WorldWideScience

Sample records for psychology law warfare

  1. More Effective Warfare: Warfare Waged Psychologically

    Science.gov (United States)

    2012-06-01

    Hezbollah as a Case Study, 2–112. 85Schleifer, Psychological Operations, 8. 86 Rodger Shanahan, "Hizballah Rising: The Political Battle for the Loyalty ...getting up in a bedroom, coming out to the balcony to have his morning coffee , getting dressed, putting his combat webbing on, picking up his...Teams Brand IDF Doctrine ’Completely Wrong’," Jane’s Defense Weekly (January 3, 2007): accessed February 1, 2012. 46 forces only as a last resort.155

  2. Information Warfare and International Law

    Science.gov (United States)

    1998-01-01

    terrorists, or even enemy nations. Perhaps the most dramatic example occurred on Martin Luther King Day in 1990, when the AT&T long distance network failed...state of the law on such topics as the use of nuclear weapons, seabed mining, or the equation of Zionism with racism . 208 There is no reason...International Telecommunications Agreements 67-69 (1986). 35 Harold M. White, Jr . & Rita Lauria, The Impact of New Communication Technologies on

  3. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    Science.gov (United States)

    1982-01-01

    sug- F P _ _ 6 PSYCHOLOGICAL WARFARE IN WORLD WAR I! gestion of a single agency which would serve as a clearinghouse for all intelligence, as well as...organizations, communications, demoli- tions, organization and training of civilians for guerrilla warfare, para- chute jumping, and amphibious...General Bolte, Director, P&O, was reluctant to endorse this latter sug- gestion , indicating, "as he had indicated from time to time at other points

  4. THE PECULIARITIES OF SOCIAL PERCEPTION IN THE CONTEXT OF INFORMATION-PSYCHOLOGICAL WARFARE

    Directory of Open Access Journals (Sweden)

    Nane Zeynalyan

    2016-09-01

    Full Text Available In the recent decades, war fields have moved into the information sphere. Today’s person has reason to “be informed”; as having information provides a sense of security. In the modern world, great effort is invested in expanding information sources, because it serves to articulate both international policies and the context of wars. The exchange of information in domestic and international platforms influences the quality of public debate and ideology, which affects social attitudes and decision-making processes. This article presents the role of information-psychological warfare as a factor in forming public opinion. It discusses the peculiarities of organizing an information-psychological warfare during military conflicts. The goal of our research is to explore how social groups might perceive peculiarities in the information-psychological warfare. The research involves methods of survey, content analysis, and free associations. The effectiveness of psychological warfare significantly depends on how people perceive information. Consequently, in the contemporary world, it is necessary to not only protect or fight on the battlefield, but also to use information weapons. This imposes requirements on psychological scientists to explore peculiarities around the perception of information to help find mechanisms that safeguard people’s lives by way of contributing to the formation of necessary attitudes and stereotypes.

  5. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  6. Psychiatric/Psychological Injury and Law: Introduction.

    Science.gov (United States)

    Young, Gerald

    This special issue on psychiatric/psychological injury and law covers major developments in the field, and illustrates the complexities for mental health professionals in dealing with psychiatric/psychological injuries in court. The articles vary in the range of topics covered, and include ones on posttraumatic stress disorder, other trauma reactions, dissociation, disability, pain, and traumatic brain injury, in particular but also new areas, such as the effects of early penile injury. Work in the area of psychiatric/psychological injury and law needs to be scientifically-informed, comprehensive, and impartial, and the series of articles to follow will help workers in the area meet this standard. Copyright © 2016. Published by Elsevier Ltd.

  7. 竞技排球运动心理战理论模型的构建%Theoretical Models of Psychological Warfare Built in Competitive Volleyball

    Institute of Scientific and Technical Information of China (English)

    洪庆

    2011-01-01

    通过对军事心理学中心理战思想的精心研读,结合竞技排球运动与战场心理战的共通之处,从理论建设、专业人才建设、规章制度建设、谋略创新建设以及球队心理素质建设五个方面构建了竞技排球运动心理战的理论模型。%This article through the study of thoughts of psychological warfare in military psychology carefully, combined with the commons of volleyball and psychological warfare, from five aspects that construction of theory, construction of professional, and construction of rules and regulations, construction of counsel innovation and construction of team psychological quality to construct the theoretical model of psychological warfare of volleyball.

  8. Individual psychological features of law enforcement officers convicted of crimes

    Directory of Open Access Journals (Sweden)

    Lyutykh V.A.

    2016-06-01

    Full Text Available The relevance of this topic is caused by a significant number of crimes committed by law enforcement officers and the necessity of active prevention. The aim of the study was to determine the individual psychological characteristics of law enforcement officers convicted of intentional crimes. The hypothesis was suggested that the main difference of individual psychological characteristics of law enforcement officers convicted of intentional crimes from individual psychological characteristics of law-abiding law enforcement officers is the difference between the principal values of the person both the main motives of activity adopted by an individual and the structure and the hierarchy of these values. This article describes the progress and results of empirical research conducted on the materials of psychodiagnostic examination of: employees who have been convicted of intentional crimes; law-abiding employees; people entering an internal affairs agency. Test subjects - men 18-46 years old, 90 people. Recommendations for practical psychologist of internal affairs agencies on detection of individual psychological personality features typical for law enforcement officers convicted of intentional crimes are formulated based on the obtained results.

  9. Teaching Psychology and Law: An Empirical Evaluation of Experiential Learning

    Science.gov (United States)

    Zelechoski, Amanda D.; Riggs Romaine, Christina L.; Wolbransky, Melinda

    2017-01-01

    Given the recent proliferation of undergraduate psychology and law courses, there is an increased need to empirically evaluate effective methods of teaching psycholegal material. The current study used a between- and within-subject design across four higher education institutions (N = 291 students) to evaluate the effectiveness of incorporating…

  10. PSYCHOLOGICAL PROBLEMS AND STRESS FACED BY SOLDIERS WHO OPERATE IN ASYMMETRIC WARFARE ENVIRONMENTS: EXPERIENCES IN THE FIELD

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2014-10-01

    Full Text Available This article deals with the problems of anxiety, stress and psychological discomfort that can affect soldiers sent on asymmetric warfare operations. It is based on secondary analysis of the data of two important field researches whose results have recently (2013 been published. Although the two researches adopted different methodologies, the testimonies are fully comparable and show that soldiers from different countries and cultures display common or similar reactions when they are placed in the stress conditions that the asymmetric environment involves. The approach of the paper is drawn up in such a way as to make the reader a participating observer of the reality of such missions. It is therefore centered on the personal testimonies of the soldiers interviewed in the two researches, testimonies reported just as they are, in their simplicity and, often, drama, with comments by the author kept to a minimum in order to give readers ample opportunity to evaluate and interpret the reported texts on their own. The research data, drawn from the declarations of those directly concerned, reveal the existence of a problem of psychological distress resulting from deployment in asymmetric warfare situations that is in part different in the causes of the problems resulting from deployment in traditional combat and affects percentages of participating soldiers that are not high but definitely significant. The highest incidence appears to be constituted by problems relating to reintegration into normal social and working life upon returning from the mission. This is followed in percentage terms by anxiety situations relating to life far from the family, due in large part to a sense of powerlessness for the scant possibility of managing family situations that may have cropped up or already existed beforehand.

  11. 中国共产党领导的抗日心理战%Anti-Japanese Psychological Warfare Led by the Chinese Communist Party

    Institute of Scientific and Technical Information of China (English)

    及之刚

    2014-01-01

    During the Anti-Japanese War ,the Chinese Communist Party creatively applied the ancient Chinese mili-tary’s psychological warfare and developed psychological tactics .By conducting political psychological attacking and im-plementing POW policy and other measures to constantly shake ,lax and abate enemy psychological defense ,our Party achieved remarkable success because with the development of the war ,the psychological defense of the Japanese invaders gradually collapsed ,and the Chinese people finally won the victory in the Anti-Japanese psychological warfare .%抗日战争中,我党继承和发扬了中国古代兵家的心战思想,创造性地运用和发展了心理战术,取得了举世瞩目的战果。我军民通过开展政治攻心和实施俘虏政策等措施,不断动摇、涣散、消减敌军的士气军心,使日本侵略者的军心随着战争的发展而日渐动摇和瓦解,我国人民最终赢得了抗日心理战的胜利。

  12. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    psychological operations, and information operations. • In keeping with traditional Soviet notions of battling constant threats from abroad and within...theorists, is a holistic concept that includes computer network operations, electronic warfare, psychological operations, and information operations.3...that “in the ongoing revolution in information technologies, information and psychological warfare will largely lay the groundwork for victory.”10

  13. Preventing the Emasculation of Warfare: Halting the Expansion of Human Rights Law into Armed Conflict

    Science.gov (United States)

    2007-04-01

    as the two regimes "rub[bing] up against each other like two tectonic plates .蕎 Part III of this article provides a discussion of these...General’s Legal Center and School; J.D. 1997, Regent University School of Law; B.A. 1994, Saint Leo College; A.A. 1992, Hawaii Pacific University. Previous...French Horn Player, 25th Infantry Division, Schofield Barracks, Hawaii , 1990-1992 (enlisted service). Member of the bars of Virginia, the Supreme

  14. Simple Quantum Model of Learning Explains the Yerkes-Dodson Law in Psychology

    CERN Document Server

    Vol, E D

    2012-01-01

    We propose the simple model of learning based on which we derive and explain the Yerkes-Dodson law - one of the oldest laws of experimental psychology. The approach uses some ideas of quantum theory of open systems (QTOS) and develops the method of statistical description of psychological systems that was proposed by author earlier.

  15. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  16. The Challenges of Cyber Warfare to International Law:From Perspective of The Tallinn Manual on The International Law Applicable to Cyber Warfare%从《塔林手册》看网络战争对国际法的挑战

    Institute of Scientific and Technical Information of China (English)

    张天舒

    2014-01-01

    Tallinn Manual on The International Law Applicable to Cyber Warfare results from an expert -driven process designed to produce a non -binding document applying existing law to cyber warfare .It encompasses both jus ad bellum and jus in bello , as well as related bodies of general international law , such as the law of State re-sponsibility etc .It is believed that how the Manual elaborates on current international law applicable to cyber war -fare reflects the current development of international law about cyber warfare .However , it is also arguable about the methodology used to ascertain rules and the composition of the International Group of Experts .Additionally , the Manual contains several flaws in the formulation of the rules and the relevant comments .Given to all these reasons , how much the Manual could affect states and international law still remains uncertain and need to be proven in the future.%《适用于网络战争的国际法塔林手册》(以下简称“《塔林手册》”)分别讨论了一般国际法和国际人道法如何适用于网络空间和网络战争中的重要问题。《塔林手册》对适用于网络战争的国际法进行的系统归纳和总结,将会影响国际社会对网络战争的认识。但是《塔林手册》在编纂方式和国际专家组的人员构成方面存在先天不足,而且其中的若干具体规则也与现今国际法有些许出入。《塔林手册》究竟能在什么程度上影响国家实践和国际法的发展,还有待检验。

  17. The integrated nature of the method of psychological portraying in law enforcement

    Directory of Open Access Journals (Sweden)

    Shpagina E. M.

    2016-01-01

    Full Text Available The article reveals peculiarities of using the method of psychological portraying in law enforcement, shows the current practice of using psychological knowledge in solving crimes, reveals an integration relationship of other Sciences with psychology with the use of the method of psychological portraying the disclosure of crimes. The article presents a comprehensive approach to the psychological profile of an unknown offender. Psychological portraying of an unknown offender is regarded as a form of analytical work in solving crimes, which integrate information and knowledge from various Sciences such as forensics, criminology, detective work, psychiatry, sexology, victimology, etc. Psychological science (information of its various branches is a fundamental element that helps to explain, interpret and describe the behavior of the offender and the victim to resolve the problems of law enforcement.

