportation. Pipeline routes are divided into smaller route segments. Subsequently, likelihood scores of possible terrorist-related incidents are determined per route segment and per

  19. Game Theoretic Centrality Analysis of Terrorist Networks : The Cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2011-01-01

    The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist

  20. Training, SEVIS, and NSEERS: Will They Stop Terrorists from Entering the U.S

    National Research Council Canada - National Science Library

    Bugarin, Darwina S

    2007-01-01

    .... Stopping their entry is key to preventing attacks. The 9/11 Commission's Staff Report of the National Commission on Terrorist Attacks Upon the United States, 9/11 and Terrorist Travel, identified pre-9/11 gaps/weaknesses in U.S...

  1. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  2. Avoidant Responses to Interpersonal Provocation Are Associated with Increased Amygdala and Decreased Mentalizing Network Activity

    Science.gov (United States)

    Krämer, Ulrike M.

    2017-01-01

    When intentionally pushed or insulted, one can either flee from the provoker or retaliate. The implementation of such fight-or-flight decisions is a central aspect in the genesis and evolution of aggression episodes, yet it is usually investigated only indirectly or in nonsocial situations. In the present fMRI study, we aimed to distinguish brain regions associated with aggressive and avoidant responses to interpersonal provocation in humans. Participants (thirty-six healthy young women) could either avoid or face a highly (HP) and a lowly (LP) provoking opponent in a competitive reaction time task: the fight-or-escape (FOE) paradigm. Subjects avoided the HP more often, but retaliated when facing her. Moreover, they chose to fight the HP more quickly, and showed increased heart rate (HR) right before confronting her. Orbitofrontal cortex (OFC) and sensorimotor cortex were more active when participants decided to fight, whereas the mentalizing network was engaged when deciding to avoid. Importantly, avoiding the HP relative to the LP was associated with both higher activation in the right basolateral amygdala and lower relative activity in several mentalizing regions [e.g., medial and inferior frontal gyrus (IFG), temporal-parietal junction (TPJ)]. These results suggest that avoidant responses to provocation might result from heightened threat anticipation and are associated with reduced perspective taking. Furthermore, our study helps to reconcile conflicting findings on the role of the mentalizing network, the amygdala, and the OFC in aggression. PMID:28660251

  3. Amygdala hyperactivation during symptom provocation in obsessive–compulsive disorder and its modulation by distraction

    Directory of Open Access Journals (Sweden)

    Daniela Simon

    2014-01-01

    Full Text Available Anxiety disorders have been linked to a hyperactivated cortico-amygdalar circuitry. Recent findings highlight the amygdala's role in mediating elevated anxiety in obsessive–compulsive disorder (OCD. However, modulation of amygdala hyperactivation by attentional distraction – an effective emotion regulation strategy in healthy individuals – has not yet been examined. While undergoing functional magnetic resonance imaging twenty-one unmedicated OCD patients and 21 controls performed an evaluation and a distraction task during symptom provocation with individually tailored OCD-relevant pictures. To test the specificity of responses, additional aversive and neutral stimuli were included. Significant group-by-picture type interactions were observed within fronto–striato–limbic circuits including the amygdala. In these regions patients showed increased BOLD responses during processing of OCD triggers relative to healthy controls. Amygdala hyperactivation was present across OCD symptom dimensions indicating that it represents a common neural correlate. During distraction, we observed dampening of patients' amygdala hyperactivity to OCD-relevant stimuli. Augmented amygdala involvement in patients during symptom provocation, present across OCD symptom dimensions, might constitute a correlate of fear expression in OCD linking it to other anxiety disorders. Attentional distraction seemed to dampen emotional processing of disorder-relevant stimuli via amygdala downregulation. The clinical impact of this strategy to manage anxiety in OCD should be further elucidated.

  4. Scopolamine provocation-based pharmacological MRI model for testing procognitive agents.

    Science.gov (United States)

    Hegedűs, Nikolett; Laszy, Judit; Gyertyán, István; Kocsis, Pál; Gajári, Dávid; Dávid, Szabolcs; Deli, Levente; Pozsgay, Zsófia; Tihanyi, Károly

    2015-04-01

    There is a huge unmet need to understand and treat pathological cognitive impairment. The development of disease modifying cognitive enhancers is hindered by the lack of correct pathomechanism and suitable animal models. Most animal models to study cognition and pathology do not fulfil either the predictive validity, face validity or construct validity criteria, and also outcome measures greatly differ from those of human trials. Fortunately, some pharmacological agents such as scopolamine evoke similar effects on cognition and cerebral circulation in rodents and humans and functional MRI enables us to compare cognitive agents directly in different species. In this paper we report the validation of a scopolamine based rodent pharmacological MRI provocation model. The effects of deemed procognitive agents (donepezil, vinpocetine, piracetam, alpha 7 selective cholinergic compounds EVP-6124, PNU-120596) were compared on the blood-oxygen-level dependent responses and also linked to rodent cognitive models. These drugs revealed significant effect on scopolamine induced blood-oxygen-level dependent change except for piracetam. In the water labyrinth test only PNU-120596 did not show a significant effect. This provocational model is suitable for testing procognitive compounds. These functional MR imaging experiments can be paralleled with human studies, which may help reduce the number of false cognitive clinical trials. © The Author(s) 2015.

  5. Bronchial provocation testing does not detect exercise-induced laryngeal obstruction.

    Science.gov (United States)

    Walsted, Emil Schwarz; Hull, James H; Sverrild, Asger; Porsbjerg, Celeste; Backer, Vibeke

    2017-01-02

    Exercise-induced laryngeal obstruction (EILO) is a key differential diagnosis for asthma in the presence of exertional respiratory symptoms. Continuous laryngoscopy during exercise (CLE), the current gold standard diagnostic test for EILO, has practical limitations. We aimed to establish if inspiratory flow data obtained during standard bronchoprovocation testing, to establish the presence of extra-thoracic hyper-responsiveness, may prove diagnostic for EILO and thus preclude requirement for CLE testing. We consecutively evaluated 37 adult subjects with exertional dyspnea and possible asthma referred over 6 months. All subjects received comprehensive assessment including a detailed clinical evaluation; pulmonary function testing, indirect and direct bronchial provocation testing, and CLE testing. Out of 37 subjects, moderate or severe EILO was diagnosed in 8 subjects (22%, all female) while 5 (14%) had both asthma and EILO. There was no correlation between degree of EILO during CLE and mean decrease in forced inspiratory flow (%FIF 50 ) obtained during neither the Methacholine (r = -0.15; p = 0.38) nor Mannitol (r = 0.04; p = 0.84) provocation tests. Inspiratory flow parameters obtained during bronchoprovocation tests did not reliably detect EILO. It remains that CLE is an important and key investigation modality in establishing a secure diagnosis of EILO.

  6. Experimental provocation of 'ice-cream headache' by ice cubes and ice water.

    Science.gov (United States)

    Mages, Stephan; Hensel, Ole; Zierz, Antonia Maria; Kraya, Torsten; Zierz, Stephan

    2017-04-01

    Background There are various studies on experimentally provoked 'ice-cream headache' or 'headache attributed to ingestion or inhalation of a cold stimulus' (HICS) using different provocation protocols. The aim of this study was to compare two provocation protocols. Methods Ice cubes pressed to the palate and fast ingestion of ice water were used to provoke HICS and clinical features were compared. Results The ice-water stimulus provoked HICS significantly more often than the ice-cube stimulus (9/77 vs. 39/77). Ice-water-provoked HICS had a significantly shorter latency (median 15 s, range 4-97 s vs. median 68 s, range 27-96 s). There was no difference in pain localisation. Character after ice-cube stimulation was predominantly described as pressing and after ice-water stimulation as stabbing. A second HICS followed in 10/39 (26%) of the headaches provoked by ice water. Lacrimation occurred significantly more often in volunteers with than in those without HICS. Discussion HICS provoked by ice water was more frequent, had a shorter latency, different pain character and higher pain intensity than HICS provoked by ice cubes. The finding of two subsequent HICS attacks in the same volunteers supports the notion that two types of HICS exist. Lacrimation during HICS indicates involvement of the trigeminal-autonomic reflex.

  7. Esophageal Manometry with Provocative Testing in Patients with Noncardiac Angina-Like Chest Pain

    Directory of Open Access Journals (Sweden)

    William G Paterson

    1991-01-01

    Full Text Available In a five year period 238 of 594 esophageal manometric studies performed in the authors’ laboratory were done on patients whose major reason for referral was noncardiac angina-like chest pain. Standard eophageal manometry was performed followed by an acid-antacid perfusion period (Bernstein test and then subcutaneous bethanechol (80 μg/kg to a maximum of 5 mg was adminstered. Baseline manometry was normal in 38% of patients and was diagnostic of ‘nutcracker’ esophagus, nonspecific esophageal motility disorder, diffuse esophageal spasm and isolated hypertensive lower esophageal sphincter in 24%, 19%, 16% and 3% of patients, respectively. Ninety-six of 238 patients (40% experienced reproduction of their presenting angina-like chest pain during acid perfusion. In 80% of these patients there were associated esophageal motor abnormal ilies induced by the acid perfusion. Thirty-six of 212 (17% experienced pain reproduction following the injection of bethanechol; however, 16 of these had already had their presenting chest pain reproduced during the acid perfusion study. In two-thirds of the patients with pain reproduction following bechanechol there was an associated bethanechol-induced esophageal motility disorder. Overall 49% of patients had their pain reproduced during provocative testing. The acid perfusion test reproduced the pain much more frequently than bethanechol simulation. This study reaffirms the value of esophageal manometry and provocative testing in this group of patients.

  8. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  9. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  10. Role of motivation to respond to provocation, the social environment, and trait aggression in alcohol-related aggression.

    Science.gov (United States)

    Tremblay, Paul F; Mihic, Ljiljana; Graham, Kathryn; Jelley, Jennifer

    2007-01-01

    Little attention has been paid to the motivation to respond to provocation and to the interaction between this motivation, alcohol, the drinking environment, and individual characteristics. Undergraduates at six Canadian universities (N = 1,232) read three vignettes describing conflict situations with social environmental manipulations while imagining themselves as either sober or intoxicated. Self-ratings assessed likelihood of assertive and aggressive responses and motivational indices of anger, offensiveness of the instigator's actions, and importance to respond to the provocation. Respondents also completed a measure of trait aggression. Multi-group structural equation models supported the hypothesis that perceived likelihood of reactive aggression is influenced by perceived alcohol intoxication, gender, trait aggression, social environmental factors, and motivation to respond to the provocation. In addition, a number of interactions were found among the predictors. These results provide insight into the types of factors that may influence aggression in drinking situations. Copyright 2007 Wiley-Liss, Inc.

  11. Chemical or Biological Terrorist Attacks: An Analysis of the Preparedness of Hospitals for Managing Victims Affected by Chemical or Biological Weapons of Mass Destruction

    Science.gov (United States)

    Bennett, Russell L.

    2006-01-01

    The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD) on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma City in 1995 and the use of planes as guided missiles directed into the Pentagon and New York’s Twin Towers in 2001 (9/11) and the tragic incidents involving twenty-three people who were infected and five who died as a result of contact with anthrax-laced mail in the Fall of 2001, have well established that the United States can be attacked by both domestic and international terrorists without warning or provocation. In light of these actions, hospitals have been working vigorously to ensure that they would be “ready” in the event of another terrorist attack to provide appropriate medical care to victims. However, according to a recent United States General Accounting Office (GAO) nationwide survey, our nation’s hospitals still are not prepared to manage mass causalities resulting from chemical or biological WMD. Therefore, there is a clear need for information about current hospital preparedness in order to provide a foundation for systematic planning and broader discussions about relative cost, probable effectiveness, environmental impact and overall societal priorities. Hence, the aim of this research was to examine the current preparedness of hospitals in the State of Mississippi to manage victims of terrorist attacks involving chemical or biological WMD. All acute care hospitals in the State were selected for inclusion in this study. Both quantitative and qualitative methods were utilized for data collection and analysis. Six hypotheses were tested. Using a

  12. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  13. Plagiarism explainer for students

    OpenAIRE

    Barba, Lorena A.

    2016-01-01

    A slide deck to serve as an explainer of plagiarism in academic settings, with a personal viewpoint. For my students.Also on SpeakerDeck:https://speakerdeck.com/labarba/plagiarism-explainer-for-students(The slide viewer on SpeakerDeck is much nicer.)

  14. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    International Nuclear Information System (INIS)

    Shin, Hyeongki; Kim, Juyoul

    2007-01-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity

  15. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hyeongki [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, Juyoul [Seoul National University, Seoul (Korea, Republic of)

    2007-07-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity.

  16. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  18. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-03-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.

  19. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  20. Papain-induced asthma: diagnosis by skin test, RAST and bronchial provocation test

    International Nuclear Information System (INIS)

    Baur, X.; Fruhmann, G.

    1979-01-01

    Seven out of eleven workers occupationally exposed to airborne papain developed immediate hypersensitive reactions, predominantly asthma and rhinitis. Skin tests and RAST with papain were positive in all symptomatic workers, but not in the four asymptomatic workers. Furthermore, out of forty non-exposed asthmatics, thirty-eight had negative RAST results and all had negative skin test results. Bronchial provocation tests with 0.15-0.5 mg papain performed in five patients with a positive case history showed in each case an immediate asthmatic reaction; in addition to that, one patient developed signs of a dual asthmatic reaction. These results suggest that airborne papain is a highly immunogenic agent in humans, which induces type I allergic reactions in a large percentage of the exposed subjects. (author)

  1. Posterior midline activation during symptom provocation in acute stress disorder: An fMRI study

    Directory of Open Access Journals (Sweden)

    Jan Christopher Cwik

    2014-05-01

    Full Text Available Functional imaging studies of patients with Posttraumatic Stress Disorder showed wide-spread activation of mid-line cortical areas during symptom provocation i.e., exposure to trauma-related cues. The present study aimed at investigating neural activation during exposure to trauma-related pictures in patients with Acute Stress Disorder (ASD shortly after the traumatic event. Nineteen ASD patients and 19 healthy control participants were presented with individualized pictures of the traumatic event and emotionally neutral control pictures during the acquisition of whole-brain data with a 3-T fMRI scanner. Compared to the control group and to control pictures, ASD patients showed significant activation in mid-line cortical areas in response to trauma-related pictures including precuneus, cuneus, postcentral gyrus and pre-supplementary motor area. The results suggest that the trauma-related pictures evoke emotionally salient self-referential processing in ASD patients.

  2. Evaluation of colonoscopic allergen provocation as a diagnostic tool in dogs with proven food hypersensitivity reactions.

    Science.gov (United States)

    Allenspach, K; Vaden, S L; Harris, T S; Gröne, A; Doherr, M G; Griot-Wenk, M E; Bischoff, S C; Gaschen, F

    2006-01-01

    To evaluate the colonoscopic allergen provocation (COLAP) test as a new tool for the diagnosis of IgE-mediated food allergy. Oral food challenges as well as COLAP testing were performed in a colony of nine research dogs with proven immediate-type food allergic reactions. In addition, COLAP was performed in five healthy dogs. When compared with the oral challenge test, COLAP accurately determined 18 of 23 (73 per cent) positive oral challenge reactions (73 per cent) in dogs with food allergies and was negative in the healthy dogs. The accuracy of this new test may be higher than that for gastric sensitivity testing. Therefore, COLAP holds promise as a new test to confirm the diagnosis of suspect IgE-mediated food allergy in dogs.

  3. Provocative and inhibitory effects of a video-EEG neuropsychologic protocol in juvenile myoclonic epilepsy.

    Science.gov (United States)

    Guaranha, Mirian Salvadori Bittar; da Silva Sousa, Patrícia; de Araújo-Filho, Gerardo Maria; Lin, Katia; Guilhoto, Laura Maria Figueiredo Ferreira; Caboclo, Luís Otávio Sales Ferreira; Yacubian, Elza Márcia Targas

    2009-11-01

    Studies suggest that higher cognitive functions could precipitate seizures in juvenile myoclonic epilepsy (JME). The present study aimed to analyze the effects of higher mental activity on epileptiform discharges and seizures in patients with JME and compare them to those of habitual methods of activation. Seventy-six patients with JME (41 female) underwent a video-EEG (electroencephalography) neuropsychologic protocol (VNPP) and habitual methods of activation for 4-6 h. Twenty-nine of the 76 (38.2%) presented provocative effect, and inhibition was seen in 28 of 31 (90.3%). A mixed effect was observed in 11 (35.5%), and 30 patients (39.5%) suffered no effect of VNPP. Action-programming tasks were more effective than thinking in provoking epileptiform discharges (23.7% and 11.0% of patients, respectively, p = 0.03). Inhibitory effect was observed equally in the various categories of tasks, except in mental calculation, which had a higher inhibitory rate. Habitual methods of activation were more effective than VNPP in provoking discharges. Anxiety disorders were diagnosed in 24 of 58 patients (41.4%); anxious patients had greater discharge indexes and no significant inhibitory effect on VNPP. Praxis exerted the most remarkable provocative effect, in accordance with the motor circuitry hyperexcitability hypothesis in JME. Inhibitory effect, which had no such task specificity, might be mediated by a widespread cortical-thalamic pathway, possibly involving the parietal cortex. The frequent inhibitory effect found under cortical activation conditions, influenced by the presence of anxiety, supports nonpharmacologic therapeutic interventions in JME.

  4. Methacholine bronchial provocation measured by spirometry versus wheeze detection in preschool children

    Directory of Open Access Journals (Sweden)

    Yahav Yaacov

    2005-06-01

    Full Text Available Abstract Background Determination of PC20-FEV1 during Methacholine bronchial provocation test (MCT is considered to be impossible in preschool children, as it requires repetitive spirometry sets. The aim of this study was to assess the feasibility of determining PC20-FEV1 in preschool age children and compares the results to the wheeze detection (PCW method. Methods 55 preschool children (ages 2.8–6.4 years with recurrent respiratory symptoms were recruited. Baseline spirometry and MCT were performed according to ATS/ERS guidelines and the following parameters were determined at baseline and after each inhalation: spirometry-indices, lung auscultation at tidal breathing, oxygen saturation, respiratory and heart rate. Comparison between PCW and PC20-FEV1 and clinical parameters at these end-points was done by paired Student's t-tests. Results and discussion Thirty-six of 55 children (65.4% successfully performed spirometry-sets up to the point of PCW. PC20-FEV1 occurred at a mean concentration of 1.70+/-2.01 while PCW occurred at a mean concentration of 4.37+/-3.40 mg/ml (p 1 by 44.7+/-14.5%; PEFR by 40.5+/-14.5 and FEF25–75 by 54.7+/-14.4% (P Conclusion Determination of PC20-FEV1 by spirometry is feasible in many preschool children. PC20-FEV1 often appears at lower provocation dose than PCW. The lower dose may shorten the test and encourage participation. Significant decrease in spirometry indices at PCW suggests that PC20-FEV1 determination may be safer.

  5. Individual Differences in Automatic Emotion Regulation Interact with Primed Emotion Regulation during an Anger Provocation

    Directory of Open Access Journals (Sweden)

    Ping Hu

    2017-04-01

    Full Text Available The current study investigated the interactive effects of individual differences in automatic emotion regulation (AER and primed emotion regulation strategy on skin conductance level (SCL and heart rate during provoked anger. The study was a 2 × 2 [AER tendency (expression vs. control × priming (expression vs. control] between subject design. Participants were assigned to two groups according to their performance on an emotion regulation-IAT (differentiating automatic emotion control tendency and automatic emotion expression tendency. Then participants of the two groups were randomly assigned to two emotion regulation priming conditions (emotion control priming or emotion expression priming. Anger was provoked by blaming participants for slow performance during a subsequent backward subtraction task. In anger provocation, SCL of individuals with automatic emotion control tendencies in the control priming condition was lower than of those with automatic emotion control tendencies in the expression priming condition. However, SCL of individuals with automatic emotion expression tendencies did no differ in the automatic emotion control priming or the automatic emotion expression priming condition. Heart rate during anger provocation was higher in individuals with automatic emotion expression tendencies than in individuals with automatic emotion control tendencies regardless of priming condition. This pattern indicates an interactive effect of individual differences in AER and emotion regulation priming on SCL, which is an index of emotional arousal. Heart rate was only sensitive to the individual differences in AER, and did not reflect this interaction. This finding has implications for clinical studies of the use of emotion regulation strategy training suggesting that different practices are optimal for individuals who differ in AER tendencies.

  6. Cognitive reactivity to sad mood provocation and the prediction of depressive relapse.

    Science.gov (United States)

    Segal, Zindel V; Kennedy, Sidney; Gemar, Michael; Hood, Karyn; Pedersen, Rebecca; Buis, Tom

    2006-07-01

    Episode remission in unipolar major depression, while distinguished by minimal symptom burden, can also be a period of marked sensitivity to emotional stress as well as an increased risk of relapse. To examine whether mood-linked changes in dysfunctional thinking predict relapse in recovered patients who were depressed. In phase 1 of this study, patients with major depressive disorder were randomly assigned to receive either antidepressant medication or cognitive behavior therapy. In phase 2, patients who achieved clinical remission underwent sad mood provocation and were then observed with regular clinical assessments for 18 months. Outpatient psychiatric clinics at the Centre for Addiction and Mental Health, Toronto, Ontario. A total of 301 outpatients with major depressive disorder, aged 18 to 65 years, participated in phase 1 of this study and 99 outpatients with major depressive disorder in remission, aged 18 to 65 years, participated in phase 2. Occurrence of a relapse meeting DSM-IV criteria for a major depressive episode as assessed by the longitudinal interval follow-up evaluation and a Hamilton Depression Rating Scale score of 16 or greater. Patients who recovered through antidepressant medication showed greater cognitive reactivity following the mood provocation than those who received cognitive behavior therapy. Regardless of type of prior treatment, the magnitude of mood-linked cognitive reactivity was a significant predictor of relapse over the subsequent 18 months. Patients whose mood-linked endorsement of dysfunctional attitudes increased by a minimum of 8 points had a significantly shorter time to relapse than those whose scores were not as elevated. The vulnerability of remitted depressed patients for illness relapse may be related to the (re)activation of depressive thinking styles triggered by temporary dysphoric states. This is the first study to link such differences to prognosis following successful treatment for depression. Further

  7. Responses of dogs with food allergies to single-ingredient dietary provocation.

    Science.gov (United States)

    Jeffers, J G; Meyer, E K; Sosis, E J

    1996-08-01

    To characterize specific food ingredients causing allergic reactions in dogs and to assess cross-reactivity between proteins derived from a single animal source or from different plant products. Prospective study. 25 dogs with histories and cutaneous signs consistent with food-allergic dermatitis. Dogs were fed a food-elimination diet until resolution of clinical signs and then challenged with their original diet. A diagnosis of food allergy was made if there was complete return of pruritus within 14 days of challenge exposure. After diagnosis, dogs were fed the food-elimination diet until signs related to dietary challenge abated. The dogs then were fed beef, chicken, chicken eggs, cows' milk, wheat, soy, and corn in single-ingredient provocation trials for 1 week. Any cutaneous reactions to these food ingredients were recorded by their owners. Beef and soy most often caused adverse cutaneous reactions, although all ingredients induced clinical signs in at least 1 dog. Mean number of allergens per dog was 2.4, with 80% reacting to 1 or 2 proteins and 64% reacting to 2 or more of the proteins tested. A significant difference was found between dogs reacting to beef versus cows' milk and between dogs reacting to soy versus wheat; thus, the hypothesis of cross-reactivity to ingredients derived from a single animal source or to different plant products was not supported. Similar differences between chicken meat and eggs were not identified. Long-term management of dogs with food allergies is facilitated by identification of the most commonly encountered food allergens. Because cross-reactivity cannot be verified, each protein source should be included separately in food-provocation trials.

  8. The diagnostic value of three sacroiliac joint pain provocation tests for sacroiliitis identified by magnetic resonance imaging

    DEFF Research Database (Denmark)

    Arnbak, B; Jurik, A G; Jensen, R K

    2017-01-01

    OBJECTIVES: The aim of the current study was to investigate the diagnostic value of three sacroiliac (SI) joint pain provocation tests for sacroiliitis identified by magnetic resonance imaging (MRI) and stratified by gender. METHOD: Patients without clinical signs of nerve root compression were...

  9. Can migraine aura be provoked experimentally? A systematic review of potential methods for the provocation of migraine aura

    DEFF Research Database (Denmark)

    Lindblad, Marianne; Hougaard, Anders; Amin, Faisal Mohammad

    2017-01-01

    , physical activity, calcitonin gene-related peptide infusion, chocolate ingestion, and the intravenous injection of insulin. In addition, carotid artery puncture has consistently been reported as a trigger of aura. Conclusions No safe and efficient method for aura provocation exists at present, but several...

  10. The Relation between Early Adolescents' Trust Beliefs in Peers and Reactions to Peer Provocation: Attributions of Intention and Retaliation

    Science.gov (United States)

    Rotenberg, Ken J.; Betts, Lucy R.; Moore, Jolene

    2013-01-01

    The authors examined the relation between early adolescents' trust beliefs in peers and both their attributions for, and retaliatory aggression to, peer provocation. One hundred and eight-five early adolescents (102 male) from the United Kingdom (M age = 12 years, 2 months, SD = 3 months) completed the Children's Generalized Trust Beliefs in peer…

  11. A systematic review of the diagnostic accuracy of provocative tests of the neck for diagnosing cervical radiculopathy.

    NARCIS (Netherlands)

    Rubinstein, S.M.; Pool, J.J.; van Tulder, M.W.; Riphagen, II; de Vet, H.C.W.

    2007-01-01

    Clinical provocative tests of the neck, which position the neck and arm inorder to aggravate or relieve arm symptoms, are commonly used in clinical practice in patients with a suspected cervical radiculopathy. Their diagnostic accuracy, however, has never been examined in a systematic review. A

  12. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    Energy Technology Data Exchange (ETDEWEB)

    Ball, Ryan Jokl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly used by terrorists in asymmetric conflicts.

  13. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  14. Computer jargon explained

    CERN Document Server

    Enticknap, Nicholas

    2014-01-01

    Computer Jargon Explained is a feature in Computer Weekly publications that discusses 68 of the most commonly used technical computing terms. The book explains what the terms mean and why the terms are important to computer professionals. The text also discusses how the terms relate to the trends and developments that are driving the information technology industry. Computer jargon irritates non-computer people and in turn causes problems for computer people. The technology and the industry are changing so rapidly; it is very hard even for professionals to keep updated. Computer people do not

  15. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    National Research Council Canada - National Science Library

    Hudson, Rex A

    1999-01-01

    ...) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure...

  16. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    This study is based on open source research into the scope of Asian organized crime and terrorist activity in Canada during the period 1999 to 2002, and the extent of cooperation and possible overlap...

  17. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  18. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  19. Improving Local and State Agency Response to Terrorist Incidents Involving Biological Weapons

    National Research Council Canada - National Science Library

    2003-01-01

    .... Because of multiple terrorist acts such as the September II, 2001 attacks on the Pentagon and the World Trade Center, as well as anthrax contaminated mail and the Oklahoma City bombing, there is a...

  20. 40 years of terrorist bombings - A meta-analysis of the casualty and injury profile.

    Science.gov (United States)

    Edwards, D S; McMenemy, L; Stapley, S A; Patel, H D L; Clasper, J C

    2016-03-01

    Terrorists have used the explosive device successfully globally, with their effects extending beyond the resulting injuries. Suicide bombings, in particular, are being increasingly deployed due to the devastating effect of a combination of high lethality and target accuracy. The aim of this study was to identify trends and analyse the demographics and casualty figures of terrorist bombings worldwide. Analysis of the Global Terrorism Database (GTD) and a PubMed/Embase literature search (keywords "terrorist", and/or "suicide", and/or "bombing") from 1970 to 2014 was performed. 58,095 terrorist explosions worldwide were identified in the GTD. 5.08% were suicide bombings. Incidents per year are increasing (Pprofile of survivors to guide the immediate response by the medical services and the workload in the coming days. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Changing the story the role of the narrative in the success or failure of terrorist groups

    OpenAIRE

    Mellen, Brian C.

    2009-01-01

    Approved for public release, distribution unlimited This thesis focuses on the nexus between a terrorist group's narrative and the group's success or failure in achieving its strategic goals. This work theorizes that the interaction of competing narratives exerts a systematic impact on the ability of the terrorist group to achieve its strategic goals through the influence that the narratives have over a group's members, the group's adversary, and the affected population. Although a te...

  2. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    OpenAIRE

    Li MingChu; Yang Zekun; Lu Kun; Guo Cheng

    2017-01-01

    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watch...

  3. The human body as a terrorist weapon: hunger strikes and suicide bombers

    OpenAIRE

    Mollica, Marcello; Dingley, James

    2007-01-01

    This article argues that a major factor in terrorist acts is an appeal to the actor's own community at an emotional and symbolic level, through acts of sacrifice, particularly self-sacrifice. Although other aims also exist, a prime concern is to recall the actor's home audience to the struggle, because the actor regards himself as acting on their behalf. This utilizes the imagery and symbolism of traditional religion, implying a strong communal and non-material impetus to terrorist acts, rath...

  4. Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations

    OpenAIRE

    Roy, de, van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents th...

  5. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  6. Self-explaining roads

    NARCIS (Netherlands)

    Horst, A.R.A. van der; Kaptein, N.

    1999-01-01

    As a means to a sustainable safe traffic environment the concept of Self-Explaining Roads (SER) has been developed. The SER concept advocates a traffic environment that elicits safe driving behaviour simply by its design. In order to support safe driving behaviour and appropriate speed choice,

  7. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  8. An Overview of NCRP Report No. 138 on Terrorist Activities

    Science.gov (United States)

    Poston, John, Sr.

    2005-04-01

    In late 1998, the National Council on Radiation Protection and Measurements (NCRP) convened Scientific Committee 46-14 to prepare a report on the radiological safety aspects of terrorist activities involving radioactivity. The work of this committee was funded through a contract with the Planning and Preparedness Division of the Office of Emergency Management of the Department of Energy. The committee was composed of a diverse group of individuals with expertise in many areas in addition to radiation safety and emergency response. These areas included law (both federal and state), public communications, and psychosocial aspects of such incidents. The statement of work focused the work of the committee, and the resulting report did not necessarily address all issues of such activities. One of the charges of the committee was to provide guidance as to necessary research and make recommendations regarding the present infrastructure with the responsibility for responding to such incidents. This presentation will provide an overview of NCRP Report No. 138 and focus on some of the critical issues raised in the report. These issues include recognition of the event, the interface between federal, state, and local authorities, exposure limits for the first-responders, clean-up criteria, training and resources, the psychosocial aspects of such events, and communications with the media and the public. This report represented the ``beginning'' of such considerations. It pointed the way for additional studies and research in this very important area.

  9. Foreign (Terrorist Fighter Estimates: Conceptual and Data Issues

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2015-10-01

    Full Text Available This Policy Brief – a short version of a larger Research Paper to be released by ICCT in late 2015 – focuses on the phenomenon of foreign (terrorist fighters (FTFs as it relates to Syria and Iraq. It concentrates on recruits to jihad and the astonishing growth in numbers from less than 1,000 in 2011 to more than 3,500 in 2012, 8,500+ in 2013, 18,000+ in 2014 to more than 25,000 by fall 2015. By October 2015, nearly 30,000 militants from more than 100 countries had become foreign fighters with the so-called “Islamic State” (IS in Syria and Iraq and other militant groups. This Policy Brief first discusses various definitions of FTFs by disaggregating the “foreign”, “terrorist” and “fighters” elements of FTFs of the UN Security Council definition in resolution 2178 (2014. Subsequently, an attempt is made to bring some structure and order to the widely diverging estimates of the numbers of foreign fighters and their origins, with tables presenting the best available estimates for different sides of the conflict at different moments in time since 2011. UN estimates on foreign fighters are juxtaposed with estimates from other sources. The biggest uncertainty is the ratio of foreign fighters to IS own core manpower. It is likely that at least 40 percent of the fighters of IS are foreigners and many more if Iraqis in Syria are counted as such.