  18. Conference of the European Association of Psychology and Law (EAPL)

    OpenAIRE

    Dozortseva E.G.

    2014-01-01

    EAPL conference is held in Russia for the first time. The theme for 2014 is "Actual Problems of Legal Psychology. Victims and witnesses: from research to effective practice". Psychological characteristics of testimony, in particular, children's testimony, the possibility of recognition of lies and errors in the readings were in the focus of researchers at the dawn of the development of Legal Psychology as a science and remain relevant to this day. Currently in Russia, these topics are of part...

  19. Strategic Political Work and Strategic Psychological Warfare%战时政治工作与战略心理作战

    Institute of Scientific and Technical Information of China (English)

    军事科学院《战略学》课题组

    2005-01-01

    Wartime political work refers to the ideological and organizational work undertaken by the armed forces while performing combat tasks. Strategic psychological warfare means the strategic confrontational activities in which psychological offensives are launched according to the principles of psychology in order to undermine the morale of both the enemy troops and its civilians or to eliminate the consequences of the enemy's deceptive propaganda, and it is a component part of wartime political work. Conducting thoroughgoing wartime political work is a unique political advantage of the PLA and an important guarantee for preserving the true political qualities of the people's army, arousing the fighting will, increasing the cohesion of our soldiers' morale, keeping internal unity against the enemy,and winning the war.%战时政治工作是军队履行作战任务期间进行的思想工作和组织工作,是发挥我军独特的政治优势的重要途径.战略心理作战是运用心理学原理,开展心理攻势,从精神上瓦解敌方军民斗志或消除敌欺骗宣传后果而进行的战略对抗活动,在战时它是战时政治工作的组成部分.

  20. Analysis on Joint Operational Capability in the Condition of Information and Psychological Warfares%信息心理对抗条件下联合作战能力分析

    Institute of Scientific and Technical Information of China (English)

    闫家传; 秦伟; 陈璐; 张仁友

    2011-01-01

    In the information age, operational capabilities of troops include firepower, defense power, maintainance power, information power and many other factors, and the warfares between the opponents represent force confrontation, psychological confrontation, information warfares and many other complex forms. Based on the quantity analysis of joint operational capability, mutual functional mechanism of information, psychology and combat power is analyzed, and three feedback loops of operational confrontation, information warfares and psychological warfares are educed, and then system dynamical models are established, and effects on joint operational capability by information, psychology and other factors are deduced in the prospect of quantity.%信息化条件下作战,部队的作战能力表现为包括火力、防护力、保障力、信息力等多种因素的联合作战能力,作战双方的对抗表现为兵力对抗,心理对抗,信息对抗等多种复杂的形式.在联合作战能力量化分析基础上,分析了信息、心理和战斗力相互作用机制,得出了战斗对抗、信息对抗、心理对抗3个反馈回路环,并据此建立了系统动力学模型,从定量的角度分析了信息、心理等因素对联合作战能力的影响.

  1. Roman Warfare

    Directory of Open Access Journals (Sweden)

    D.B. Saddington

    2012-03-01

    Full Text Available

    ROTH, Jonathan P 2009. Roman Warfare. Cambridge: Cambridge University Press. Pbk. R250. ISBN 978-0-521-53726-1.

    Jonathan Roth of San Jose State University, known as an expert on military logistics, has written this attractive Cambridge Introduction to Roman Civilization volume on Roman Warfare. The series is designed for students with no prior knowledge of Roman antiquity. The book comprises an Introduction on Sources and Methods (pp. 1-6 and 15 chapters on Roman warfare from the beginnings to the fall of the Western Empire in AD 476, using a chronological approach. There are 68 illustrations and maps, a Timeline, a Glossary, a Glossary of People, a Bibliography (which includes several websites and an Index.

  2. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...... administration. While organisation systems continue to make some kind of political control possible, this is not the case in relation to wars. The organisation system is the in-between that should mediatise politics and war but is not functionally equivalent to just and unjust wars. The paper investigates...

  3. Influence of Psychological Warfare Information on College Students and Educational Countermeasures%心理战信息对大学生的影响及其教育对策

    Institute of Scientific and Technical Information of China (English)

    巴文娟

    2015-01-01

    In the psychological warfare of information under the background of the Internet, television, language, religious, and academic and cultural exchanges, visits and other activities for the psychological warfare of information carrier of long term effect on the students, had different effect on the students' ideological consciousness, emotion attitude, values education, the national consciousness, cultural identity education, national education measures in a timely manner, improve the ability of college students' psychological warfare defense.%在信息心理战的背景下,以互联网、语言、影视、宗教,以及学术文化交流、参观访问等活动为载体的心理战信息长期作用于大学生,对大学生的思想意识、情感态度产生了不同程度的影响,应及时通过价值观教育、国家意识教育、文化认同教育、国情国力教育等教育对策,提高大学生的心理战防御能力。

  4. Some New Facets of the Psychology-Law Interface.

    Science.gov (United States)

    Freeman, James T.

    While the field of forensic psychology has emerged as a recognized discipline, psychologists who work within institutional settings frequently feel frustration in dealing with inmates for whom they have had no responsibility or input during the critical pre-trial, trial and sentencing decision-making process. The roles and ways in which psychology…

  5. Strategic disclosure of evidence : perspectives from psychology and law

    OpenAIRE

    Sukumar, Divya; Wade, Kimberley A.; Hodgson, Jacqueline

    2016-01-01

    The police frequently present their evidence to suspects in investigative interviews. Accordingly, psychologists have developed strategic ways in which the police may present evidence to catch suspects lying or to elicit more information from suspects. While research in psychology continues to illustrate the effectiveness of strategic evidence disclosure tactics in lie detection, lawyers and legal research challenge these very tactics as undermining fair trial defense rights. Legal research i...

  6. Do law students stand apart from other university students in their quest for mental health: A comparative study on wellbeing and associated behaviours in law and psychology students.

    Science.gov (United States)

    Skead, Natalie K; Rogers, Shane L

    2015-01-01

    We are not producing a product, but a well-balanced person.(1) It is well-documented that law students experience higher levels of psychological distress than members of the general population and university students in other professional disciplines. In 2014, we published our findings on an empirical study identifying the correlations between law student wellbeing and student behaviour both at and away from law school. The results of the study informed the development of an evidence-based 'behavioural toolkit' to assist law students and law schools in making informed choices and decisions that promote and even improve the mental health of students. The study we undertook was not, however, limited to law students. It extended to collecting quantitative data on psychological distress and associated behaviours in psychology students. This article reports on the comparative findings of the study and provides a comparative basis for understanding the contextual influences on the wellbeing of law students.

  7. Children of lesbian and gay parents: psychology, law, and policy.

    Science.gov (United States)

    Patterson, Charlotte J

    2009-11-01

    Legal and policy questions relevant to the lives of lesbian and gay parents and their children have recently been subjects of vigorous debate. Among the issues for which psychological research has been seen as particularly relevant are questions regarding child custody after divorce, same-sex marriage, adoption, and foster care. This article provides an overview of the current legal terrain for lesbian and gay parents and their children in the United States today, an overview of relevant social science research, and some commentary on the interface between the two. It is concluded that research findings on lesbian and gay parents and their children provide no warrant for legal discrimination against these families.

  8. Using Controversial Mock Trials in "Psychology and Law" Courses: Suggestions from Participants.

    Science.gov (United States)

    Werth, James L., Jr.; Harvey, James; McNamara, Rebecca; Svoboda, Andrea; Gulbrandson, Raina; Hendren, Jennifer; Greedy, Tiffany; Leybold, Christie

    2002-01-01

    Describes a mock trial focused on Jack Kevorkian and an euthanasia case that was included in a psychology and law course. Discusses the course format, provides the reactions to the mock trial by students and consultants, and includes suggestions for improving the mock trial. (CMK)

  9. Psychological-Educational Research of Professionally Essential Characteristics of Law Students’ Personalities, Studying at Bachelor Level

    Directory of Open Access Journals (Sweden)

    Valentina A. Polyanskaya

    2012-02-01

    Full Text Available The article considers the results of psychological-educational research, implemented in teaching process of law students’, studying at bachelor level. Special attention is attached to self-determination of future lawyers in professional specialization during introduction training

  10. [Assessment of psychological conditions for the use of firearms in law enforcement].

    Science.gov (United States)

    Vilardell Molas, Jordi; Martí Agustí, Gabriel; Solé i Sanosa, M Angels

    2014-03-01

    To handle firearms safely, an individual needs to be in sound psychological conditions. This point is especially relevant in law enforcement, given that this group is likely to experience situations where there is a reasonably severe risk to life, physical integrity and that of third parties. These conditions cause high levels of stress and become a significant source of psychological strain. The assessment of these psychological conditions in law enforcement must stay ahead of this strain and should act preventively, establishing surveillance that is the product of a consensus between the needs of professionals and organizations. This evaluation should be conducted by technical specialists who understand and know the occupational reality of these professionals. A good assessment methodology starts with the need to discover the basic areas that need exploring, the ideal procedure for assessing these issues and the criteria that determine the aptitude (or lack thereof) for handling firearms. Once these goals have been established, we can be assured that the assessment will follow a set of principles that will give it homogeneity, effectiveness and efficiency. This type of assessment will help accomplish the mission that these security professionals are entrusted to by law, which is to protect the free exercise of rights and freedoms and ensure citizen safety. Copyright © 2014 Elsevier España, S.L. All rights reserved.

  11. Intentional activity and free will as core concepts in criminal law and psychology

    DEFF Research Database (Denmark)

    Bertelsen, Preben

    2012-01-01

    Whether or not intentional actions initiated and formed by free will exist, it can be shown that lack of belief in such behavior makes people behave less ethically and less law-abidingly (they cheat more). Therefore, this phenomenon—often called a necessary illusion—is crucial to moral as well as...... model within the domain of criminal law and psychology explaining human intentional actions based on a scientific notion of free will as a real-world phenomenon.......Whether or not intentional actions initiated and formed by free will exist, it can be shown that lack of belief in such behavior makes people behave less ethically and less law-abidingly (they cheat more). Therefore, this phenomenon—often called a necessary illusion—is crucial to moral as well...

  12. Air Power in Irregular Warfare

    Science.gov (United States)

    2012-12-01

    Intelligence, Surveillance, and Reconnaisance IW Irregular Warfare JFC Joint Force Commander JP Joint Publication xii MCP Malayan Communist Party...being or acting in accord with laws , rules, or established custom.”5 Combined with the Clausewitzian definition of war as “an act of violence meant...Quarterly and Defence Journal , October, 1920), accessed March 21, 2012, http://usacac.army.mil/cac2/cgsc/carl/download/csipubs/lawrence.pdf, 17. 22 Bruce

  13. Teaching Independent Learning Skills in the First Year: A Positive Psychology Strategy for Promoting Law Student Well-Being

    Science.gov (United States)

    Field, Rachael; Duffy, James; Huggins, Anna

    2015-01-01

    Empirical evidence in Australia and overseas has established that in many university disciplines, students begin to experience elevated levels of psychological distress in their first year of study. There is now a considerable body of empirical data that establishes that this is a significant problem for law students. Psychological distress may…

  14. Biological warfare agents.

    Science.gov (United States)

    Pohanka, Miroslav; Kuca, Kamil

    2010-01-01

    Biological warfare agents are a group of pathogens and toxins of biological origin that can be potentially misused for military or criminal purposes. The present review attempts to summarize necessary knowledge about biological warfare agents. The historical aspects, examples of applications of these agents such as anthrax letters, biological weapons impact, a summary of biological warfare agents and epidemiology of infections are described. The last section tries to estimate future trends in research on biological warfare agents.

  15. On the Training of Commanders' Psychological Quality under the Conditions of Information Warfare%信息化战争条件下指挥员良好心理素质培养探析

    Institute of Scientific and Technical Information of China (English)

    孙建祥

    2011-01-01

    It is an urgent need to strengthen the training of commanders' good psychological quality to win the future information warfare. In order to achieve this, we should not only grasp the connotation of the development of commanders' good psychological quality, but also make strict psychological selection, practice extensive psychological education of the involved personnel, carry out a wide range of psychological training and establish corresponding sound and perfect support system.%加强指挥员良好心理素质的培养是打赢未来信息化战争的迫切需要。着眼培养指挥员良好的心理素质,我们不仅要科学把握其良好心理素质培养的主要内涵,还要对预提对象进行认真的心理选拔和广泛的心理教育,并开展多方面的心理训练和建立健全完善的训练支持系统。

  16. Emotional evidence and jurors' judgments: the promise of neuroscience for informing psychology and law.

    Science.gov (United States)

    Salerno, Jessica M; Bottoms, Bette L

    2009-01-01

    This article is a review of psychological and neuroscience research addressing how juror decision making is influenced by emotion elicited from potentially disturbing evidence such as gruesome autopsy photographs, victim impact statements, and information about a defendant's tragic personal history presented as mitigating evidence. We review (a) converging evidence suggesting that the presence versus absence of such evidence results in more punitive juror judgments, (b) social cognition theories that provide potential explanations for these effects, and (c) neuroscience research aimed at understanding the role of emotion in moral judgments by identifying how brain activity is affected by emotion-eliciting stimuli. We argue that neuroimaging evidence showing that emotional stimuli cause heightened emotion and decreased effortful cognitive processing is relevant in understanding jurors' increased punitiveness after being exposed to emotional evidence, and in turn relevant to debates about the admissibility of emotional evidence in courts of law. Ultimately, we argue for more ecologically valid psychological research to clarify these important issues.

  17. INFORMATION-PSYCHOLOGICAL IMPACT OF INTERNATIONAL LAW SUBJECTS AS A THREAT TO RUSSIAN NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    V. V. Sobolnikov

    2016-01-01

    Full Text Available The article is devoted to research of informationpsychological impact of a subject of international law on the population of Russia. As the basis of the study put the US and NATO in order to optimize the system of psychological protection. Based on the analysis of the Anglo-Saxon version information press highlighted the conceptual background exposure. Important is the implementation of the doctrine of "soft power" and effectiveness of the mechanisms of psychological influence. The analysis of individual research projects at a granular level allows you to unlock the potential of destructive psychological impact on the population of Russia and to identify trends. Special attention is paid to the susceptibility of Russians influence over the Internet that, according to the author, leads to a probabilistic transformation of thinking and directional behavior. The process of constructing the virtual environment impact from its components: the tab-level response, providing spatial temporal resolution in contact, etc. Programming an effective communication network is based on the fact that the thinking of modern man more quickly and adaptive, and thought processes are single-line and limited. At the same time lays the possibility of the sense of presence in a virtual environment, the initiation of metacognitive processes responsible for adaptation to cognitive context information. The directions of further research is focused.

  18. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  19. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  20. Running to well-being: A comparative study on the impact of exercise on the physical and mental health of law and psychology students.

    Science.gov (United States)

    Skead, Natalie K; Rogers, Shane L

    Research indicates that, in comparison to other university students, law students are at greater risk of experiencing high levels of psychological distress. There is also a large body of literature supporting a general negative association between exercise and stress, anxiety and depression. However, we are not aware of any studies exploring the impact of exercise on the mental health of law students specifically. This article reports evidence of a negative association between exercise and psychological distress in 206 law and psychology students. Compared to psychology students, the law students not only reported greater psychological distress, but, in addition, there was a stronger association between their levels of distress and their levels of exercise. Based on the results of this study, we suggest a simple yet effective way law schools might support the mental health of their students.

  1. Interdisciplinary Psychology and Law Training in Family and Child Mediation: An Empirical Study of the Effects on Law Student Mediators

    Science.gov (United States)

    Holtzworth-Munroe, Amy; Applegate, Amy G.; Rudd Brittany N.; Freeman, Ann; D'Onofrio, Brian

    2013-01-01

    There is growing interest in interdisciplinary training programs for law students. The goal of these programs is to prepare law students for the real world interdisciplinary settings they will face in their careers. However, there exists little research to provide evidence of the utility of such training. This study examined the effectiveness of…

  2. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  3. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  4. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  5. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  6. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  7. From undocumented to lawfully present: Do changes to legal status impact psychological wellbeing among latino immigrant young adults?

    Science.gov (United States)

    Patler, Caitlin; Laster Pirtle, Whitney

    2017-03-09

    Exclusionary immigration policies, as a form of structural racism, have led to a sizeable undocumented population that is largely barred from access to resources in the United States. Existing research suggests that undocumented immigration status detrimentally impacts mobility, yet few studies have tested the impacts of legal status on psychological wellbeing. Most importantly, we know little about how changes to legal status impact wellbeing. Announced in 2012, the Deferred Action for Childhood Arrivals (DACA) program allows eligible undocumented youth to apply for temporary lawful status. Drawing on cross-sectional survey data from 487 Latino immigrant young adults in California collected in 2014 and 2015, we analyze the predictors of three specialized outcomes related to immigrants' psychological wellbeing-distress, negative emotions, and deportation worry before and after a transition from undocumented to lawfully present status. Results show that retrospective reports of past psychological wellness, when all respondents were undocumented, are predicted primarily by socioeconomic status. However, reports of current psychological wellness are predicted by DACA status. Our results demonstrate, for the first time, the positive emotional consequences of transitioning out of undocumented status for immigrant young adults. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. The Impact of Psychological Science on Policing in the United States: Procedural Justice, Legitimacy, and Effective Law Enforcement.

    Science.gov (United States)

    Tyler, Tom R; Goff, Phillip Atiba; MacCoun, Robert J

    2015-12-01

    The May 2015 release of the report of the President's Task Force on 21st Century Policing highlighted a fundamental change in the issues dominating discussions about policing in America. That change has moved discussions away from a focus on what is legal or effective in crime control and toward a concern for how the actions of the police influence public trust and confidence in the police. This shift in discourse has been motivated by two factors-first, the recognition by public officials that increases in the professionalism of the police and dramatic declines in the rate of crime have not led to increases in police legitimacy, and second, greater awareness of the limits of the dominant coercive model of policing and of the benefits of an alternative and more consensual model based on public trust and confidence in the police and legal system. Psychological research has played an important role in legitimating this change in the way policymakers think about policing by demonstrating that perceived legitimacy shapes a set of law-related behaviors as well as or better than concerns about the risk of punishment. Those behaviors include compliance with the law and cooperation with legal authorities. These findings demonstrate that legal authorities gain by a focus on legitimacy. Psychological research has further contributed by articulating and demonstrating empirical support for a central role of procedural justice in shaping legitimacy, providing legal authorities with a clear road map of strategies for creating and maintaining public trust. Given evidence of the benefits of legitimacy and a set of guidelines concerning its antecedents, policymakers have increasingly focused on the question of public trust when considering issues in policing. The acceptance of a legitimacy-based consensual model of police authority building on theories and research studies originating within psychology illustrates how psychology can contribute to the development of evidence

  9. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available to cyber warfare. This article aims to provide evidence towards the probability of predicting and mapping traditional warfare measurements to the cyber warfare domain. Currently the only way of cyber warfare measurement is located in traditional information...

  10. Occupational, social, and relationship hazards and psychological distress among low-income workers: implications of the 'inverse hazard law'.

    Science.gov (United States)

    Krieger, Nancy; Kaddour, Afamia; Koenen, Karestan; Kosheleva, Anna; Chen, Jarvis T; Waterman, Pamela D; Barbeau, Elizabeth M

    2011-03-01

    Few studies have simultaneously included exposure information on occupational hazards, relationship hazards (eg, intimate partner violence) and social hazards (eg, poverty and racial discrimination), especially among low-income multiracial/ethnic populations. A cross-sectional study (2003-2004) of 1202 workers employed at 14 worksites in the greater Boston area of Massachusetts investigated the independent and joint association of occupational, social and relationship hazards with psychological distress (K6 scale). Among this low-income cohort (45% were below the US poverty line), exposure to occupational, social and relationship hazards, per the 'inverse hazard law,' was high: 82% exposed to at least one occupational hazard, 79% to at least one social hazard, and 32% of men and 34% of women, respectively, stated they had been the perpetrator or target of intimate partner violence (IPV). Fully 15.4% had clinically significant psychological distress scores (K6 score ≥ 13). All three types of hazards, and also poverty, were independently associated with increased risk of psychological distress. In models including all three hazards, however, significant associations with psychological distress occurred among men and women for workplace abuse and high exposure to racial discrimination only; among men, for IPV; and among women, for high exposure to occupational hazards, poverty and smoking. Reckoning with the joint and embodied reality of diverse types of hazards involving how people live and work is necessary for understanding determinants of health status.

  11. ["Psychologic marital unfitness" in cyclothymia? A case report on the topic of the annullment procedure in canon law].

    Science.gov (United States)

    Thiel, A; Hilken, S

    1993-09-01

    According to the Canon Law (CIC) of the catholic church a marriage can be annulled because of psychological inability under certain conditions. We present the case report of a married woman, who fell ill with cyclothymia after her first childbirth. Her marriage was annulled under canon 1095 (n.3 CIC) because of psychological inability to fulfill martial obligations. The authors believe that this represents a clear cut case of discrimination against patients with mental disorders: on the one hand the catholic church claims that every martial bond is principally indissoluble; on the other hand they do not eschew invalidating a marriage due to an affective psychosis. This poses special problems which are also discussed.

  12. Ethical Considerations of Computer Network Attack in Information Warfare

    Science.gov (United States)

    2001-01-16

    attack/destruction, and special information operations (SIO). CNA and the other methods of offensive IO represent the incorporation of information...psychological operations, electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network...to computer networks to record information sent over them. 41 special information operations. Information operations that by their sensitive nature

  13. Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Dev Vrat Kamboj

    2006-10-01

    Full Text Available There is a long historic record of use of biological warfare (BW agents by warring countriesagainst their enemies. However, the frequency of their use has increased since the beginningof the twentieth century. World war I witnessed the use of anthrax agent against human beingsand animals by Germans, followed by large-scale field trials by Japanese against war prisonersand Chinese population during world war II. Ironically, research and development in biologicalwarfare agents increased tremendously after the Geneva Protocol, signed in 1925, because ofits drawbacks which were overcome by Biological and Toxin Weapons Convention (BTWC in1972. Biological warfare programme took back seat after the 1972 convention but biologicalagents regained their importance after the bioterrorist attacks of anthrax powder in 2001. In thelight of these attacks, many of which turned out to be hoax, general awareness is required aboutbiological warfare agents that can be used against them. This review has been written highlightingimportant biological warfare agents, diseases caused by them, possible therapies and otherprotection measures.