  10. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  11. Screening Cargo Containers to Remove a Terrorist Threat

    International Nuclear Information System (INIS)

    Hazi, A

    2005-01-01

    Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S

  12. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  13. Modeling cascading failures in interdependent infrastructures under terrorist attacks

    International Nuclear Information System (INIS)

    Wu, Baichao; Tang, Aiping; Wu, Jie

    2016-01-01

    An attack strength degradation model has been introduced to further capture the interdependencies among infrastructures and model cascading failures across infrastructures when terrorist attacks occur. A medium-sized energy system including oil network and power network is selected for exploring the vulnerabilities from independent networks to interdependent networks, considering the structural vulnerability and the functional vulnerability. Two types of interdependencies among critical infrastructures are involved in this paper: physical interdependencies and geographical interdependencies, shown by tunable parameters based on the probabilities of failures of nodes in the networks. In this paper, a tolerance parameter α is used to evaluation of the overloads of the substations based on power flow redistribution in power transmission systems under the attack. The results of simulation show that the independent networks or interdependent networks will be collapsed when only a small fraction of nodes are attacked under the attack strength degradation model, especially for the interdependent networks. The methodology introduced in this paper with physical interdependencies and geographical interdependencies involved in can be applied to analyze the vulnerability of the interdependent infrastructures further, and provides the insights of vulnerability of interdependent infrastructures to mitigation actions for critical infrastructure protections. - Highlights: • An attack strength degradation model based on the specified locations has been introduced. • Interdependencies considering both physical and geographical have been analyzed. • The structural vulnerability and the functional vulnerability have been considered.

  14. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  15. Losing one’s Cool: Social Competence as a Novel Inverse Predictor of Provocation-Related Aggression

    Science.gov (United States)

    Fetterman, Adam K.; Hopkins, Kay; Krishnakumar, Sukumarakurup

    2013-01-01

    Provocations and frustrating events can trigger an urge to act aggressively. Such behaviors can be controlled, but perhaps more so for people who can better distinguish effective from ineffective courses of action. The present three studies (total N = 285) introduce a scenario-based measure of this form of social competence. In Study 1, higher levels of social competence predicted lower levels of trait anger. Study 2 presented provocation scenarios and asked people whether they would engage in direct, indirect, and symbolic forms of aggression when provoked. Social competence was inversely predictive of all forms of aggressive responding. Study 3 focused on reactions to frustrating events in daily life. Such events were predictive of hostile behavior and cognitive failures particularly at low levels of social competence. The research establishes that social competence can be assessed in an objective manner and that variations in it are systematically predictive of reactive aggression. PMID:23754040

  16. Ruminal changes in monensin- and lasalocid-fed cattle grazing bloat-provocative alfalfa pasture.

    Science.gov (United States)

    Katz, M P; Nagaraja, T G; Fina, L R

    1986-10-01

    Microbial and fermentation changes in the rumen in monensin- and lasalocid-fed cattle grazing bloat-provocative alfalfa pasture were studied using genetically bloat-susceptible, ruminally-cannulated adult cattle. Monensin at .66 and .99 mg/kg body weight daily reduced the severity of legume bloat by 41 and 73%, respectively. The same doses of lasalocid reduced bloat by 25 and 12%. Comparison of ruminal contents from animals before treatment with ruminal contents from antibiotic-treated animals showed no differences in pH, ammonia, soluble N, soluble carbohydrate, ethanol-precipitable slime and anaerobic bacterial counts. Monensin treatment decreased protozoal numbers and microbial activity, as evidenced by lower gas production from in vitro fermentation of ground alfalfa hay when compared to pretreatment. Lasalocid had no effect on protozoal counts and in vitro gas production. Addition of monensin or lasalocid (12 micrograms/ml) to in vitro fermentation of chopped, fresh alfalfa reduced microbial activity as evidenced by higher soluble N, lower ammonia concentration and decreased gas production. Monensin reduced the amount of ethanol-precipitable slime and protozoal numbers. Reduction in the severity of bloat when monensin was fed appears to be due to decreased protozoal numbers, which resulted in decreased gas production. Lasalocid did not reduce legume bloat because of its minimal effect on the ruminal protozoa.

  17. HRCT and bronchial asthma: visualization of the pathophysiologic changes of the pulmonary parenchyma after inhalation provocation

    International Nuclear Information System (INIS)

    Schueller, G.; Neumann, K.; Helbich, T.; Herold, C.J.; Riemer, H.; Backfrieder, W.; Sertl, K.; Pittner, B.

    2004-01-01

    Purpose: To characterize parenchymal lung affections morphologically in patients with asthma and healthy subjects by high resolution computed tomography (HRCT) subsequent to histamine-triggered inhalation bronchoprovocation and salbutamolinduced broncholysis, and to compare the results with pulmonary function tests. Materials and Methods: Fifteen asthmatics with bronchial hyperreactivity, with a>20% decrease in FEV1 and a>10 mmHg decrease in PaO 2 after bronchoprovocation (PC20%+), twelve asthmatics with a 10 mmHg decrease in PaO 2 after bronchoprovocation (PC20%-), and eight healthy persons without bronchial hyperreactivity underwent inhalation bronchoprovocation and broncholysis. Spirometer-triggered HRCT at high lung volumes was performed, and total and peripheral lung densities and the amount of solid lung structures, representing predominantly vessels, were measured. Results: After bronchoprovocation, we observed significant decreases in total and peripheral lung densities in all groups (p 0.05), as compared to the baseline measurements. In hyperreactive patients, PaO 2 significantly decreased after provocation and significantly increased after lysis (p [de

  18. Conflicts in Africa and Major Powers: Proxy Wars, Zones of Influence or Provocative Instability

    Directory of Open Access Journals (Sweden)

    Jerry Rowlings Tafotie

    2016-12-01

    Full Text Available The article analyses the different nature of conflicts that have occurred in Africa since the end of Cold War. A special attention is given to the role of external factors in the process of conflict evolution and the escalation of violence on the African continent. In effect, this paper demonstrates through a critical examination of the meaning of proxy war as, zone of influence or provocation of instability as a strategy and an analysis of its employment by the United States and China, France etc. in Africa. The new potential confrontation between the United States and China as in Sudan, France in its former coloniesis not only based on a clash of world views about the structure and nature of international relations and security but largely over the control of strategically vital energy resources based in Africa. The authors conclude that this ultimately creates permanent tensions or bitter conflicts between the actors and African populations as a factor that have negative impact on the peace and stability of continent. According to the context of superpower conflict strategies, this paper critically examines, zone of influence, provoking of instability or proxy war as a viable national strategy of nuclear armed great powers in advancing and/or defending their global national interests in a bipolar/multipolar international system.

  19. Effect of terfenadine on nasal, eustachian tube, and pulmonary function after provocative intranasal histamine challenge.

    Science.gov (United States)

    Skoner, D P; Doyle, W J; Boehm, S; Fireman, P

    1991-12-01

    Previous studies have documented that intranasal histamine challenge results in nasal and eustachian tube obstruction (ETO) in human volunteers. The purpose of the present study was to assess the effect of pretreatment with terfenadine, a nonsedating antihistamine on the pathophysiologic consequences of intranasal histamine challenge. Fifteen subjects with allergic rhinitis were challenged intranasally with saline and increasing histamine doses (0.01, 0.1, 0.5, 1.0, 5.0, and 10.0 mg) before pretreatment (baseline) and after 1 week of pretreatment with terfenadine, 60 mg b.i.d., terfenadine, 120 mg b.i.d., and placebo. Nasal conductance as measured by posterior rhinomanometry showed a dose-dependent, monotonic decrease following sequential administration of the histamine solutions, but there were no apparent differences in the average responses among the four challenge sessions. The frequency of ETO after histamine challenge was decreased by pretreatment with both doses of terfenadine, although this was not significant. Histamine-induced sneezing and rhinorrhea, but not congestion, were significantly reduced by terfenadine pretreatment. There was no evidence of extension of the histamine effects to the lower airway. The results of the present study suggest that terfenadine, a nonsedating antihistamine, had a favorable effect on sneezing and rhinorrhea after provocative intranasal histamine challenge, but did not significantly attenuate the subjective or objective nasal and ET obstructive responses.

  20. On recent advances in human engineering Provocative trends in embryology, genetics, and regenerative medicine.

    Science.gov (United States)

    Anton, Roman

    2016-01-01

    Advances in embryology, genetics, and regenerative medicine regularly attract attention from scientists, scholars, journalists, and policymakers, yet implications of these advances may be broader than commonly supposed. Laboratories culturing human embryos, editing human genes, and creating human-animal chimeras have been working along lines that are now becoming intertwined. Embryogenic methods are weaving traditional in vivo and in vitro distinctions into a new "in vivitro" (in life in glass) fabric. These and other methods known to be in use or thought to be in development promise soon to bring society to startling choices and discomfiting predicaments, all in a global effort to supply reliably rejuvenating stem cells, to grow immunologically non-provocative replacement organs, and to prevent, treat, cure, or even someday eradicate diseases having genetic or epigenetic mechanisms. With humanity's human-engineering era now begun, procedural prohibitions, funding restrictions, institutional controls, and transparency rules are proving ineffective, and business incentives are migrating into the most basic life-sciences inquiries, wherein lie huge biomedical potentials and bioethical risks. Rights, health, and heritage are coming into play with bioethical presumptions and formal protections urgently needing reassessment.

  1. North Korea's satellite launch: provocation and ballistic progress; Le lancement d'un satellite par la Coree du Nord: entre provocation et progres des capacites balistiques

    Energy Technology Data Exchange (ETDEWEB)

    Sitt, Bernard

    2013-12-15

    North Korea's putting into orbit of a small meteorological satellite using an Unha-3 launcher on the 13 December 2013, a year on from Kim Jong-il's passing, smacks of provocation. The launch of an SLV that is closely related to the Taepodong-2 and that has numerous characteristics in common with a long-range ballistic missile contravened Security Council Resolutions 1695 (2006), 1718 (2006), and 1874 (2009), adopted in response to nuclear and ballistic tests carried out by Pyongyang. These resolutions implemented a progressively more strenuous regime of sanctions, which cannot fail to have marked the North Korean dictatorship, at least in economic and financial terms. The provisional successes and failures of the Six-party talks, mediated by China, which have been at a dead-end since 2009 bear witness to the unpredictability of the North's reactions. Pyongyang's double-agenda is, nonetheless, relatively easily to discern. Firstly, with this successful launch, North Korea has redeemed the failure of the first Unha-3 launch on the 13 April 2012, at the same time as Kim Jong-un took power and the country was celebrating the centenary of the birth of its founder, Kim Il-sung. This success evidently helps to bolster both the young leader's prestige on the domestic front and his sway over the army. Simultaneously, and beyond any symbolic value, North Korea's development of long-range ballistic capabilities constitutes veritable progress, on the back of a series of failures since 2006. Naturally, the reliability of the Unha-3 launcher (or of an improved Taepodong-2) is by no means guaranteed. Moreover, its payload is limited, since it can presently only launch small satellites, and thus well below the capacity needed to carry a nuclear weapon. If this is indeed North Korea's objective in years to come, it will need to make considerable technological progress, including the development of sufficiently small nuclear devices, which would necessitate further nuclear tests. In

  2. [Safety and efficacy of a new preservative-free levocabastine ophthalmic solution (Levofree®) using the conjunctival provocation test].

    Science.gov (United States)

    Allaire, C; Siou-Mermet, R; Bassols, A

    2012-09-01

    To evaluate the safety and efficacy of preservative-free levocabastine 0.05 % ophthalmic solution compared to placebo (vehicle) and to preserved levocabastine 0.05 % ophthalmic suspension in the prevention of allergic conjunctivitis induced by a conjunctival provocation test. Ninety-two subjects (18-50 years) with a previous history of allergic conjunctivitis to pollen were randomised to receive either preservative-free levocabastine solution in one eye and preserved levocabastine suspension in the fellow eye (n=69), or preservative-free levocabastine in one eye and placebo in the fellow eye (n=23). One drop of each product was administered 10 minutes (visit 3) and 4 hours (visit 4) prior to the provocation test. The primary efficacy criterion was the sum of the itching and conjunctival hyperemia scores assessed at 3, 5 and 10 minutes after the provocation test. The safety evaluation included adverse events, visual acuity, intra-ocular pressure and study drug drop sensation. The efficacy of the preservative-free solution was significantly higher than that of placebo at all time points (P≤0.01) with one exception at visit 4 (3 minutes after the provocation test). It was significantly higher than that of the preserved suspension at visit 3, and equivalent at visit 4. The incidence of adverse events was lower with the preservative-free solution than with the preserved suspension. 94.2 % and 95.7 % subjects rated preservative-free levocabastine drop sensation as "good" or "very good" at visits 3 and 4 respectively, whereas these rates were 68.1 % and 63.8 % with preserved levocabastine. This difference between the two formulations was highly statistically significant (Ppreservative-free levocabastine was superior to that of the placebo and of the preserved suspension at visit 3, at least as effective as the preserved suspension at visit 4, and better tolerated at each visit. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  3. MAGMADIM: Young Explainers Program

    International Nuclear Information System (INIS)

    Paltiel, Z.

    2005-01-01

    Full Text:Physics teachers and educators constantly face the problem of inspiring their students to major in physics. On the other hand, science museums are designed to provide a pleasant environment which will stimulate and encourage a science associated experience to the general public. Typically, there is no intention to teach science as such in science museums. One may, however, use the science museum to teach and inspire certain groups of students in a much deeper sense. In fact they may actually enthusiastically learn much of the school physics curriculum at the museum. This report discusses the Magmadim program through which 10th graders are trained to be young explainers at the Weizmann Institutes Clore Garden of Science. To this end they study the physics underlying its exhibits in an after-school course. The ultimate goal is for the 'magmadim' to become the best possible explainers and be able to face all sorts of museum visitors. Along with learning how to instruct visitors, they must learn the physics behind the exhibits to give a full explanation of the exhibit and be able to answer any question that may arise. Our 5 year experience with the program shows that its self-selected participants not only study a lot of science, but also like it and learn how to explain the content to other people. This program, along with similar programs at the Bloomfield Science Museum and the Madatzim (young physics tutors) program of Ort, help in promoting the interest in science in general and physics in particular among school students. Various ways to expand the programs will also be discussed

  4. Linear Algebra Thoroughly Explained

    CERN Document Server

    Vujičić, Milan

    2008-01-01

    Linear Algebra Thoroughly Explained provides a comprehensive introduction to the subject suitable for adoption as a self-contained text for courses at undergraduate and postgraduate level. The clear and comprehensive presentation of the basic theory is illustrated throughout with an abundance of worked examples. The book is written for teachers and students of linear algebra at all levels and across mathematics and the applied sciences, particularly physics and engineering. It will also be an invaluable addition to research libraries as a comprehensive resource book for the subject.

  5. Mobile kidney pain provocation ultrasonography before surgery for symptomatic mobile kidney: A prospective study of 43 consecutive patients.

    Science.gov (United States)

    Arnerlöv, Conny; Söderström, Minette; Öhberg, Lars

    2016-01-01

    The aim of this study was to evaluate whether mobile kidney pain provocation ultrasonography together with intravenous pyelography in supine and standing positions and a full medical history can confirm the diagnosis of the clinical condition of symptomatic mobile kidney and aid the selection of patients for surgical treatment. In a consecutive study, 43 patients with the clinical picture of symptomatic mobile kidney, a positive mobile kidney pain provocation ultrasonography and a renal descent of at least 2 lumbar vertebral heights on intravenous pyelography in the standing position, were operated on with nephropexy. Patients' pain relief after nephropexy was evaluated by clinical follow-up, a questionnaire and visual analogue scale (VAS) scoring. Reduction of pain after nephropexy was associated with a significant decrease in VAS scoring from a median of 8 (range 4-10) preoperatively to a median of 0 (range 0-7) postoperatively (p mobile kidney pain provocation ultrasonography and intravenous pyelography in supine and standing positions can verify the diagnosis of symptomatic mobile kidney and aid the selection of patients who will benefit from nephropexy.

  6. Identification of critical locations across multiple infrastructures for terrorist actions

    International Nuclear Information System (INIS)

    Patterson, S.A.; Apostolakis, G.E.

    2007-01-01

    This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7 m of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIS) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIS system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when infrastructures

  7. Internal disc derangement in patients with low back pain: correlation of MR imaging and provocative discography and CT discography

    International Nuclear Information System (INIS)

    Chung, Hye Won; Cheon, Jung Eun; Hong, Sung Hwan; Kang, Heung Sik; Lee, Ji Ho; Oh, Joo Han; Jeon, Pyoung

    2004-01-01

    The aim of this study was to correlate the MR imaging abnormalities of the lumbar intervertebral discs, with emphasis being placed on the high intensity zone (HIZ) with the use of discography for pain provocation and disc morphologic evaluation of the disc. Consecutive patients with low back pain unresponsive to conservative treatment, and who were being considered for spinal fusion had MRI performed, and this was followed by lumbar discography. The MR imaging, discography and CT discography (CTD) were evaluated for all of the 19 patients. Forty-three lumbar discs in 19 patients were included in this study. The findings of MR and CTD images were evaluated retrospectively with the professional opinion and agreement of two radiologists. MR images were assessed for the presence or absence of decreased T2-wighted signal intensity, decreased disc height, annular bulging, HIZ on T2-weighted images and disc herniation. The results of pain provocation were graded as 0, nonconcordant pain; 1, definite pain, but only as part of the symptom complex; 2, concordant pain. The morphology of CTD was analyzed for presence or absence of disc degeneration, radial tearing and extravasation of the contrast agent. The presence of radial tearing was defined as contrast extension to the outer third of the annulus. The prevalence of all MR abnormalities was calculated, and the data were compared with disc morphologic characteristics and the pain response on provocative discography. We used the chi-square test to analyze the results. Grade 1 and 2 discogenic pain was observed in 8 (19%) and 12 disc levels (28%), respectively. All of the seven non-degenerated discs on MR had no pain response. The decreased SI on T2-weighted image, annular bulging and HIZ were significantly correlated with discogenic pain. Extravasation of contrast media had good correlation with annular bulging and disc herniation on MRI. Radial tearing on CT discography correlated significantly with HIZ. The HIZ was

  8. Matlab for engineers explained

    CERN Document Server

    Gustafsson, Fredrik

    2003-01-01

    This book is written for students at bachelor and master programs and has four different purposes, which split the book into four parts: 1. To teach first or early year undergraduate engineering students basic knowledge in technical computations and programming using MATLAB. The first part starts from first principles and is therefore well suited both for readers with prior exposure to MATLAB but lacking a solid foundational knowledge of the capabilities of the system and readers not having any previous experience with MATLAB. The foundational knowledge gained from these interactive guided tours of the system will hopefully be sufficient for an effective utilization of MATLAB in the engineering profession, in education and in research. 2. To explain the foundations of more advanced use of MATLAB using the facilities added the last couple of years, such as extended data structures, object orientation and advanced graphics. 3. To give an introduction to the use of MATLAB in typical undergraduate courses in elec...

  9. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  10. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    Science.gov (United States)

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  11. Provocative questions in parochial sex education classes: higher incidence in younger students.

    Science.gov (United States)

    Moreno, Megan; Breuner, Cora C; Lozano, Paula

    2008-10-01

    Recent data show US adolescents are engaging in sexual activity at earlier ages; however, little is known about young teens' sexual attitudes and behaviors. Examining teens' questions in sex education classes may provide insight into these attitudes and behaviors. Quasi cohort study Parochial middle school sex education classes 5(th) through 8(th) graders Students' anonymous written questions submitted at the outset of sex education classes between 2003 and 2005. Questions were classified into topic categories. Three additional variables were then coded for each question. Ethics/guidance questions included requests for advice or value judgments. Prohibited questions included the topics homosexuality, abortion, masturbation, and contraception. "Red flag" questions were those that suggested consideration of or engagement in sexual behavior. Among 473 questions submitted by 410 students, the most popular topics for 5(th)/6(th) graders were pregnancy and puberty, and for 7(th)/8(th) graders puberty and menstruation. 41 questions (8.6%) were prohibited. 29 questions (6.2%) asked about ethics/guidance. 18 questions (3.81%) were coded as red flag questions. A chi-square analysis showed that 5(th)/6(th) graders asked more questions in the ethics/guidance (8.3% versus 3.64%) and red flag question categories (5.53% versus 1.82%) (P < 0.05) than 7(th)/8(th) graders. Although provocative questions represent a minority of these middle students' queries, these requests suggest the urgency of providing appropriate guidance to young teens, given the risks of early sexual activity. The role of school education programs, physicians and parents in addressing questions of this sort should be considered.

  12. Mobile system for radiation reconnaissance after terrorist attack

    International Nuclear Information System (INIS)

    Resehetin, V. P.

    2009-01-01

    Well-timed radiation reconnaissance aimed at identifying a source of radiation contamination and drawing up a contamination map represents an important and complex problem, the solution of which allows for the reduction of the irradiation dose, the implementation of decontamination works, and finally minimizing the consequences of a terrorist attack. New opportunities for operational gathering of radiation contamination data and corresponding space coordinates can be associated with the development of mobile systems which provide measurements of ionizing radiation dose rate and corresponding space coordinates, and subsequent transferral to the crisis centre server where these data are processed and used for mapping radiation contamination. In such a way, the data obtained on radiation contamination could be incorporated in a timely manner as input data to computer models, describing the dispersion of radionuclides in an environment that makes it possible not only to forecast the development of a situation but to define necessary protection measures for mitigating and localizing the consequences. The mobile reconnaissance system was developed as a prototype of such a solution, based on a cellular terminal such as the Nokia 12i (Teltonika BoxGPS). A Global Positioning System (GPS) was used to determine space coordinates. A Russian BDMG device measured the dose rate of ionizing radiation, and the subsequent data were transferred to the server of the crisis centre of the Nuclear Safety Institute of RAS (IBRAE). The main operation regime involved setting the GPRS connection, transferring data, and switching off the connection. A change of the operation regime can be produced via SMS commands from the crisis centre's terminal or with the help of a cellular phone. When a connection is not available, the data are aggregated in memory and transferred to the server when the connection channel arises. A few data transfer protocols, including FTP and HTTP/HTTPS, are provided

  13. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  14. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Directory of Open Access Journals (Sweden)

    Li MingChu

    2017-01-01

    Full Text Available The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency.

  15. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  16. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  17. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Directory of Open Access Journals (Sweden)

    H.A Eiselt

    2015-02-01

    Full Text Available This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.

  18. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researche...

  19. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002, The two most notorious terrorist organizations during this period were the "November 17" group and another group...

  20. ANTI-TERROR POLICY OF UZBEKISTAN IN THE FRAMEWORK OF THE REGIONAL ANTI-TERRORIST POLICY OF THE SCO

    Directory of Open Access Journals (Sweden)

    С П Базылева

    2017-12-01

    Full Text Available The beginning of the XXI century was marked by a number of serious problems, including cancer, world hunger, environmental problems and increasing every year the problem of global terrorism, which poses a great threat to the security of the modern multipolar world. Uzbekistan today occupies a firm position in fight against terrorist threat. The principled position of Uzbekistan in the fight against terrorism is that “no country should exclude their participation in the fight against global terrorism, there must be no transit zones and "green corridors" for terrorist organizations”. The Central Asian region is one of the most vulnerable, because it is necessary to pay special attention to the strategy of the anti-terrorist security of the countries included in the structure of the Central Asian region. In this article, we consider the anti-terrorist policy of Uzbekistan in the framework of the regional anti-terrorist policy of the SCO.

  1. Change and Continuity in Indonesian Islamist Ideology and Terrorist Strategies

    Directory of Open Access Journals (Sweden)

    Adam James Fenton

    2015-04-01

    Full Text Available The “Islamisation” of Indonesia has exerted a transformative force on every aspect of Indonesian society. That process continues today. It has created streams of change and continuity in thoughts, ideologies and practices, of enormous complexity. Strict doctrinal interpretation of Koranic text is not a new phenomenon, contrary to what some reports in the mass media might suggest. Its roots stretch back at least as far as the 1800s with the outbreak of violent conflicts between those urging a stricter, scripturalist application of Islam, and those adhering to traditionalist and colonialist ideologies --culminating in the Padri war of West Sumatra of 1821-38. Indicating an ostensible continuity of ideology, modern extremist ideologues, such as Abu Bakar Bashir, urge their followers toward violent conflict and terrorist actions based on an ideology of strict “Middle Eastern” interpretation of fundamental Islamic tenets. This paper argues that the strategies of those carrying out radical and violent ideologies are undergoing change, as are the strategies of the authorities tasked with combating them. Radical groups have displayed a shift away from large-scale, attacks on symbolic foreign targets towards low-level violence primarily aimed at law enforcement authorities. Authorities, on the other hand, have shown a greater tendency to shoot dead those suspected of involvement with violent radical groups. This paper will examine the changing strategies of violent radical groups and the continuity, and evolution, of the underlying Islamic ideology that provides religious justification for their violent acts. The paper will argue that engaging Indonesia’s politically active youth in an ideological dialogue on Islamism and democracy provides the best prospect for disengagement from, and breaking the cycle of recruitment for, radical violence and terrorism.[Proses panjang Islamisasi di Indonesia telah menghasilkan kekuatan transformatif di

  2. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  3. Iraagi väitel tuleb iga teine terrorist Süüriast / Igor Taro

    Index Scriptorium Estoniae

    Taro, Igor

    2007-01-01

    Bagdadis elurajooni turul hukkus enesetapurünnakus 130 inimest. Iraagi kõrge valitsusametniku sõnul tuleb 50% terrorist üle Süüria piiri. Iraagi peaminister Nuri al-Maliki arvamus. Vt. samas: Mässulised leiavad tuge internetist

  4. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  5. Social categorization and fear reactions to the September 11th terrorist attacks

    NARCIS (Netherlands)

    Dumont, M.; Yzerbyt, V.Y.; Wigboldus, D.H.J.; Gordijn, E.H.

    2003-01-01

    Two experiments were run in The Netherlands and Belgium 1 week after the terrorist attacks against the World Trade Center in New York on September 11, 2001. The aim was to investigate whether social categorization affected emotional reactions, behavioral tendencies, and actual behaviors. Results

  6. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  7. Lone Actor Terrorist Attack Planning and Preparation : A Data-Driven Analysis

    NARCIS (Netherlands)

    Schuurman, B.W.; Bakker, E.; Gill, P.; Bouhana, N.

    2017-01-01

    This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented

  8. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    Science.gov (United States)

    1999-09-01

    for School Killers,” New York Times, June 21, 1999, A10. Della Porta, Donatella. “ Political Socialization in Left-Wing Underground Organizations...Newsletter of the Association of Former Intelligence Officers, 22, No. 1, 1997. Wasmund, Klaus. “The Political Socialization of West German Terrorists.” In

  9. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    Science.gov (United States)

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  10. A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System

    Science.gov (United States)

    Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.

    2006-01-01

    The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…

  11. In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

    Directory of Open Access Journals (Sweden)

    Mary Beth Altier

    2012-01-01

    Full Text Available Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably stem from the fact that terrorists and the organizations to which they belong represent clandestine populations engaged in illegal activity. Unsurprisingly, these qualities make it difficult for the researcher to identify and locate willing subjects of study—let alone a representative sample. In this research note, we suggest the systematic analysis of terrorist autobiographies offers a promising means of investigating difficult-to-study areas of terrorism-related phenomena. Investigation of autobiographical accounts not only offers additional data points for the study of individual psychological issues, but also provides valuable perspectives on the internal structures, processes, and dynamics of terrorist organizations more broadly. Moreover, given most autobiographies cover critical events and personal experiences across the life course, they provide a unique lens into how terrorists perceive their world and insight into their decision-making processes. We support our advocacy of this approach by highlighting its methodological strengths and shortcomings.

  12. Activist or Terrorist? Negotiating Discourses of Eco-Terror in "If a Tree Falls"

    Science.gov (United States)

    Olson, Jade

    2018-01-01

    Environmentalist voices like the Earth Liberation Front have been labeled "eco-terrorists." The 2011 documentary film "If a Tree Falls" explores how "eco-terrorism" troubles the unstable border between activism and terrorism. This essay offers a textual analysis of the film's negotiation of the activism/terrorism…

  13. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    Science.gov (United States)

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  14. Analysing Personal Characteristics of Lone-Actor Terrorists : Research Findings and Recommendations

    NARCIS (Netherlands)

    Roy, de van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of

  15. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    Science.gov (United States)

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  16. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    Science.gov (United States)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  17. Allergy tests: Comparison between the Radio-Allergo-Sorbent Test (RAST) and cutaneous test as well as inhalative provocation test

    International Nuclear Information System (INIS)

    Langenstrass, J.A.

    1979-01-01

    As this publication has shown, the Radio-Allergo-Sorbent Test (RAST) is well suited for investigation programs. Absence of physical strain for the patient, precise reproducibility of the results and fair agreement with other test methods are above all qualities in favour of RAST. Its main disadvantages are the as yet rather restricted spectrum of allergens and expensiveness and high technical requirement. Substantial technical requirements are also involved with the inhalative provocation test, if properly carried out, but here the spectrum of allergens is by far greater. On the other hand, it exposes patients to great physical strain. The skin tests are most simple to carry out but present the largest position of misresults and are less reproducible than the two former procedures. The Radio-Immuno-Sorbent Test (RIST) can provide very useful results as a preliminary test but is also very costly owing to its high technical demands. - In conclusion, RAST is most conveniently used as a co-test in a complete investigation program where it constitutes a valuable aid. As a sole alternative to skin tests and inhalative provocation tests it is a yet not recommendable for the above-mentioned reasons. Although not able to replace the two conventional methods within the foreseeable future, it is expected to be used more widely on further development. (orig./MG) [de

  18. Immediate hypersensitivity to iodinated contrast media: diagnostic accuracy of skin tests and intravenous provocation test with low dose.

    Science.gov (United States)

    Sesé, L; Gaouar, H; Autegarden, J-E; Alari, A; Amsler, E; Vial-Dupuy, A; Pecquet, C; Francès, C; Soria, A

    2016-03-01

    The diagnosis of HSR to iodinated contrast media (ICM) is challenging based on clinical history and skin tests. This study evaluates the negative predictive value (NPV) of skin tests and intravenous provocation test (IPT) with low-dose ICM in patients with suspected immediate hypersensitivity reaction (HSR) to ICM. Thirty-seven patients with suspected immediate hypersensitivity reaction to ICM were included retrospectively. Skin tests and a single-blind placebo-controlled intravenous provocation test (IPT) with low-dose iodinated contrast media (ICM) were performed. Skin tests with ICM were positive in five cases (one skin prick test and five intradermal test). Thirty-six patients were challenged successfully by IPT, and only one patient had a positive challenge result, with a grade I reaction by the Ring and Messmer classification. Ten of 23 patients followed up by telephone were re-exposed to a negative tested ICM during radiologic examination; two experienced a grade I immediate reaction. For immediate hypersensitivity reaction to ICM, the NPV for skin tests and IPT with low dose was 80% (95% CI 44-97%). © 2016 John Wiley & Sons Ltd.

  19. MAOA-uVNTR genotype predicts interindividual differences in experimental aggressiveness as a function of the degree of provocation.

    Science.gov (United States)

    Kuepper, Yvonne; Grant, Phillip; Wielpuetz, Catrin; Hennig, Juergen

    2013-06-15

    The MAOA-uVNTR has been suggested to play a role regarding aggression, however, results are inconsistent. We aimed at further elucidating potential effects of the MAOA-uVNTR on aggressiveness with respect to potential modulators: sex, experimental vs. trait aggressiveness and type of aggressiveness (proactive vs. reactive aggressiveness). We tested 239 healthy young adults (88 men/151 women). Participants were genotyped for the MAOA-uVNTR and performed a modified version of a competitive reaction time task - a commonly used and well established tool to elicit and measure aggressiveness. Furthermore, they completed a self-report scale measuring trait aggressiveness. We found a main effect of MAOA-uVNTR on a measure of reactive aggressiveness for both men and women, whereby the low-activity alleles of the MAOA-uVNTR were associated with substantially increased aggressive reactions (pimpulsive experimental aggressiveness in healthy men and women. Furthermore the association between the MAOA-uVNTR genotype and aggressive responses increases in a fashion linear to the degree of provocation. This indicates that the low-functional alleles of the MAOA-uVNTR are not associated with increased aggressive behavior per se, but rather with an increased aggressive reactivity to provocation. Copyright © 2013 Elsevier B.V. All rights reserved.

  20. Harsh discipline and readiness for interpersonal aggression in Poland and the USA: the mediating role of sensitivity to provocations and frustrations

    Directory of Open Access Journals (Sweden)

    Dominiak-Kochanek Monika

    2015-12-01

    Full Text Available This study examined the effect of history of harsh parenting on readiness for aggression in young adults testing the mediating effect of emotional reaction to frustration and provocation that is assumed to arise in the context of a history of physical punishment and psychological aggression. Data were collected from 402 participants including 187 Poles (Mage = 9.5; SD = 1.2 and 215 Americans (Mage = 19.16, SD = 1.15. Participants reported retrospectively on corporal punishment and psychological aggression experienced during childhood. Based on self-report instruments, sensitivity to provocation and frustration and three patterns of readiness for aggression in adulthood were assessed. Contrary to the US sample, sensitivity to provocation and frustration were mediators in the Polish sample alone. The important role of contextual factors that define harsh parenting circumstances, such as cultural context and sex of the parent, are discussed.

  1. The effect of levocabastine and furosemide pretreatment on hyperreactive response after nasal provocation with hypotonic aerosol in subjects with allergic rhinitis.

    Science.gov (United States)

    Anzic, Srdjan Ante; Dzepina, Davor; Kalogjera, Livije

    2007-11-01

    Patients with allergic rhinitis demonstrate hyperreactive response in distilled water nasal provocation, shown by significant increase in nasal airway resistance (NAR). Antihistamines, including topical antihistamine, levocabastine, reduce response in non-specific nasal provocation tests. Furosemide is a diuretic which reduces hyperreactivity in lower airways, but the mode of its action is not yet fully understood. In this study, we hypothesized that either levocabastine or furosemide pre-treatment in allergic rhinitis patients reduced response to nasal challenge with non-isotonic aerosol. To test the hypothesis, we measured the effect of pre-treatment with levocabastine and furosemide in topical application on suppression of hyperreactive response to distilled water nasal inhalation. Nasal resistance was measured, prior to and after the provocation, by active anterior rhinomanometry in two randomized groups of patients, according to pre-treatment, either by levocabastine or furosemide, 20 patients in each group, respectively. Nasal airflow resistance and level of hyperreactive response considering nasal eosinophilia were tested. Significant increase in nasal resistance following provocation was found at baseline conditions (without pre-medication); pre-treatment with levocabastine and furosemide has suppressed such response. Patients with positive nasal eosinophilia showed a significantly higher increase in nasal resistance compared to those with negative smears. Furosemide has shown significantly better protective effect on nasal resistance increase in patients with positive eosinophils nasal smears. Levocabastine and furosemide pre-treatment suppress hyperreactive response to distilled water nasal provocation. Comparison of resistances (pre-treatment vs. without) showed more protective effect of furosemide, measured on both better and worse patent side of nose, in contrast to levocabastine group for which it was shown only on better patent side prior to

  2. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL; Siebeneck, Laura K. [University of Utah; Hepner, George F. [University of Utah

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  3. Risk of Immediate-Type Allergy to Local Anesthetics is Overestimated-Results from 5 Years of Provocation Testing in a Danish Allergy Clinic

    DEFF Research Database (Denmark)

    Kvisselgaard, Ask D; Mosbech, Holger F; Fransson, Sara

    2017-01-01

    BACKGROUND: Local anesthetics (LAs) are used in many health care settings and exposure during a lifetime is almost inevitable. Immediate-type allergy to LAs is considered rare among allergy experts but is commonly suspected by health care workers from other specialties, and by patients. OBJECTIVE...... of 164 patients (123 women/41 men; median age, 56 years; range, 7-89 years) who had 189 provocations with LAs were included over the 5-year period 2010 to 2014. All 164 patients had negative subcutaneous provocations to all 189 tests with LAs (95% CI, 0%-1.83%). Another allergen was identified in 10% (n...

  4. FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Bunchuk

    2017-11-01

    Full Text Available The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology. Within the scientific research, for the most effective approaches at the national level to prevent the threat of international terrorism, under the conditions of the deep internal political crisis and extremely difficult economic situation, in order to improve the efficiency of public administration in developing and implementing the anti-terrorism state policies in Ukraine, the paper analyses international and domestic regulations on preventing the terrorist financing, considers factors that affect the deterioration of the social and economic situation of the temporarily occupied parts of Donbas. Results of the research allow formulating the definition of financial instruments of antiterrorist policies, the paper develops and proposes a series of organizational measures in order to prevent the terrorist financing in Ukraine. Practical implications. Based on the above, we propose an option of classification of main illegal mechanisms that may be used to finance terrorist activities in the territories of Donetsk and Luhansk regions uncontrolled by Ukrainian authorities, dividing them into internal and external. Given the above studied factors and classification of financing of terrorist acts in eastern Ukraine, we can assume that for the purpose of evading duty payable to relevant state bodies of Ukraine, external supplies of inventories in the uncontrolled areas of the Donetsk region, which are later obtained by illegal armed groups, are possibly carried out as follows: on behalf of a commercial entity registered in a foreign country for the Ukrainian commercial entity, registered in settlements located in the uncontrolled territory; crossing of international transit traffic that moves through the

  5. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  6. Explaining Physics – What Skills does a good Explainer Need?

    CERN Multimedia

    CERN. Geneva; Bartels, Hauke

    2018-01-01

    Explaining physics in a way that it is both scientifically correct and comprehensible is a highly demanding practice. But are explanations an effective way to teach physics? Under which circumstances should a physics teacher explain – and is there such a thing as a guideline for effective instructional explanations? Of course, explaining is more than just presenting content knowledge in clear language – but what more? In our talk, we want to discuss empirical studies on instructional explanations from science education and psychology to address these questions. Among other things, we will refer to results from a large study aiming to research whether teacher education contributes to the development of explaining skills. Besides, we will give insights into a project that seeks to measure explaining skills with an interactive online test instrument.

  7. Review of the Estimates for the Impact of the September 11, 2001, Terrorist Attacks on New York Tax Revenues

    National Research Council Canada - National Science Library

    2002-01-01

    As a follow-up to our May 2002 report, reviewing the estimates of the economic impact of the September 11, 2001, terrorist attacks on New York, Congress requested additional information on New York tax revenues...

  8. 48 CFR 252.209-7001 - Disclosure of ownership or control by the government of a terrorist country.

    Science.gov (United States)

    2010-10-01

    ...) (a) Definitions. As used in this provision— (1) Government of a terrorist country includes the state... the government of which has repeatedly provided support for acts of international terrorism. As of the...

  9. Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing

    Science.gov (United States)

    McCormick, Gordon H.; Owen, Guillermo

    We consider the conditions that lead to the dissolution of state-terrorist coalitions. While such coalitions have well known advantages, they also have structural weaknesses that are largely ignored in the literature on the state sponsorship of terrorism. Each player in the coalition has interests that are only partially shared and, in some cases, at odds with those of its partner. Long term cooperation must be based on mutual advantage and mutual trust, both of which are subject to change over time.We examine the conditions that are needed to begin and maintain a cooperative strategy and the circumstances that lead a state and a terrorist group to leave the coalition and double-cross its partner. Equilibrium strategies for both players are defined and interpreted.

  10. Offensive Counterterrorism Targeted killing in eliminating terrorist target: the case of the USA and Israel

    Directory of Open Access Journals (Sweden)

    Hermínio Matos

    2012-01-01

    Full Text Available Due to the "global terrorism project", some States have adopted offensive counterterrorism measures which, though within national strategies on security and defense, contemplate the use of military power and the use of lethal force against non-state actors - individuals, groups or terrorist organizations - beyond their national borders. Reformulating the security paradigm has led, in these cases, to policies against terrorism. This is the case of targeted killing - the killing of selected targets - by the USA and Israel. Targeted killing actions - using essentially but not only drones - in Pakistan and Yemen by the American administration, a well as the Israeli response to Palestinian terrorism, are under heated debate in terms of their efficiency and legality. Thus, this paper aims to not only provide an analytical framework on this theme but also analyze the scope and impact of these counter terrorist strategies by the two countries.

  11. The quest for significance model of radicalization: implications for the management of terrorist detainees.

    Science.gov (United States)

    Dugas, Michelle; Kruglanski, Arie W

    2014-01-01

    Radicalization and its culmination in terrorism represent a grave threat to the security and stability of the world. A related challenge is effective management of extremists who are detained in prison facilities. The major aim of this article is to review the significance quest model of radicalization and its implications for management of terrorist detainees. First, we review the significance quest model, which elaborates on the roles of motivation, ideology, and social processes in radicalization. Secondly, we explore the implications of the model in relation to the risks of prison radicalization. Finally, we analyze the model's implications for deradicalization strategies and review preliminary evidence for the effectiveness of a rehabilitation program targeting components of the significance quest. Based on this evidence, we argue that the psychology of radicalization provides compelling reason for the inclusion of deradicalization efforts as an essential component of the management of terrorist detainees. Copyright © 2014 John Wiley & Sons, Ltd.

  12. Licensing issues in the context of terrorist attacks on nuclear power plants

    International Nuclear Information System (INIS)

    Danwitz, T. von

    2002-01-01

    The terrorist attack on the World Trade Center in September 2001 has prompted enhanced nuclear risk awareness among the German population. But in the current public debate about the safety of nuclear power plants in Germany in times of new dimensions of danger, aspects such as the role of the constitutional law, the German Atomic Energy Act, and the regulatory system governing nuclear power plant licensing in the context of protection and safety have not been addressed. The author therefore discusses the German nuclear power plant licensing law and administrative regime, elaborating on the significance attributed in those bodies of law to risks like terrorist attacks on nuclear power plants. (orig./CB) [de

  13. ‘Let the Punishment Match the Offence’: Determining Sentences for Australian Terrorists

    Directory of Open Access Journals (Sweden)

    Nicola McGarrity

    2013-04-01

    Full Text Available To date, 38 men have been charged with terrorism offences in Australia. Twenty-six have been convicted. The article commences with an overview of the factual circumstances leading to these convictions. This provides important background for the following discussion of a largely unexplored issue in Australian anti-terrorism law and policy, namely, the difficulties faced by the Australian courts in adapting traditional sentencing principles to the (for the most part, preparatory terrorism offences enacted by the Commonwealth Parliament after the 9/11 terrorist attacks. Of particular interest are how the courts determine the objective seriousness of these offences and the respective weight placed upon deterrence (both specific and general and the rehabilitation of convicted terrorists.

  14. A data fusion approach to indications and warnings of terrorist attacks

    Science.gov (United States)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  15. [Stories and drawings by children after the 2015 terrorist attacks in Paris].

    Science.gov (United States)

    Poget, Marc; Bouaziz, Nora; Apter, Gisèle

    2016-01-01

    Through the stories and drawings of children in a medical-psychological centre, it is possible to explore their psychological representations of the terrorist attacks which took place in Paris in January 2015. This work highlights the need to rethink the methods of care provided to these children in order to adapt them to their specific needs. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  16. We Bomb, Therefore We Are: The Evolution of Terrorist Group Life Cycles

    Science.gov (United States)

    1994-03-24

    34 Political Socialization in Left-Wing Underground Organizations: Biographies of Italian and German Militants," International Social Movement Research... Political Socialization of Terrorist Groups in West Germany," Journal of Political and Military Sociology, v. 11, n. 2, Fall 1983, 236. See also Giorgio...Love?, 30-31. 7 Quoted in Wasmund, " Political Socialization ," 236. 88Irving L. Horowitz, "The Routinization of Terrorism and Its Unanticipated

  17. Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat.

    Science.gov (United States)

    Ackerman, Gary A; Zhuang, Jun; Weerasuriya, Sitara

    2017-02-01

    This article uses a game-theoretic approach to analyze the risk of cross-milieu terrorist collaboration-the possibility that, despite marked ideological differences, extremist groups from very different milieus might align to a degree where operational collaboration against Western societies becomes possible. Based upon theoretical insights drawn from a variety of literatures, a bargaining model is constructed that reflects the various benefits and costs for terrorists' collaboration across ideological milieus. Analyzed in both sequential and simultaneous decision-making contexts and through numerical simulations, the model confirms several theoretical arguments. The most important of these is that although likely to be quite rare, successful collaboration across terrorist milieus is indeed feasible in certain circumstances. The model also highlights several structural elements that might play a larger role than previously recognized in the collaboration decision, including that the prospect of nonmaterial gains (amplification of terror and reputational boost) plays at least as important a role in the decision to collaborate as potential increased capabilities does. Numerical simulation further suggests that prospects for successful collaboration over most scenarios (including operational) increase when a large, effective Islamist terrorist organization initiates collaboration with a smaller right-wing group, as compared with the other scenarios considered. Although the small number of historical cases precludes robust statistical validation, the simulation results are supported by existing empirical evidence of collaboration between Islamists and right- or left-wing extremists. The game-theoretic approach, therefore, provides guidance regarding the circumstances under which such an unholy alliance of violent actors is likely to succeed. © 2016 Society for Risk Analysis.

  18. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    are forced into prostitution, pornography and sweatshop labor, it becomes an obvious and direct threat to the fabric of our society.3 Add terrorists... impacts the U.S. Finally, many nation states are on the brink of thriving or failing, and their fate depends either on us…or the “help” of organized...and social fabric of societies came to light in the mid-1990s. Aggravating factors include globalization of business networks, lowered trade

  19. Spatial proximity and the risk of psychopathology after a terrorist attack

    OpenAIRE

    DiMaggio, Charles; Galea, Sandro; Emch, Michael

    2010-01-01

    Previous studies concerned with the relation of proximity to the September 11, 2001 terrorist attacks and subsequent psychopathology have produced conflicting results. The goals of this analysis are to assess the appropriateness of using Bayesian hierarchical spatial techniques to answer the question of the role of proximity to a mass trauma as a risk factor for psychopathology. Using a set of individual-level Medicaid data for New York State, and controlling for age, gender, median household...

  20. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    International Nuclear Information System (INIS)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli

    2010-01-01

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  1. Colombian Army Transformation and the Inflection Point of the Terrorist Groups

    Science.gov (United States)

    2011-03-30

    Prince (Cambridge: Cambridge University Press, 1988), 24. 2 James D Henderson, La Modernizacion en Colombia: Los años de Laureano Gomez, 1889-1965...prime factor that permits the terrorist´s isolation from the social base, as well as the legitimate use of force by the State. In summary, the FARC...his dismissal, for alleged meddling in political affairs. 23 3 Francisco Leal Buitrago, La Inseguridad de la Seguridad. Colombia 1958-2005

  2. Terrorists or cowards: negative portrayals of male Syrian refugees in social media

    OpenAIRE

    Rettberg, Jill Walker; Gajjala, Radhika

    2015-01-01

    This paper examines images and words shared on the Twitter hashtag #refugeesNOTwelcome to understand the portrayal of male Syrian refugees in a post-9/11 context where the Middle-Eastern male is often primarily cast as a potential terrorist. Queer theorist Jasbir Puar (2007) and Middle- East scholar Paul Amar (2011) provide us with a theoretical approach to make sense of the contradictions we see emerging in this social media context.

  3. Strengthening Hospital Surge Capacity in the Event of Explosive or Chemical Terrorist Attacks

    Science.gov (United States)

    2009-03-01

    and become more specialized and efficient over the past decade in order to survive in the tight financial markets . Capacity is not keeping pace...Surge Capacity for Terrorist Bombings,” Atlanta, Georgia, (April 2007): 6. 197 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler ...activated in several bombings, 200 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler

  4. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    Energy Technology Data Exchange (ETDEWEB)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli (Dept. of Diagnostic Imaging, Sheba Medical center, Tel Hashomer, Sackler School of Medicine, Tel Aviv Univ., Tel Aviv (Israel)), e-mail: iris.eshed@sheba.health.gov.il

    2010-03-15

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  5. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

    OpenAIRE

    Avoine , Gildas; Bultel , Xavier; Gambs , Sébastien; Gerault , David; Lafourcade , Pascal; Onete , Cristina; Robert , Jean-Marc

    2017-01-01

    International audience; Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, veri-fiers have to authenticate the credentials of untrusted provers. Unfortunately , these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a compl...

  6. Hit or Run: Exploring Aggressive and Avoidant Reactions to Interpersonal Provocation Using a Novel Fight-or-Escape Paradigm (FOE).

    Science.gov (United States)

    Beyer, Frederike; Buades-Rotger, Macià; Claes, Marie; Krämer, Ulrike M

    2017-01-01

    Interpersonal provocation presents an approach-avoidance conflict to the provoked person: responding aggressively might yield the joy of retribution, whereas withdrawal can provide safety. Experimental aggression studies typically measure only retaliation intensity, neglecting whether individuals want to confront the provocateur at all. To overcome this shortcoming of previous measures, we developed and validated the Fight-or-Escape paradigm (FOE). The FOE is a competitive reaction time (RT) task in which the winner can choose the volume of a sound blast to be directed at his/her opponent. Participants face two ostensible opponents who consistently select either high or low punishments. At the beginning of each trial, subjects are given the chance to avoid the encounter for a limited number of times. In a first experiment ( n = 27, all women), we found that fear potentiation (FP) of the startle response was related to lower scores in a composite measure of aggression and avoidance against the provoking opponent. In a second experiment ( n = 34, 13 men), we altered the paradigm such that participants faced the opponents in alternating rather than in random order. Participants completed the FOE as well as the Dot-Probe Task (DPT) and the Approach-Avoidance Task (AAT). Subjects with higher approach bias scores in the AAT avoided the provoking opponent less frequently. Hence, individuals with high threat reactivity and low approach motivation displayed more avoidant responses to provocation, whereas participants high in approach motivation were more likely to engage in aggressive interactions when provoked. The FOE is thus a promising laboratory measure of avoidance and aggression.

  7. Hit or Run: Exploring Aggressive and Avoidant Reactions to Interpersonal Provocation Using a Novel Fight-or-Escape Paradigm (FOE

    Directory of Open Access Journals (Sweden)

    Frederike Beyer

    2017-10-01

    Full Text Available Interpersonal provocation presents an approach-avoidance conflict to the provoked person: responding aggressively might yield the joy of retribution, whereas withdrawal can provide safety. Experimental aggression studies typically measure only retaliation intensity, neglecting whether individuals want to confront the provocateur at all. To overcome this shortcoming of previous measures, we developed and validated the Fight-or-Escape paradigm (FOE. The FOE is a competitive reaction time (RT task in which the winner can choose the volume of a sound blast to be directed at his/her opponent. Participants face two ostensible opponents who consistently select either high or low punishments. At the beginning of each trial, subjects are given the chance to avoid the encounter for a limited number of times. In a first experiment (n = 27, all women, we found that fear potentiation (FP of the startle response was related to lower scores in a composite measure of aggression and avoidance against the provoking opponent. In a second experiment (n = 34, 13 men, we altered the paradigm such that participants faced the opponents in alternating rather than in random order. Participants completed the FOE as well as the Dot-Probe Task (DPT and the Approach-Avoidance Task (AAT. Subjects with higher approach bias scores in the AAT avoided the provoking opponent less frequently. Hence, individuals with high threat reactivity and low approach motivation displayed more avoidant responses to provocation, whereas participants high in approach motivation were more likely to engage in aggressive interactions when provoked. The FOE is thus a promising laboratory measure of avoidance and aggression.

  8. FCJ-161 Productive Provocations: Vitriolic Media, Spaces of Protest and Agonistic Outrage in the 2011 England Riots

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2013-12-01

    Full Text Available The intense social upheaval that spread through a number of UK cities in the riots and protests of August, 2011 signalled the terrifying speed with which passionate disaffection can turn to uncontained violence. At stake in the dense and volatile debate that ensued, and in the acts of violence themselves, were contests over spaces as well as competing models of democracy, publics and citizenship, including the appropriate use of social media. Within these debates, almost universally, rational deliberative discourse and action is assumed to be the only route to legitimate “civil” society. So what is to be made of the violent physical contest over city squares, streets and property, as well as contests over acts of participation and demonstration played out online through the hundreds of eyewitness videos posted to sites like YouTube and the endless flow of often vitriolic words in blogs, comments spaces and social network sites? This paper uses a video posted to YouTube titled ‘Clapham Junction Speaker (London Riots 2011’ to examine the passion and provocation that flowed beyond the city streets to enliven, intensify and sustain forms of protest and civic engagement. We argue that the aggressive and antagonistic tenor of the Speaker’s twenty minute monologue, the bitter vitriol that flowed through the comments space, and even the act of posting it constitute significant elements of a generative, ‘agonistic’ public, to use Chantal Mouffe’s term, that operates in multiple spaces and outside of the rationalising discourse demanded by mainstream media and government. This paper develops a richer understanding of these spaces of protest, and the concept of provocation central to these events.

  9. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  10. CAROLIN GOERZIG. TALKING TO TERRORISTS: CONCESSIONS AND THE RENUNCIATION OF VIOLENCE. REVIEWED BY: SCOTT NICHOLAS ROMANIUK

    Directory of Open Access Journals (Sweden)

    Scott Nicholas Romaniuk

    2016-03-01

    Full Text Available “Talking to terrorists remains a taboo” (Goerzig, 2010: p. 125. The adoption and reinforcement of such a moral position by many Western and non-Western governments alike has played no small role in, to a large extent, states to contain the violence and insecurity bred by terror activist in the post-Cold war and post-9/11 periods. Yet, few policymakers seem to recognize the danger in building political and social environments in which dialogue between states and terrorist groups and organizations is little more than depravity or even a betrayal to entire populations. To be sure, the protection of civilian populations has been entrusted to states that might otherwise learn better means of terrorism deterrence if lines of communication between states and terrorists were less constrained. The taboo of which Carolin Goerzig speaks, is one that “has been institutionalized in a legal framework in which … academics are being asked to report on their students and in which attempting to understand the subjectivities of ‘terrorist’ suspects could be interpreted as a ‘glorification of terrorism’” (Jackson quoted in Goerzig, 2010: p. 125.

  11. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  12. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  13. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  14. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  15. The challenge of preparation for a chemical, biological, radiological or nuclear terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexander David

    2006-01-01

    Full Text Available Terrorism is not a new phenomenon, but, in the contemporary scene, it has established itself in a manner which commands the most serious attention of the authorities. Until relatively recently, the major threat has been through the medium of conventional weaponry and explosives. Their obvious convenience of use and accessibility guarantees that such methods will continue to represent a serious threat. However, over the last few years, terrorists have displayed an enthusiasm for higher levels of carnage, destruction and publicity. This trend leads inexorably to the conclusion that chemical, biological, radiological and nuclear (CBRN methods will be pursued by terrorist organisations, particularly those which are well organised, are based on immutable ideological principles, and have significant financial backing. Whilst it is important that the authorities and the general public do not risk over-reacting to such a threat (otherwise, they will do the work of the terrorists for them, it would be equally ill-advised to seek comfort in denial. The reality of a CBRN event has to be accepted and, as a consequence, the authorities need to consider (and take seriously how individuals and the community are likely to react thereto and to identify (and rehearse in a realistic climate what steps would need to be taken to ameliorate the effects of such an event.

  16. Explaining crude oil prices using fundamental measures

    International Nuclear Information System (INIS)

    Coleman, Les

    2012-01-01

    Oil is the world's most important commodity, and improving the understanding of drivers of its price is a longstanding research objective. This article analyses real oil prices during 1984–2007 using a monthly dataset of fundamental and market parameters that cover financial markets, global economic growth, demand and supply of oil, and geopolitical measures. The innovation is to incorporate proxies for speculative and terrorist activity and dummies for major industry events, and quantify price impacts of each. New findings are positive links between oil prices and speculative activity, bond yields, an interaction term incorporating OPEC market share and OECD import dependence, and the number of US troops and frequency of terrorist attacks in the Middle East. Shocks also prove significant with a $6–18 per barrel impact on price for several months. - Highlights: ► Article introduces new variables to the study of oil prices. ► New variables are terrorist incidents and military activity, and oil futures market size. ► Shocks prove important affecting prices by $6–18 per barrel for several months. ► OPEC market influence rises with OECD import dependence.

  17. Ultrasonic imaging of lumbar discs combined with vibration pain provocation compared with discography in the diagnosis of internal anular fissures of the lumbar spine.

    Science.gov (United States)

    Yrjämä, M; Tervonen, O; Vanharanta, H

    1996-03-01

    The diagnostic information achieved by a combination of ultrasonographic imaging of discs and local bony vibration of lumbar vertebrae was compared to that obtained by discographic imaging and pain provocation. The purpose of this study was to find a noninvasive method for spine diagnostics to replace expensive and invasive methods such as discography. Internal anular fissures of the lumbar discs have been shown to be a source of back pain. Intradiscal changes associated with disc degeneration can be imaged by ultrasonography. The bony vibration test of spinal processes has shown to correlate well with discographic pain provocation tests in cases of internal anular ruptures. Discographic examination of the spine is the only widely accepted diagnostic method that combines pathoanatomic changes and patients' pain. Patients with back pain in this study were examined by means of ultrasonography, bony vibration stimulation, and discography. The three lowest lumbar discs were examined. In the cases of intradiscal ultrasound findings, the vibration provocation test showed a sensitivity of 0.90 and a specificity of 0.75 compared to the discographic pain provocation test. In cases of total anular ruptures seen in ultrasound examination, the sensitivity and the specificity of the vibration pain provocation test were much lower, being 0.50 and 0.50, respectively. The combination of the two noninvasive methods provides a useful screening test for the evaluation of low back pain. The combination test can accurately depict painful disc degeneration with internal disc rupture and the use of discography can be limited to the cases suggesting total anular rupture in ultrasound examination.

  18. Terrorist Threats in the Basque Country: its Impact on the Psychosocial Sphere of Victims

    Directory of Open Access Journals (Sweden)

    Javier Martín-Peña

    2014-07-01

    Full Text Available The ceasefire of armed activities announced by ETA (Basque Homeland and Freedom in 2011 has fostered a debate about the violence and the victims of the terrorist organization. During those years, the violence perpetrated by ETA was characterized by bomb attacks and assassinations. In addition to this blatant violent behavior, a low-intensity violence was also taking place in the Basque Country, consisting of terrorist threats against their targets. There is, however, a lack of evidence-based research into this phenomenon. This investigation studies the impact of terrorist threats on the psychosocial functioning of people threatened by ETA in the Basque Country. Seventy-six people targeted by ETA completed self-reported survey. Terrorist threats and their derived psychosocial consequences were assessed by this way. The findings point out a relationship between terrorist threats and their psychosocial effects, which greatly affected the immediate environment of the targets too. The implications of these findings are discussed. El cese de la actividad armada anunciado por ETA (Euskadi ta Askatasuna – Euskadi y Libertad en 2011 ha promovido un debate sobre la violencia y las víctimas de la organización terrorista. Durante esos años, la violencia perpetrada por ETA se caracterizó por ataques con bombas y asesinatos. Además de este comportamiento claramente violento, en el País Vasco también se estaba produciendo una violencia de baja intensidad, consistente en amenazas terroristas contra sus objetivos. Sin embargo, no hay una investigación basada en la evidencia sobre este fenómeno. Esta investigación estudia el impacto de las amenazas terroristas en el funcionamiento psicosocial de las personas amenazadas por ETA en el País Vasco. Setenta y seis personas amenazadas por ETA completaron una encuesta de autoevaluación. Se evaluaron de esta forma las amenazas terroristas y sus consecuencias psicosociales derivadas. Los resultados indicaron

  19. Your Radiologist Explains Nuclear Medicine

    Medline Plus

    Full Text Available ... Disorders Video: The Basketball Game: An MRI Story Radiology and You Sponsored by Image/Video Gallery Your Radiologist Explains Nuclear Medicine Transcript Welcome to Radiology Info dot org Hello! I’m Dr. Ramji ...

  20. Your Radiologist Explains Nuclear Medicine

    Medline Plus

    Full Text Available ... by Image/Video Gallery Your Radiologist Explains Nuclear Medicine Transcript Welcome to Radiology Info dot org Hello! ... d like to talk to you about nuclear medicine. Nuclear medicine offers the potential to identify disease ...

  1. Your Radiologist Explains Nuclear Medicine

    Medline Plus

    Full Text Available ... An MRI Story Radiology and You Sponsored by Image/Video Gallery Your Radiologist Explains Nuclear Medicine Transcript ... by a special camera and computer to create images of the inside of your body. If you’ ...

  2. Your Radiologist Explains Nuclear Medicine

    Medline Plus

    Full Text Available ... Sponsored by Image/Video Gallery Your Radiologist Explains Nuclear Medicine Transcript Welcome to Radiology Info dot org ... I’d like to talk to you about nuclear medicine. Nuclear medicine offers the potential to identify ...

  3. Explaining variation in nascent entrepreneurship

    NARCIS (Netherlands)

    A.J. van Stel (André); A.R.M. Wennekers (Sander); P. Reynolds (Paul); A.R. Thurik (Roy)

    2004-01-01

    textabstractThis paper aims at explaining cross-country variation in nascent entrepreneurship. Regression analysis is applied using various explanatory variables derived from three different approaches. We make use of the Global Entrepreneurship Monitor database, including nascent entrepreneurship

  4. Explaining nascent entrepreneurship across countries

    NARCIS (Netherlands)

    A.R. Thurik (Roy); A.J. van Stel (André); A.R.M. Wennekers (Sander); P. Reynolds (Paul)

    2003-01-01

    textabstractThis paper aims at explaining cross-country variation in nascent entrepreneurship. Regression analysis is applied using various explanatory variables derived from three different approaches. We make use of the Global Entrepreneurship Monitor database, including nascent entrepreneurship

  5. The Nation That Cried Lone Wolf : A Data-Driven Analysis of Individual Terrorists in the United States Since 9/11

    OpenAIRE

    Eby, Charles A.

    2012-01-01

    Approved for public release; distribution is unlimited Lone-wolf terrorist attacks have occurred in the United States throughout the countrys history. Attempted attacks from individual terrorists unaffiliated with terrorist groups may be becoming more prevalent. Both the general public and government officials acknowledge the presence and importance of these attacks; however, relatively little literature exists on the subject compared to group terrorism. Much of the information on lone wol...

  6. Role of basal and provocative serum prolactin in differentiating idiopathic hypogonadotropic hypogonadism and constitutional delayed puberty--a diagnostic dilemma.

    Science.gov (United States)

    Ali, Liaqat; Adeel, Afrose

    2012-01-01

    The prevalence of Idiopathic Hypogonadotropic Hypogonadism (IHH) is approximately 1 in 10,000 men. Objectives of this study were to evaluate the role of basal and stimulated serum prolactin in differentiating Constitutional Delayed Puberty (CDP) from IHH. This cross-sectional study was carried out at the Department of Diabetes and Endocrinology, Military Hospital, Rawalpindi. A total of 20 male patients presenting with provisional diagnosis of IHH/CDP were enrolled in the study. Patients with known diseases were excluded from the study. Baseline FSH, LH, testosterone, and prolactin were estimated and the patients were subjected to provocative prolactin stimulation by Thyrotropin releasing hormone stimulation (TRH) test and chlorpromazine challenge. At each 6 monthly follow-up visit for 4 years, the patients were evaluated for adrenarche, pubarche and other secondary sexual characters. Tanner scale was taken as standards for comparing stage of puberty at a particular age. No treatment was given to both groups for 2 years. At the end of 2 years IHH patients with failed puberty or progression of puberty and CDP who lagged behind by more than 2 years by Tanner scale or 4 years per bone age with compelling psychosocial or psychosexual reasons at school or at home were given short courses of 50 mg injection testosterone in an attempt to expedite the onset or progression of puberty. Patients from either group with failed puberty after low dose testosterone were managed with high dose testosterone therapy to induce secondary sexual characters. Twenty patients enrolled in the study were provisionally divided into 2 groups called IHH (n = 9), and CDP (n = 11) based on high basal and provocative serum prolactin levels in CDP group. Two patients from CDP group were lost in the follow-up leaving 9 patients in each group. A total of 10 (56%) patients, 3 (17%) from IHH group and 7 (39%) from CDP group achieved grade 4 puberty without any treatment. Remaining 8 (44%) patients, 6

  7. Terror i tvillingtårnene – dystopi og ironi? 9/11 i Darlah og En terrorist i senga

    Directory of Open Access Journals (Sweden)

    Lersbryggen Mørk, Kjersti

    2011-03-01

    Full Text Available Terror in the Twin Towers – dystopia and irony? 9/11 in Darlah and En terrorist i senga. Through globalization of our media society, children as well as adults are endlessly exposed to information and images from all over the world. In Norway, signs of the terrorist attack on the Twin Towers in USA on September 11th 2001 are now to be found in literature for children and young adults. With globalization theory and post-colonial theory I will examine how two novels present global challenges in general and 9/11 in particular. What does globalization mean for the construction of identity? Who are “we”, and who are “the others”? The novel for young adults, Darlah – 172 timer på månen [Darlah – 172 hours on the moon] (2008 by Johan Harstad, is a dystopia where 9/11 points forward to a full scale catastrophe for humanity. En terrorist i senga [There's a terrorist in my bed] (2008, a novel for children by Endre Lund Eriksen, makes explicit references to 9/11 – but with playfulness and ironic revelation of xenophobia. Both books use aliens from outer space as “the other”, but where Darlah presents a pessimistic view of our global future, En terrorist i senga is optimistic on behalf of the humankind.