  14. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  15. FOA Information from the Research Institute of Swedish National Defence on Electronic Warfare (FOA Orientar om Electronic Warfare),

    Science.gov (United States)

    1967-01-01

    modified. If it is appears as if the psychological It is hardly likely. however. known that the opponent has a warfare element involved there- that the most...34 . -roadeatla - ".-Rhdar Raa -* * - cldignsl Toi~loieey aft u comunication , ntavigation -ctionl Examples of applications Radar bands FroquaP" UMI 0.1

  16. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military...comprehension (also explicitly included in Figure 3). The entire spectrum of deception, psychological operations, and all means to impact human-centered...with the same input data (other than ground truth) via different channels and that data must be consistent within itself. The belief in empiricism to

  17. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    social, military, information, and diplomatic means. Russian information operations are a critical component of their hybrid theory of warfare and...in which NATO discontinues encroaching on Russia’s sphere of influence and in which Russia ascends to regional hegemony .2 Although unsuccessful, this...Russian model of hybrid warfare illuminates several critical innovations to warfare that transpired while the United States was committed to operations

  18. Analysis of the psychometric characteristics of the experimental psychological methods for examination of the law enforcement officers

    Directory of Open Access Journals (Sweden)

    Vitaliy Omelyanovich

    2016-09-01

    Full Text Available Background. As a number of local documents requires continuous improvement of psychodiagnostic work, one of the main activities of the Internal Affairs Agencies psychiatric service is an active clinical examination, the timely detection of law enforcement officers employees with neuropsychological instability, tendency to aggression and other forms of deviant behavior. Methods. The aim of the study was the selection of additional experimental psychological techniques to conduct psychological examinations of law enforcement officers.  As on objective of a study evaluation of reliability, validity and discriminative level of psychological tests has been chosen. The object of study was a group of the randomly selected representatives of almost all the major police professions, consisting of 348 respondents of the male gender in the age from 21 to 48 years old. Given the fact that the screening psychological evaluation of law enforcement officers during periodic psychiatric examinations is usually carried out under time constraints and the urgency to form an opinion immediately after the end of testing, nonprojective psychological techniques have been chosen for testing. These techniques, according to the scientific literature, proved their effectiveness and, in addition, are characterized by a small volume of questions and simplicity (largely - the dichotomous scales. Moreover, it does not require a lot of time to handle them: a methodology «Aggressive behavior» (E. P Ilyin, P. O. Kovalev, 2001, the test «Аnxiety-Rigidity- Extravertebral» (D. Moudsli, 2002, the test «IPC-Fragebogen» (H. Levenson, 1986, the test is «MS PTSD» (NM Keane, 2001. Results. Tests reliability was investigated by determining the consistency of their results by calculating the L. Cronbach’s coefficient α and Guttman method of splitting in half; discriminative level was determined by calculating the ratio; construct validity was investigated by the exploratory

  19. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  20. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  1. Electronic Warfare in Operations

    Science.gov (United States)

    2009-02-25

    through gamma radiation (at the short-wavelength end). It covers wavelengths from thousands of kilometers to a fraction of the size of an atom...INFORMATION FUSION EXCHANGE F-13. The Knowledge and Information Fusion Exchange (sometimes called KnIFE ) is a program sponsored by U.S. Joint Forces...Warfare Analysis Center, 7-9 K–L–M Knowledge and Information Fusion Exchange ( KnIFE ), F-13 lasers, directed energy and, A-7 leadership (element

  2. Modern Maritime Trade Warfare

    Science.gov (United States)

    2013-05-20

    historically established method for conducting maritime trade warfare is Maritime Interdiction Operations ( MIO ). In the context of this paper, the...operating far from friendly shores. Accordingly, this tool would be most useful against nations with less capable navies. An advantage of MIO in...or collateral damage. 6 Large-scale MIO can be resource intensive and time consuming, and the U.S. Navy and Coast Guard have limited ships and

  3. A brief report on rape myth acceptance: differences between police officers, law students, and psychology students in the United Kingdom.

    Science.gov (United States)

    Sleath, Emma; Bull, Ray

    2015-01-01

    A common perception is that police officers hold very negative attitudes about rape victims. Therefore, the purpose of this article is to establish whether police officers do accept stereotypical rape myths at a higher level compared to members of other populations. There were 3 comparison samples, composed of police officers, law students, and psychology students, that completed the Illinois Rape Myth Acceptance scale. Male and female police officers accepted "she lied" myths at a higher level than the student samples. Student samples were found to accept 2 types of rape myths ("she asked for it" and "he didn't meant to") at a higher level compared to police officers. No significant differences were found in the other 4 subfactors. Therefore, the pattern of results suggests that police officers do not adhere to stereotypical myths about rape victims more than do other populations.

  4. Protecting young people from junk food advertising: implications of psychological research for First Amendment law.

    Science.gov (United States)

    Harris, Jennifer L; Graff, Samantha K

    2012-02-01

    In the United States, one third of children and adolescents are overweight or obese, yet food and beverage companies continue to target them with advertising for products that contribute to this obesity crisis. When government restrictions on such advertising are proposed, the constitutional commercial speech doctrine is often invoked as a barrier to action. We explore incongruities between the legal justifications for the commercial speech doctrine and the psychological research on how food advertising affects young people. A proper interpretation of the First Amendment should leave room for regulations to protect young people from advertising featuring calorie-dense, nutrient-poor foods and beverages.

  5. Psychology

    Science.gov (United States)

    Blackmore, Susan; Fouad, Nadya; Kagan, Jerome; Kosslyn, Stephen; Posner, Michael; Sternburg, Robert; Driscoll, Marcy; Ge, Xun; Parrish, Patrick

    2013-01-01

    Scholars representing the field of psychology were asked to identify what they considered to be the most exciting and imaginative work currently being done in their field, as well as how that work might change our understanding. The scholars included Susan Blackmore, Nadya Fouad, Jerome Kagan, Stephen Kosslyn, Michael Posner, and Robert Sternberg.…

  6. Psychology

    Science.gov (United States)

    Blackmore, Susan; Fouad, Nadya; Kagan, Jerome; Kosslyn, Stephen; Posner, Michael; Sternburg, Robert; Driscoll, Marcy; Ge, Xun; Parrish, Patrick

    2013-01-01

    Scholars representing the field of psychology were asked to identify what they considered to be the most exciting and imaginative work currently being done in their field, as well as how that work might change our understanding. The scholars included Susan Blackmore, Nadya Fouad, Jerome Kagan, Stephen Kosslyn, Michael Posner, and Robert Sternberg.…

  7. PSYCHOLOGICAL ASSESSMENT AND INTERNATIONAL LAW: CROSS-BORDER RELOCATIONS AND ABDUCTION OF CHILDREN

    Directory of Open Access Journals (Sweden)

    Carles Rodríguez Domínguez

    2015-01-01

    Full Text Available Globalisation has produced a new world order of profound socio-economic transformations that have caused dramatic changes, unprecedented in history, and together with the women's revolution they have introduced new challenges for the model of family and society. Divorce between spouses of different nationalities has significantly increased the number of international relocations of children - with or without abduction-, affecting both the judicial decision-making regarding the care and custody, as well as the forensic psychological evaluations. The objective of this article is to reflect upon the task of the expert forensic psychologist in cases of international transfers or child abduction that will help to deepen our understanding of these cases, for which it is necessary to understand the current legislative framework, among other issues.

  8. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    Science.gov (United States)

    2014-06-01

    Unlike landmines, for example, that litter historical battlefields to this day, cyber weapons offer a more hygienic approach to warfare. In...institutions have protected civilians from harm through established regulations and norms ranging from merchant shipping protection under the law of...targeted the Laconia, a merchant vessel, in 1942.80 Citizens engaged in cyber warfare, however, may be targeted with commensurate cyber weapons

  9. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  10. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  11. Airpower Support to Unconventional Warfare

    Science.gov (United States)

    2009-12-11

    supplies to isolated mountain outposts (Trest 2000, 109). The Helio Couriers operated out of small dirt strips, referred to as lima sites, usually... rosa : The O.S.S. and American espionage. New York: Reynal and Hitchcock. AF Special Operations Command white paper. 2007. USAF irregular warfare...Symposium on the role of airpower in counterinsurgency and unconventional warfare: A brief summary of viewpoints. Santa Monica, CA: The RAND

  12. Psychoanalytic principles as a heuristic framework to bridge the gap between psychology and the law in SVP evaluations: Assessing emotional and volitional impairment.

    Science.gov (United States)

    Simon, Eric P

    2015-01-01

    The legal concepts of emotional and volitional impairment in SVP evaluations are vague and ill-defined. This article reviews the legal terms of emotional and volitional impairment as they have been contemplated in extant SVP statutes, SVP case law, logical constructions, and limited empirical studies. To bridge the gap between psychiatry and the law, a broad, theory-based heuristic framework is furnished for understanding emotional and volitional impairment at a deep psychological (and intra-psychic) level. Specifically discussed are the concepts of transference, repetition compulsion, fixation, cathexis, regression, identification with the aggressor, and the object-relations and self-psychology concepts related to a loss of possession of the self. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  14. Can the square law be validated

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, D.S. III.

    1989-03-01

    This paper addresses the question of validating the homogeneous Lanchestrian square law of attrition by the use of historical data. The available data and some analysis techniques are examined. The result is that the homogeneous Lanchester square law cannot be regarded as a proven attrition algorithm for warfare; however, the square law cannot be regarded as disproved either. To validate the square law or any other proposed attrition law, data on more battles are required. 21 refs., 31 figs., 11 tabs.

  15. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  16. Technological, military and social causes for the application of cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-01-01

    Full Text Available Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare. For the purpose of clear understanding of the nature of cyber warfare, this paper covers the basic groups of preconditions for its broad application and fast development from technological, military and social aspects. Understanding the true nature of cyber warfare is a necessary condition for building national capacities for its application that are military justified and harmonized with the international law. The paper explores the characteristic instances of cyber warfare, ranging from information propaganda to physical destruction, with the goal to determine guidelines for the possible development of cyber capacities at the national level. Based on the analysis of previous cyber warfare cases, a prediction of future development directions is made and the necessity to apply suitable methods and techniques for defense against them is analyzed.

  17. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Ringsmose, Jens; Pedersen, Kenneth

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  18. Evolutionary Models of Irregular Warfare

    Science.gov (United States)

    2013-03-01

    G. (2010) Decentralize, adapt and cooperate. Nature 465:292-293. Sagarin, R. (2012) Learning From the Octopus : How Secrets from Nature Can Help Us...because the concepts map on to important features of modern irregular warfare. For example, small-scale behaviors are increasingly thought to

  19. 刑法公众认同的心理学展开%Psychological Expansion of Public Recognition of Criminal Law

    Institute of Scientific and Technical Information of China (English)

    马荣春; 焦译宁

    2016-01-01

    Public recognition of criminal law means that criminal practice ,including criminal legislation ,criminal justice and punishment execution , embodies common know ledge ,common sense and common feelings ,w hich are know n by the social public as to be accepted ,trusted and abided by universally . Principle of psychological resonance verifies the concept of public recognition of criminal law .Principle of three‐element reciprocation embodies the psychological structure of public recognition of criminal law .And theory of locus of control explains that public recognition of criminal law has important significance in enhancing individual recognition ability and behavior motivation ,and in improving individual emotional state ,w hich is useful to protect human rights and to keep social order .%刑法公众认同,是指刑法实践包括刑法立法、刑法司法乃至刑罚执行因内化和体现社会公众普遍认同的常识、常理和常情而被社会公众普遍认可、信赖与体行。心理学中的心理共振原理印证着刑法公众认同的概念,三元交互理论体现着刑法公众认同的心理结构,而心理控制源理论说明着刑法公众认同具有增强个体认知能力和行为动力、改善个体情感状态,从而有利于保障人权和稳定社会秩序的重要意义。

  20. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  1. Distress levels and self-reported treatment rates for medicine, law, psychology and mechanical engineering tertiary students: cross-sectional study.

    Science.gov (United States)

    Leahy, Catherine M; Peterson, Ray F; Wilson, Ian G; Newbury, Jonathan W; Tonkin, Anne L; Turnbull, Deborah

    2010-07-01

    The aim of this research was to assess tertiary student distress levels with regards to (i) comparisons with normative population data, and (ii) the effects of discipline, year level, and student characteristics. Self-reported treatment rates and level of concern regarding perceived distress were also collected. Students from all six years of an undergraduate medical course were compared with samples from Psychology, Law and Mechanical Engineering courses at the University of Adelaide, Australia. Students participated in one of three studies that were either web-based or paper-based. All studies included Kessler's Measure of Psychological Distress (K10), and questions pertaining to treatment for any mental health problems and concern regarding distress experienced. Of the 955 tertiary students who completed the K10, 48% were psychologically distressed (a K10 score > or = 22) which equated to a rate 4.4 times that of age-matched peers. The non-health disciplines were significantly more distressed than the health disciplines. Distress levels were statistically equivalent across all six years of the medical degree. Of tertiary students, 11% had been treated for a mental health problem. Levels of concern correlated with the K10 score. The results from this research suggest that high distress levels among the tertiary student body may be a phenomenon more widely spread than first thought. Low treatment rates suggest that traditional models of support may be inadequate or not appropriate for tertiary cohorts.

  2. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    concluded that the United States has a national policy gap in our own ability to wage “unconventional warfare in the gray zone.”3 That statement...advancing army—few have studied the irregular nature of the campaign waged against Napoleon. Napoleon’s overstretched logistics and the elusiveness of...94 Karl E. Meyer and Shareen Blair Brysac, Tournament of Shadows: The Great Game and the Race for Empire in Central Asia (Washington, DC: Basic

  3. Rethinking Cultural Influences on Warfare

    Science.gov (United States)

    2012-05-17

    militaries turn toward understanding culture as an important corrective action to naive ethnocentrism , but warns about the dangers of... Ethnocentrism (Holmes and Meier, 1979); Robert E. Harkavy and Stephanie G. Neuman, Warfare in the Third World (Palgrave, 2001); more recently, Mary...influence of ethnocentrism and the mirror imaging of our cultural values on to another culture with its own history. Scholars according to John Ferris

  4. Electronic warfare target location methods

    CERN Document Server

    Poisel, Richard

    2012-01-01

    Describing the mathematical development underlying current and classical methods of geolocating electronic systems that are emitting, this newly revised and greatly expanded edition of a classic Artech House book offers practical guidance in electronic warfare target location. The Second Edition features a wealth of additional material including new chapters on time delay estimation, direction finding techniques, and the MUSIC algorithm. This practical resource provides you with critical design information on geolocation algorithms, and establishes the fundamentals of existing algorithms as a

  5. Zipf's law, power laws and maximum entropy

    Science.gov (United States)

    Visser, Matt

    2013-04-01

    Zipf's law, and power laws in general, have attracted and continue to attract considerable attention in a wide variety of disciplines—from astronomy to demographics to software structure to economics to linguistics to zoology, and even warfare. A recent model of random group formation (RGF) attempts a general explanation of such phenomena based on Jaynes' notion of maximum entropy applied to a particular choice of cost function. In the present paper I argue that the specific cost function used in the RGF model is in fact unnecessarily complicated, and that power laws can be obtained in a much simpler way by applying maximum entropy ideas directly to the Shannon entropy subject only to a single constraint: that the average of the logarithm of the observable quantity is specified.

  6. Zipf's law, power laws, and maximum entropy

    CERN Document Server

    Visser, Matt

    2012-01-01

    Zipf's law, and power laws in general, have attracted and continue to attract considerable attention in a wide variety of disciplines - from astronomy to demographics to economics to linguistics to zoology, and even warfare. A recent model of random group formation [RGF] attempts a general explanation of such phenomena based on Jaynes' notion of maximum entropy applied to a particular choice of cost function. In the present article I argue that the cost function used in the RGF model is in fact unnecessarily complicated, and that power laws can be obtained in a much simpler way by applying maximum entropy ideas directly to the Shannon entropy subject only to a single constraint: that the average of the logarithm of the observable quantity is specified.

  7. The Art of Aerial Warfare

    Science.gov (United States)

    2005-03-01

    the  Strait  of  Gibraltar   from  North  Africa  during  the Spanish Civil War. 11 FAIRCHILD PAPER A Comparison of Aerial Warfare to Land... Hitler , for example, the United States cannot assume that Nazi aggression would have  evaporated  instantly. Although  Hitler himself profoundly affected

  8. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  9. The Enlightenment of Hayne Law on Psychological Crisis Administration Concerning College Students%“海恩法则”对大学生心理危机管理的启示

    Institute of Scientific and Technical Information of China (English)

    章成斌

    2011-01-01

    近年来,存在心理危机的大学生群体越来越大,给社会、家庭和学校造成一定压力,大学生心理健康问题正在被越来越多的人关注.“海恩法则”指出,任何不安全事故都是可以预防的,这对大学生心理危机管理以诸多启示:高度重视和建立大学生心理危机管理工作制度;建立大学生心理危机管理组织机构和心理危机干预队伍;完善高校大学生心理危机管理预案制度;构建大学生心理危机预警机制;心理危机干预走专业化道路;加强心理危机恢复管理.%In recent years, there is a psychological crisis, more and more college students to community, families and schools that caused some of the pressure. Their mental health problems are being attention by more and more people. The Hayne Law indicates that any insecurity accident can be prevented. This psychological crisis for a lot of inspiration which brings the following enlightenment of the law on psychological crisis administration concerning college students: take highly attention and establish psychological crisis administration system of college students;establish the troops of psychological crisis administration institution and intervening in psychological crisis; perfect pre - arranged planning system of psychological crisis administration for college students; construct early warning system of psychological crisis administration of college students; take the professional road of psychological crisis intervention; strengthen the restoring administration of psychological crisis.

  10. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  11. Grid architecture model of network centric warfare

    Institute of Scientific and Technical Information of China (English)

    Yan Tihua; Wang Baoshu

    2006-01-01

    NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward, which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer, based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.

  12. Learning the Law

    OpenAIRE

    Engel, Christoph

    2004-01-01

    Hardly any of the law's subjects know the text of the provisions that govern their conduct. Even less would they be able to handle this text properly, were they to get access to it. Nonetheless the law firmly believes that it is not feckless. This paper solves the puzzle by drawing on four bodies of knowledge: neurobiology, developmental psychology, the psychology of learning, and work form social scientists on learning.The paper makes the following claim: typically the law reaches its addres...

  13. Operationalizing and Measuring (a Kind of Free Will (and Responsibility. Towards a New Framework for Psychology, Ethics, and Law

    Directory of Open Access Journals (Sweden)

    Andrea Lavazza

    2015-04-01

    Full Text Available Free will is usually defined by three conditions: (1 the ability to do otherwise; (2 control of one’s own choices; (3 responsiveness to reasons. The compatibility of free will with determinism lies at the heart of the philosophical debate at the metaphysical level. This debate, while being increasingly refined, has not yet reached a conclusion. Recently, neuroscience and empirical psychology have tried to settle the problem of free will with a series of experiments that go in the direction of so-called illusionism: free will as the conscious control of our behavior cannot exist, being a mere illusion. But even in this case, the experimental results are challenged at various levels. Considering that in most moral and legal systems, the subject’s liability derives from their freedom, the usefulness of preserving the concept of freedom – which incidentally responds to a very strong commonsensical intuition – suggests the need for an operational solution. This could be done by resorting to the concepts of capacity and cognitive control, which are measured by a set of well-established neuropsychological tests. Our preliminary proposal is to create an index, the first step towards a specific quantification and measurement of free will, to be used especially in ethical and legal contexts. Theoretical premises, practical difficulties and objections to this approach are also discussed and addressed.

  14. A Taxonomy of Network Centric Warfare Architectures

    Science.gov (United States)

    2008-01-01

    Distributed Database Theory, an area of Computer Science that has studied information flow in networks extensively ( Ceri & Pelagatti 1984, Mullender 1993...Australian Department of Defence, 2003, Australian Defence Force Network Centric Warfare Roadmap (First Draft), September. Ceri , S. & Pelagatti

  15. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  16. A Dialectic for Network Centric Warfare

    Science.gov (United States)

    2005-06-01

    Giffin, 2003; Borgu , 2003; Kaufman, 2004). For example, from a standpoint of Popperian methodological falsificationism (Popper, 1934), Reid and...focused term network-centric warfare has common favor ( Borgu , 2003) despite the organisational decree to use the term ‘network centric warfare...Commonwealth Department of Defence, June. Borgu , A., (2003), “The Challenges and Limitations of Network Centric Warfare”, Presented at NCW: Improving ADF

  17. Finding Lawrence recruiting talent for unconventional warfare

    OpenAIRE

    Mourouzis, Michael G.

    2011-01-01

    Approved for public release; distribution is unlimited. From Francis Marion's guerrilla war against the British to advising the resistance against the Nazis and Japanese, the United States has depended on unconventional warfare (UW) as a component of national defense. Today, the U.S. Army Special Forces (SF) is the premiere unconventional warfare unit in the U.S. military. With a smaller Army and increasing missions, SF must expand its recruiting efforts. This thesis analyzes the recruitme...

  18. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    defense ( CND ).”7 Thus cyber warfare is distinguished from cyber criminal acts based upon its coercive nature to attain a strategic end, whereas...CNA and CND . Conceptually, CNA effects “range from disrupting the adversary’s electronic systems and what operations they enable (communications...or self-destruct.”10 The second component of cyber warfare seeks to eliminate or minimize the risk of the first. The role of CND is to defend

  19. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available , Analysis, Development and Maintenance [6] [12] [13]. Furthermore, Baker and Harris also discuss techniques like Intrusion Prevention, Personnel Security and Security Awareness as part of information security [14] [12]. Moreover, when considering... techniques that are core to information security and to Network Warfare were thus identified. The following summary of the techniques found in Network Warfare is given: Risk Analysis, Intrusion Prevention, Physical Security, Personnel Security, Cyber...

  20. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    also McCulloh and Johnson who demonstrate throughout their study that context is critical . Indeed, their summary statement for “hybrid warfare theory ...Muhr, eds., Hybrid and Cyber War as Consequences of the Asymmetry, Frankfurt : Peter Lang, 2011, p.95. Interestingly, the CFD Hybrid Warfare Concept...the highest political and military levels. The study of hybrid-type case studies yields the critical lesson that: “leadership is essential to victory

  1. Intrafamily and intragenomic conflicts in human warfare

    Science.gov (United States)

    2017-01-01

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression—i.e. ‘genomic imprinting’—in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. PMID:28228515

  2. Landmine Warfare in Support of Multi-domain Battle: Balancing Discrimination and Military Effectiveness

    Science.gov (United States)

    2017-05-25

    military personnel, obstruct economic development and reconstruction following a conflict, inhibit the repatriation of refugees and internally displaced...Basing themselves on the principle of international law that the right of the parties to an armed conflict to choose methods or means of warfare is...Conflict in the Gulf (London: Atlantic Books, 2006), 120-21. 30 Human Rights Watch, “Back in Business? US Landmine Production and Exports,” briefing

  3. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available aspects to its network enabled capabilities and functionality (network warfare). Various computer and information security practices form part of network warfare techniques. Whilst various information and security practices are well-known and applied...

  4. Hybrid Warfare: A Military Revolution or Revolution in Military Affairs?

    Science.gov (United States)

    2012-12-14

    warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of Military...irregular warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of...understand new concepts. Douglas C Lovelace. Director Strategic Studies Institute has this insight to offer regarding the importance of

  5. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available to prevent misconceptions, as well as to ensure that the necessary input data is incorporated. They include the following: • The involved parties must grasp the difference between auditing and determining a Network Warfare Capability. It is encouraged... to incorporate the use of auditing in the technique set underlying Network Warfare. • To determine a Network Warfare Capability, assessments of the various techniques that contribute to Network Warfare are necessary. This will incorporate expert opinion...

  6. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks.

  7. [The history of biological warfare].

    Science.gov (United States)

    Cohen, Amir; Robenshtok, Eyal; Rotman, Eran; Sagi, Rami

    2002-05-01

    Selected events in the history of biological weapons are highlighted to increase the physician's awareness of this crucial threat. The deliberate use of biological substances originated in antiquity and has pervaded the history of human wars throughout time until the 21th century. The history of biological warfare is difficult to assess because of a number of confounding factors. These include the difficulty in verification of allegation, the use of the threat of this weapon for propaganda purposes, the lack of microbiological or epidemiological data, and the incidence of natural occurring endemic or epidemic diseases during hostilities. Although it may be problematic to verify at times, the use of such weapons has not been limited to national armies or militia. Frustrated civilians, terrorists and even physicians have used biological substances to promote their interests. Today, the biological threat has become more serious. It's potency, cost-effectiveness, and the ability to manufacture and deploy it with little sophistication, or under the semblance of legitimate commercial endeavors, will ensure that biological weapons remain a constant threat to human health.