  8. Journalism and Explaining News Content

    NARCIS (Netherlands)

    Albæk, E.; Skovsgaard, M.; de Vreese, C.H.; Nussbaum, J.F.

    Three models are presented to explain variation in news content. In the first model the explanation is based on the individual journalist, in the second model on the professional journalist, and in the third model on the organized journalist. The individual journalist model focuses on how the

  9. Can Marxism Explain America's Racism?

    Science.gov (United States)

    Willhelm, Sidney M.

    1980-01-01

    The Marxist interpretation of the Black experience in America has always had difficulty explaining various noneconomic aspects of racism. A perspective is needed that can blend racism as a variable in relationship with economic variables. To reach this perspective, the labor process within capitalism must be more fully understood. (Author/GC)

  10. Does market competition explain fairness?

    Science.gov (United States)

    Descioli, Peter

    2013-02-01

    The target article by Baumard et al. uses their previous model of bargaining with outside options to explain fairness and other features of human sociality. This theory implies that fairness judgments are determined by supply and demand but humans often perceive prices (divisions of surplus) in competitive markets to be unfair.

  11. Stochastic nanopore sensors for the detection of terrorist agents: Current status and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Liu Aihua; Zhao Qitao [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States); Guan Xiyun, E-mail: xguan@uta.edu [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States)

    2010-08-24

    Nanopore stochastic sensor works by monitoring the ionic current modulations induced by the passage of analytes of interest through a single pore, which can be obtained from a biological ion channel by self-assembly or artificially fabricated in a solid-state membrane. In this minireview, we overview the use of biological nanopores and artificial nanopores for the detection of terrorist agents including explosives, organophosphorus nerve agents, nitrogen mustards, organoarsenic compounds, toxins, and viruses. We also discuss the current challenge in the development of deployable nanopore sensors for real-world applications.

  12. Cyberspace as a new arena for terroristic propaganda: an updated examination.

    Science.gov (United States)

    Minei, Elizabeth; Matusitz, Jonathan

    2012-11-01

    This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists exploit cyberspace to trigger feelings of panic and overreaction in the target population. In many cases, this form of propaganda is the primary means of communication for various cyberterrorist groups to convey their intents. Internet sites also produce numerous opportunities for in-group communication and publicity.

  13. Architectural and structural engineering aspects of protective design for nuclear power plants against terrorist attack

    International Nuclear Information System (INIS)

    Musacchio, J.M.; Rozen, A.

    1987-01-01

    This paper presents the results of several threat studies which have been performed, provides collective data on costs, and discusses, in a general sense, architectural/structural aspects of passive protection design measures which have been developed and utilized at several nuclear power plants. By combining relevant architectural and structural measures in the standard design, it is possible to substantially reduce the vulnerability of nuclear power plants to terrorist attack and the estimated damage to a manageable level with a minimal investment. (orig./HP)

  14. Finding the Wolves in Sheeps Clothing: Ways to Distinguish and Deter Lone-Wolf Terrorists

    Science.gov (United States)

    2015-03-01

    Mark Hamm, “Lone-wolf Terrorism in America: Forging a New Way of Looking at an Old Problem,” YouTube video, 7:32, posted by the National Institute...that factors that influence most lone-wolf terrorists include, “to varying degrees and in variable combinations: personal aversion or depression ...Russia.”97 Also discovered after the bombings, “Tamerlan had a YouTube account that he used to post and watch violent Islamic extremist videos starting

  15. The Treatment of Images in 11-M Terrorist Attacks. Terrorism and Violence in the Press

    Directory of Open Access Journals (Sweden)

    Dra. Emma Torres Romay

    2006-01-01

    Full Text Available In this paper we want to analyze the pictures publishing in the Spanish and international newspapers before the Madrid terrorist attack, March, 11. With this research we get some ideas about freedom speech limits: the respect of the privacy and, in special, the respect of the pain. At the same time, we´ll remark the importance of the photography in the press and their communication power. For this research we used the March, 11 and 12 newspapers of most important Spanish editors and the digital edition of international press.

  16. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  17. Transgression médiatique et provocations décadentes: La décadence comme comportement médiatique.

    Directory of Open Access Journals (Sweden)

    Yoan Vérilhac

    2012-03-01

    Full Text Available The decadent and symbolist movements are deeply connected to the creation of media: newspapers, small reviews which make the promotion of the young poets and their original works. In the 1880’s, the decadent reviews use in a provocative way the codes and the media potentialities. However this provocative press is based on a double language (especially about the relationship with the public, and this contradiction generates a negative image in the popular press: the new generation of poets and writers appears to be a noisy group of « hoaxers ». Therefore, around 1890, when the new reviews grouped around the « symbolist » label define themselves a media identity, it is important for them to distance from decadent behaviours. The decadent moment of the mediatization of literature is thus indispensable to understand the history of connections between press and poetic avant-gardes.

  18. Manifestation of J wave induced by acetylcholine applied for a coronary spasm provocation test in a patient with aborted sudden cardiac death.

    Science.gov (United States)

    Kodama, Hiroyuki; Fujita, Kazumasa; Moriyama, Shouhei; Irie, Kei; Noda, Hirotaka; Yokoyama, Taku; Fukata, Mitsuhiro; Arita, Takeshi; Odashiro, Keita; Maruyama, Toru; Akashi, Koichi

    2017-06-01

    A 51-year-old man with a resuscitation episode was referred to our hospital. Coronary angiography revealed a focal spasm overlapped with organic stenosis where a bare metal stent was implanted. Acetylcholine (ACh) provocation test did not induce chest pain. It revealed no discernible ST-T changes but unmasked a J wave at the end of the QRS complex, which was associated with short-coupled repetitive premature ventricular beats. A J wave reportedly appears immediately before the onset of ventricular fibrillation caused by vasospastic angina. However, a J wave observed newly after a coronary spasm provocation test using ACh without ST-T changes is informative when considering the mechanisms of the J wave.

  19. ABORTION AND VIOLENCE IN JANE MARTIN’S KEELY AND DU: PRO-CHOICE, PRO-LIFE, OR MERELY PROVOCATIVE?

    Directory of Open Access Journals (Sweden)

    Eta Farmacelia Nurulhady

    2017-04-01

    Full Text Available Abortion and violence are global issues, yet different culture might respond to the issues somewhat differently. This study aims to reveal the abortion and violence issues in Jane Martin’s Keely and Du in terms of pro-choice and pro life movements and see how Indonesian students reading the play respond to the issues. In the United States of America, the discussion of abortion issue can be grouped into two major categories: the pro-life and pro-choice. In Indonesia, the majority of people would be against abortion when it is not for medical reasons. The students reading Keely and Du find the play challenging their beliefs as religious people still keeping hold of eastern values. Having discussed the nature of pro-life and pro-choice movements, it is difficult for them to decide whether they are proponent of either one. Keely and Du is successfully provocative in offering insight on how abortion and violence issues cannot be judged in a black and white manner.

  20. Colonoscopic allergen provocation test with rBet v 1 in patients with pollen-associated food allergy.

    Science.gov (United States)

    Pickert, C N; Lorentz, A; Manns, M P; Bischoff, S C

    2012-10-01

    After consumption of fruits, nuts, and vegetables, several patients with pollen allergy experience gastrointestinal (GI) tract symptoms that are possibly caused by pollen-associated food allergy. The aim of this study was to evaluate the colonoscopic allergen provocation (COLAP) test using the recombinant birch pollen allergen Bet v 1 (rBet v 1) for in vivo diagnosis of pollen-associated food allergy manifesting in the GI tract. Thirty-four patients with a history of adverse reactions to food, GI tract symptoms, and birch pollen pollinosis and five healthy controls underwent COLAP test. Twenty minutes after endoscopic challenge of the cecal mucosa with rBet v 1, the mucosal wheal and flare reaction was registered semiquantitatively, and tissue biopsy specimens were examined for eosinophil mucosal activation. The mucosal reaction to rBet v 1 was correlated with the presence of pollinosis (P = 0.004), history of adverse reaction to Bet v 1-associated food allergens (P = 0.001), and tissue eosinophils' activation (P foods and in four of 18 (22%) patients with a negative history (P food allergy manifesting in the GI tract. © 2012 John Wiley & Sons A/S.

  1. A pilot study on the validity of using pictures and videos for individualized symptom provocation in obsessive-compulsive disorder.

    Science.gov (United States)

    Simon, Daniela; Kischkel, Eva; Spielberg, Rüdiger; Kathmann, Norbert

    2012-06-30

    Distressing symptom-related anxiety is difficult to study in obsessive-compulsive disorder (OCD) due to the disorder's heterogeneity. Our aim was to develop and validate a set of pictures and films comprising a variety of prominent OCD triggers that can be used for individually tailored symptom provocation in experimental studies. In a two-staged production procedure a large pool of OCD triggers and neutral contents was produced and preselected by three psychotherapists specialized in OCD. A sample of 13 OCD patients and 13 controls rated their anxiety, aversiveness and arousal during exposure to OCD-relevant, aversive and neutral control stimuli. Our findings demonstrate differences between the responses of patients and controls to OCD triggers only. Symptom-related anxiety was stronger in response to dynamic compared with static OCD-relevant stimuli. Due to the small number of 13 patients included in the study, only tentative conclusions can be drawn and this study merely provides a first step of validation. These standardized sets constitute valuable tools that can be used in experimental studies on the brain correlates of OCD symptoms and for the study of therapeutic interventions in order to contribute to future developments in the field. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Explaining Disparities in Unemployment Dynamics

    OpenAIRE

    Karanassou, Marika; Snower, Dennis J.

    1993-01-01

    This paper attempts to explain disparities among the unemployment experiences of different OECD countries in terms of the `fragility' of the short-run unemployment equilibrium (the impact of labour market shocks on the short-run unemployment rate) and the lag structure of the employment determination, wage setting, and labour force participation decisions. The effects of this lag structure on unemployment dynamics are captured through two general measures of `unemployment persistence' (occurr...

  3. Explaining the Gender Wealth Gap

    Science.gov (United States)

    Ruel, Erin; Hauser, Robert M.

    2013-01-01

    To assess and explain the United States’ gender wealth gap, we use the Wisconsin Longitudinal Study to examine wealth accumulated by a single cohort over 50 years by gender, by marital status, and limited to the respondents who are their family’s best financial reporters. We find large gender wealth gaps between currently married men and women, and never-married men and women. The never-married accumulate less wealth than the currently married, and there is a marital disruption cost to wealth accumulation. The status-attainment model shows the most power in explaining gender wealth gaps between these groups explaining about one-third to one-half of the gap, followed by the human-capital explanation. In other words, a lifetime of lower earnings for women translates into greatly reduced wealth accumulation. A gender wealth gap remains between married men and women after controlling for the full model that we speculate may be related to gender differences in investment strategies and selection effects. PMID:23264038

  4. [Effects of nasal provocation with a single-dose allergen on the explicit and implicit memory of physically active and inactive patients with ragweed allergy].

    Science.gov (United States)

    Tokodi, Margaréta; Csábi, Eszter; Kiricsi, Ágnes; Schultz, Rebeka; Molnár H, Andor; Rovó, László; Bella, Zsolt

    2018-01-30

    Allergy is an endemic disease and has a considerable impact on the quality of life. This study aimed to measure the effect of active allergic rhinitis on memory functions of physically active and inactive patients with ragweed allergy. Memory functions were assessed before and after allergen exposure. Participants in both groups were provoked nasally with 30 IR/mL ragweed allergen in each nostril. Explicit memory was measured with story-recalling and implicit memory was investigated with reaction time task. In neuropsychological assessments athletes performed significantly better, compared with the control group after allergen provocation in short-term and long-term memory functions. There was no difference between the groups in the implicit tasks. Athletes have achieved better results after provocation, comparing to the baseline test and the tests that measured short-term and long-term memory functions. Short-term disturbing factors, e.g. swollen nasal mucosa, sneezing, and watery eyes after provocation did have not caused deterioration in cognitive functions. A single-shot allergen in high doses have caused an increase of mental concentration, which was more pronounced in athletes.

  5. The need to counter extremist terrorist manifestations in society and in the penal system

    Directory of Open Access Journals (Sweden)

    Kazberov P.N.

    2013-09-01

    Full Text Available The article discusses the need for inter-agency work to minimize the extremist-terrorist activities in the community. The problem of the psychology of extremism and terrorism are increasingly in the spotlight representatives of various scientific disciplines. First of all, there is no single legal science in all respects understanding of phenomena such as extremism and terrorism, their classification and evaluation, although a number of positive examples in this respect international cooperation is present. According to current data provided by the Investigative Committee of the Russian Federation, the General Prosecutor of the Russian Federation, the Russian Ministry of Internal Affairs, as well as the Moscow Bureau for Human Rights, extremism is a real threat to the national security of the Russian Federation. From the data of law enforcement should be the fact that most of the crimes of extremist and terrorist nature committed by persons of young age, the consciousness of which are susceptible to nationalist propaganda. A significant increase in informal youth movements extremist-nationalist orientation. The problem of expansion of extremism is also relevant for the penitentiary system of modern society. The very fact that a significant number of prisoners serving sentences for extremism and terrorism, illustrates the need for them special psychological and educational work

  6. Radiological preparedness in the case of a terrorist attack or an accident

    International Nuclear Information System (INIS)

    Cizmek, A.

    2005-01-01

    During the Cold War, every information about weapons of mass destruction was treated as top secret, regardless of whether the information concerned friend or foe. The most serious threat in our post Cold War era are terrorist radiological dispersal devices. Dirty nukes are what you may choose to build if you're unable to create a real nuclear bomb, i.e. one whose explosion is based on a nuclear reaction. A dirty bomb is a conventional explosive salted with radioactive isotopes in order to spew out that nuclear material and contaminate a wide area. The military usefulness of such devices have always been in dispute. In fact, the TNT in such a bomb may still be more dangerous than the nuclear material. Its destructive power would really depend on the size of the conventional bomb, and the volume and nature of nuclear material. This paper addresses the possibilities of decontamination and preparedness in the case of a terrorist attack or accident.(author)

  7. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  8. Reflection in phraseological neology of traumatic historical events connected with the terrorist threat

    Directory of Open Access Journals (Sweden)

    Skorobogatova Taisiya Ivanovna

    2016-03-01

    Full Text Available The article is devoted to the analysis of phraseological units - neologisms which are associated with such traumatic historical events, as the implementation of terrorist acts. Particular emphasis is placed on the description of English, Russian and French phraseological units that have introduced the memory of the terrorist threat in the XX-XXI centuries.: Eng. That’s so 10th September (lit. today September 10, fig: Do not worry ahead of time about nothing; Rus. мочить в сортире (descriptor: беспощадно расправиться; фр. le prince s’est mari, le m chant est mort, c’est une semaine Walt Disney (lit. prince married the villain died, week Walt Disney; descriptor: Idyll, g n ration Bataclan (lit. Bataklan generation; descriptor: young people age of the victims who died in the “Bataklane”, i.e. young people aged 25-35. Phraseology description of new, emerging units is one of the most important problems in theoretical linguistics, namely: to illustrate and confirm the fact that the phrasebook body of a single national language is the result of the two memories - historical and linguistic. At the same time important to consider such a significant factor that determines the specificity of the national phraseological fund as memory selectivity in general and historical memory in particular.

  9. Plastic Surgery Management of Victims of Terrorist Violence in Ankara, Turkey.

    Science.gov (United States)

    İğde, Murat; Kaplan, Ahmet

    2017-12-01

    Terror attacks have been progressively increasing worldwide through the present era. The management of the consequences of terrorism events is under debate in almost every scientific area. The organization and advancement of health services constitute important components of the crisis management. Similar to other specialty areas in medicine, the medical management of terrorist attacks is becoming important in terms of plastic and reconstructive surgery.Ankara, the capital of Turkey, has been subject to 2 terrorist events in public places within a year. The total number of patients involved in both cases was 434. Ankara Numune Training and Research Hospital is a tertiary health care institution and one of the most important trauma centers in the region. A total of 178 Patients exposed to these events referred to our hospital. Of the total, 34 patients were completely or partially treated in the plastic and reconstructive surgery clinic. In this study, we tried to discuss the difficulties encountered in the classification of patients and plastic surgery during the treatment period of patients who experienced these attacks.Data were obtained from The National News Agency, hospital, and our own clinic registries. Patient classification was based on the injured parts of the body. Statistical analysis was performed for all data. In conclusion, the role and the importance of plastic surgery department especially in trauma management have been emphasized in the light of our findings.

  10. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    Barakat, M.

    2008-01-01

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  11. A project to develop restoration methods for buildings and facilities after a terrorist attack

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.F. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Div]|[Environment Canada, Ottawa, ON (Canada). River Road Environmental Technology Centre; Volchek, K.; Hornof, M.; Boudreau, L.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Best, M. [Health Canada, Ottawa, ON (Canada); Garbutt, M.; Krishnan, J.; Wagener, S.; Bernard, K. [Health Canada, Winnipeg, MB (Canada); Cousins, T.; Haslip, D. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2004-07-01

    A multi-agent project was initiated to review site restoration after a terrorist attack. The objective was to acquire and compile information on all known restoration procedures for buildings, exteriors of buildings, their interior contents, and adjacent areas such as parking lots, lawns and vehicles. All procedures were then tested and validated. Restoration procedures included pickup, neutralization, decontamination, removal and final destruction/deposition of the contaminant, cleaning material and contaminated debris resulting from the terrorist act. This research and development project considered chemical, biological and nuclear contamination with the intent to develop methods to decontaminate and restore buildings after a chemical, biological and radiological (CBR) attack. Ideas were collected from work conducted around the world. The efficacy of best candidates was tested along with all selected chemical target items. The project also involved the preparation of procedures for decontamination and restoration. Ultimately, a tradeoff decision basis will be developed to provide information on abandonment and quarantine versus cleanup. The study revealed that there are several technologies that can be used for the decontamination of structures and equipment after acts of terrorism, however, no one technique will work for all contaminants on all surfaces. The selection of a decontamination method depends on the contaminant, the surface being decontaminated and economic, social and health factors. The amount of waste generated by decontamination is a major feasibility factor. 25 refs., 6 tabs.

  12. Optimizing Visits to the Site of Death for Bereaved Families After Disasters and Terrorist Events.

    Science.gov (United States)

    Kristensen, Pål; Dyregrov, Atle; Weisæth, Lars; Straume, Marianne; Dyregrov, Kari; Heir, Trond; Bugge, Renate Grønvold

    2017-09-13

    In recent years it has been common after disasters and terrorist events to offer bereaved families the opportunity to visit the place where their loved ones died. Many report that such visits are beneficial in processing their loss. Various factors, both cognitive (eg, counteracting disbelief) and existential or emotional (eg, achieving a sense of closeness to the deceased), are associated with the experienced benefit. Nonetheless, exacerbations of trauma and grief reactions (eg, re-enactment fantasies) are common, with some of the bereaved also reporting adverse reactions after the visit. Subsequently, proper preparations are a prerequisite before such visits take place. This article describes how to optimize collective visits to the site of death after disasters or terrorist events for bereaved families. Important questions-for example, concerning those who should be responsible for organizing a visit and those who should be invited, the timing of the visit, what can be done at the site, the need for support personnel, and other practical issues-are discussed and general guidelines are recommended. (Disaster Med Public Health Preparedness. 2017;page 1 of 5).

  13. Tracking and Analyzing Individual Distress Following Terrorist Attacks Using Social Media Streams.

    Science.gov (United States)

    Lin, Yu-Ru; Margolin, Drew; Wen, Xidao

    2017-08-01

    Risk research has theorized a number of mechanisms that might trigger, prolong, or potentially alleviate individuals' distress following terrorist attacks. These mechanisms are difficult to examine in a single study, however, because the social conditions of terrorist attacks are difficult to simulate in laboratory experiments and appropriate preattack baselines are difficult to establish with surveys. To address this challenge, we propose the use of computational focus groups and a novel analysis framework to analyze a social media stream that archives user history and location. The approach uses time-stamped behavior to quantify an individual's preattack behavior after an attack has occurred, enabling the assessment of time-specific changes in the intensity and duration of an individual's distress, as well as the assessment of individual and social-level covariates. To exemplify the methodology, we collected over 18 million tweets from 15,509 users located in Paris on November 13, 2015, and measured the degree to which they expressed anxiety, anger, and sadness after the attacks. The analysis resulted in findings that would be difficult to observe through other methods, such as that news media exposure had competing, time-dependent effects on anxiety, and that gender dynamics are complicated by baseline behavior. Opportunities for integrating computational focus group analysis with traditional methods are discussed. © 2017 Society for Risk Analysis.

  14. The Representation of Islam in Western Media: The Coverage of Norway Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Emad A. Alghamdi

    2015-05-01

    Full Text Available Undeniably mass media have become the primary source of information and communication for the majority of, if not all, members of modern societies. The nature of the information thus communicated and the manner in which it is dispensed through media certainly have a profound influence on people’s perceptions of the world around them. The relation between the media, on one hand, and culture, social life, and politics on the other, is an interesting one in which media fulfills dual functions, reflecting and also shaping issues occurring within these three domains (Bell & Garrett, 1998. In the initial media coverage of the 2011 Norway terrorist attacks, some western media authors, inaccurately and unjustly, held Muslims and Islamic groups as being responsible for the attacks. Using Critical Discourse Analysis (CDA, this study seeks to ascertain how language was manipulated in this coverage of the terrorist attacks in order to give expression to blind prejudice against Islam and Muslims. As findings of the analyses reveal, the tones of allegation in these articles and reports differed dramatically from one article to another ranging from tones of mere suspicion to those of overt accusation. The varying degrees of uncertainty or assertion of the authors’ statements were reflected in the varied linguistic forms and devices used within the discourse.

  15. Defense against terroristic hazards and risk by building planning law; Abwehr terroristischer Gefahren und Risiken durch Bauplanungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Richard

    2012-07-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  16. You Are the Real Terrorist and We Are Just Your Puppet: Using Individual and Group Factors to Explain Indonesian Muslims’ Attributions of Causes of Terrorism

    Science.gov (United States)

    Mashuri, Ali; Akhrani, Lusy Asa; Zaduqisti, Esti

    2016-01-01

    The current study investigates the role of individual and intergroup factors in predicting Muslims’ tendency to attribute domestic terrorism in Indonesia to an external cause (i.e., The West) or an internal cause (i.e., radical Islamist groups). The results (N = 308) showed that intergroup factors of symbolic threat and realistic threat directly increased the external attribution and conversely decreased the internal attribution. Within the context of the current research, symbolic threat refers to Muslims’ perception that the norms and values of the West undermine Islamic identity. Realistic threat denotes Muslims’ perception that the economy and technology of the West undermine Islamic power. The individual factor of Islamic fundamentalism, which has to do with Muslims’ belief in the literal interpretation of and strict guidelines to Islamic doctrines, indirectly predicted both external attribution and internal attribution of terrorism as hypothesized, via the extent to which Muslims perceived the West as posing a symbolic threat, but not a realistic threat to Islamic existence. Uncertainty avoidance, a cultural dimension that describes the extent to which people view clear instructions as a pivotal source of concern to deal with societal problems, also significantly increased perceived symbolic threat and realistic threat, and this cultural dimension mediated the effect of Islamic fundamentalism on each of the intergroup threats. Finally, we found that the level of Islamic fundamentalism was dependent upon cognitive response, but not emotional response to mortality salience. The cognitive response to mortality salience denotes what Muslims are thinking about in coping with their own death whereas the emotional response denotes what Muslims are feeling about such issue. In particular, we found the cognitive response, but not the emotional response to mortality salience significantly gave rise to Muslims’ Islamic fundamentalism. These findings shed light on the importance of combining individual factors and group factors in explicating the dynamics of Muslims’ tendency to make attributions of causes of domestic terrorism. We discuss theoretical implications and study limitations, as well as practical actions policy makers could conduct to deal with Muslims’ Islamic fundamentalism and reduce the extent to which this particular group perceives the West as threatening their existence. PMID:27247694

  17. The game-theoretic national interstate economic model : an integrated framework to quantify the economic impacts of cyber-terrorist behavior.

    Science.gov (United States)

    2014-12-01

    This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...

  18. The 'overlooked trio' of hypothetical terrorist nuclear weapons - reactor grade plutonium, neptunium-237 and tritium

    International Nuclear Information System (INIS)

    Sholly, S.

    2002-01-01

    Full text: Considerations revolving around physical protection of nuclear material are quite commonly and naturally focused on protecting weapons-grade plutonium (WGPu) and highly enriched uranium (HEU) from theft and diversion. These two materials are the center of attention because of their well-known (and demonstrated) potential for use in first-generation nuclear explosive devices of which potential terrorists are widely thought to be capable. They are also the center of attention because of retirements of these materials from military use as the Russian Federation and the United States reduce the number of nuclear weapons in their arsenals. Three other materials - an 'overlooked trio' - must also be borne in mind within this context: (1) reactor-grade plutonium (RGPu); (2) neptunium-237 (Np-237); and (3) tritium (H-3). Although there are still some authorities who either contend that RGPu cannot be used in a nuclear explosive or that there are (for a terrorist) insurmountable difficulties in doing so, the knowledgeable scientific and technical community, recognizes the potential utility of RGPu for hypothetical terrorist nuclear devices. A much smaller community of experts recognizes the usefulness of Np-237 for nuclear devices, but Np-237 is as straight-forwardly and easily usable as HEU and similarly abundant (but not often in separated form). Tritium can be used (with a modest increase in design sophistication) in a conventional first-generation nuclear device with any of the weapons-usable materials (WGPu, HEU, RGPu or Np-237) to increase the yield and/or increase the reliability of a non-fizzle yield. Given the presence of RGPu and Np-237 in abundant quantities in spent commercial reactor fuel, widely available knowledge of how to separate these materials, and a world-wide total of more than 400 nuclear power plants, spent reactor fuel also requires stringent controls. This is especially true of old spent fuel which has far less radiation dose

  19. Explaining the Evolution of Poverty

    DEFF Research Database (Denmark)

    Arndt, Channing; Hussain, Azhar; Jones, Edward Samuel

    2012-01-01

    We provide a comprehensive approach for analyzing the evolution of poverty using Mozambique as a case study. Bringing together data from disparate sources, we develop a novel “back-casting” framework that links a dynamic computable general equilibrium model to a micro-simulation poverty module....... This framework provides a new approach to explaining and decomposing the evolution of poverty, as well as to examining rigorously the coherence between poverty, economic growth, and inequality outcomes. Finally, various simple but useful and rarely-applied approaches to considering regional changes in poverty...

  20. Terrorist threat and perceived Islamic support for terrorist attacks as predictors of personal and institutional out-group discrimination and support for anti-immigration policies: evidence from 9 European countries

    NARCIS (Netherlands)

    Doosje, B.; Zimmermann, A.; Küpper, B.; Zick, A.; Meertens, R.

    2009-01-01

    Traditionally, research has shown that subtle and blatant prejudices are important predictors of out-group discrimination and support for anti-immigration policies. The present paper shows that, when controlling for these types of prejudices and for political conservatism, terrorist threat and

  1. Adenosine monophosphate is not superior to histamine for bronchial provocation test for assessment of asthma control and symptoms.

    Science.gov (United States)

    Wu, Fan; Guan, Wei-Jie; Gao, Yi; An, Jia-Ying; Xie, Yan-Qing; Liu, Wen-Ting; Yu, Xin-Xin; Zheng, Jin-Ping

    2017-07-01

    Adenosine monophosphate (AMP) may reflect airway inflammation and hyperresponsiveness, but relationship between AMP and histamine (His, a conventional stimulus) bronchial provocation test (BPT) in asthma is not fully elucidated. To compare both BPTs and determine their utility in reflecting changes of asthmatic symptoms. BPTs were performed in a cross-over fashion, at 2-4 day intervals. Cumulative doses eliciting 20% FEV 1 fall (PD 20 FEV 1 ), diagnostic performance and adverse events (AEs) were compared. Patients with PD 20 FEV 1 lower than geometric mean were defined as responders, otherwise poor responders. Patients with uncontrolled and partly controlled asthma, who maintained their original inhaled corticosteroids therapy, underwent reassessment of airway responsiveness and asthmatic symptoms 3 and 6 months after. Nineteen uncontrolled, 22 partly controlled and 19 controlled asthmatic patients and 24 healthy subjects were recruited. Lower PD 20 FEV 1 geometric means were associated with poorer asthma control in His-BPT (0.424 μmol vs 1.684 μmol vs 3.757 μmol), but not AMP-BPT (11.810 μmol vs 7.781 μmol vs 10.220 μmol). Both BPTs yielded similar overall diagnostic performance in asthma (area under curve: 0.842 in AMP-BPT vs 0.850 in His-BPT). AEs, including wheezing and tachypnea, were similar and mild. Ten patients with uncontrolled and 10 partly controlled asthma were followed-up. At months 3 and 6, we documented an increase in PD 20 FEV 1 -AMP and PD 20 FEV 1 -His, which did not correlate with reduction asthmatic symptom scores. This overall applied in responders and poor responders of AMP-BPT and His-BPT. Despite higher screening capacity of well-controlled asthma, AMP-BPT confers similar diagnostic performance and safety with His-BPT. AMP-BPT might not preferentially reflect changes asthmatic symptoms. © 2015 John Wiley & Sons Ltd.

  2. 389 Allergic Reactions to Local Anesthetics: Detection by Skin Tests and Subcutaneous Provocation. Analysis of 160 Cases

    Science.gov (United States)

    Arcanjo, Luiz; Gonçalves Tavares, Tania Maria; Delcourt, Nathalia; Baroni, Juliana; Rios, João; Rios, José Luiz

    2012-01-01

    Background Adverse reactions to local anesthetics (LA) are frequent and often referred to as allergic. Although immune-mediated reactions are rare, it should be investigated for suspected cases. The objective of this study was to determine the frequency of positive skin test to these drugs in patients with a suspected history of allergic reactions and describe the main socio-demographic characteristics of these individuals. Methods Retrospective study of medical records of patients attended at Policlínica Geral do Rio de Janeiro Allergic Clinic, between 2008 and 2011. The parameters evaluated were the test indication and the patient ages and gender. The drug tested was that the patient had a history of suspicion. Patients underwent skin prick and intradermal tests and subcutaneous provocation. Descriptive statistical analysis of the data was performed. Results It was performed 160 tests (125 female). Three of this total was excluded due to inconclusive results. In women, the highest proportion of tests was in the age group from 41 to 60 years (43%), while in males the higher concentration was at a youngest age group: 21 to 40 years (41%). The most common indication (103 cases, 65%) for the tests was a previous suspected anaphylactic reaction by LA. Seven of 157 tests had a positive result (4.4%), 6 of them occurred in women (4.8%). Only one test resulted in a type of anaphylactic reaction response (0.67%). All patients who presented positive response to the test had a history of per-anesthetic reaction that suggested an immune-mediated mechanism. Conclusions In patients with a history of previous reaction to local anesthetics, the skin tests with these drugs have a key role in the prevention of anaphylaxis, and on guidance for adequate anesthetic procedures.