  8. [Impact of the women's press on the attitudes of readers toward ultraviolet radiation--a survey of law and psychology students].

    Science.gov (United States)

    Gałajda, Karolina; Kamińska-Winciorek, Grazyna; Spiewak, Radosław

    2013-08-01

    Excessive exposure to ultraviolet radiation (UVA and UVB) leads to negative consequences including sunburn, carcinogenesis and photoaging. Therefore, educational campaigns promoting safe tanning and sunscreens are necessary. Helpful with this regard might be mass media including women's magazines, which for young people are important source of information on health, beauty and lifestyle. The aim of the study was to examine the influence of women's press in the attitude of non-medical students toward ultraviolet radiation (UV) as well as to analyse articles about tanning and skin protection against UV rays in selected magazines for women. The study group consisted of 68 psychology students and 60 law students (n = 128). An original author's questionnaire was used in this research, including 22 questions regarding frequency of reading articles about sunbathing, and the impact of women's press on the respondents' attitude toward suntanning. In the second part of the study 13 articles were examined from magazines "Twój Styl", "ELLE", "PANI" (years 2007-2011), which contained keywords "sun", "tanning bed", "tanning", "UV radiation". Selected articles were assessed whether they were encouraging to, or discouraging from sunbathing. A majority (63%) of respondents declared that after reading the article in women's magazines, they began to apply a sunscreen with higher SPF rate than before. Moreover, 57% refrained from using tanbeds, and 48% began to regularly check melanocytic naevi and monitor their skin after sun exposures. The analysis of the articles showed that majority of articles discouraged from the sunbathing (11 articles discouraging versus and 2 encouraging). Women's press in Poland generally promotes women's rational behavior against UV radiation and tanning.

  9. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  10. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo...

  11. Agricultural Warfare and Bioterrorism using Invasive Species

    Science.gov (United States)

    The chapter on Agricultural Warfare and Bioterrorism using Invasive Species is part of the book titled Pest Management and Phytosanitary Trade Barriers authored by Neil Heather (Australia) and Guy Hallman. The chapter attempts to briefly put the topic into context with phytosanitation. It presents...

  12. Information Warfare Arms Control: Risks and Costs

    Science.gov (United States)

    2006-03-01

    legal system and the modern concept of arms control were able to provide for national and international collective security during the Cold War...information warfare presents many challenges that question their viability. The most significant challenges are to the international legal system , which

  13. 浅谈《精神卫生法》对高校心理咨询中心工作影响%Discussion on Influence of Mental Health Law on the Psychological Counseling Center in University

    Institute of Scientific and Technical Information of China (English)

    郑亚楠; 龚茜

    2014-01-01

    In order to investigate the influence of Mental Health Law on the work of psychological counseling center in university , the actual situation in the psychological counseling center in university and base on the literature research , this text discusses from positive and negative aspects and puts forward the countermeasures, to provide a basis for carrying out the mental health education of uollege students. And the psychological counseling center in university should adjust the work according to Mental Health Law.%为探讨《精神卫生法》的实施对高校心理咨询中心工作开展带来的影响,通过文献研究并根据高校心理咨询中心工作的实际情况,从积极和消极两个方面进行相应的讨论并提出对策,旨在为未来高校心理健康工作改革提供参考意见。同时,高校心理咨询中心应根据《精神卫生法》调整工作重心。

  14. Psychology in Japan.

    Science.gov (United States)

    Imada, Hiroshi; Tanaka-Matsumi, Junko

    2016-06-01

    The purpose of this article is to provide information about Japan and its psychology in advance of the 31st International Congress of Psychology (ICP), to be held in Yokohama, Japan, in 2016. The article begins with the introduction of the Japanese Psychological Association (JPA), the hosting organization of the ICP 2016, and the Japanese Union of Psychological Associations consisting of 51 associations/societies, of which the JPA is a member. This is followed by a brief description of a history of psychology of Japan, with emphasis on the variation in our approach to psychology in three different periods, that is, the pre- and post-Pacific War periods, and the post-1960 period. Next, the international contributions of Japanese psychology/psychologists are discussed from the point of view of their visibility. Education and training in psychology in Japanese universities is discussed with a final positive remark about the long-awaited enactment of the Accredited Psychologist Law in September, 2015.

  15. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    Science.gov (United States)

    2000-06-01

    brigadier general and publish several more noted works on Mao and revolutionary warfare. See Samuel B. Giffith, Mao Tse-Tung on Guerrilla Warfare (New...and propagators of the faith. The bibles (in English translation) are Mao Tse-tung on Guerrilla Warfare by Brigadier General Samuel B. Griffith...Barnett, B. Hugh Tovar , and Richard H. Schultz eds., Special Operations in US Strategy (Washington, D.C.: US Government Printing Office, 1984), 2. 58

  16. An Irony of War: Human Development as Warfare in Afghanistan (Colloquium, Volume 3, Number 3, October 2010)

    Science.gov (United States)

    2010-10-01

    other type of warfare, do not associate human development with counterinsurgency (COIN). In fact, " Human development " is not a standard term in the...34 Human development is a process of enlarging people’s choices. The most critical of these wide-ranging choices are to live a long and healthy life, to...public administration, health system, communications, education, and, sometimes, the rule of law and security, they are trying to build human

  17. Irregular Warfare Stability Model (IWSMod)

    Science.gov (United States)

    2014-01-01

    soldiers killed by the time the conflict was ended. In the graphs in Figure 3 above, the blue columns show the actual killed in action ( KIA ) frequency...The left graph is for fiscal year (FY) 1951. The red line is the generalized power law equation based on the total KIAs . There were 9,427 KIAs in FY...the graph shows that the actual KIA distribution depicted in the blue columns is very close to the generalized distribution shown in the red line

  18. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  19. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  20. Violence and Warfare in Precontact Melanesia

    Directory of Open Access Journals (Sweden)

    Stephen M. Younger

    2014-01-01

    Full Text Available Levels of interpersonal violence and warfare for 30 Melanesian societies at the time of contact with Europeans are estimated based on ethnographic and historical records. While violence was common in indigenous Melanesia, it was not ubiquitous and some societies experienced extended periods of internal and external peace. Interpersonal violence and warfare were correlated-when one occurred there was a high probability of finding the other. Violence was not dependent on total population. It was, however, higher for population density greater than 50 persons per square kilometer. Violence in Melanesia may have been stimulated by the large number of relatively small polities, many of which competed with one another for prestige and, in some cases, land.

  1. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  2. New concepts and their applications in underwater acoustic warfare simulation system

    Institute of Scientific and Technical Information of China (English)

    DONG Yangze; YAO Lan

    2004-01-01

    An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective.

  3. New dimensions of the modern warfare

    Directory of Open Access Journals (Sweden)

    CĂLIN HENTEA

    2008-02-01

    Full Text Available The huge scientific and technologic progress made by mankind during the last century has had an obvious impact on the military phenomenon. It is a common place to say that the present day wars do not look like the previous ones at all. The military are not the same as the one in former days either, whatever their national insignia on various uniforms. Hence, some questions require a clear and imperative answer. How has the contemporary war been changed? How has the 21 Century military prophile evolved? Which is the trigger of all these changes? What are the new concepts of the modern warfare? To all those questions we are trying to get an answer based on our personal experience gained during a couple of NATO missions and on the respective military doctrines and policies. Why both the military and the politicians are trying to avoid the term „war" by placing instead the much more innofensive syntagm of „military operations" and what are the main characteristics of the 3rd Millenium officer? These are some of the topics of this essay. Quite new military concepts experimented by the most powefull armed forces of the world, such as Effect Based Operations Approach, Network Based Warfare, Information Operations and Psychologiocal Operations will be also examined as pillars of the modern warfare.

  4. Comprehensive Soldier Fitness and the Future of Psychology

    Science.gov (United States)

    Seligman, Martin E. P.; Fowler, Raymond D.

    2011-01-01

    Psychology responded to the national needs in World War I and World War II and was itself transformed. National need calls a third time: unprecedented levels of posttraumatic stress disorder, depression, suicide, and anxiety along with a need for a resilient Army capable of meeting the persistent warfare of the foreseeable future. As a large part…

  5. Adoção de crianças por casais homoafetivos: um estudo comparativo entre universitários de Direito e de Psicologia Children adoption by homosexual couples: a comparative study between law and psychology students

    Directory of Open Access Journals (Sweden)

    Ludgleydson Fernandes de Araújo

    2007-08-01

    Full Text Available Esta pesquisa objetivou analisar e comparar as Representações Sociais (RS de estudantes em fase final do curso de psicologia e de direito acerca da adoção de crianças por casais homossexuais. Para tanto a amostra foi não-probabilística e intencional constituída de 104 universitários, de ambos os sexos (56% feminino e 44% masculino, sendo 51 concluintes do curso de Direito e 53 concluintes do curso de Psicologia. Utilizaram-se questionários com perguntas fechadas. Posteriormente foi categorizada pela análise de conteúdo temática de Bardin (1977/2000. Perceberam-se posicionamentos contrários dos universitários acerca da adoção de crianças por casais homossexuais. No que diz respeito às conseqüências para a criança emergiram conteúdos tais como: influência na orientação sexual, preconceito e ausência de referencial materno/paterno. Os universitários de Psicologia mencionaram que tal fato poderia desenvolver distúrbios psicológicos, ao passo que os universitários de Direito ancoraram suas RS nos problemas morais. Evidenciou-se a necessidade do fomento de mecanismos psicossociais e jurídicos que contribuam na elucidação desta temática complexa e dinâmica na sociedade contemporânea.The objective of this research was to analyze and to compare the Social Representations of last year's undergraduate law and psychology students regarding the adoption of children by homosexual couples. For this purpose, the sample was non-probabilistic and intentional and it was composed of 104 students of both genders (56% female and 44% male; 51 students were graduating in Law, and 53 were graduating in Psychology. Closed questioned questionnaires were used. The data was categorized by Bardin's (1977/2000 thematic content analysis. Contrary attitudes were perceived from the students regarding the adoption of children adoption by homosexual couples. Concerning the consequences to the child, contents such as influence on sexual

  6. nalysis of Psychological Barrierswith Which Students Study Concepts and Laws in Physics%物理概念与规律学习过程中的 心理障碍分析

    Institute of Scientific and Technical Information of China (English)

    徐硕

    2001-01-01

    运用教育学和心理学知识,从中学教育教学实际出发,就中学生在物理概念与规律学习过程中各种心理障碍的表现特征及其形成原因进行分析研究,并就不同知识和能力要求所应采取的教学策略,以及在中学物理教学中进一步加强对学生进行心理素质的培养提出了对策性建议。%Applying knowledge of pedagogy and psychology and based on educational and teaching situation in middle schools, this paper analyses the features of all kinds of psychological barriers with which middle school students learn physical concepts and laws. It also makes some suggestions on teaching tactics that must be adopted on request of different knowledge and capacity, and strengthening cultivation of student psychological quality during physics education in middle schools.

  7. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...

  8. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard, sa

  9. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and...to Counter Total Warfare Mentality Approved by: , Thesis Committee Chair LTC Sandra J. Sanchez, MBA , Member Marlyn R. Pierce...