  3. Aspirin provocation increases 8-iso-PGE2 in exhaled breath condensate of aspirin-hypersensitive asthmatics.

    Science.gov (United States)

    Mastalerz, Lucyna; Januszek, Rafał; Kaszuba, Marek; Wójcik, Krzysztof; Celejewska-Wójcik, Natalia; Gielicz, Anna; Plutecka, Hanna; Oleś, Krzysztof; Stręk, Paweł; Sanak, Marek

    2015-09-01

    Isoprostanes are bioactive compounds formed by non-enzymatic oxidation of polyunsaturated fatty acids, mostly arachidonic, and markers of free radical generation during inflammation. In aspirin exacerbated respiratory disease (AERD), asthmatic symptoms are precipitated by ingestion of non-steroid anti-inflammatory drugs capable for pharmacologic inhibition of cyclooxygenase-1 isoenzyme. We investigated whether aspirin-provoked bronchoconstriction is accompanied by changes of isoprostanes in exhaled breath condensate (EBC). EBC was collected from 28 AERD subjects and 25 aspirin-tolerant asthmatics before and after inhalatory aspirin challenge. Concentrations of 8-iso-PGF2α, 8-iso-PGE2, and prostaglandin E2 were measured using gas chromatography/mass spectrometry. Leukotriene E4 was measured by immunoassay in urine samples collected before and after the challenge. Before the challenge, exhaled 8-iso-PGF2α, 8-iso-PGE2, and PGE2 levels did not differ between the study groups. 8-iso-PGE2 level increased in AERD group only (p=0.014) as a result of the aspirin challenge. Urinary LTE4 was elevated in AERD, both in baseline and post-challenge samples. Post-challenge airways 8-iso-PGE2 correlated positively with urinary LTE4 level (p=0.046), whereas it correlated negatively with the provocative dose of aspirin (p=0.027). A significant increase of exhaled 8-iso-PGE2 after inhalatory challenge with aspirin was selective and not present for the other isoprostane measured. This is a novel finding in AERD, suggesting that inhibition of cyclooxygenase may elicit 8-iso-PGE2 production in a specific mechanism, contributing to bronchoconstriction and systemic overproduction of cysteinyl leukotrienes. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this

  5. Explaining the harmonic sequence paradox.

    Science.gov (United States)

    Schmidt, Ulrich; Zimper, Alexander

    2012-05-01

    According to the harmonic sequence paradox, an expected utility decision maker's willingness to pay for a gamble whose expected payoffs evolve according to the harmonic series is finite if and only if his marginal utility of additional income becomes zero for rather low payoff levels. Since the assumption of zero marginal utility is implausible for finite payoff levels, expected utility theory - as well as its standard generalizations such as cumulative prospect theory - are apparently unable to explain a finite willingness to pay. This paper presents first an experimental study of the harmonic sequence paradox. Additionally, it demonstrates that the theoretical argument of the harmonic sequence paradox only applies to time-patient decision makers, whereas the paradox is easily avoided if time-impatience is introduced. ©2011 The British Psychological Society.

  6. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  7. Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists (by Jeffrey Kahn, University of Michigan Press, 2013

    Directory of Open Access Journals (Sweden)

    Susan Ginsburg

    2014-04-01

    Full Text Available Since 9/11, migration-related security measures, including a growing reliance on watch-lists, have limited the right to travel. Jeffrey Kahn’s book, Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists, examines the legal and policy questions raised by prohibitions on travel by US citizens. 

  8. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-07-25

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  9. Granting Concessions and Paying Ransoms to Terrorists: A Policy Options Analysis of the U.S. Policy on Hostage Recovery

    Science.gov (United States)

    2016-06-01

    businesses like General Motors, which received bailout money from the federal government, and the Catholic Church, which receives tax-exempt status...from gaining independence from France . Other examples of absolute terrorists include the Provisional Irish Republican Army (IRA), Hamas, and al...The conflict began when the IRA, which represented the Catholic minority, felt discriminated against by the Protestant majority, represented by

  10. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Directory of Open Access Journals (Sweden)

    Tuncay Ercan

    2008-07-01

    Full Text Available Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  11. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Science.gov (United States)

    2011-07-06

    ... of Investigation (FBI)/Terrorist Screening Center (TSC) is providing a near real time, synchronized... appropriate clearances or permissions. Retention and disposal: The WLS will maintain a near real time mirror... difficulties they experienced during their travel screening at transportation hubs such as airports and train...

  12. Construction of War Discourse on International News Agencies: Case Study Terrorist attacks November 13th 2015

    Directory of Open Access Journals (Sweden)

    Ángel TORRES-TOUKOUMIDIS

    2017-01-01

    Full Text Available This study analyzes warmongering rhetoric presented by international agencies Reuters, Al Arabiya, Al Jazeera and Associated Press (AP of the information related to the terrorist attacks in Paris on November 13th, 2015 for 15 days after the event. We have started from a quantitative and qualitative analysis of 550 information units using the software MAXQDA (v. 11.0.11. Subsequently, the semantic criteria of media discourse: functionality, significance and direction of the goal was applied on the selected sample. The results demonstrate the prevailing demonization of Islam, the exaltation of fear and panic in the discursive construction and it highlighted the spectacle of the information as a communicative strategy on the rhetorical guidance.

  13. War on Terror: Fantasy and Fiction Behind the Mythology of Terrorist Financing

    Directory of Open Access Journals (Sweden)

    El-Fatih A. Abdel Salam

    2009-06-01

    Full Text Available Documentary evidence shows that the series of financial crackdowns initiated since 9/11 have had virtually no impact on terrorism. This is because these efforts are based on a fundamental misconception on how terrorism works. The financial warriors’ predisposition to stereotypes about “Arabs and their money” allowed unsubstantiated rumours–such as Bin Laden’s personal fortune of $300 million–to become established as facts. This study exposes the extent to which Washington policymakers simply transposed the template for the war on drugs on to the war on terror, despite the fact that terrorism is not a profit–driven enterprise. The collateral damage inflicted on organisations like Al-Barakaat, the Somali remittance network, wrongly accused of channeling money to the terrorists, and others are counter-productive as they dent the image of the US in the Muslim world.

  14. Chronic thought suppression and posttraumatic symptoms: data from the Madrid March 11, 2004 terrorist attack.

    Science.gov (United States)

    Vázquez, Carmelo; Hervás, Gonzalo; Pérez-Sales, Pau

    2008-12-01

    Although a considerable number of people either witnessed directly or in the mass media the traumatic scenes of the terrorist attack that took place on March 11th, 2004 in Madrid, only a fraction of Madrid citizens developed posttraumatic symptoms. In this study, posttraumatic stress-related symptoms, degree of exposure, coping strategies related to the attack, and chronic attempts to avoid intrusive thoughts (i.e., thought suppression) were assessed in a general population Madrid sample (N=503) 2-3 weeks after the attacks. Our results showed that participants with higher scores in chronic thought suppression exhibited higher levels of PTSD symptoms. Higher scores in chronic thought suppression also correlated positively with the use of avoidant coping strategies after the attacks. We discuss the possible common roots of avoidance of intrusive thoughts and avoidant coping strategies and the implications of this relationship for the emergence of stress-related symptoms as well as for public health policies.

  15. Addressing the Foreign Terrorist Fighters Phenomenon From a European Union Perspective

    Directory of Open Access Journals (Sweden)

    Mark Singleton

    2014-12-01

    Full Text Available With the outbreak of civil war and sectarian violence in Syria, Iraq, and Libya, over 15,000 men and women from more than 80 countries around the world have left their homes to become foreign fighters. The security challenge they pose is immense and there are concerns about radicalised fighters returning to their countries of origin or residence, hardened by experience and with the possible intent – and the know-how – to engage in terrorist activities. On 24 September, the UN Security Council unanimously adopted Resolution 2178 (2014 with the support of over 120 states representing a broad cross-section of the UN membership. Resolution 2178 called on all UN member states to ensure increased border security and to screen for or arrest so-called “foreign terrorist fighters” (FTFs travelling to or returning from conflict areas. Rightly so, it also urges states to counter violent extremism by taking preventive measures, such as engaging with communities at the local level to stop the spread of extremist ideologies. On 23 October 2014, the Global Center on Cooperative Security, the Human Security Collective, and ICCT convened an expert meeting at the European Union (EU in Brussels to discuss the implications of the resolution and to explore appropriate and effective responses to the threat of FTFs, both within the EU and as part of the Union’s foreign security and development programming. Building upon the discussion in Brussels, this policy brief is a compilation of essays from all three organisations on the challenges and opportunities for addressing the FTF threat from a European Union perspective. It also examines the implementation of Resolution 2178 as an integral part of national and multilateral foreign security and development policies and initiatives.

  16. Reflection, Interrogatory, Provocation

    International Nuclear Information System (INIS)

    Carnes, W.E.

    2016-01-01

    This invited paper advances a framing context for considering next steps in HOF and organizational culture in light of the presentations and discussions that occur during the conference. Many of the contributions during the conference will represent results of scholarly research, structured investigations, or formal organizational improvement efforts. This contribution is intended as informal reflection by a 40-year nuclear veteran on themes from other presentations considering questions such as: ''Where do we think we are?, Are we better off as an industry based on what we have done?, Where do we think we need to go?, What do we think we need to do?, and, Why do we think these things?'' Our coming together on this occasion marks 30 years since the publication of INSAG-l. As we reflect on the past, perhaps it is time to pose a series of questions. Are we sustainers of a mature technology that is in some places declining and being replaced by other energy sources? If we consider nuclear a mature technology, should we focus most on operational excellence with renewed attention to managing the unexpected? Or, is innovation still a vital part of our industry?

  17. Muscle Weakness in the Empty and Full Can Tests Cannot Differentiate Rotator Cuff Tear from Cervical Spondylotic Amyotrophy: Pain Provocation is a Useful Finding.

    Science.gov (United States)

    Iwata, Eiichiro; Shigematsu, Hideki; Inoue, Kazuya; Egawa, Takuya; Sakamoto, Yoshihiro; Tanaka, Yasuhito

    2017-01-01

    Rotator cuff tears and cervical spondylotic amyotrophy (CSA) are often confused as the main symptom in those with difficulty in shoulder elevation. Empty and full can tests are frequently used for the clinical diagnosis of rotator cuff tears. The aim of the present study was to investigate whether the empty and full can test results can help differentiate rotator cuff tears from CSA. Twenty-seven consecutive patients with rotator cuff tears and 25 with CSA were enrolled. We prospectively performed empty and full can tests in patients with rotator cuff tears and CSA. The following signs were considered positive: (a) muscle weakness during the empty can test, (b) muscle weakness during the full can test, (c) pain provocation during the empty can test, and (d) pain provocation during the full can test. We calculated the sensitivity, specificity, positive predictive value (PPV) and negative predictive value (NPV) of rotator cuff tears for each positive finding. The sensitivity and specificity of each index were as follows (sensitivity, specificity, PPV, NPV): (a) 77.8%, 0%, 45.7%, 0%; (b) 66.7%, 4.0%, 42.9%, 10.0%; (c) 88.9%, 96.0%, 96.0%, 88.9%; and (d) 74.1%, 96.0%, 95.2%, 77.4%. There were significant differences for each index. Muscle weakness during the empty and full can tests was not useful in differentiating rotator cuff tears from CSA because of low specificity and PPV. However, pain provocation was useful in differentiating these two conditions because of high specificity and PPV.

  18. Does short-term exposure to mobile phone base station signals increase symptoms in individuals who report sensitivity to electromagnetic fields? A double-blind randomized provocation study.

    Science.gov (United States)

    Eltiti, Stacy; Wallace, Denise; Ridgewell, Anna; Zougkou, Konstantina; Russo, Riccardo; Sepulveda, Francisco; Mirshekar-Syahkal, Dariush; Rasor, Paul; Deeble, Roger; Fox, Elaine

    2007-11-01

    Individuals with idiopathic environmental illness with attribution to electromagnetic fields (IEI-EMF) believe they suffer negative health effects when exposed to electromagnetic fields from everyday objects such as mobile phone base stations. This study used both open provocation and double-blind tests to determine if sensitive and control individuals experience more negative health effects when exposed to base station-like signals compared with sham. Fifty-six self-reported sensitive and 120 control participants were tested in an open provocation test. Of these, 12 sensitive and 6 controls withdrew after the first session. The remainder completed a series of double-blind tests. Subjective measures of well-being and symptoms as well as physiological measures of blood volume pulse, heart rate, and skin conductance were obtained. During the open provocation, sensitive individuals reported lower levels of well-being in both the global system for mobile communication (GSM) and universal mobile telecommunications system (UMTS) compared with sham exposure, whereas controls reported more symptoms during the UMTS exposure. During double-blind tests the GSM signal did not have any effect on either group. Sensitive participants did report elevated levels of arousal during the UMTS condition, whereas the number or severity of symptoms experienced did not increase. Physiological measures did not differ across the three exposure conditions for either group. Short-term exposure to a typical GSM base station-like signal did not affect well-being or physiological functions in sensitive or control individuals. Sensitive individuals reported elevated levels of arousal when exposed to a UMTS signal. Further analysis, however, indicated that this difference was likely to be due to the effect of order of exposure rather than the exposure itself.

  19. Aggregated data from two double-blind base station provocation studies comparing individuals with idiopathic environmental intolerance with attribution to electromagnetic fields and controls.

    Science.gov (United States)

    Eltiti, Stacy; Wallace, Denise; Russo, Riccardo; Fox, Elaine

    2015-02-01

    Data from two previous studies were aggregated to provide a statistically powerful test of whether exposure to electromagnetic fields (EMFs) produced by telecommunication base stations negatively affects well-being in individuals who report idiopathic environmental illness with attribution to electromagnetic fields (IEI-EMF) and control participants. A total of 102 IEI-EMF and 237 controls participated in open provocation trials and 88 IEI-EMF and 231 controls went on to complete double-blind trials in which they were exposed to EMFs from a base station emitting either a Global System for Mobile Communication and Universal Mobile Telecommunications System or a Terrestrial Trunked Radio Telecommunications System signal. Both experiments included a comparison sham condition. Visual analog and symptom scales measured subjective well-being. Results showed that IEI-EMF participants reported lower levels of well-being during real compared to sham exposure during open provocation, but not during double-blind trials. Additionally, participants reported lower levels of well-being during high compared to low load trials and this did not interact with radiofrequency-EMF exposure. These findings are consistent with a growing body of literature indicating there is no causal relationship between short-term exposure to EMFs and subjective well-being in members of the public whether or not they report perceived sensitivity to EMFs. © 2015 Wiley Periodicals, Inc.

  20. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    ... and business elite, The government's failure to curtail these groups resulted from the enormous belief that these terrorists were not a direct threat to Greek's democracy Fortunately, in June of 2002...

  1. Involvement of Russian Organized Crime Syndicates, Criminal Elements in the Russian Military, and Regional Terrorist Groups in Narcotics Trafficking in Central Asia, the Caucasus, and Chechnya

    National Research Council Canada - National Science Library

    Curtis, Glenn E

    2002-01-01

    ... (Armenia, Azerbaijan, and Georgia), and in Chechnya. The purpose of the report is to reveal the role of Russian organized crime and Central Asian terrorist organizations in narcotics trafficking in those areas...

  2. Posse Comitatus and the Use of the Military in Denying Terrorist Access to the United States Along the Border with Mexico

    National Research Council Canada - National Science Library

    Thomas, Greg A

    2005-01-01

    .... The largely unsecured border we share with Mexico is an enticing avenue for illegal immigrants and drug smugglers but also, and more importantly, for potential terrorists hostile to the United States...

  3. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  4. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    International Nuclear Information System (INIS)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il'kaev, R.I.; Shapovalov, V.I.

    2004-01-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks

  5. How Belfius Bank's response to the terrorist attacks in Brussels helped embed business continuity in the company culture.

    Science.gov (United States)

    Jappens, Ludo

    2017-01-01

    Until 2015, major terrorist incidents in Belgium were considered a 'black swan'. However, the suicide attacks in Paris on 13th November, 2015 provided a wake-up call. Investigations revealed that the raid was prepared in Belgium by jihadists who grew up in Brussels and was coordinated by Belgian ISIS fighters in Syria. In an instant, it became clear that terror had been embedded in Belgian society and could erupt at any moment. At Belfius Bank Belgium, the subsequent months were a rollercoaster ride of terrorist-related events. Business activities were strongly affected, as the company's head office is located in the centre of Brussels. This paper focuses on the way Belfius responded to the events and how the lessons learned have helped to improve its business continuity and crisis management capability.

  6. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    Energy Technology Data Exchange (ETDEWEB)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il' kaev, R.I.; Shapovalov, V.I. [Russian Federal Nuclear Center - All-Russian Research Inst. of Experimental Physics, Sarov (Russian Federation)

    2004-07-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks.

  7. Characterising the UK Terrorist Threat: The Problem with Non-Violent Ideology as a Focus for Counter-Terrorism and Terrorism as the product of ‘Vulnerability’

    OpenAIRE

    Anthony Richards

    2012-01-01

    This article investigates two particular aspects as to how the terrorist threat in the UK has been characterised, arguing that they both challenge conventional academic wisdom as to how terrorism should be conceptualised. While such conventional wisdom should always be open to challenge, and policymaking perspectives are different to those of academics, these two particular aspects as to how the terrorist threat has been perceived in the UK merit scrutiny, especially as counter-terrorism stra...

  8. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    OpenAIRE

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critica...

  9. Review of Studies of the Economic Impact of the September 11, 2001, Terrorist Attacks on the World Trade Center

    Science.gov (United States)

    2002-05-29

    of the Budget, • New York City Partnership and Chamber of Commerce , Washington, DC 20548 Report Documentation Page Report Date 29MAY2002 Report Type...700R Impact of Terrorist Attacks on the World Trade Center 10 Eight Studies (cont’d) ! New York City Partnership and Chamber of Commerce , Economic...Center 29 Observations Observations The New York City Partnership and Chamber of Commerce study generated the most comprehensive estimates—direct and

  10. What Are We Really Afraid Of? The Practitioner View of the Terrorist Threat in the United States

    Science.gov (United States)

    2005-03-01

    like intelligence gathering and courier work • 80% single • Familiarity with home ground. Thus terrorists come from both rural and urban areas • 66...codes also help disaggregate intra- - 114 - state regions by identifying urban areas from suburban and rural . Finally, through geographic mapping...National Laboratory for Tourism and eCommerce (NLTEC), University of Illinois at Urbana-Champaign. 2002. Self-Selection Biases in the Internet

  11. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  12. Operation the laboratory for NBC protection and bio monitoring in the case of terrorist attack with NBC weapons

    International Nuclear Information System (INIS)

    Tusek, D.; Vucemilovic, A; Klobucar, J.

    2009-01-01

    The aim of this study was to develop efficacy of Operation the Laboratory for NBC protection and Bio monitoring in the case of terrorist attack with chemical weapons. When is necessary quickly, adeptly Operation and unambiguous confirmation about use chemical warfare agent, the Laboratory must be ready and qualified for reaction. The Laboratory had to develop capability for the timely sampling and unambiguous identification chemical warfare agents in a battlefield or in case of the terrorist attack. The need for quality sample collection and analyses is critical to verify use of chemical weapon (CW) by an enemy or terrorists. Collection, packaging, transport and analysis of samples must be carried out on proper way and quickly enough for military, medical or political purposes. Precise records must accompany each sample but these records must not contaminate samples anyway. All sampling team personnel have to be equipped with appropriate equipment and qualified in its handling. After arriving samples at our Laboratory, we will handle with them on standard procedures; carry out preparation such as Headspace, Liquid/liquid extraction, Solid phase extraction, Liquid/solid extraction, concentration and derivatization. After that we will analyze samples by gas-chromatography mass-spectrometry (GC/MS) method.(author)

  13. Social integration buffers stress in New York police after the 9/11 terrorist attack.

    Science.gov (United States)

    Schwarzer, Ralf; Bowler, Rosemarie M; Cone, James E

    2014-01-01

    Being socially integrated is regarded as a protective factor enabling people to cope with adversity. The stress-buffering effect reflects an interaction between stress and a social coping resource factor on subsequent outcomes. This study, based on 2943 police officers, examines mental health outcomes among officers who responded to the 9/11 terrorist attack on the World Trade Center. The Wave 1 data collection took place between September 2003 and November 2004 with a follow-up study (Wave 2) conducted from November 2006 through December 2007. A moderated mediation model was specified that uses event exposure as a distal predictor, earlier stress response as a mediator, and later stress response as an outcome, and social integration as a moderator of this relationship. The mediation hypothesis was confirmed, and moderation occurred at two stages. First, there was a multiplicative relationship between exposure levels and social integration: The higher the exposure level, the more stress responses occur, but this effect was buffered by a high level of social integration. Second, Wave 1 stress interacted with social integration on Wave 2 stress: The more the police officers were socially integrated, the lower the Wave 2 stress, which happened in a synergistic manner. The findings contribute to the understanding of mediating and moderating mechanisms that result in health outcomes such as posttraumatic stress disorder or resilience.

  14. Extremist Radicalism and Terrorist Inroads in West Africa: Understanding the Threat

    Directory of Open Access Journals (Sweden)

    Solomon Kofi Amoah

    2017-12-01

    Full Text Available While research has not yet established the regional consequences of terrorism, its immediate effects on states that have been hit (i.e. Mali, Niger, Burkina Faso and Nigeria, and the spill over effects in neighbouring countries cannot be discounted. This paper analyses the challenge of violent extremism in Africa based on existing evidence from across the West African sub- region. It pays particular attention to the recruitment of young people in Africa into extremist causes on the continent and beyond and proffers measures for their curtailment. The paper argues that terrorism in contemporary Africa undermines democratization, good governance, peace and security and regional development. It also recommends three-pronged strategies for addressing the miasma of extremist radicalism and its associated violence in West Africa, namely, governance, development and security reforms. While it may be difficult to absolutely curtail the activities of terrorist organizations in West Africa. Countries with minimal vulnerabilities like Ghana, Sierra Leone, Liberia and others should intensify efforts towards increased border and cyber security surveillance, sustained de-radicalization programmes and youth empowerment programmes to curb unemployment in earnest.

  15. Cooperative international arrangements: prevention of nuclear terrorism and the extradition and prosecution of terrorists

    International Nuclear Information System (INIS)

    Murphy, J.F.

    1987-01-01

    In considering the problems associated with prosecuting and punishing nuclear terrorists, it is noted that nuclear terrorism per se is not currently a crime under international law. To be sure, the Convention on the Physical Protection of Nuclear Material would probably cover any act of nuclear terrorism that involved nuclear material used for peaceful purposes. However, nuclear material used for military purposes or military nuclear reactors is outside the scope of the convention. US legislation implementing the convention goes beyond its terms in this respect and covers crimes involving nuclear material for nonpeaceful purposes if the offense is committed within US territorial, special maritime, special territorial, or special aircraft jurisdiction or if the offense is committed by nationals of the US. The author feels an effort should be made, under the auspices of the United Nations, to conclude a convention that would define nuclear terrorism, declare it a crime under international law, and obligate state parties to extradite or prosecute those who commit the crime. Such a convention would fill the large gap in the coverage of the Convention on the Physical Protection of Nuclear Material

  16. "Evita Una Muerte, Esta en Tus Manos" Program: Bystander First Aid Training for Terrorist Attacks.

    Science.gov (United States)

    Pajuelo Castro, J J; Meneses Pardo, J C; Salinas Casado, P L; Hernandez Martin, P; Montilla Canet, R; Del Campo Cuesta, J L; Incera Bustio, G; Martin Ayuso, D

    The latest terrorist attacks in Europe and in the rest of the world, and the military experience in the most recent conflicts leave us with several lessons learned. The most important is that the fate of the wounded rests in the hands of the one who applies the first dressing, because the victims usually die within the first 10 minutes, before professional care providers or police personnel arrive at the scene. A second lesson is that the primary cause of preventable death in these types of incidents involving explosives and firearms is massive hemorraghe. There is a need to develop a training oriented to citizens so they can identify and use available resources to avoid preventable deaths that occur in this kind of incidents, especially massive hemorrhage. A 7-hour training intervention program was developed and conducted between January and May 2017. Data were collected from participants' answers on a multiple-choice test before and after undertaking the training. Improved mean score for at least 75% of a group's members on the posttraining test was considered reflective of adequate knowledge. A total of 173 participants (n = 74 men [42.8%]; n = 99 women [57.2%]) attended the training. They were classified into three groups: a group of citizens/ first responders with no prior health training, a group of health professionals, and a group of nursing students. Significant differences (ρ first responders group. 2017.

  17. Holy Terror, Batman! Frank Miller’s Dark Knight and the Superhero as Hardboiled Terrorist

    Directory of Open Access Journals (Sweden)

    Daniele Croci

    2016-05-01

    Full Text Available Conceived in the late thirties as “bold humanist response to Depression-era fears of runaway scientific advance and soulless industrialism” (Morrison 2012, 6, the superhero has flourished as one of the most resilient archetypes of American popular culture. This essay analyses the literary and cultural contaminations that have engendered an unprecedented revision of the paradigm since the 1980s. In particular, it will take into account three graphic novels by American cartoonist Frank Miller (1957 - , one of leading figures of the mainstream comics renaissance, whose ideas have indelibly influenced the artistic development of both medium and genre. The Dark Knight Returns (1986, The Dark Knight Strikes Again (2002 and Holy Terror (2011 constitute an ideal Batman trilogy that charts the character’s evolution as political counterpoint to the perceived crisis of American identity. In this regard, Reaganism and 9/11 are polarized as historical discontinuities triggering the need for a new kind of a criminal (superhero. It will be in fact demonstrated how the novels hybridise the latent generic links to hardboiled pulp novels (R. Chandler, D. Hammet with narrative and aesthetics elements appropriated from the culturally-received concepts of terrorism and terrorists. This fruitful contamination on the one hand “play[s] with reader assumptions about genre” (Baetens and Frey 2015, 46, while on the other hand deconstructs the ideological underpinnings of the archetype, as the moral dichotomy and the alienation of justice from the law.

  18. Toxicology of organophosphorus compounds in view of an increasing terrorist threat.

    Science.gov (United States)

    Worek, Franz; Wille, Timo; Koller, Marianne; Thiermann, Horst

    2016-09-01

    The implementation of the Chemical Weapon Convention (CWC), prohibiting the development, production, storage and use of chemical weapons by 192 nations and the ban of highly toxic OP pesticides, especially class I pesticides according to the WHO classification, by many countries constitutes a great success of the international community. However, the increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents new challenges to our societies. Almost seven decades of research on organophosphorus compound (OP) toxicology was mainly focused on a small number of OP nerve agents despite the fact that a huge number of OP analogues, many of these agents having comparable toxicity to classical nerve agents, were synthesized and published. Only limited physicochemical, toxicological and medical information on nerve agent analogues is available in the open literature. This implies potential gaps of our capabilities to detect, to decontaminate and to treat patients if nerve agent analogues are disseminated and may result in inadequate effectiveness of newly developed countermeasures. In summary, our societies may face new, up to now disregarded, threats by toxic OP which calls for increased awareness and appropriate preparedness of military and civilian CBRN defense, a broader approach for new physical and medical countermeasures and an integrated system of effective detection, decontamination, physical protection and treatment.

  19. An autopsy case related to a terrorist attack using a ball-bearing bomb.

    Science.gov (United States)

    Takamiya, Masataka; Biwasaka, Hitoshi; Niitsu, Hisae; Saigusa, Kiyoshi; Aoki, Yasuhiro

    2009-03-01

    We encountered an autopsy case related to a terrorist attack using a ball-bearing bomb. The decedent was a 51-year-old male without significant medical histories. During dinner in a restaurant, the perpetrator suddenly exploded a ball-bearing bomb, the blast from which blew the victim off his chair. The victim was found to be unresponsive, and pronounced dead. X-ray photographs taken before autopsy revealed six spherical shadows. Three penetrating wounds in the head, one in the neck and chest, and two in the left upper arm were observed in vivo. Six projectiles recovered from the body were identified as ball-bearings, one of which traveled through the midbrain, diencephalon, and left temporal lobe. Although blast injuries and penetrating wounds are often combined in bomb attack victims, penetrating brain injury would be the cause of death in this case. Lethal injuries to major organs can thus occur even though the destructive force of a ball-bearing bomb is weak. X-ray films were informative for detecting the ball-bearings in this case, suggesting that autopsy imaging is essential in cases of terrorism victims.

  20. The 1983 Beirut Airport terrorist bombing. Injury patterns and implications for disaster management.

    Science.gov (United States)

    Frykberg, E R; Tepas, J J; Alexander, R H

    1989-03-01

    The casualty profile and results of the medical care provided for the survivors of the terrorist truck bombing of the U.S. Marine Corps facility in Beirut, Lebanon, in 1983 were reviewed to determine the factors that influenced casualty survival. This explosion resulted in 346 casualties, of whom 234 (68%) were immediately killed. The spectrum of injury was determined in 85 survivors using the Injury Severity Score (ISS). There were seven (6.3%) deaths among the 112 immediate survivors. All deaths occurred among the 19 (17%) victims who were critically injured (ISS greater than 15), giving a mortality in this population of 37 per cent. Six (86%) of the seven deaths were associated with an initial delay in treatment. Head injury was the most common fatal injury among both immediate fatalities (71.4%) and immediate survivors (57%). Thoracic injury and burns each accounted for 29 per cent of survivor deaths. Triage efficiency, as determined by the rates of overtriage (80%) and undertriage (0), did not appear adversely to affect mortality. Critical analysis of disasters such as this can contribute to improvements in preparation and casualty care in the event of future disasters.

  1. Centralization as a predictor of provocation discography results in chronic low back pain, and the influence of disability and distress on diagnostic power.

    Science.gov (United States)

    Laslett, Mark; Oberg, Birgitta; Aprill, Charles N; McDonald, Barry

    2005-01-01

    The "centralization phenomenon" (CP) is the progressive retreat of referred pain towards the spinal midline in response to repeated movement testing (a McKenzie evaluation). A previous study suggested that it may have utility in the clinical diagnosis of discogenic pain and may assist patient selection for discography and specific treatments for disc pain. Estimation of the diagnostic predictive power of centralization and the influence of disability and patient distress on diagnostic performance, using provocation discography as a criterion standard for diagnosis, in chronic low back pain patients. This study was a prospective, blinded, concurrent, reference standard-related validity design carried out in a private radiology clinic specializing in diagnosis of chronic spinal pain. Consecutive patients with persistent low back pain were referred to the study clinic by orthopedists and other medical specialists for interventional radiological diagnostic procedures. Patients were typically disabled and displayed high levels of psychosocial distress. The sample included patients with previous lumbar surgery, and most had unsuccessful conservative therapies previously. results of provocation discography. The CP. Psychometric evaluation: Roland-Morris, Zung, Modified Somatic Perception questionnaires, Distress Risk Assessment Method, and 100-mm visual analog scales for pain intensity. Patients received a single physical therapy examination, followed by lumbar provocation discography. Sensitivity, specificity, and likelihood ratios of the CP were estimated in the group as a whole and in subgroups defined by psychometric measures. A total of 107 patients received the clinical examination and discography at two or more levels and post-discography computed tomography. Thirty-eight could not tolerate a full physical examination and were excluded from the main analysis. Disability and pain intensity ratings were high, and distress was common. Sensitivity, specificity, and

  2. La décadence à la fin du XIXe siècle espagnol: une esthétique de la provocation

    Directory of Open Access Journals (Sweden)

    Xavier Escudero

    2012-03-01

    In what way(s do these concepts both make use of and take part in an aesthetic of transgression, or a provocative pose? What does Spanish decadentism really mean, and what are its expressions? In order to answer these questions, we shall first look at the concept of decadentism as applied to the sociocultural phenomenon of Spanish literary bohemianism, which gathers writers and artists defined by constant failure, loose morals and the "cursed" poses they adopt. Then we shall highlight the literary expressions of decadence through the writings of Manuel Machado, Rubén Darío and Ramón María del Valle-Inclán, three prominent authors of the fin-de-siècle letters. Finally we shall take a closer look at the decadent motifs of marginality and lust in the little-known field of modernist bohemian poetry.

  3. Provocative diskography: safety and predictive value in the outcome of spinal fusion or pain intervention for chronic low-back pain

    Directory of Open Access Journals (Sweden)

    Willems PC

    2014-12-01

    Full Text Available Paul C Willems Department of Orthopedic Surgery, CAPHRI Research School, Maastricht University Medical Center, Maastricht, the Netherlands Abstract: There is still no clear definition of diskogenic low-back pain and no consensus on a generally agreed test, such as provocative diskography (PD, to diagnose painful disk degeneration, and probably more importantly, to predict the outcome of therapy intended to reduce pain that is presumed to be diskogenic in nature. Nevertheless, PD is the most specific procedure to diagnose diskogenic low-back pain. Its accuracy, however, is rather low or at best unknown. Although rare, the most prevalent complication, postdiskography diskitis, can be devastating for the individual patient, so all measures, like strict sterile conditions and antibiotic prophylaxis, should be taken to avoid this complication. It is advised to perform the procedure in a pressure-controlled way with a constant low flow, and optionally computed tomography imaging. PD should not be performed in morphologically normal disks. A standardized execution of the test should be established in order to perform high-quality studies to determine its accuracy to lead to meaningful interventions, and find best practices for diagnosis and treatment of diskogenic back pain. Possibly, PD may have detrimental effects on the disk, causing early degeneration, although it is unknown whether this will be related to clinical symptoms. Especially with these possible adverse side effects in mind, the risk–benefit ratio with the lack of clear benefits from treatments provided, and possible complications of disk puncture, the rationale for PD is questionable, which should be stressed to patients in the process of shared decision making. Diskography as a stand-alone test is not recommended in clinical decision making for patients with chronic low-back pain. Keywords: provocative diskography, chronic low-back pain, prognostic accuracy, spinal fusion, pain

  4. De-labelling self-reported penicillin allergy within the emergency department through the use of skin tests and oral drug provocation testing.