  10. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    Science.gov (United States)

    2007-12-01

    Glenn, Russell, John Gordon, Tom Herbert, John Matsumura, Randall Steeb, and Paul Steinberg. Lightning Over Water: Sharpening America’s Light...conventional and unconventional warfare.” Special Warfare Journal, March-April (2007). Hersey , John. A Bell for Adano. New York: Vintage Books

  11. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    second evolutionary generation of warfare incorporating political, economic, social, and technical changes, and maneuver warfare. Much of this concept is...aligns itself with the emerging understanding of the world through nonlinear sciences, epistemological and ontological foundations.308 In this, Unified

  12. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    Options ‘Off the Table’ for US Response to Cyber Attacks,” Stars and Stripes, May 8, 2009. 34 Scott Shackelford , “From Nuclear War to Net War...whitepapers/warfare/redefining-role- information-warfare-chinese-strategy_896 (accessed February 18, 2012). Shackelford , Scott. “From Nuclear War to

  13. Combat Simulation Modeling in Naval Special Warfare Mission Planning.

    Science.gov (United States)

    1995-12-01

    This thesis explores the potential role of combat simulation modeling in the Naval Special Warfare mission planning cycle. It discusses methods for...at the tactical level. The thesis concludes by discussing additional applications of combat simulation modeling within the Naval Special Warfare community and makes recommendations for its effective and efficient implementation.

  14. Workplace trauma and the law.

    Science.gov (United States)

    Tehrani, Noreen

    2002-12-01

    The law places increasing responsibilities on organizations to protect its workforce from psychological injury. This paper looks at the development of British law relating to traumatic stress and explores a growing concern of clinicians that the law and the legal processes themselves may increase the psychological injury of victims of traumatic stress. The statutory requirement for organizations to provide effective support for employees following a traumatic incident is enshrined in law. However organizations are confused by the conflicting statements on the effectiveness of debriefing and trauma counselling.

  15. Business Law

    DEFF Research Database (Denmark)

    Föh, Kennet Fischer; Mandøe, Lene; Tinten, Bjarke

    Business Law is a translation of the 2nd edition of Erhvervsjura - videregående uddannelser. It is an educational textbook for the subject of business law. The textbook covers all important topic?s within business law such as the Legal System, Private International Law, Insolvency Law, Contract law......, Instruments of debt and other claims, Sale of Goods and real estate, Charges, mortgages and pledges, Guarantees, Credit agreements, Tort Law, Product liability and Insurance, Company law, Market law, Labour Law, Family Law and Law of Inheritance....

  16. Comprehensive Soldier Fitness and the future of psychology.

    Science.gov (United States)

    Seligman, Martin E P; Fowler, Raymond D

    2011-01-01

    Psychology responded to the national needs in World War I and World War II and was itself transformed. National need calls a third time: unprecedented levels of posttraumatic stress disorder, depression, suicide, and anxiety along with a need for a resilient Army capable of meeting the persistent warfare of the foreseeable future. As a large part of the Comprehensive Soldier Fitness program, positive psychology is meeting this need with new tests, with new fitness courses, and with resilience training. These developments may transform the practice of psychology and psychology's relation to medicine and education.

  17. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    Fukuyama , Francis . “At the ‘End of History’ Still Stands Democracy.” The Wall Street Journal, 6 June 2014. http://www.wsj.com/articles/at-the-end-of...warfare is cultural instead of political (in the traditional Clausewitzian sense). 15 Hoffman is referring to Francis Fukuyama’s idea of “the end of...history,” as argued in his 1989 essay and subsequent book. Fukuyama first published an essay titled “The End of History” in the National Interest in

  18. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  19. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  20. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  1. Business Law

    DEFF Research Database (Denmark)

    Föh, Kennet Fischer; Mandøe, Lene; Tinten, Bjarke

    Business Law is a translation of the 2nd edition of Erhvervsjura - videregående uddannelser. It is an educational textbook for the subject of business law. The textbook covers all important topic?s within business law such as the Legal System, Private International Law, Insolvency Law, Contract law...

  2. Environmental chemistry of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    MacNaughton, M.G.; Brewer, J.H.; Ledbetter-Ferrill, J. [Southwest Research Inst., San Antonio, TX (United States)

    1995-06-01

    This paper summarizes the approach used in the preparation of a Handbook for the Corps of Engineers, Huntsville Division, on the environmental chemistry of chemical warfare agents. The agents GB and HD will be used to illustrate the type of information in the report. Those readers interested in the full report should contact Mr. Arkie Fanning, Huntsville Corps of Engineers at (505) 955-5256. The U.S. Army Corps of Engineers (ACE) has identified approximately 7,200 formerly used defense sites (FUDS) in the United States, some of which are suspected to be contaminated with chemical warfare agents (CWA). The ACE has responsibility for environmental clean-up of FUDS, including site characterization, evaluation and remediation of the site. Thirty-four FUDS and 48 active DOD installations that may contain CWA were identified in an Interim Survey and Analysis Report by the USACMDA Program Manager for Non-Stockpile Chemical Material (NSCM). The chemical agents listed include sulfur mustard (H), lewisite (L), tabun (GA), sarin (GB), VX, hydrogen cyanide (AC), cyanogen chloride (CK), phosgene (CG), BZ, and CS.

  3. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  4. Helicopters in Irregular Warfare: Algeria, Vietnam, and Afghanistan

    Science.gov (United States)

    2013-06-13

    the political group associated with the Algerian nationalist independence movement GALAT Groupement d’ Aviation Légère de l’Armée de Terre ...unique from most conflicts because the expeditionary forces’ parent country rarely perceives an existential threat.19 The lack of perceived threat...dominance rarely guarantees success in irregular warfare.22 Instead, success in irregular warfare requires synergy between government and military efforts

  5. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    COVERED Capstone 4. TITLE AND SUBTITLE LITTORAL COMBAT SHIP OPEN OCEAN ANTI-SUBMARINE WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) 311-124O/Team LCS...Life cycle cost LCCE Life cycle cost estimate LCS Littoral combat ship LHA Landing ship, helicopter assault LHD Landing ship, helicopter...is unlimited LITTORAL COMBAT SHIP OPEN OCEAN ANTI- SUBMARINE WARFARE by Team LCS 311-124O June 2014 Capstone Advisors: John Green Dan

  6. Fourth Generation Warfare and Its Impact on the Army

    Science.gov (United States)

    2007-11-02

    In 1989, the authors of an article entitled, "The Changing Face of War: Into the Fourth Generation ," offered a glimpse of the future rooted in the...decline of the West in a world rife with cultural conflicts and the powerful influences of a form of cultural Marxism known as political correctness...were combining in America to create conditions for a new generation of warfare. Their vision included a form of warfare that bypassed the military

  7. The Chinese People’s Liberation Army and Information Warfare

    Science.gov (United States)

    2014-03-01

    information confrontation operations across the elec- tromagnetic spectrum. In doing so, as Dr. Wortzel’s monograph explains, the PLA used innovative means...and in- formation confrontation operations across the electro- magnetic spectrum. As this monograph explains, the PLA used innovative means to...information warfare concepts as a barometer of how the PLA approached the concept, by 2007 the threads of integrated network electronic warfare

  8. Depth vs. breadth: talent management for special warfare

    OpenAIRE

    Krebs, William K.

    2016-01-01

    Approved for public release; distribution is unlimited This thesis presents recommendations for improving officer talent management for Special Warfare units. Success in this complex human domain demands that key planners and commanders of a Special Warfare campaign operate with a long-term perspective, a depth of expertise, and a strong network of relationships. However, on any given day in a U.S. Army Special Forces Group, the preponderance of field grade officers are in their first year...

  9. Naval Special Warfare Injury Prevention and Human Performance Initiative

    Science.gov (United States)

    2012-06-30

    3. DATES COVERED (From - To) 01 JUL 10-30 JUN 12 4. TITLE AND SUBTITLE Naval Special Warfare Group 4 Injury Prevention and Human Performance...from suboptimal biomechanical, musculoskeletal, and physiological characteristics and is further compounded with poor or inadequate nutrition . The...Prescribed by ANSI Std. Z39.18 OFFICE OF NAVAL RESEARCH FINAL TECHNICAL REPORT Naval Special Warfare Injury Prevention and Human Performance

  10. Criminal Law

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Garde, Peter; Greve, Vagn

    <> book contains a thorough description of Danish substantive criminal law, criminal procedure and execution of sanctions. The book was originally published as a monograph in the International Encyclopaedia of Laws/Criminal Law....... book contains a thorough description of Danish substantive criminal law, criminal procedure and execution of sanctions. The book was originally published as a monograph in the International Encyclopaedia of Laws/Criminal Law....

  11. World law

    Directory of Open Access Journals (Sweden)

    Harold J. Berman

    1999-03-01

    Full Text Available In the third millennium of the Christian era, which is characterised by the emergence of a world economy and eventually a world society, the concept of world law is needed to embrace not only the traditional disciplines of public international law, and comparative law, but also the common underlying legal principles applicable in world trade, world finance, transnational transfer of technology and other fields of world economic law, as well as in such emerging fields as the protection of the world's environment and the protection of universal human rights. World law combines inter-state law with the common law of humanity and the customary law of various world communities.

  12. ADOPTION IN SHARI'A LAW, ITS IMPACT ON THE MUSLIM MINORITY IN ISRAEL, AND THE THERAPIST-PATIENT RELATIONSHIP WHEN PSYCHOLOGICAL INTERVENTION IS NECESSARY.

    Science.gov (United States)

    Gith, Emad

    2014-10-01

    Adoption is an act of kindness and an expression of the most exalted of human morality. It fulfills the needs of both the adoptive parents and the adopted child. Muslim religious law has rejected the concept of adoption as it exists in the western world and presents several alternatives including personal liability, declaration of guardianship, bestowing a gift and leaving a last will and testament. Nevertheless, over the past 20 years, the Arab-Muslim population in Israel has developed a certain acceptance of the more typical concept of adoption and the willingness to accept the civil legislation that is applied in domestic courts in Israel. This gradual integration into Israeli society as well as the very act of adoption, which remains controversial, often creates the need for treatment, consultation and guidance for the adoptive family and the adopted child. The traditional, collective characteristics of the Arab-Muslim society have a significant impact on the child's emotional state and behavior and, of course, effect the adoptive family's social standing as well. In such situations, it is imperative to discuss the interaction and the often difficult and complex relationship that develops between the therapist or counselor and the patient.

  13. Law in Transition Biblioessay: Globalization, Human Rights, Environment, Technology

    Directory of Open Access Journals (Sweden)

    Michael Marien

    2012-04-01

    Full Text Available As globalization continues, many transformations in international and domestic laws areunderway or called for. There are too many laws and too few, too much law that is inadequateor obsolete, and too much law-breaking. This biblioessay covers some 100 recentbooks, nearly all recently published, arranged in four categories. 1 International Lawincludes six overviews/textbooks on comparative law, laws related to warfare and security,pushback against demands of globalization, and gender perspectives; 2 Human Rightsencompasses general overviews and normative visions, several books on how some statesviolate human rights, five items on how good laws can end poverty and promote prosperity,and laws regulating working conditions and health rights; 3 Environment/Resources coversgrowth of international environmental law, visions of law for a better environmental future,laws to govern genetic resources and increasingly stressed water resources, two books onprospects for climate change liability, and items on toxic hazards and problems of compliance;4 Technology, Etc. identifies eight books on global crime and the failed war on drugs,books on the response to terrorism and guarding privacy and mobility in our high-tech age,seven books on how infotech is changing law and legal processes while raising intellectualproperty questions, biomedical technologies and the law, and general views on the need forupdated laws and constitutions. In sum, this essay suggests the need for deeper and timelyanalysis of the many books on changes in law.

  14. A war psychiatry approach to warfare in the Middle Byzantine period.

    Science.gov (United States)

    Ntafoulis, Pavlos

    2016-12-01

    Combat stress cases were traced in historical texts and military manuals on warfare from the Middle Byzantine period; they were mainly labelled as cowardice. Soldiers suffered from nostalgia or exhaustion; officers looked stunned, or could not speak during the battle. Cruel punishments were often enforced. Suicide and alcohol abuse were rarely mentioned. The Byzantines' evacuation system for battle casualties was well organized. Psychological operations were conducted and prisoners-of-war were usually part of them. The Byzantine army had 'parakletores', officers assigned to encourage soldiers before combat. The leaders dealt with combat stress by using their rhetoric skills and emphasizing religious faith in eternal life. The treatment of the 'cowards' was rather similar to modern war psychiatry principles of treatment. No description of PTSD was found. © The Author(s) 2016.