    Science.gov (United States)

    Marwood, Joseph; Aguirrebarrena, Gonzalo; Kerr, Stephen; Welch, Susan A; Rimmer, Janet

    2017-10-01

    Self-reported penicillin allergy is common among patients attending the ED, but is a poor predictor of true immunoglobulin E-mediated hypersensitivity to penicillin. We hypothesise that with a combination of skin testing and drug provocation testing, selected patients can be safely de-labelled of their allergy. This prospective study enrolled a sample of patients presenting to an urban academic ED between 2011 and 2016 with a self-reported allergy to penicillin. Standardised skin prick and intradermal testing with amoxicillin and both major and minor determinants of penicillin was performed in the department. If negative, testing was followed by a graded oral challenge of amoxicillin over 9 days. The primary end point was the allergy status of participants at the end of the study. A total of 100 patients (mean age 42; standard deviation 14 years; 54% women) completed the testing. Of these, 81% (95% confidence interval 71.9-88.2) showed no hypersensitivity to penicillin and were labelled non-allergic. The majority (16/19) of allergies were confirmed by skin testing, with three suspected allergies detected by the oral challenge. Women were more likely than men to have a true penicillin allergy, with odds ratio of 4.0 (95% confidence interval 1.23-13.2). There were no serious adverse events. Selected patients in the ED who self-report an allergy to penicillin can be safely tested there for penicillin allergy, using skin tests and oral drug provocation testing. This testing allows a significant de-labelling of penicillin allergy, with the majority of these patients able to tolerate penicillin without incident. © 2017 Australasian College for Emergency Medicine and Australasian Society for Emergency Medicine.

  5. Do TETRA (Airwave) base station signals have a short-term impact on health and well-being? A randomized double-blind provocation study.

    Science.gov (United States)

    Wallace, Denise; Eltiti, Stacy; Ridgewell, Anna; Garner, Kelly; Russo, Riccardo; Sepulveda, Francisco; Walker, Stuart; Quinlan, Terence; Dudley, Sandra; Maung, Sithu; Deeble, Roger; Fox, Elaine

    2010-06-01

    "Airwave" is the new communication system currently being rolled out across the United Kingdom for the police and emergency services, based on the Terrestrial Trunked Radio Telecommunications System (TETRA). Some police officers have complained about skin rashes, nausea, headaches, and depression as a consequence of using their Airwave handsets. In addition, a small subgroup in the population self-report being sensitive to electromagnetic fields (EMFs) in general. We conducted a randomized double-blind provocation study to establish whether short-term exposure to a TETRA base station signal has an impact on the health and well-being of individuals with self-reported "electrosensitivity" and of participants who served as controls. Fifty-one individuals with self-reported electrosensitivity and 132 age- and sex-matched controls participated in an open provocation test; 48 sensitive and 132 control participants went on to complete double-blind tests in a fully screened semianechoic chamber. Heart rate, skin conductance, and blood pressure readings provided objective indices of short-term physiological response. Visual analog scales and symptom scales provided subjective indices of well-being. We found no differences on any measure between TETRA and sham (no signal) under double-blind conditions for either controls or electrosensitive participants, and neither group could detect the presence of a TETRA signal at rates greater than chance (50%). When conditions were not double blind, however, the self-reported electrosensitive individuals did report feeling worse and experienced more severe symptoms during TETRA compared with sham. Our findings suggest that the adverse symptoms experienced by electrosensitive individuals are due to the belief of harm from TETRA base stations rather than to the low-level EMF exposure itself.

  6. Management of gallbladder dyskinesia: patient outcomes following positive 99mtechnetium (Tc)-labelled hepatic iminodiacetic acid (HIDA) scintigraphy with cholecystokinin (CCK) provocation and laparoscopic cholecystectomy

    International Nuclear Information System (INIS)

    Dave, R.V.; Pathak, S.; Cockbain, A.J.; Lodge, J.P.; Smith, A.M.; Chowdhury, F.U.; Toogood, G.J.

    2015-01-01

    Aims: To evaluate clinical outcomes in patients with typical biliary pain, normal ultrasonic findings, and a positive 99m technetium (Tc)-labelled hepatic iminodiacetic acid analogue (HIDA) scintigraphy with cholecystokinin (CCK) provocation indicating gallbladder dyskinesia, as per Rome III criteria, undergoing laparoscopic cholecystectomy (LC). Methods and materials: Consecutive patients undergoing LC for gallbladder dyskinesia were identified retrospectively. They were followed up by telephone interview and review of the electronic case records to assess symptom resolution. Results: One hundred consecutive patients (median age 44; 80% female) with abnormal gallbladder ejection fraction (GB-EF <35%) were followed up for a median of 12 months (range 2–80 months). Following LC, 84% reported symptomatic improvement and 52% had no residual pain. Twelve percent had persisting preoperative-type pain of either unchanged or worsening severity. Neither pathological features of chronic cholecystitis (87% of 92 incidences when histology available) nor reproduction of pain on CCK injection were significantly predictive of symptom outcome or pain relief post-LC. Conclusion: In one of the largest outcome series of gallbladder dyskinesia patients in the UK with a positive provocation HIDA scintigraphy examination and LC, the present study shows that the test is a useful functional diagnostic tool in the management of patients with typical biliary pain and normal ultrasound, with favourable outcomes following surgery. - Highlights: • Gallbladder dyskinesia (GD) is a challenging condition to diagnose and treat. • This study evaluated clinical outcomes following laparoscopic cholecystectomy (LC). • There was sustained symptomatic benefit in >80% following surgery. • Pre-operative counselling before LC is important

  7. Food hypersensitivity reactions in Soft Coated Wheaten Terriers with protein-losing enteropathy or protein-losing nephropathy or both: gastroscopic food sensitivity testing, dietary provocation, and fecal immunoglobulin E.

    Science.gov (United States)

    Vaden, S L; Hammerberg, B; Davenport, D J; Orton, S M; Trogdon, M M; Melgarejo, L T; VanCamp, S D; Williams, D A

    2000-01-01

    The purpose of this study was to evaluate Soft Coated Wheaten Terriers (SCWTs) affected with protein-losing enteropathy (PLE) or protein-losing nephropathy (PLN) or both for allergy to food. We performed gastroscopic food-sensitivity testing, a provocative dietary trial, and measurement of fecal immunoglobulin E (IgE) in 6 SCWTs affected with PLE or PLN or both. Positive gastroscopic food-sensitivity test reactions were noted in 5 of 6 dogs. Positive reactions were found to milk in 4 dogs, to lamb in 2 dogs, and to wheat and chicken each in 1 dog. Adverse reactions to food (diarrhea, vomiting, or pruritus) were detected in all 6 dogs during the provocative dietary trial. Adverse reactions were found to corn in 5 dogs, to tofu in 3 dogs, to cottage cheese in 2 dogs, to milk in 2 dogs, to farina cream of wheat in 2 dogs, and to lamb in 2 dogs. Serum albumin concentrations significantly decreased and fecal alpha1-protease inhibitor concentration significantly increased 4 days after the provocative trial when compared with baseline values. Antigen-specific fecal IgE varied throughout the provocative trial, with peak levels following ingestion of test meals. We conclude that food hypersensitivities are present in SCWTs affected with the syndrome of PLE/PLN. Mild inflammatory bowel disease was already established in the 6 SCWTs of this report at the time of study, making it impossible to determine if food allergies were the cause or result of the enteric disease.

  8. The counter-terrorist campus: Securitisation theory and university securitisation – Three Models

    Directory of Open Access Journals (Sweden)

    Liam Gearon

    2017-02-01

    Full Text Available With intensified threats to global security from international terrorism, universities have become a focus for security concerns and marked as locus of special interest for the monitoring of extremism and counter-terrorism efforts by intelligence agencies worldwide. Drawing on initiatives in the United Kingdom and United States, I re-frame three – covert, overt and covert–overt – intersections of education, security and intelligence studies as a theoretical milieu by which to understand such counter-terrorism efforts. Against the backdrop of new legislative guidance for universities in an era of global terrorism and counter-terrorism efforts by security and intelligence agencies and their Governments, and through a review of Open-Source security/intelligence concerning universities in the United Kingdom and the United States, I show how this interstitial (covert, overt and covert– overt complexity can be further understood by the overarching relationship between securitisation theory and university securitisation. An emergent securitised concept of university life is important because de facto it will potentially effect radical change upon the nature and purposes of the university itself. A current-day situation replete with anxiety and uncertainty, the article frames not only a sharply contested and still unfolding political agenda for universities but a challenge to the very nature and purposes of the university in the face of a potentially existential threat. Terrorism and counterterrorism, as manifest today, may well thus be altering the aims and purposes of the university in ways we as yet do not fully know or understand. This article advances that knowledge and understanding through a theoretical conceptualisation: the counter-terrorist campus.

  9. Restoration projects for decontamination of facilities from chemical, biological and radiological contamination after terrorist actions

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Lumley, T.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Division, Environmental Technology Centre, Science and Technology Branch; Payette, P.; Laframboise, D.; Best, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Krishnan, J.; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Winnipeg, MB (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada); Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada)

    2006-07-01

    This paper reviewed studies that identified better decontamination methods for chemical, biological and radiological/nuclear (CBRN) attacks. In particular, it reviewed aspects of 3 projects in which procedures were tested and validated for site restoration. Cleanup targets or standards for decontaminating buildings and materials after a CBRN attack were also developed. The projects were based on physicochemical and toxicological knowledge of potential terrorist agents and selected surface matrices. The projects also involved modeling and assessing environmental and health risks. The first multi-agent project involved gathering information on known procedures for restoration of areas including interiors and exteriors of buildings, contents, parking lots, lawn, and vehicles. Air inside the building was included. The efficacy of some of the proposed concepts was tested. Results included the determination of appropriate surrogates for anthrax and tests of liquid and gaseous biocides on the surrogates. The development of new contamination procedures using peroxyacetic acid were also discussed. The second project involved decontamination tests on CBRN using specially-constructed buildings at the Counter-terrorism Technology Centre at Defence Research and Development Canada in Suffield. The buildings will be contaminated with chemical and biological agents and with short-lived radionuclides. They will be decontaminated using the best-performing technologies known. Information collected will include fate of the contaminant and decontamination products, effectiveness of the restoration methods, cost and duration of cleanup and logistical problems. The third project is aimed at developing cleanup standards for decontaminating buildings and construction materials after a chemical or biological attack. It will create as many as 12 algorithms for the development of 50 standards which will help cleanup personnel and first-responders to gauge whether proposed methods can achieve

  10. The restoration project : decontamination of facilities from chemical, biological and radiological contamination after terrorist action

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science Div; Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Duncan, L.; Best, M.; Krishnan; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    Bioterrorism poses a real threat to the public health and national security, and the restoration of affected facilities after a chemical, biological or radiological attack is a major concern. This paper reviewed aspects of a project conducted to collect information, test and validate procedures for site restoration after a terrorist attack. The project began with a review of existing technology and then examined new technologies. Restoration included pickup, neutralization, decontamination, removal and final destruction and deposition of contaminants as well as cleaning and neutralization of material and contaminated waste from decontamination. The project was also intended to test existing concepts and develop new ideas. Laboratory scale experiments consisted of testing, using standard laboratory techniques. Radiation decontamination consisted of removal and concentration of the radioisotopes from removal fluid. General restoration guidelines were provided, as well as details of factors considered important in specific applications, including growth conditions and phases of microorganisms in biological decontamination, or the presence of inhibitors or scavengers in chemical decontamination. Various agents were proposed that were considered to have broad spectrum capability. Test surrogates for anthrax were discussed. The feasibility of enhanced oxidation processes was examined in relation to the destruction of organophosphorus, organochlorine and carbamate pesticides. The goal was to identify a process for the treatment of surfaces contaminated with pesticides. Tests included removal from carpet, porous ceiling tile, steel plates, and floor tiles. General radiation contamination procedures and techniques were reviewed, as well as radiological decontamination waste treatment. It was concluded that there is no single decontamination technique applicable for all contaminants, and decontamination methods depend on economic, social and health factors. The amount of

  11. How identity crisis, relative deprivation, personal characteristics, and empathy contribute to the engagement of Western individuals in Islamist terrorist behavior

    Directory of Open Access Journals (Sweden)

    Khouwaga Yusoufzai

    2017-02-01

    Full Text Available The growing sense of insecurity in the Western world due to home-grown Islamist terrorism prompts further research on the topic. Based on previous literature, the current paper attempts to determine whether factors can be identified which contribute to Western individuals joining Islamic extremist organizations and engaging in terrorist behavior in the West. Four factors are discussed: While extensive scientific literature supports the view that identity crises and relative deprivation play a crucial role in turning Western individuals to terrorism, evidence on the role of personal characteristics and empathy, on the other hand, is still too scarce to allow any clear scientific judgment.

  12. What we need to know ...and when. Educating the public about nuclear terrorist risks can help raise levels of security

    International Nuclear Information System (INIS)

    Khripunov, I.

    2006-01-01

    Nuclear power infrastructures could be the target of terrorist acts of theft, sabotage, unauthorized access or other malicious acts given their radiological and chemical content and potential for building weapons. Attacks on its major components, including fuel production, reactors, waste handling, and reprocessing facilities, would lead to serious consequences-even if there is little or no damage to a nuclear power plant itself and other related structures. Public fear of nuclear radiation, in combination with a possibly massive resultant blackout and other aggravating factors, could create significant distress and panic. In other words, successful terrorist attempts to attack nuclear power infrastructure can easily bring about systemic disaster. Systemic risks impact society on a large scale and their effects may spread much further from the original hazardous source. Those risks widely affect systems that society depends on, such as health, transport, environment, telecommunications. Their consequences may be technical, social, environmental, psychological and economic and involve different stakeholders. In this context, however, one important stakeholder has been under-appreciated, under-utilized and somewhat misunderstood: the general public. The nuclear power infrastructure must learn how to efficiently communicate to the public and develop better options for public risk communication that relate to deliberate attacks or accidents. The public is also a challenging stockholder because citizens are deeply split regarding the acceptability and value of nuclear power generation and tend to express their feelings emotionally. However, there is growing recognition that because of skyrocketing oil prices and evidence of the greenhouse effect, nuclear power may be approaching renaissance. Hence, the public must no longer be looked upon only as potential victims or panicked masses but rather as an important contributing factor for better nuclear security throughout

  13. International legal problem in combating 'Islamic State' terrorist group in Syria

    Directory of Open Access Journals (Sweden)

    Stevanović Miroslav

    2015-01-01

    Full Text Available 'Islamic State of Iraq and Syria' (ISIS has occupied parts of internationally recognized states and exerts further territorial pretensions. ISIS, also, implements a repressive rule, through violations of human rights and humanitarian law, which may constitute international crimes. In facing the threat od ISIS, the perception of international terrorism is important since this group has the features of a territorial entity. So far, facing with the threat of ISIS has been reduced to a model that is adopted by the UN Security Council against the terrorist network Al-Qaida. An international coalition of states, led by the United States, has undertaken air strikes on positions ISIS, on several grounds: the responsibility to protect, the protection of national security, and at the request of Iraq. At the same time, the strikes are applied in Syria, which can not be accountable for the actions of ISIS and has not requested international assistance. International law does not allow actions which would aim to destroy or jeopardize the territorial integrity or political independence of any sovereign and independent state, which is acting in accordance with the principle of equal rights and self-determination of peoples, and is hence governed by a representative government. The UNSC resolution 2249 remains short of recommending international armed action under the aegis of UNSC, but represents a step forward in recognizing the responsibility of this body in facing ISIS, at least as far as the 'destruction of refuge' is concerned. The use of force in the territory of Syria, without the express authorization of the UNSC is illegal, because terrorism does not constitute grounds for the use of force against countries. But, it opens broader issues of responsibility for the development of ISIS and the humanitarian crisis in the Middle East, as well as the functioning of the system of collective security. Overcoming the current crisis UNSC implies not just a

  14. Restorative Encounters in Terrorist Victimization in Spain: Theoretical Reflections and Practical Insights from Social Work

    Directory of Open Access Journals (Sweden)

    Alberto Jose Olalde

    2014-07-01

    Full Text Available After the ceasefire announcement by the terrorist organization ETA in 2011, new horizons and scenarios of peace have opened in the Basque Country, a land that has been badly hurt by violence over several decades.Restorative justice, a new paradigm for an old kind of justice, the reparation of the harm caused to victims and their consequent importance in the judicial process, has been knocking at our door for a long time. Since the beginning of this decade, following European trends, our country has begun to implement restorative justice at different levels.This article wants to bring the reader closer to understanding of the possibilities which restorative justice offers to the victims of terrorism. We describe the central elements of the restorative encounters held between ex-members of ETA and direct or indirect victims. Furthermore, we support our restorative intervention with theoretical arguments and practical examples from social work. Tras el anuncio del cese de la actividad armada por parte de la organización armada ETA, en 2011, nuevos escenarios y horizontes de pacificación se abren en la historia para esta tierra, castigada por la violencia durante decenas de años.La Justicia restaurativa, un nuevo paradigma para una vieja reivindicación, la reparación de la víctima y su protagonismo en la resolución y abordaje de las consecuencias de los conflictos penales, lleva años asomando a nuestro contexto. Tras la incorporación de España a principios de esta década a las corrientes europeas, se constata la validación de la práctica restaurativa.Este artículo quiere acercar a la persona lectora la comprensión de las posibilidades de justicia restaurativa en victimización terrorista. Describimos los elementos centrales de los encuentros restaurativos celebrados entre ex miembros de ETA y víctimas directas e indirectas. Y nos apoyamos en elementos teóricos y prácticos del trabajo social para nuestra intervención restaurativa.

  15. Rising threat of terrorist bomb blasts in Karachi--a 5-year study.

    Science.gov (United States)

    Mirza, Farhat Hussain; Parhyar, Hamid Ali; Tirmizi, Syed Zubair Ahmed

    2013-08-01

    This study aims to determine the frequency of injuries and fatalities associated with terrorist bomb explosions in the city of Karachi from 1 January 2007 to 31 December 2011. Moreover, this study is aimed to determine age and sex vulnerability among the victims of blast explosion. A descriptive cross-sectional study was conducted. The study was carried out at mortuaries and medicolegal sections at Jinnah Postgraduate Medical Center, Civil Hospital and Abbasi-Shaheed Hospital Karachi, the three main hospitals, which cater to all these cases of Karachi. The study included all bomb blast victims examined and autopsied from January 2007 to December 2011 at Jinnah Postgraduate Medical Center, Civil Hospital and Abbassi Shaheed Hospital Karachi. Details of 1142 cases were collected for those medicolegal deaths and injured persons, identified to be the victims of bomb blasts from January 2007 to December 2011. Data were collected on a preformed proforma from the mortuaries and medicolegal sections of these three public sector hospitals. The variables investigated include age, gender, year-wise distribution of the injured and the dead along with the cause of death and body parts injured in survivors. Out of the total 11,109 autopsies during the study period, 249 (2.24%) were carried out on deaths due to bomb blasts. Similarly, 135,065 injury cases were reported during the study period out of which 893 (0.66%) cases were due to bomb blasts. An initial peak in the year 2007, followed by a decline in 2008 and since then a steady rise of bomb blast incidences with casualties and fatalities, has been observed. The highest numbers of injured victims were reported in the year 2010 and fatalities in 2007. Among 1142 cases, 95.18% were male and 4.82% female with a male to female ratio of 19.76:1. Persons of ages between 15 and 45 years were chiefly involved. Shock due to multiple injuries was the leading cause of death, followed by head injury with or without haemorrhage. The

  16. Managing mild casualties in mass-casualty incidents: lessons learned from an aborted terrorist attack.

    Science.gov (United States)

    Bloch, Yuval H; Leiba, Adi; Veaacnin, Nurit; Paizer, Yohanan; Schwartz, Dagan; Kraskas, Ahuva; Weiss, Gali; Goldberg, Avishay; Bar-Dayan, Yaron

    2007-01-01

    Mildly injured and "worried well" patients can have profound effects on the management of a mass-casualty incident. The objective of this study is to describe the characteristics and lessons learned from an event that occurred on 28 August 2005 near the central bus station in Beer-Sheva, Israel. The unique profile of injuries allows for the examination of the medical and operational aspects of the management of mild casualties. Data were collected during and after the event, using patient records and formal debriefings. They were processed focusing on the characteristics of patient complaints, medical response, and the dynamics of admission. A total of 64 patients presented to the local emergency department, including two critical casualties. The remaining 62 patients were mildly injured or suffered from stress. Patient presentation to the emergency department was bi-phasic; during the first two hours following the attack (i.e., early phase), the rate of arrival was high (one patient every three minutes), and anxiety was the most frequent chief complaint. During the second phase, the rate of arrival was lower (one patient every 27 minutes), and the typical chief complaint was somatic. Additionally, tinnitus and complaints related to minor trauma also were recorded frequently. Psychiatric consultation was obtained for 58 (91%) of the patients. Social services were involved in the care of 47 of the patients (73%). Otolaryngology and surgery consultations were obtained for 45% and 44%, respectively. The need for some medical specialties (e.g., surgery and orthopedics) mainly was during the first phase, whereas others, mainly psychiatry and otolaryngology, were needed during both phases. Only 13 patients (20%) needed a consultation from internal medicine. Following a terrorist attack, a large number of mildly injured victims and those experiencing stress are to be expected, without a direct relation to the effectiveness of the attack. Mildly injured patients tend to

  17. Topology Explains Why Automobile Sunshades Fold Oddly

    Science.gov (United States)

    Feist, Curtis; Naimi, Ramin

    2009-01-01

    Automobile sunshades always fold into an "odd" number of loops. The explanation why involves elementary topology (braid theory and linking number, both explained in detail here with definitions and examples), and an elementary fact from algebra about symmetric group.

  18. Your Radiologist Explains Magnetic Resonance Angiography (MRA)

    Medline Plus

    Full Text Available ... Disorders Video: The Basketball Game: An MRI Story Radiology and You Sponsored by Image/Video Gallery Your ... Explains Magnetic Resonance Angiography (MRA) Transcript Welcome to Radiology Info dot org Hello, I’m Dr. Elliot ...

  19. Explorers Presentation: Explaining the Tides to Children

    OpenAIRE

    Institute, Marine

    2015-01-01

    Explaining the tides to children Presentation includes information about: Orbits of the Earth, Moon and Sun; Moon phases and the lunar cycle; Gravity; Gravity and the tide; Types of tides; The tides and me!; Tide tables; Extra insight

  20. Your Radiologist Explains Magnetic Resonance Angiography (MRA)

    Medline Plus

    Full Text Available ... An MRI Story Radiology and You Sponsored by Image/Video Gallery Your Radiologist Explains Magnetic Resonance Angiography ( ... posted: How to Obtain and Share Your Medical Images Movement Disorders Video: The Basketball Game: An MRI ...

  1. A model to explain human voice production

    Science.gov (United States)

    Vilas Bôas, C. S. N.; Gobara, S. T.

    2018-05-01

    This article presents a device constructed with low-cost material to demonstrate and explain voice production. It also provides a contextualized, interdisciplinary approach to introduce the study of sound waves.

  2. Using Expectancy Theory to Explain Performance Appraisal ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... appraisal conducting style, the relation between the performance appraisal system and task ... the article first explains the theory model which is based expectancy theory. II. ... which in return lead to rewards. According to [12],.

  3. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    Science.gov (United States)

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  4. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: Case study of New Jersey

    International Nuclear Information System (INIS)

    Greenberg, Michael; Mantell, Nancy; Lahr, Michael; Felder, Frank; Zimmerman, Rae

    2007-01-01

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened

  5. Reducing Mortality from Terrorist Releases of Chemical and Biological Agents: I. Filtration for Ventilation Systems in Commercial Building

    Energy Technology Data Exchange (ETDEWEB)

    Thatcher, Tracy L.; Daisey, Joan M.

    1999-09-01

    There is growing concern about potential terrorist attacks involving releases of chemical and/or biological (CB) agents, such as sarin or anthrax, in and around buildings. For an external release, the CB agent can enter the building through the air intakes of a building's mechanical ventilation system and by infiltration through the building envelope. For an interior release in a single room, the mechanical ventilation system, which often recirculates some fraction of the air within a building, may distribute the released CB agent throughout the building. For both cases, installing building systems that remove chemical and biological agents may be the most effective way to protect building occupants. Filtration systems installed in the heating, ventilating and air-conditioning (HVAC) systems of buildings can significantly reduce exposures of building occupants in the event of a release, whether the release is outdoors or indoors. Reduced exposures can reduce the number of deaths from a terrorist attack. The purpose of this report is to provide information and examples of the design of filtration systems to help building engineers retrofit HVAC systems. The report also provides background information on the physical nature of CB agents and brief overviews of the basic principles of particle and vapor filtration.

  6. Narratives from caregivers of children surviving the terrorist attack in Beslan: issues of health, culture, and resilience.

    Science.gov (United States)

    Moscardino, Ughetta; Axia, Giovanna; Scrimin, Sara; Capello, Fabia

    2007-04-01

    Acts of terrorism have an extremely negative impact on the mental health of children and families. The school siege in Beslan, Russia, in 2004, represents a particularly traumatizing event as it was directed specifically at children and involved the entire community. This qualitative study aims to: (a) examine caregiver reactions to the terrorist attack in Beslan as reported 3 months after the traumatic event; (b) determine the extent to which indigenous cultural values and religious belief systems play a role in Beslan's caregivers' reactions to such event; and (c) identify variables that may function as sources of resilience to caregivers. A convenience sample of 17 primary caregivers from Beslan with at least one child who survived the school siege were asked to participate in semi-structured interviews. Narratives generated from the interviews were qualitatively analyzed using a thematic approach; nine major themes were identified. Caregivers' concerns centered on children's physical and psychological well-being, the reorganization of family life, and the disruption of community ties. Cultural values of pride, heroism, courage, and revenge emerged as relevant aspects shaping caregivers' reactions to the traumatic event. Possible sources of resilience included the willingness to return to normality, social support, and the reaffirmation of positive, culturally shared values in face of the perceived threat of future terrorist attacks. Findings are discussed in terms of their theoretical implications on the effects of trauma on children and families as well as interventions with highly traumatized populations in diverse cultural settings.

  7. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: case study of New Jersey

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, M.; Mantell, N.; Lahr, M.; Felder, F. [Rutgers University, New Brunswick, NJ (United States). Edward J. Bloustein School; Zimmerman, R. [New York University (United States). Robert F. Wagner School of Public Service

    2007-01-15

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened. (author)

  8. Análogos das prostaglandinas diminuem a sensibilidade do teste provocativo da ibopamina no glaucoma Prostaglandin analogues reduce the ibopamine provocative test specificity in glaucoma

    Directory of Open Access Journals (Sweden)

    Leopoldo Magacho

    2006-04-01

    Full Text Available OBJETIVO: Avaliar o desempenho do teste provocativo da ibopamina em pacientes com glaucoma usuários de drogas hipotensoras. MÉTODOS: Pacientes glaucomatosos foram recrutados do Centro de Referência em Oftalmologia (CEROF da Universidade Federal de Goiás, e suas drogas hipotensoras em uso registradas. Indivíduos normais foram amigos e parentes dos pacientes. A seguir, foram instiladas duas gotas de ibopamina 2% com intervalo de 5 minutos. A pressão intra-ocular (Pio foi medida previamente, e após 30, 60 e 180 minutos. No nosso estudo, o teste da ibopamina foi considerado positivo quando a pressão intra-ocular excedeu 4 mmHg em pelo menos uma das medidas. RESULTADOS: Cinquenta e oito olhos de 58 indivíduos (38 glaucomatosos e 20 normais foram incluídos no estudo. O aumento da pressão intra-ocular foi maior nos pacientes com glaucoma aos 30, 60 e 180 minutos (pPURPOSE: To evaluate the ibopamine provocative test for the diagnosis of glaucoma in glaucoma patients using antiglaucomatous drugs. METHODS: Two 2% ibopamine eyedrops were instilled 5 minutes apart in one eye selected at random in both glaucoma and normal subjects. The intraocular pressure (IOP was assessed prior to the drops and 30, 60 and 180 minutes after instillation. The test was considered positive when there was an intraocular pressure increase of greater than 4 mmHg at any one of the timepoints. The amount of intraocular pressure change was compared to the types of medical treatment. RESULTS: Fifty-eight eyes were included (38 glaucoma patients and 20 normal individuals. The intraocular pressure rise was significantly higher in glaucoma patients (p<0.001 at all times. The sensitivity and specificity of the ibopamine test were 68% (87% if we exclude eyes using prostaglandin analogues and 95%, respectively. Glaucoma patients using prostaglandin analogues did not present a significant intraocular pressure elevation. CONCLUSION: The ibopamine provocative test may be an

  9. Bibliotecile în societatea contemporană – provocări, mutaţii, perspective în context digital

    Directory of Open Access Journals (Sweden)

    Elena Tîrziman

    2009-01-01

    Full Text Available În societatea contemporană, bibliotecile sunt o componenta activă a procesului de achiziţionare, prelucrare, comunicare, utilizare, conservare şi arhivare a resurselor informaţionale şi documentare. Pentru a-şi îndeplini menirea sunt obligate să răspundă provocărilor mediului electronic integrându-se noului context informaţional şi de comunicare. Sunt vizibile o serie de mutaţii care se produc la nivelul bibliotecii ca structură de informare şi documentare, la nivelul proceselor biblioteconomice şi a produselor şi serviciilor oferite, la nivelul profesiilor din domeniul ştiinţelor informării şi comunicării, la nivelul utilizatorului şi a nevoilor sale de informare. Asistăm astfel la transformarea bibliotecilor din biblioteci tradiţionale în biblioteci hybrid şi biblioteci cu importante colecţii digitale devenind instituţii manageri ai informaţiei şi cunoaşterii care îşi desfăşoară activităţile într-un nou context dominat de Tehnologiile Informaţiei şi Comunicării.

  10. Evaluation of the efficacy of laser peripheral iridoplasty in reversing the darkroom provocative test result in Chinese patients with primary angle closure status post laser iridotomy

    Directory of Open Access Journals (Sweden)

    Ping Huang

    2015-06-01

    Full Text Available AIM: To investigate the efficacy and safety of krypton laser peripheral iridoplasty (LPIP for Chinese patients with primary angle closure (PAC or primary angle-closure glaucoma (PACG status post laser iridotomy in reversing the positive results of the dark room provocative test (DRPT.METHODS:This study was prospective, noncomparative, interventional case series. Thirty-three patients (thirty-eight eyes with PAC or PACG status post patent laser iridotomy and maintained normal intraocular pressure (IOP but with positive DRPT results were enrolled. All the subjects were treated with krypton LPIP. DRPT was repeated after krypton LPIP. Results of DRPT were recorded. The visual acuity, IOP and gonioscopy were analyzed before and after krypton LPIP. A minimum time limit for follow-up was 6mo.RESULTS:Thirty-three patients (thirty-eight eyes were followed for 17.7±8.37mo (range 7-41mo after LPIP. Positive results of DRPT decreased from 38 eyes to 9 eyes (23.7% after LPIP. Peripheral anterior synechiae of angle in 34 of 38 eyes (89.5% remained unchanged at dynamic gonioscopy throughout the follow-up period after LPIP.CONCLUSION:LPIP decreased positive rates of the DRPT significantly. The mechanism may be that LPIP minimized contact between the peripheral iris and trabecular meshwork, which is a key factor for developing peripheral anterior synechiae.

  11. Posterior and prefrontal contributions to the development posttraumatic stress disorder symptom severity: an fMRI study of symptom provocation in acute stress disorder.

    Science.gov (United States)

    Cwik, Jan C; Sartory, Gudrun; Nuyken, Malte; Schürholt, Benjamin; Seitz, Rüdiger J

    2017-09-01

    Acute stress disorder (ASD) is predictive of the development of posttraumatic stress disorder (PTSD). In response to symptom provocation, the exposure to trauma-related pictures, ASD patients showed increased activation of the medial posterior areas of precuneus and posterior cingulate cortex as well as of superior prefrontal cortex in a previous study. The current study aimed at investigating which activated areas are predictive of the development of PTSD. Nineteen ASD patients took part in an fMRI study in which they were shown personalized trauma-related and neutral pictures within 4 weeks of the traumatic event. They were assessed for severity of PTSD 4 weeks later. Activation contrasts between trauma-related and neutral pictures were correlated with subsequent PTSD symptom severity. Greater activation in, among others, right medial precuneus, left retrosplenial cortex, precentral and right superior temporal gyrus as well as less activation in lateral, superior prefrontal and left fusiform gyrus was related to subsequently increased PTSD severity. The results are broadly in line with neural areas related to etiological models of PTSD, namely multisensory associative learning recruiting posterior regions on the one hand and failure to reappraise maladaptive cognitions, thought to involve prefrontal areas, on the other.

  12. Evaluation of the efficacy of laser peripheral iridoplasty in reversing the darkroom provocative test result in Chinese patients with primary angle closure status post laser iridotomy

    Institute of Scientific and Technical Information of China (English)

    Ping; Huang; Ling-Ling; Wu

    2015-01-01

    AIM: To investigate the efficacy and safety of krypton laser peripheral iridoplasty(LPIP) for Chinese patients with primary angle closure(PAC) or primary angle-closure glaucoma(PACG) status post laser iridotomy in reversing the positive results of the dark room provocative test(DRPT).METHODS: This study was prospective, noncomparative,interventional case series. Thirty-three patients(thirty-eight eyes) with PAC or PACG status post patent laser iridotomy and maintained normal intraocular pressure(IOP) but with positive DRPT results were enrolled. All the subjects were treated with krypton LPIP. DRPT was repeated after krypton LPIP. Results of DRPT were recorded. The visual acuity, IOP and gonioscopy were analyzed before and after krypton LPIP. A minimum time limit for follow-up was 6mo.RESULTS: Thirty-three patients(thirty-eight eyes)were followed for 17.7 ±8.37mo(range 7-41mo) after LPIP. Positive results of DRPT decreased from 38 eyes to9 eyes(23.7%) after LPIP. Peripheral anterior synechiae of angle in 34 of 38 eyes(89.5%) remained unchanged at dynamic gonioscopy throughout the follow-up period after LPIP.CONCLUSION: LPIP decreased positive rates of the DRPT significantly. The mechanism may be that LPIP minimized contact between the peripheral iris and trabecular meshwork, which is a key factor for developing peripheral anterior synechiae.

  13. Coping Styles as Moderating the Relationships between Terrorist Attacks and Well-Being Outcomes

    Science.gov (United States)

    Braun-Lewensohn, Orna; Celestin-Westreich, Smadar; Celestin, Leon-Patrice; Verleye, Gino; Verte, Dominique; Ponjaert-Kristoffersen, Ingrid

    2009-01-01

    This study aims to explore use of coping strategies among adolescents and their relationships with well being in the context of ongoing terrorism. Furthermore, we aim to explore to what extent coping styles in addition to exposure variables explain well being of adolescents facing ongoing terror. During September 2003, after three years of ongoing…

  14. Comment on the first anniversary of the terrorist attacks in the United States of America. Vienna, 11 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The attacks in September 2001 were, however, a wake-up call to the world nuclear community that more can and must be done. In the wake of the terrorist attacks, Member States of the IAEA meeting in the Agency's General Conference adopted a resolution requesting that the IAEA Director General initiate a thorough review of the Agency's activities and programmes relevant to preventing acts of terrorism involving nuclear and other radioactive materials. The Agency moved rapidly to respond. It devised and is presently implementing an integrated action plan which includes enhanced and new activities to upgrade nuclear security worldwide and to combat nuclear terrorism. The plan covers eight areas: (1) physical protection of nuclear material and nuclear facilities; (2) detection of malicious activities (such as illicit trafficking) involving nuclear and other radioactive materials; (3) strengthening of State systems for nuclear material accountancy and control; (4) security of radioactive sources; (5) the assessment of safety and security related vulnerabilities at nuclear facilities; (6) response to malicious acts or threats thereof; (7) the adherence to international agreements and guidelines; and (8) co-ordination and information management for nuclear security related matters. National measures for protecting nuclear material and facilities remain uneven in their substance and application. There is wide recognition that the international physical protection regime needs to be further strengthened. Through its International Physical Protection Advisory Service (IPPAS), the Agency provides Member States with assessment services, together with associated advice and follow up actions to improve security arrangements at nuclear facilities. It also provides training and workshops, notably in assessing threats, as well as other supporting

  15. Do changes in connectivity explain desertification?

    Science.gov (United States)

    Desertification, broad-scale land degradation in drylands, is a major environmental hazard facing inhabitants of the world’s deserts as well as an important component of global change. There is no unifying framework that simply and effectively explains different forms of desertification. Here we arg...

  16. Can the inherence heuristic explain vitalistic reasoning?

    Science.gov (United States)

    Bastian, Brock

    2014-10-01

    Inherence is an important component of psychological essentialism. By drawing on vitalism as a way in which to explain this link, however, the authors appear to conflate causal explanations based on fixed features with those based on general causal forces. The disjuncture between these two types of explanatory principles highlights potential new avenues for the inherence heuristic.

  17. Explaining probalistic risk assessment in common language

    International Nuclear Information System (INIS)

    Wong, J.W.

    1994-01-01

    Probabilistic human health risk assessment is explained in ordinary language using a hypothetical example and the ingestion equation from EPA's Risk Assessment Guidance for Superfund. A section on understanding probabilities and probability distributions used in a Monte Carlo simulation is included as well as an appendix showing the computer run and the technical assumptions behind it

  18. Explaining Violence in Sierra Leone's Civil War

    African Journals Online (AJOL)

    Explaining the violence of civil war is never a simple task for the scholar. In the case of the Sierra Leone, paradoxically, the task has in some ways been rendered more difficult by the sheer variety of compelling scholarship on the question. This paper seeks to identify the most useful of the explanations offered thus far, and ...

  19. Measuring and explaining house price developments

    NARCIS (Netherlands)

    De Vries, P.

    2010-01-01

    This study discusses ways of measuring and explaining the development of house prices. The goal of the research underpinning this dissertation was to develop a methodological framework for studying these developments. This framework relates, first, to correcting for changes in the composition of

  20. Adaptive hatching hypotheses do not explain asynchronous ...

    African Journals Online (AJOL)

    At the core of the suite of adaptive hatching hypotheses advanced to explain asynchronous hatching in birds is the assumption that if food is not limited then all the hatchlings will develop normally to adulthood. In this study Brown-headed Parrot Poicephalus cryptoxanthus chicks were hand fed and weighed on a daily basis.

  1. Explaining convergence of oecd welfare states

    DEFF Research Database (Denmark)

    Schmitt, C.; Starke, Peter

    2011-01-01

    of conditional convergence helps to both better describe and explain the phenomenon. By applying error correction models, we examine conditional convergence of various types of social expenditure in 21 OECD countries between 1980 and 2005. Our empirical findings go beyond the existing literature in two respects...

  2. Explaining the VET Applied Research Developmental Framework

    Science.gov (United States)

    Simon, Linda; Beddie, Francesca M.

    2017-01-01

    This document explains the VET Applied Research Developmental Framework, created as part of a project that explored how the vocational education and training (VET) sector could broaden its engagement in Australia's research and development (R&D) and innovation systems. Achieving this engagement will rely significantly on building the…

  3. Explaining Teachers' Use of Textbooks

    Science.gov (United States)

    Reichenberg, Monica

    2016-01-01

    In educational systems without comprehensive systems for regulating textbooks, teachers can exert considerable influence on the use of textbooks. However, existing research has not yet identified the mechanisms of this use. Accordingly, the aim of this article is to examine and explain teachers' strategic use of textbooks. I administered a…

  4. Your Radiologist Explains Magnetic Resonance Angiography (MRA)

    Medline Plus

    Full Text Available ... Sponsored by Image/Video Gallery Your Radiologist Explains Magnetic Resonance Angiography (MRA) Transcript Welcome to Radiology Info dot ... I’d like to talk with you about magnetic resonance angiography, or as it’s commonly known, MRA. MRA ...

  5. Increased Incidence Rate of Trauma- and Stressor-Related Disorders in Denmark After the September 11, 2001, Terrorist Attacks in the United States

    DEFF Research Database (Denmark)

    Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M

    2016-01-01

    The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined...

  6. Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters

    Energy Technology Data Exchange (ETDEWEB)

    Denise Baclawski

    2010-03-08

    The University of Nevada, Reno Fire Science Academy (FSA) applied for grant funding to develop and deliver programs for municipal, rural, and volunteer firefighters. The FSA specializes in preparing responders for a variety of emergency events, including flammable liquid fires resulting from accidents, intentional acts, or natural disasters. Live fire training on full scale burnable props is the hallmark of FSA training, allowing responders to practice critical skills in a realistic, yet safe environment. Unfortunately, flammable liquid live fire training is often not accessible to municipal, rural, or volunteer firefighters due to limited department training budgets, even though most department personnel will be exposed to flammable liquid fire incidents during the course of their careers. In response to this training need, the FSA developed a course during the first year of the grant (Year One), Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters. During the three years of the grant, a total of 2,029 emergency responders received this training. In Year Three, two new courses, a train-the-trainer for Responding to Terrorist Incidents in Your Community and Management of Large-Scale Disasters for Public Officials were developed and pilot tested during the Real-World Disaster Management Conference held at the FSA in June of 2007. Two research projects were conducted during Years Two and Three. The first, conducted over a two year period, evaluated student surveys regarding the value of the flammable liquids training received. The second was a needs assessment conducted for rural Nevada. Both projects provided important feedback and a basis for curricula development and improvements.

  7. Explaining money creation by commercial banks

    DEFF Research Database (Denmark)

    Ravn, Ib

    2015-01-01

    Educators and economists concerned with monetary reform face the extraordinary challenge of explaining to the public and its elected representatives not only what a reformed system would look like, but also how the current system works. Centrally, the point that in a modern economy money is largely...... created by commercial banks, as explained by the Bank of England recently (McLeay, Radia & Thomas, 2014b), is often met with incredulity: “What do you mean, created?” This paper introduces five easy-to-grasp analogies that educators and reformers may use to convey key money-creation concepts to a lay...... audience. The analogies offered include (1) money as patches in an expandable patchwork quilt that covers a nation’s real assets, (2) the money supply as water in a bathtub with a faucet and a drain, (3) money understood as debt in a model economy run by schoolchildren, (4) the misleading concept of a bank...

  8. HIV As Trojan Exosome: Immunological Paradox Explained?

    Science.gov (United States)

    Hildreth, James E K

    2017-01-01

    The HIV pandemic is still a major global challenge, despite the widespread availability of antiretroviral drugs. An effective vaccine would be the ideal approach to bringing the pandemic to an end. However, developing an effective HIV vaccine has proven to be an elusive goal. Three major human HIV vaccine trials revealed a strong trend toward greater risk of infection among vaccine recipients versus controls. A similar observation was made in a macaque SIV vaccine study. The mechanism explaining this phenomenon is not known. Here, a model is presented that may explain the troubling results of vaccine studies and an immunological paradox of HIV pathogenesis: preferential infection of HIV-specific T cells. The central hypothesis of this perspective is that as "Trojan exosomes" HIV particles can directly activate HIV-specific T cells enhancing their susceptibility to infection. Understanding the biology of HIV as an exosome may provide insights that enable novel approaches to vaccine development.

  9. Children's Theories and the Drive to Explain

    Science.gov (United States)

    Schwitzgebel, Eric

    Debate has been growing in developmental psychology over how much the cognitive development of children is like theory change in science. Useful debate on this topic requires a clear understanding of what it would be for a child to have a theory. I argue that existing accounts of theories within philosophy of science and developmental psychology either are less precise than is ideal for the task or cannot capture everyday theorizing of the sort that children, if they theorize, must do. I then propose an account of theories that ties theories and explanation very closely together, treating theories primarily as products of a drive to explain. I clarify some of the positions people have taken regarding the theory theory of development, and I conclude by proposing that psychologists interested in the ''theory theory'' look for patterns of affect and arousal in development that would accompany the existence of a drive to explain.

  10. Explaining the Allocation of Regional Structural Funds

    DEFF Research Database (Denmark)

    Charron, Nicholas

    2016-01-01

    What regional factors can explain the heterogeneity in Structural Funds distribution to European Union regions? Past studies have shown that aside from the level of economic development and rates of unemployment, other political, and economic factors systematically explain why certain European...... Union regions receive greater funding than others, in particular where there is room for bargaining. In this article, a novel theory is posited which argues that the determination of Structural Funds is based on an interaction between a region’s formal institutions (the level of a regional autonomy......) and informal institutions (its level of quality of government). In cases of low regional autonomy, member states and European Union level actors prefer to allocate greater levels of Funds to regions with lower quality of government in order to increase cohesion. Yet in cases of high regional autonomy, risks...

  11. IEE wiring regulations explained and illustrated

    CERN Document Server

    Scaddan, Brian

    2013-01-01

    The IEE Wiring Regulations Explained and Illustrated, Second Edition discusses the recommendations of the IEE Regulations for the Electrical Equipment of Buildings for the safe selection or erection of wiring installations. The book emphasizes earthing, bonding, protection, and circuit design of electrical wirings. The text reviews the fundamental requirements for safety, earthing systems, the earth fault loop impedance, and supplementary bonding. The book also describes the different types of protection, such as protection against mechanical damage, overcurrent, under voltage (which prevents

  12. A More Practical Method for Explaining Equilibrium

    OpenAIRE

    Yi-Jang Yu

    2014-01-01

    The aim of this study is to suggest a more practical method for explaining market equilibrium in a two-dimensional risk-return world. Its main difference from textbook contents is to define, in both qualitative and quantitative ways, the environment or the system factor and treat it as an endogenous variable. Once the two-dimensional framework that is capable of managing uncertainty and environmental relationship can be reasonably established, a greater number of economic issues can be effect...

  13. "Explaining the Gender Wage Gap in Georgia"

    OpenAIRE

    Tamar Khitarishvili

    2009-01-01

    This paper evaluates gender wage differentials in Georgia between 2000 and 2004. Using ordinary least squares, we find that the gender wage gap in Georgia is substantially higher than in other transition countries. Correcting for sample selection bias using the Heckman approach further increases the gender wage gap. The Blinder Oaxaca decomposition results suggest that most of the wage gap remains unexplained. The explained portion of the gap is almost entirely attributed to industrial variab...

  14. Explaining seeing? Disentangling qualia from perceptual organization.

    Science.gov (United States)

    Ibáñez, Agustin; Bekinschtein, Tristan

    2010-09-01

    Abstract Visual perception and integration seem to play an essential role in our conscious phenomenology. Relatively local neural processing of reentrant nature may explain several visual integration processes (feature binding or figure-ground segregation, object recognition, inference, competition), even without attention or cognitive control. Based on the above statements, should the neural signatures of visual integration (via reentrant process) be non-reportable phenomenological qualia? We argue that qualia are not required to understand this perceptual organization.

  15. Can a one-layer optical skin model including melanin and inhomogeneously distributed blood explain spatially resolved diffuse reflectance spectra?

    Science.gov (United States)

    Karlsson, Hanna; Pettersson, Anders; Larsson, Marcus; Strömberg, Tomas

    2011-02-01

    Model based analysis of calibrated diffuse reflectance spectroscopy can be used for determining oxygenation and concentration of skin chromophores. This study aimed at assessing the effect of including melanin in addition to hemoglobin (Hb) as chromophores and compensating for inhomogeneously distributed blood (vessel packaging), in a single-layer skin model. Spectra from four humans were collected during different provocations using a twochannel fiber optic probe with source-detector separations 0.4 and 1.2 mm. Absolute calibrated spectra using data from either a single distance or both distances were analyzed using inverse Monte Carlo for light transport and Levenberg-Marquardt for non-linear fitting. The model fitting was excellent using a single distance. However, the estimated model failed to explain spectra from the other distance. The two-distance model did not fit the data well at either distance. Model fitting was significantly improved including melanin and vessel packaging. The most prominent effect when fitting data from the larger separation compared to the smaller separation was a different light scattering decay with wavelength, while the tissue fraction of Hb and saturation were similar. For modeling spectra at both distances, we propose using either a multi-layer skin model or a more advanced model for the scattering phase function.

  16. Evaluation of JNJ-54717793 a Novel Brain Penetrant Selective Orexin 1 Receptor Antagonist in Two Rat Models of Panic Attack Provocation

    Directory of Open Access Journals (Sweden)

    Pascal Bonaventure

    2017-06-01

    Full Text Available Orexin neurons originating in the perifornical and lateral hypothalamic area are highly reactive to anxiogenic stimuli and have strong projections to anxiety and panic-associated circuitry. Recent studies support a role for the orexin system and in particular the orexin 1 receptor (OX1R in coordinating an integrative stress response. However, no selective OX1R antagonist has been systematically tested in two preclinical models of using panicogenic stimuli that induce panic attack in the majority of people with panic disorder, namely an acute hypercapnia-panic provocation model and a model involving chronic inhibition of GABA synthesis in the perifornical hypothalamic area followed by intravenous sodium lactate infusion. Here we report on a novel brain penetrant, selective and high affinity OX1R antagonist JNJ-54717793 (1S,2R,4R-7-([(3-fluoro-2-pyrimidin-2-ylphenylcarbonyl]-N-[5-(trifluoromethylpyrazin-2-yl]-7-azabicyclo[2.2.1]heptan-2-amine. JNJ-54717793 is a high affinity/potent OX1R antagonist and has an excellent selectivity profile including 50 fold versus the OX2R. Ex vivo receptor binding studies demonstrated that after oral administration JNJ-54717793 crossed the blood brain barrier and occupied OX1Rs in the rat brain. While JNJ-54717793 had minimal effect on spontaneous sleep in rats and in wild-type mice, its administration in OX2R knockout mice, selectively promoted rapid eye movement sleep, demonstrating target engagement and specific OX1R blockade. JNJ-54717793 attenuated CO2 and sodium lactate induced panic-like behaviors and cardiovascular responses without altering baseline locomotor or autonomic activity. These data confirm that selective OX1R antagonism may represent a novel approach of treating anxiety disorders, with no apparent sedative effects.

  17. In search of the trauma memory: a meta-analysis of functional neuroimaging studies of symptom provocation in posttraumatic stress disorder (PTSD.

    Directory of Open Access Journals (Sweden)

    Gudrun Sartory

    Full Text Available Notwithstanding some discrepancy between results from neuroimaging studies of symptom provocation in posttraumatic stress disorder (PTSD, there is broad agreement as to the neural circuit underlying this disorder. It is thought to be characterized by an exaggerated amygdalar and decreased medial prefrontal activation to which the elevated anxiety state and concomitant inadequate emotional regulation are attributed. However, the proposed circuit falls short of accounting for the main symptom, unique among anxiety disorders to PTSD, namely, reexperiencing the precipitating event in the form of recurrent, distressing images and recollections. Owing to the technical demands, neuroimaging studies are usually carried out with small sample sizes. A meta-analysis of their findings is more likely to cast light on the involved cortical areas. Coordinate-based meta-analyses employing ES-SDM (Effect Size Signed Differential Mapping were carried out on 19 studies with 274 PTSD patients. Thirteen of the studies included 145 trauma-exposed control participants. Comparisons between reactions to trauma-related stimuli and a control condition and group comparison of reactions to the trauma-related stimuli were submitted to meta-analysis. Compared to controls and the neutral condition, PTSD patients showed significant activation of the mid-line retrosplenial cortex and precuneus in response to trauma-related stimuli. These midline areas have been implicated in self-referential processing and salient autobiographical memory. PTSD patients also evidenced hyperactivation of the pregenual/anterior cingulate gyrus and bilateral amygdala to trauma-relevant, compared to neutral, stimuli. Patients showed significantly less activation than controls in sensory association areas such as the bilateral temporal gyri and extrastriate area which may indicate that the patients' attention was diverted from the presented stimuli by being focused on the elicited trauma memory. Being

  18. Noninvasive screening for pheochromocytoma in patients with an incidentally discovered adrenal mass. Usefulness of provocative test with metoclopramide and {sup 131}I-metaiodobenzylguanidine scintigraphy

    Energy Technology Data Exchange (ETDEWEB)

    Yokoyama, Hiroshi; Tsuji, Yuji [Fukuoka Univ. (Japan). School of Medicine

    1999-10-01

    Pheochromocytoma accounts for approximately 25% of incidentally discovered adrenal masses. Certain diagnostic procedures (e.g., adrenal arteriography, needle biopsy of an adrenal mass), anesthesia and abdominal surgery may cause a sudden release of catecholamines from a pheochromocytoma and induce paroxysmal attacks of hypertension. In addition, pheochromocytoma is well known to cause unsuspected operating room deaths. Therefore, we must carefully separate this functioning neoplasm from other types of adrenal masses. In this study, we compared the results of noninvasive tests including assay of urinary catecholamines and their metabolites, a provocative pharmacologic test using metoclopramide (MCP test), and {sup 131}I-metaiodobenzylguanidine (MlBG) scintigraphy to screen for pheochromocytoma in 10 consecutive patients with an incidentally discovered adrenal mass (6 pheochromocytomas and 4 non-functioning adrenocortical adenomas). We measured the 24-hour urinary excretion of catecholamines, metanephrines and vanillyl mandelic acid in all 10 patients; 5 were positive, 4 were negative and 1 was false-negative (sensitivity=83%, specificity=100%). The MCP test was performed in 7 patients; 3 were positive, 3 were negative and 1 was false-negative (sensitivity=75%, specificity=100%). MIBG scintigraphy was performed in 7 patients; 4 were positive, 1 was negative and 2 were false-negative (sensitivity=67%, specificity=100%). According to these results, all patients with an incidentally discovered adrenal mass should undergo a determination of the 24-hour urinary excretion of catecholamines and their metabolites, including metanephrines. If this urine assay is negative, other noninvasive tests including the MCP test and MIBG scintigraphy should be considered in selected patients with radiographic characteristics of pheochromocytoma. (author)

  19. Explaining variation in Down's syndrome screening uptake

    DEFF Research Database (Denmark)

    Crombag, Neeltje M T H; Vellinga, Ynke E; Kluijfhout, Sandra A

    2014-01-01

    ), in an attempt to explain the observed variation in national uptake rates. METHODS: We used a mixed methods approach with an embedded design: a) documentary analysis and b) expert stakeholder analysis. National central statistical offices and legal documents were studied first to gain insight in demographic....... RESULTS: There were many similarities in the demographics, healthcare systems, government abortion legislation and Down's syndrome screening policy across the studied countries. However, the additional cost for Down's syndrome screening over and above standard antenatal care in the Netherlands...

  20. SOME THEORETICAL MODELS EXPLAINING ADVERTISING EFFECTS

    Directory of Open Access Journals (Sweden)

    Vasilica Magdalena SOMEŞFĂLEAN

    2014-06-01

    Full Text Available Persuade clients is still the main focus of the companies, using a set of methods and techniques designed to influence their behavior, in order to obtain better results (profits over a longer period of time. Since the late nineteenth - early twentieth century, the american E.St.Elmo Lewis, considered a pioneer in advertising and sales, developed the first theory, AIDA model, later used by marketers and advertisers to develop a marketing communications strategy. Later studies have developed other models that are the main subject of this research, which explains how and why persuasive communication works, to understand why some approaches are effective and others are not.

  1. Weaker dental enamel explains dental decay.

    Science.gov (United States)

    Vieira, Alexandre R; Gibson, Carolyn W; Deeley, Kathleen; Xue, Hui; Li, Yong

    2015-01-01

    Dental caries continues to be the most prevalent bacteria-mediated non-contagious disease of humankind. Dental professionals assert the disease can be explained by poor oral hygiene and a diet rich in sugars but this does not account for caries free individuals exposed to the same risk factors. In order to test the hypothesis that amount of amelogenin during enamel development can influence caries susceptibility, we generated multiple strains of mice with varying levels of available amelogenin during dental development. Mechanical tests showed that dental enamel developed with less amelogenin is "weaker" while the dental enamel of animals over-expressing amelogenin appears to be more resistant to acid dissolution.

  2. EXPLAINING THE ASSOCIATION BETWEEN INCARCERATION AND DIVORCE*

    Science.gov (United States)

    Siennick, Sonja E.; Stewart, Eric A.; Staff, Jeremy

    2014-01-01

    Recent studies have suggested that incarceration dramatically increases the odds of divorce, but we know little about the mechanisms that explain the association. This study uses prospective longitudinal data from a subset of married young adults in the National Longitudinal Study of Adolescent Health (N = 1,919) to examine whether incarceration is associated with divorce indirectly via low marital love, economic strain, relationship violence, and extramarital sex. The findings confirmed that incarcerations occurring during, but not before, a marriage were associated with an increased hazard of divorce. Incarcerations occurring during marriage also were associated with less marital love, more relationship violence, more economic strain, and greater odds of extramarital sex. Above-average levels of economic strain were visible among respondents observed preincarceration, but only respondents observed postincarceration showed less marital love, more relationship violence, and higher odds of extramarital sex than did respondents who were not incarcerated during marriage. These relationship problems explained approximately 40 percent of the association between incarceration and marital dissolution. These findings are consistent with theoretical predictions that a spouse’s incarceration alters the rewards and costs of the marriage and the relative attractiveness of alternative partners. PMID:25598544

  3. Explaining the democratic anchorage of governance networks

    DEFF Research Database (Denmark)

    Skelcher, Chris; Klijn, Erik-Hans; Kübler, Daniel

    2011-01-01

    Advances in understanding the democratic anchorage of governance networks require carefully designed and contextually grounded empirical analysis that take into account contextual factors. The article uses a conjectural framework to study the impact of the national democratic milieu...... on the relationship between network governance and representative institutions in four European countries: the United Kingdom, Switzerland, the Netherlands, and Denmark. The article shows that the distinction between majoritarian and consensus democracy as well as the varying strength of voluntary associations...... are important contextual factors that help explain cross-national differences in the relationship between governance networks and representative institutions. We conclude that a context of weak associationalism in majoritarian democracies facilitates the instrumentalization of networks by government actors...

  4. Explaining CMS lepton excesses with supersymmetry

    CERN Multimedia

    CERN. Geneva; Prof. Allanach, Benjamin

    2014-01-01

    1) Kostas Theofilatos will give an introduction to CMS result 2) Ben Allanach: Several CMS analyses involving di-leptons have recently reported small 2.4-2.8 sigma local excesses: nothing to get too excited about, but worth keeping an eye on nonetheless. In particular, a search in the $lljj p_T$(miss) channel, a search for $W_R$ in the $lljj$ channel and a di-leptoquark search in the $lljj$ channel and $ljj p_T$(miss) channel have all yielded small excesses. We interpret the first excess in the MSSM, showing that the interpretation is viable in terms of other constraints, despite only having squark masses of around 1 TeV. We can explain the last three excesses with a single R-parity violating coupling that predicts a non-zero contribution to the neutrinoless double beta decay rate.

  5. Explaining the moral of the story.

    Science.gov (United States)

    Walker, Caren M; Lombrozo, Tania

    2017-10-01

    Although storybooks are often used as pedagogical tools for conveying moral lessons to children, the ability to spontaneously extract "the moral" of a story develops relatively late. Instead, children tend to represent stories at a concrete level - one that highlights surface features and understates more abstract themes. Here we examine the role of explanation in 5- and 6-year-old children's developing ability to learn the moral of a story. Two experiments demonstrate that, relative to a control condition, prompts to explain aspects of a story facilitate children's ability to override salient surface features, abstract the underlying moral, and generalize that moral to novel contexts. In some cases, generating an explanation is more effective than being explicitly told the moral of the story, as in a more traditional pedagogical exchange. These findings have implications for moral comprehension, the role of explanation in learning, and the development of abstract reasoning in early childhood. Copyright © 2016 Elsevier B.V. All rights reserved.

  6. Explaining NDVI trends in northern Burkina Faso

    DEFF Research Database (Denmark)

    Rasmussen, Kjeld; Fensholt, Rasmus; Fog, Bjarne

    2014-01-01

    by a distinct spatial pattern and strongly dominated by negative trends in Normalized Difference Vegetation Index (NDVI). The aim of the paper is to explain this distinct pattern. When studied over the period 2000–2012, using NDVI data from the MODIS sensor the spatial pattern of NDVI trends indicates that non......-climatic factors are involved. By relating NDVI trends to landscape elements and land use change we demonstrate that NDVI trends in the north-western parts of the study area are mostly related to landscape elements, while this is not the case in the south-eastern parts, where rapidly changing land use, including....... expansion of irrigation, plays a major role. It is inferred that a process of increased redistribution of fine soil material, water and vegetation from plateaus and slopes to valleys, possibly related to higher grazing pressure, may provide an explanation of the observed pattern of NDVI trends. Further work...

  7. Can molecular cell biology explain chromosome motions?

    Directory of Open Access Journals (Sweden)

    Gagliardi L

    2011-05-01

    Full Text Available Abstract Background Mitotic chromosome motions have recently been correlated with electrostatic forces, but a lingering "molecular cell biology" paradigm persists, proposing binding and release proteins or molecular geometries for force generation. Results Pole-facing kinetochore plates manifest positive charges and interact with negatively charged microtubule ends providing the motive force for poleward chromosome motions by classical electrostatics. This conceptual scheme explains dynamic tracking/coupling of kinetochores to microtubules and the simultaneous depolymerization of kinetochore microtubules as poleward force is generated. Conclusion We question here why cells would prefer complex molecular mechanisms to move chromosomes when direct electrostatic interactions between known bound charge distributions can accomplish the same task much more simply.

  8. Explaining fast radio bursts through Dicke's superradiance

    Science.gov (United States)

    Houde, Martin; Mathews, Abhilash; Rajabi, Fereshteh

    2018-03-01

    Fast radio bursts (FRBs), characterized by strong bursts of radiation intensity at radio wavelengths lasting on the order of a millisecond, have yet to be firmly associated with a family, or families, of astronomical sources. It follows that despite the large number of proposed models, no well-defined physical process has been identified to explain this phenomenon. In this paper, we demonstrate how Dicke's superradiance, for which evidence has recently been found in the interstellar medium, can account for the characteristics associated with FRBs. Our analysis and modelling of previously detected FRBs suggest they could originate from regions in many ways similar to those known to harbour masers or megamasers, and result from the coherent radiation emanating from populations of molecules associated with large-scale entangled quantum mechanical states. We estimate this entanglement to involve as many as ˜1030 to ˜1032 molecules over distances spanning 100-1000 au.

  9. Explaining mutualism variation: a new evolutionary paradox?

    Science.gov (United States)

    Heath, Katy D; Stinchcombe, John R

    2014-02-01

    The paradox of mutualism is typically framed as the persistence of interspecific cooperation, despite the potential advantages of cheating. Thus, mutualism research has tended to focus on stabilizing mechanisms that prevent the invasion of low-quality partners. These mechanisms alone cannot explain the persistence of variation for partner quality observed in nature, leaving a large gap in our understanding of how mutualisms evolve. Studying partner quality variation is necessary for applying genetically explicit models to predict evolution in natural populations, a necessary step for understanding the origins of mutualisms as well as their ongoing dynamics. An evolutionary genetic approach, which is focused on naturally occurring mutualist variation, can potentially synthesize the currently disconnected fields of mutualism evolution and coevolutionary genetics. We outline explanations for the maintenance of genetic variation for mutualism and suggest approaches necessary to address them. © 2013 The Author(s). Evolution © 2013 The Society for the Study of Evolution.

  10. Explaining excess morbidity amongst homeless shelter users

    DEFF Research Database (Denmark)

    Benjaminsen, Lars; Birkelund, Jesper Fels

    2018-01-01

    AIMS: This article analyses excess morbidity amongst homeless shelter users compared to the general Danish population. The study provides an extensive control for confounding and investigates to what extent excess morbidity is explained by homelessness or other risk factors. METHODS: Data set...... includes administrative micro-data for 4,068,926 Danes who were 23 years or older on 1 January 2007. Nationwide data on shelter use identified 14,730 individuals as shelter users from 2002 to 2006. Somatic diseases were measured from 2007 to 2011 through diagnosis data from hospital discharges. The risk...... of somatic diseases amongst shelter users was analysed through a multivariate model that decomposed the total effect into a direct effect and indirect effects mediated by other risk factors. RESULTS: The excess morbidity associated with shelter use is substantially lower than in studies that did not include...

  11. AHP 47: THE PROVOCATIVE RABBIT

    Directory of Open Access Journals (Sweden)

    Rnam rgyal རྣམ་རྒྱལ།

    2017-04-01

    Full Text Available A retreatant finished chanting for a family, packed up the offerings from the host, and started back to his hermitage feeling satisfied. A rabbit, called Ja dkrug mgo 'Trouble Maker', watched the retreatant through an evergreen bush, and decided he wanted to cheat the retreatant out of his offerings. Trouble Maker came out of the bush and stood in front of the retreatant in the middle of the path. As the retreatant came closer, Trouble Maker ran forward a few steps and then again turned back to watch the retreatant, who chased the rabbit for a while, but the heavy bag burdened him and he soon got very tired. He finally threw down his bag and chased Trouble Maker, who ran just beyond the retreatant’s grasp. Finally, having left the retreatant far behind, Trouble Maker doubled back, picked up the retreatant's bag, and carried it off. ...

  12. [Defusing of victims of the terrorist attacks in Paris. Elements of assessment one-month post-event].

    Science.gov (United States)

    Prieto, N; Cheucle, E; Faure, P; Digard, F; Dalphin, C; Pachiaudi, V; Simond, M; Darbon, R; Collinet, C; Habibi, R; Gueugniaud, P-Y

    2018-04-01

    The terrorist attacks (fusillades and suicide attacks) in Paris on 13 November 2015 have had a major psychic impact on all individuals directly or secondarily exposed to them. Medico-psychological unit (CUMP) of the Paris Île-de-France region's immediate care services were immediately mobilized and rapidly strengthened by all regional medico-psychological units (CUMP) throughout the country. Psychological assistance has been provided in several key points of Paris and specifically in the 11th district City Hall of Paris where Lyon's Medico-psychological unit was located. These specific immediate psychological assistances, referred to as a "defusing process" by the medico-psychological unit (CUMP), are mostly devoted to provide the victims with an entry point to a psychological healthcare relationship and give them a first sense of soothing and relief even though they do not prevent further psychological care follow up for the victims. Nonetheless, the potential therapeutic effect of this "defusing process" has not yet been sufficiently established nor demonstrated by any scientific study. A phoning survey was carried out one-month post-terrorist attacks and interviewed the 129 victims who benefited from the "defusing process" conducted by Lyon's medico-psychological unit (CUMP) in order to collect data and assess its effects. These people, whether directly exposed, bereaved relatives or witnesses, whose average age is 35, are mostly living in the Île-de-France region. Most of them present a high score on the IES-R scale, whether they were directly exposed, bereaved relatives or witnesses. Almost all of them (96.5%) experienced at least one medical care contact within this one-month post-trauma period with psychotropic medication for 37% of them. Regarding the defusing conducted by Lyon's medico-psychological unit (CUMP) in the 11th district City Hall of Paris, it appears that 93% of the victims who were looked after indicated that they were satisfied and 87.4% of

  13. The correlation between diversion (Article 113 of the Criminal Code of Ukraine and terrorist act (Article 258 of the Criminal Code of Ukraine

    Directory of Open Access Journals (Sweden)

    Андрій Сергійович Климосюк

    2018-03-01

    During the investigating of the punishability for these crimes, it was found that in some cases the actual infliction of harm by a s diversion causes the necessity for additional qualifications by Part 2 of Art. 115 or Part 3 of Art. 258 of the Criminal Code of Ukraine. It is proved that the norm of diversion can be competed with the norm of a terrorist act as a whole (Article 113 of the Criminal Code of Ukraine and as part of the whole (Article 258 of the Criminal Code of Ukraine, and in such cases the preference in enforcement should be qualified as a diversion. Examples given in this article are an illustrations of an ideal and actual set of diversion e and terrorist act.

  14. Correlation of skin test results and specific immunoglobulin E blood levels with nasal provocation testing for house-dust mite allergies.

    Science.gov (United States)

    Haxel, Boris R; Huppertz, Tilman; Boessert, Patrick; Bast, Florian; Fruth, Kai

    2016-01-01

    Allergen-specific immunotherapy for house-dust mite (HDM) allergies is associated with lower success rates when compared with similar treatments for other inhalant allergens, such as grass or birch. One reason might be the greater difficulty in diagnosing patients with assumed HDM allergies because symptoms occur perennially and may differ from those of a conventional allergic rhinitis. The aim of the study was to compare the different methods of diagnosis in patients with assumed HDM allergy. We performed a retrospective analysis of nasal provocation tests (NPT) from patients (n = 161) evaluated for Dermatophagoides pteronyssinus (n = 127) and Dermatophagoides farinae (n = 104) allergies, and compared the results with other allergen testing methods (skin-prick test [SPT], intracutaneous test, and allergen specific immunoglobulin E levels [sIgE] to detect sensitization). Receiver operating characteristic curves were used for the analyses and the areas under the curve were calculated. For D. pteronyssinus and D. farinae, 86 and 70 complete data files, respectively, were available. For both tested HDMs, the results of the receiver operating characteristic curves showed a significant correlation for SPT and sIgE, with the results of the NPT (area under the curve, 0.742 to 0.763) but not for the intracutaneous test. In patients with a positive SPT (≥3 mm), an allergy was confirmed by the NPT in 69% of cases for D. pteronyssinus and 71% for D. farinae. A positive sIgE result (ImmunoCAP class of ≥2) was verified by the NPT in 69% of cases (D. pteronyssinus) and 70% (D. farinae). The predictability value for a positive NPT result is best for SPT and sIgE. Nevertheless, even if the results of both test systems are combined, the positive predictive value that was achieved was only 0.77 for D. pteronyssinus and 0.69 for D. farinae. Therefore, in patients eligible for immunotherapy for HDM, an NPT should be performed before the start of the therapy to verify a clinically

  15. Terrorism and Counter-Terrorism Strategies in a Globalised World : alternative perceptiveness of terrorist emergence theory and policing strategies confrontation with human rights

    OpenAIRE

    Kikkas, Margit

    2015-01-01

    Globalisation and development in technology have advanced terrorism to reach a broader target audience. Especially focussing at the international co-operation strategies and combined social networks, terrorist activities have an direct- and indirect effect on private households, international commerce and local governments. Security institutions and state organisations use various combinations of counter- terrorism measures, that are mostly social-, political-, or financial in nature. Neverth...

  16. The EU Legislative Framework Against Money Laundering and Terrorist Finance:A Critical Analysis in the Light of Evolving Global Standards

    OpenAIRE

    Gilmore, William; Mitsilegas, Valsamis

    2007-01-01

    This article examines the evolution of the EU anti-money laundering legislative framework (which in recent years has also included measures to counter terrorist finance), by focusing in particular on recent legislation such as the third money laundering Directive and the Regulation on controls of cash entering the EU, both adopted in 2005. The analysis highlights the relationship between these instruments and international initiatives in the field (in particular FATF standards), and addresses...

  17. Long-Term Memory for the Terrorist Attack of September 11: Flashbulb Memories, Event Memories, and the Factors that Influence Their Retention

    Science.gov (United States)

    Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.

    2009-01-01

    More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…

  18. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following a Chemical Terrorist Attack: Decision Criteria for Multipathway Exposure Routes

    OpenAIRE

    Watson, Annetta; Dolislager, Fredrick; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Love, Adam H.

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and de...

  19. Explaining evolution via constrained persistent perfect phylogeny

    Science.gov (United States)

    2014-01-01

    Background The perfect phylogeny is an often used model in phylogenetics since it provides an efficient basic procedure for representing the evolution of genomic binary characters in several frameworks, such as for example in haplotype inference. The model, which is conceptually the simplest, is based on the infinite sites assumption, that is no character can mutate more than once in the whole tree. A main open problem regarding the model is finding generalizations that retain the computational tractability of the original model but are more flexible in modeling biological data when the infinite site assumption is violated because of e.g. back mutations. A special case of back mutations that has been considered in the study of the evolution of protein domains (where a domain is acquired and then lost) is persistency, that is the fact that a character is allowed to return back to the ancestral state. In this model characters can be gained and lost at most once. In this paper we consider the computational problem of explaining binary data by the Persistent Perfect Phylogeny model (referred as PPP) and for this purpose we investigate the problem of reconstructing an evolution where some constraints are imposed on the paths of the tree. Results We define a natural generalization of the PPP problem obtained by requiring that for some pairs (character, species), neither the species nor any of its ancestors can have the character. In other words, some characters cannot be persistent for some species. This new problem is called Constrained PPP (CPPP). Based on a graph formulation of the CPPP problem, we are able to provide a polynomial time solution for the CPPP problem for matrices whose conflict graph has no edges. Using this result, we develop a parameterized algorithm for solving the CPPP problem where the parameter is the number of characters. Conclusions A preliminary experimental analysis shows that the constrained persistent perfect phylogeny model allows to

  20. Exploring the Iran-Hezbollah Relationship: A Case Study of how State Sponsorship affects Terrorist Group Decision-Making

    Directory of Open Access Journals (Sweden)

    Marc R. DeVore

    2012-10-01

    Full Text Available Understanding the impact of state sponsorship on the decision-making of violent non-state actors is among the more important issues to scholars of security studies. This article addresses the issue by examining the relationship between Iran and Lebanon’s Hezbollah. To preview its conclusions, there are two main perspectives to consider with regard to the terrorist group – state sponsor relationship. First, state support has a powerful, yet indirect effect on violent non-state actor decision-making by shaping the options available to groups’ leaders.  Second, state sponsors can also directly leverage their aid to shape the strategic decisions of armed non-state actors, forcing their clients to either expand or restrict their activities. Because of inevitable lacunae and contradictions amongst published accounts, this study relies heavily upon primary sources and data collected during field research in Lebanon, including interviews with leaders from Hezbollah, the Lebanese Army, the United Nations' Peacekeeping Mission in Southern Lebanon (UNIFIL and the rival Shia organization, Amal.

  1. Occupational Practitioner's Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack.

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  2. Occupational Practitioner’s Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up. PMID:27703965

  3. Forecasting the “Arab Spring” of 2011: Terrorist Incident Data from 2000-2010 Offered No Early Warning

    Directory of Open Access Journals (Sweden)

    Richard J. Chasdi

    2013-04-01

    Full Text Available One of the single most predominant questions associated with the so-called “Arab Spring” is whether or not any social research indicators associated with terrorism data are available with predictive value for such profound structural political changes. The underlying aim of this “Research Note” is to take a first pass at the terrorism data and to compare certain terrorism data trends for four countries that experienced successful regime change in 2011, namely Tunisia, Egypt, Libya, and Yemen, to terrorism trends in nine countries where political strains and tensions did not result in full blown regime change. In this essay, those countries include Bahrain, Syria, Jordan, Morocco, Algeria, Kuwait, UAE, Lebanon, and Saudi Arabia. From the start, it should be clear that even though there was non-violent protest in many of these countries, this analysis places singular attention on what both Gurr and Ross and Miller call “oppositional” or “insurgent” terrorism where terrorist assaults are directed at state governments.

  4. Occupational practitioner's role in the management of a crisis: lessons learned from the Paris November 2015 terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexis Descatha

    2016-09-01

    Full Text Available In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015.During and after the Paris attack, occupational practitioners in collaboration with emergency and security professionals were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans.Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events, and participate in preventing, to the extent possible, post-traumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols.In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  5. Profiles of referrals to a psychiatric service: a descriptive study of survivors of the Nairobi US Embassy terrorist bomb blast.

    Science.gov (United States)

    Ndetei, D M; Omar, A; Mutiso, V N; Ongecha, F A; Kokonya, D A

    2009-11-01

    To document the socio-demographic characteristics and psychiatric profiles of the survivors of the Nairobi United States Embassy terrorist bomb blast referred to a psychiatric and psychotherapy (counselling) service. This was a descriptive cross-sectional study. Clinical interviews and structured questionnaires for post-traumatic stress disorder (PTSD) and stress were administered. Survivors of the bomb blast referred to a psychiatric and psychotherapy service one year or more after the bombing were included in the study. These survivors had been treated using psychopharmacotherapy and individualised (not group) therapy/counselling. Eighty-three consecutive referrals to a psychiatric service participated in this study. There were more males and the sample was generally well educated. The referrals made contact with the referring agency for a number of reasons including seeking psychological, financial and medical assistance. All the patients reported varying degrees of psychiatric symptoms and functional impairment on various aspects of social occupational functioning. High scores for PTSD and other related stress were recorded one or more years after the bombing. Although the survivors indicated that initial counselling following the blast had helped them, they still scored high on PTSD suggesting that clinically, the initial counselling had little, if any impact on the development of PTSD. There is need for a holistic approach to the management of psychotrauma in individuals.

  6. An Estimation of a Nonlinear Dynamic Process Using Latent Class Extended Mixed Models: Affect Profiles After Terrorist Attacks.

    Science.gov (United States)

    Burro, Roberto; Raccanello, Daniela; Pasini, Margherita; Brondino, Margherita

    2018-01-01

    Conceptualizing affect as a complex nonlinear dynamic process, we used latent class extended mixed models (LCMM) to understand whether there were unobserved groupings in a dataset including longitudinal measures. Our aim was to identify affect profiles over time in people vicariously exposed to terrorism, studying their relations with personality traits. The participants were 193 university students who completed online measures of affect during the seven days following two terrorist attacks (Paris, November 13, 2015; Brussels, March 22, 2016); Big Five personality traits; and antecedents of affect. After selecting students whose negative affect was influenced by the two attacks (33%), we analysed the data with the LCMM package of R. We identified two affect profiles, characterized by different trends over time: The first profile comprised students with lower positive affect and higher negative affect compared to the second profile. Concerning personality traits, conscientious-ness was lower for the first profile compared to the second profile, and vice versa for neuroticism. Findings are discussed for both their theoretical and applied relevance.

  7. Dark matter "transporting" mechanism explaining positron excesses

    Science.gov (United States)

    Kim, Doojin; Park, Jong-Chul; Shin, Seodong

    2018-04-01

    We propose a novel mechanism to explain the positron excesses, which are observed by satellite-based telescopes including PAMELA and AMS-02, in dark matter (DM) scenarios. The novelty behind the proposal is that it makes direct use of DM around the Galactic Center where DM populates most densely, allowing us to avoid tensions from cosmological and astrophysical measurements. The key ingredients of this mechanism include DM annihilation into unstable states with a very long laboratory-frame life time and their "retarded" decay near the Earth to electron-positron pair(s) possibly with other (in)visible particles. We argue that this sort of explanation is not in conflict with relevant constraints from big bang nucleosynthesis and cosmic microwave background. Regarding the resultant positron spectrum, we provide a generalized source term in the associated diffusion equation, which can be readily applicable to any type of two-"stage" DM scenarios wherein production of Standard Model particles occurs at completely different places from those of DM annihilation. We then conduct a data analysis with the recent AMS-02 data to validate our proposal.

  8. Explaining Global Secularity: Existential Security or Education?

    Directory of Open Access Journals (Sweden)

    Claude M. J. Braun

    2012-11-01

    Full Text Available At the time of data analysis for this report there were 193 countries in the world. Various institutions – the United Nations, the World Health Organization, the CIA, the World Values Survey, Gallup, and many others – have performed sophisticated statistical analyses on cross-national data. The present investigation demonstrates that valid and reliable data concerning religiosity and secularity exist for most countries and that these data are comparable. Cross-national data relating to social, political, economic and cultural aspects of life were tested for correlation with religiosity/secularity. In contrast to the most widely accepted general account of secularity, the Existential Security Framework (ESF; Norris & Inglehart, 2004, secularity was not most highly related to material security, though these were highly related. Rather, secularity was most strongly related to the degree of formal education attained. Material security explained no significant variance beyond education. Thus, religion’s primary function in the world today is being replaced, not so much by the pseudo-materialistic supplication for better living conditions as posited by the ESF, but by contemporary education – extensive knowledge of contemporary cultures, philosophy, modes of thought or processes of reasoning.

  9. Explaining Polarization Reversals in STEREO Wave Data

    Science.gov (United States)

    Breneman, A.; Cattell, C.; Wygant, J.; Kersten, K.; Wilson, L, B., III; Dai, L.; Colpitts, C.; Kellogg, P. J.; Goetz, K.; Paradise, A.

    2012-01-01

    Recently Breneman et al. reported observations of large amplitude lightning and transmitter whistler mode waves from two STEREO passes through the inner radiation belt (Lpaper. We show, with a combination of observations and simulated wave superposition, that these polarization reversals are due to the beating of an incident electromagnetic whistler mode wave at 21.4 kHz and linearly polarized, symmetric lower hybrid sidebands Doppler-shifted from the incident wave by +/-200 Hz. The existence of the lower hybrid waves is consistent with the parametric decay mechanism of Lee and Kuo whereby an incident whistler mode wave decays into symmetric, short wavelength lower hybrid waves and a purely growing (zero-frequency) mode. Like the lower hybrid waves, the purely growing mode is Doppler-shifted by 200 Hz as observed on STEREO. This decay mechanism in the upper ionosphere has been previously reported at equatorial latitudes and is thought to have a direct connection with explosive spread F enhancements. As such it may represent another dissipation mechanism of VLF wave energy in the ionosphere and may help to explain a deficit of observed lightning and transmitter energy in the inner radiation belts as reported by Starks et al.

  10. Explaining clinical behaviors using multiple theoretical models

    Directory of Open Access Journals (Sweden)

    Eccles Martin P

    2012-10-01

    Full Text Available Abstract Background In the field of implementation research, there is an increased interest in use of theory when designing implementation research studies involving behavior change. In 2003, we initiated a series of five studies to establish a scientific rationale for interventions to translate research findings into clinical practice by exploring the performance of a number of different, commonly used, overlapping behavioral theories and models. We reflect on the strengths and weaknesses of the methods, the performance of the theories, and consider where these methods sit alongside the range of methods for studying healthcare professional behavior change. Methods These were five studies of the theory-based cognitions and clinical behaviors (taking dental radiographs, performing dental restorations, placing fissure sealants, managing upper respiratory tract infections without prescribing antibiotics, managing low back pain without ordering lumbar spine x-rays of random samples of primary care dentists and physicians. Measures were derived for the explanatory theoretical constructs in the Theory of Planned Behavior (TPB, Social Cognitive Theory (SCT, and Illness Representations specified by the Common Sense Self Regulation Model (CSSRM. We constructed self-report measures of two constructs from Learning Theory (LT, a measure of Implementation Intentions (II, and the Precaution Adoption Process. We collected data on theory-based cognitions (explanatory measures and two interim outcome measures (stated behavioral intention and simulated behavior by postal questionnaire survey during the 12-month period to which objective measures of behavior (collected from routine administrative sources were related. Planned analyses explored the predictive value of theories in explaining variance in intention, behavioral simulation and behavior. Results Response rates across the five surveys ranged from 21% to 48%; we achieved the target sample size for three of

  11. Explaining clinical behaviors using multiple theoretical models.

    Science.gov (United States)

    Eccles, Martin P; Grimshaw, Jeremy M; MacLennan, Graeme; Bonetti, Debbie; Glidewell, Liz; Pitts, Nigel B; Steen, Nick; Thomas, Ruth; Walker, Anne; Johnston, Marie

    2012-10-17

    In the field of implementation research, there is an increased interest in use of theory when designing implementation research studies involving behavior change. In 2003, we initiated a series of five studies to establish a scientific rationale for interventions to translate research findings into clinical practice by exploring the performance of a number of different, commonly used, overlapping behavioral theories and models. We reflect on the strengths and weaknesses of the methods, the performance of the theories, and consider where these methods sit alongside the range of methods for studying healthcare professional behavior change. These were five studies of the theory-based cognitions and clinical behaviors (taking dental radiographs, performing dental restorations, placing fissure sealants, managing upper respiratory tract infections without prescribing antibiotics, managing low back pain without ordering lumbar spine x-rays) of random samples of primary care dentists and physicians. Measures were derived for the explanatory theoretical constructs in the Theory of Planned Behavior (TPB), Social Cognitive Theory (SCT), and Illness Representations specified by the Common Sense Self Regulation Model (CSSRM). We constructed self-report measures of two constructs from Learning Theory (LT), a measure of Implementation Intentions (II), and the Precaution Adoption Process. We collected data on theory-based cognitions (explanatory measures) and two interim outcome measures (stated behavioral intention and simulated behavior) by postal questionnaire survey during the 12-month period to which objective measures of behavior (collected from routine administrative sources) were related. Planned analyses explored the predictive value of theories in explaining variance in intention, behavioral simulation and behavior. Response rates across the five surveys ranged from 21% to 48%; we achieved the target sample size for three of the five surveys. For the predictor variables

  12. Explaining Counterfeit Alcohol Purchases in Russia.

    Science.gov (United States)

    Kotelnikova, Zoya

    2017-04-01

    of surrogate alcohol (i.e., nonbeverage) are more influential in explaining why people purchase counterfeit alcohol. Further research on these 2 factors is needed to more fully understand the purchase and consumption of counterfeit alcoholic beverages. Copyright © 2017 by the Research Society on Alcoholism.

  13. Explaining the entropy concept and entropy components

    Directory of Open Access Journals (Sweden)

    Marko Popovic

    2018-04-01

    Full Text Available Total entropy of a thermodynamic system consists of two components: thermal entropy due to energy, and residual entropy due to molecular orientation. In this article, a three-step method for explaining entropy is suggested. Step one is to use a classical method to introduce thermal entropy STM as a function of temperature T and heat capacity at constant pressure Cp: STM = ∫(Cp/T dT. Thermal entropy is the entropy due to uncertainty in motion of molecules and vanishes at absolute zero (zero-point energy state. It is also the measure of useless thermal energy that cannot be converted into useful work. The next step is to introduce residual entropy S0 as a function of the number of molecules N and the number of distinct orientations available to them in a crystal m: S0 = N kB ln m, where kB is the Boltzmann constant. Residual entropy quantifies the uncertainty in molecular orientation. Residual entropy, unlike thermal entropy, is independent of temperature and remains present at absolute zero. The third step is to show that thermal entropy and residual entropy add up to the total entropy of a thermodynamic system S: S = S0 + STM. This method of explanation should result in a better comprehension of residual entropy and thermal entropy, as well as of their similarities and differences. The new method was tested in teaching at Faculty of Chemistry University of Belgrade, Serbia. The results of the test show that the new method has a potential to improve the quality of teaching.

  14. Characteristics explaining performance in downhill mountain biking.

    Science.gov (United States)

    Chidley, Joel B; MacGregor, Alexandra L; Martin, Caoimhe; Arthur, Calum A; Macdonald, Jamie H

    2015-03-01

    To identify physiological, psychological, and skill characteristics that explain performance in downhill (DH) mountain-bike racing. Four studies were used to (1) identify factors potentially contributing to DH performance (using an expert focus group), (2) develop and validate a measure of rider skill (using video analysis and expert judge evaluation), (3) evaluate whether physiological, psychological, and skill variables contribute to performance at a DH competition, and (4) test the specific contribution of aerobic capacity to DH performance. STUDY 1 identified aerobic capacity, handgrip endurance, anaerobic power, rider skill, and self-confidence as potentially important for DH. In study 2 the rider-skill measure displayed good interrater reliability. Study 3 found that rider skill and handgrip endurance were significantly related to DH ride time (β=-0.76 and -0.14, respectively; R2=.73), with exploratory analyses suggesting that DH ride time may also be influenced by self-confidence and aerobic capacity. Study 4 confirmed aerobic capacity as an important variable influencing DH performance (for a DH ride, mean oxygen uptake was 49±5 mL·kg(-1)·min(-1), and 90% of the ride was completed above the 1st ventilatory threshold). In order of importance, rider skill, handgrip endurance, self-confidence, and aerobic capacity were identified as variables influencing DH performance. Practically, this study provides a novel assessment of rider skill that could be used by coaches to monitor training and identify talent. Novel intervention targets to enhance DH performance were also identified, including self-confidence and aerobic capacity.

  15. Explaining the gender gap in sickness absence.

    Science.gov (United States)

    Østby, K A; Mykletun, A; Nilsen, W

    2018-04-17

    In many western countries, women have a much higher rate of sickness absence than men. To what degree the gender differences in sickness absence are caused by gender differences in health is largely unknown. To assess to what degree the gender gap in sickness absence can be explained by health factors and work- and family-related stressors. Norwegian parents participating in the Tracking Opportunities and Problems (TOPP) study were asked about sickness absence and a range of factors possibly contributing to gender differences in sickness absence, including somatic and mental health, sleep problems, job control/demands, work-home conflicts, parent-child conflicts and stressful life events. Using a cross-sectional design, we did linear regression analyses, to assess the relative contribution from health and stressors. There were 557 study participants. Adjusting for health factors reduced the gender difference in sickness absence by 24%, while adjusting for stressors in the family and at work reduced the difference by 22%. A simultaneous adjustment for health factors and stressors reduced the difference in sickness absence by about 28%. Despite adjusting for a large number of factors, including both previously well-studied factors (e.g. health, job control/demands) and lesser-studied factors (parent-child conflict and sexual assault), this study found that most of the gender gap in sickness absence remains unexplained. Gender differences in health and stressors account for only part of the differences in sickness absence. Other factors must, therefore, exist outside the domains of health, work and family stressors.

  16. Explaining G20 and BRICS Compliance

    Directory of Open Access Journals (Sweden)

    Marina Larionova

    2016-11-01

    Full Text Available This article explores the internal and external factors influencing the compliance performance of the Group of 20 (G20 and the BRICS. The authors start with an overview of the G20 and BRICS compliance patterns using comparative data onthe number of commitments made by the two institutions, the level of institutional compliance, and distribution of commitments and compliance across issue areas. G20 compliance is traced since the leaders’ first 2008 summit in Washington. The BRICS compliance performance record includes data since the third stand alone summit in Sanya in 2011.The study then takes stock of compliance catalysts embedded in the summits’ discourse: priority placements, numerical targets, timelines, self-accountability pledges and mandates to implement and/or monitor implementation. The authors review trends in the use of catalysts in different years and issue areas and identify commonalities and differences.The analysis then turns to external causes of compliance and focuses on demand for collective actions and members’ collective power to respond and deliver on their pledges. Here the study explores whether the self-accountability mechanisms created by the institutions in response to the demand for effectiveness and legitimacy facilitate compliance.The article concludes by highlighting catalysts, causes of compliance and their combinations with the greatest power to encourage implementation, explaining trends in G20 and BRICS compliance performance. The data sets on G20 and BRICS differ in terms of scale. The G20 data set contains 1,511 commitments of which 114 have been monitored, and the BRICS data set contains 231 commitments of which 23 have been monitored.

  17. De l’impossible intimité physique à la provocation éthique : Le pouvoir subversif de l’hétérotopie carcérale chez Genet

    Directory of Open Access Journals (Sweden)

    Pascaline Hamon

    2010-09-01

    Full Text Available La représentation de l’univers carcéral tient un rôle considérable dans l’œuvre genetienne, aussi bien au niveau intra-textuel - la prison constitue la matrice d’écriture d’un certain nombre de pièces ou de romans - mais aussi au niveau extra-textuel, puisque la prison fait partie intégrante de la légende genétienne.Entre l’omniprésence littéraire et les réalités biographiques, cependant, on observe un fossé qui invite à se questionner sur les pouvoirs littéraires du lieu carcéral. En effet, deux œuvres seulement ont été écrites en prison : Notre-Dame des Fleurs et Miracle de la Rose. En constituant un miroir grossissant des questions éthiques et littéraires lié à l’écriture carcérale, ces deux œuvres permettent également de faire un lien entre une réflexion sociale, qui peut être éclairée par l’ouvrage de Michel Foucault, Surveiller et punir, et une création poétique qui repose sur le concept d’hétérotopie tel que le développe encore ce dernier dans Des espaces autres.Ces deux œuvres permettent de questionner la mise en œuvre d’une représentation carcérale à mi-chemin entre la reproduction d’une réalité sociale et une projection fantasmatique des époques, des lieux et de la littérature elle-même. Partant de la fécondité qu’offre, pour le critique littéraire, la notion d’hétérotopie, nous mettrons en lumière une dimension essentielle de la poétique genétienne : les glissements d’une époque à une autre, par le biais de l’imaginaire permettent la superposition des espaces hétérotopiques qui aboutit sur une réunion de contraires propre à susciter une interrogation éthique sur les structures sociales par le biais du scandale littéraire.La dimension anachronique permet d’expliquer les fondements de la provocation éthique telle qu’elle se manifeste chez l’auteur. Celle-ci n’est pas sans implication littéraire, puisque l’œuvre romanesque tend

  18. Politics of Feminine Abuse: Political Oppression and Masculine Obstinacy in Doris Lessing’s The Good Terrorist

    Directory of Open Access Journals (Sweden)

    Pedram Lalbakhsh

    2012-07-01

    Full Text Available This paper studies the male-dominated world of Doris Lessing’s novel The Good Terrorist. Alice Mellings, the protagonist of the novel, is a political activist whose reliance on male figures in the story—the leaders of a subdivision of a political party—ends in disillusionment and frustration. Looking at this novel from a socialist feminist point of view, Alice Mellings is found to be a minor member, exploited and abused, who has to follow the orders and instructions of her inept superiors—all male. While Alice is the one who guarantees the continuation of activism (doing all kinds of jobs needed to keep the squat alive, she is never allowed to have a role in decision making. She is a member whose identity is defined by male superiors and is considered as a half-human whose services are to be enjoyed only. However, the findings of this study prove Alice as one who has her own voice at the end. The novel’s closing is marked with an engendered New Woman who is aware of the political abuse and whose independent unbound identity stands much higher than the political oppression and masculine obstinacy that had imprisoned her for so long. She is a different woman at the end; one who knows her power, believes in it and decides to fight and not to surrender. And this is a new consciousness that Lessing raises: discover your feminine power, have a firm belief in it and use it to win.

  19. The day Norway cried: Proximity and distress in Norwegian citizens following the 22nd July 2011 terrorist attacks in Oslo and on Utøya Island.

    Science.gov (United States)

    Thoresen, Siri; Aakvaag, Helene Flood; Wentzel-Larsen, Tore; Dyb, Grete; Hjemdal, Ole Kristian

    2012-01-01

    Terrorism may create fear and stress reactions not only in the direct victims, but also in the general population. This study investigated emotional responses in the Norwegian population following the 22nd July 2011 terrorist attacks. We hypothesized that Oslo residents would report a higher level of fear responses compared with people living outside Oslo and that proximity would be associated with early distress and later post-traumatic stress reactions. Representative samples were drawn from the Norwegian Population Registry. Telephone interviews were conducted 4-5 months after the attacks. The response rate for the Oslo sample (N=465) was 24% of the total sample, and 43% of those who were actually reached by phone and asked to participate. Corresponding figures for the sample living outside Oslo (N=716) were 19% and 30%. Our results show strong immediate emotional responses, particularly sadness and a feeling of unreality, in both samples. Jumpiness and other fear responses were significantly higher among Oslo residents. Current level of risk perception was low 4-5 months after the attacks; however, a significant minority reported to feel less safe than before. Geographical and psychological proximity were associated with early emotional responses. Psychological proximity was significantly associated with post-traumatic stress reactions, while measures of geographical proximity were not. Immediate emotional responses, first-week reactions, and first-week jumpiness were uniquely and significantly associated with post-traumatic stress reactions. Post-traumatic stress reactions were elevated in ethnic minorities. The terrorist attacks seem to have had a significant effect on the Norwegian population, creating sadness and insecurity, at least in the short term. Proximity to the terrorist attacks was strongly associated with distress in the population, and early distress was strongly related to later post-traumatic stress reactions. Our results indicate that

  20. Do you get it? User-evaluated explainable BDI agents

    NARCIS (Netherlands)

    Broekens, J.; Harbers, M.; Hindriks, K.; Bosch, K. van den; Jonker, C.; Meyer, J.J.C.

    2010-01-01

    In this paper we focus on explaining to humans the behavior of autonomous agents, i.e., explainable agents. Explainable agents are useful for many reasons including scenario-based training (e.g. disaster training), tutor and pedagogical systems, agent development and debugging, gaming, and