  15. Adolescentes autores de atos infracionais: psicologia moral e legislação Adolescents who committed criminal transgressions: moral psychology and brazilian laws

    Directory of Open Access Journals (Sweden)

    Franciela Félix de Carvalho Monte

    2011-04-01

    Full Text Available Este trabalho tem o objetivo de discutir o Estatuto da Criança e do Adolescente - ECA, e o Sistema Nacional de Atendimento Socioeducativo - SINASE, os quais dispõem sobre a proteção integral dos direitos fundamentais de crianças e adolescentes. Foca-se a discussão nas diretrizes do atendimento a adolescentes em cumprimento de medidas socioeducativas, especialmente em instituições de ressocialização, destacando-se como características imprescindíveis para o desenvolvimento integral dos adolescentes: o estímulo à negociação, à autonomia, e à democracia, especialmente no relacionamento entre profissionais e adolescentes. Estes documentos são analisados à luz das contribuições teóricas de Piaget para o campo da Psicologia do Desenvolvimento, bem como de achados atuais sobre o desenvolvimento sociomoral de crianças e adolescentes autores de atos infracionais.This article aims to discuss Estatuto da Criança e do Adolescente (ECA and Sistema Nacional de Atendimento Socioeducativo (SINASE which provide for full protection of fundamental rights of children and adolescents. This discussion is based on the perspective of Psychology of Moral Development, especially Piaget' theory and some recent work about social-moral development of young transgressors. It will be emphasized the necessity of changing the assistance to this public, incorporating some ideals like moral autonomy, democracy and interpersonal respect in the routines of the institutions of re-socialization.

  16. The World War Two Allied Economic Warfare: The Case of Turkish Chrome Sales

    OpenAIRE

    ÖNSOY, Murat

    2009-01-01

    Economic character of "modern warfare" is too important to be underestimated. In the Economic Warfare belligerents attempt to reduce the war capacity of the enemy through various methods. In World War II crushing down the German war production and economy was the main target of the British Ministry of Economic Warfare. For Germany, one of the many ways of overcoming the British Economic Warfare was to trade with the neutral countries that had land connection to the Third Reich. Turkey was one...

  17. International humanitarian law: an introduction.

    Science.gov (United States)

    Baer, Hans-Ulrich; Hostettler, Peter

    2002-08-01

    War is the ultimate form of human relations. From a Christian and Jewish point of view, it negates the most important of the Ten Commandments: "Thou shallt not kill." Is it pure illusion to believe that war may be subject to legal rules? Was Cicero possibly right when he wrote inter arma silent leges (in war, the law is silent)? The horrors of wars in the last decades have made it clear that Cicero's approach would lead us to the ultimate catastrophe, simply because the destructive potential of modern weaponry is so overwhelming that we need rules governing warfare. This article intends to provide the reader with a brief introduction to the Law of Armed Conflict, its genesis, and its basic rules and principles with particular emphasis on rules regulating medical issues. Finally, we would like to show ways to implement Law of Armed Conflict in peacetime and during armed conflict. Where appropriate, reference is also made to the complementary body of human rights law and to standards of medical ethics.

  18. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    ARL-TN-0779 ● SEP 2016 US Army Research Laboratory Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and...Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b

  19. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  20. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  1. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later.

  2. Psychology of a leader’s managerial activity

    OpenAIRE

    Romanovskyi, O. G.; Gren', L. M.; Knysh, A. Ye.

    2015-01-01

    This tutorial aid deals with the subject, functions and principles, psychological laws of a leader’s managerial activity, leadership and management, a leader’s role in managerial activity, methods of psychological influence in management systems, individual-and-psychological peculiarities of leader’s personality and his/her role in improving a collective’s social-and-psychological and moral-and psychological climate. For students of all specialities studying psychology course of a leader’s ma...

  3. Psychology of a leader’s managerial activity

    OpenAIRE

    Romanovskyi, O. G.; Gren', L. M.; Knysh, A. Ye.

    2015-01-01

    This tutorial aid deals with the subject, functions and principles, psychological laws of a leader’s managerial activity, leadership and management, a leader’s role in managerial activity, methods of psychological influence in management systems, individual-and-psychological peculiarities of leader’s personality and his/her role in improving a collective’s social-and-psychological and moral-and psychological climate. For students of all specialities studying psychology course of a leader’s ma...

  4. World law

    OpenAIRE

    Berman, Harold J.; Robert W. Woodruff; James Barr Ames

    1999-01-01

    In the third millennium of the Christian era, which is characterised by the emergence of a world economy and eventually a world society, the concept of world law is needed to embrace not only the traditional disciplines of public international law, and comparative law, but also the common underlying legal principles applicable in world trade, world finance, transnational transfer of technology and other fields of world economic law, as well as in such emerging fields as the protection of the ...

  5. Concepto y fuentes para el estudio de la Information Warfare

    OpenAIRE

    Tramullas Saz, Jesús

    1998-01-01

    En este trabajo se aborda el concepto de Información Warfare, así como las principales definiciones que se han propuesto para el mismo. Se establecen los diferentes tipos de acciones que se inscriben en este ámbito, y se delinean algunas implicaciones para el especialista en información. Como punto de partida para su estudio, se incluyen una selección de fuentes de información sobre el tema objeto de estudio. ABSTRACT: This paper broaches the concept of Information Warfare, as ...

  6. Biological warfare in a historical perspective.

    Science.gov (United States)

    Roffey, R; Tegnell, A; Elgh, F

    2002-08-01

    There are some early examples of biological warfare (BW), but in modern times it was used first for sabotage by Germany during WWI. Development of biological weapons on a military significant scale was initiated in several countries in the period between the world wars. During WWII, several countries had active programs such as the USA, UK, Canada, Germany, Japan and the Soviet Union. It was only Japan that on a fairly large scale used BW. The US program continued until 1969, when President Nixon took a decision to end it in connection with signing the BTWC. The Soviet Union had also continued its program after the war, and this was enhanced after signing the BTWC: in the 1980s the program consisted of around fifty facilities and involved around 60,000 people. The Soviet Union produced and maintained a large stockpile of BW-agents. After the collapse of the Soviet Union, and due to pressure from USA and UK, President Yeltsin issued a decree in 1992 banning continued offensive BW activity. However, there are still concerns of residual activity in Russia. Another program of concern is the Iraqi BW-program. After 10 years of UN inspections that were stopped in 1998, there are still many unanswered questions concerning the BW program. There was also a covert BW-program in South Africa that was terminated around 1993. There have also been a number of allegations of alleged use or possession. In addition, there are indications that 10-12 states are now trying to acquire BW, and this assessment is based on intelligence information, mainly from the USA. For example Iraq, North Korea, Iran, Syria, Sudan and Libya. Another aspect is the strong driving force of technology developments to promote this type of program, opening new risks for future potential military misuse.

  7. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    activities” ( CEMA ), which is a combination of Cyber and Electronic Warfare.115 However, the relationship between cyber and EW must be carefully considered...generating effects by themselves, as well as serving as a delivery means for MISO. The focus of CEMA may be as much to support combat operations

  8. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  9. Trends in underwater warfare : From an underwater acoustics perspective

    NARCIS (Netherlands)

    Ort, C.M.; Driessen, F.P.G.

    2002-01-01

    Technological developments concerning underwater systems for Anti Submarine Warfare (ASW) and Mine Counter Measures (MCM) are directed at optimally countering the underwater threat in the near future. Countering the existing underwater threat is already extremely difficult, but there are several tre

  10. Public Discussion of Nuclear Warfare: A Time for Hope.

    Science.gov (United States)

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  11. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    decrease the logistical burden associated with transport and storage of decontaminants. The experiments in this study were focused on evaluating...propanediammonium dichloride, isopropanol, inert ingredients/water, hydrogen peroxide, diacetin Decontaminant formulated for chemical warfare agents F...potassium bisulfate, potassium sulfate, dipotassium peroxodisulfate, magnesium carbonate Acidic oxidative chemistry, used for VX laboratory waste

  12. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...

  13. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    Germany’s cognitive dissonance about the importance of military force and counter-insurgency operations in Afghanistan is an uphill battle they are still...1 Summary of Walzer’s Contemporary Just War Theory : ……............................................................2 Summary of...Postmodern Warfare Theory : .......................................................................................5 German Foreign Policy and Military

  14. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  15. Improving Professional Development for USAF Electronic Warfare Officers

    Science.gov (United States)

    2012-02-15

    NOTE AIR WAR COLLEGE AIR UNIVERSITY IMPROVING PROFESSIONAL DEVELOPMENT FOR USAF ELECTRONIC WARFARE OFFICERS by Gregory M. Patschke, Col...and planning. Professional development comprises both continuing education and career development. In the US Air Force, the acquisition, space...and cyberspace communities have professional development programs already in place. For the continuing education half of professional development , the

  16. Media Discourse in an Atmosphere of Information Warfare: From Manipulation to Aggression

    Directory of Open Access Journals (Sweden)

    Владимир Иванович Озюменко

    2017-12-01

    Full Text Available In todays atmosphere of information warfare the biased impact of the media has increased, pushing behind other functions, including the informative one. The forms of media influence have also changed: direct persuasion has been replaced by implicit manipulation, which develops into outright aggression. Since, in the media discourse aggression can be both verbal and non-verbal, we propose to use the term information (or media aggression , which is broader than verbal aggression . Media aggression can be considered as a binary process - in relation to the referent (affective aggression and in relation to the audience (cognitive aggression. As a result, the information under media aggression refers to the expression of open hostility and animosity towards the referent and meaningful impact on the consciousness of the recipient (the target audience to its ideological subordination. The purpose of this article is to justify the hypothesis that the growing media aggression is a feature of modern media discourse in the atmosphere of information warfare, and this function can be analysed within the framework of manipulative discourse as manipulative persuasion. The data has been taken from quality British and American newspapers, news websites of The BBC, The Economist, The Guardian, The New York Times, The Washington Post, and some others covering the relations between Russia and the USA, the situation in the Middle East, particularly in Syria. The the study was conducted using critical discourse analysis (Fairclough 2001, Van Dijk 2006, 2009; Wodak 2007; Weiss, Wodak 2007 and the multimodal approach (Ivanova, Spodarets 2010; Ponton 2016, and reveals various strategies and means of linguistic manipulation and media aggression. It also shows that the main aim of linguistic manipulation accentuated by verbal and non-verbal aggression is to deliberately mislead the audience imposing on it the desired idea of ideological subordination. Therefore, a

  17. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  18. [Law 6/84: "an inappropriate law"].

    Science.gov (United States)

    Barroco, L E

    1994-01-01

    The intervention of Dr. Luis Elmano Barroco was evaluated at a meeting on March 19, 1994, on the topic of the state of abortion after 10 years of the new abortion law. Some aspects of the law of 1984 are characterized as inappropriate and inadequate because of the experience of the maternity ward of Dr. Alfredo da Costa. It was expected that in the wake of the publication of the law, official health care institutions would provide services for termination of pregnancy in accordance with legal indications. However, a survey carried out by the Association for Family Planning in July 1993 revealed that more than 50% of hospitals did not perform abortions because of the inexistence of specialized services or lack of resources or on grounds of conscientious objection. Even a revision of the abortion law does not take into consideration the fact that before 12 weeks of gestation it is difficult to precisely confirm grave lesions or the physical and psychological state of health of the pregnant woman which could be potentially life threatening. It was not taken into account either that it is impossible to diagnose definitively chromosomal aberrations, severe diseases, and fetal malformation before the 16th week. The law did not contemplate the prevailing socioeconomical conditions either that lead to clandestine abortion with high morbidity and mortality from cervical lesions, uterine perforation, infections, sepsis, and salpingitis. Prenatal diagnosis for eugenic abortion can be carried out by cytogenetic analysis of the amniotic fluid and ecography, but such diagnosis probably amounts to only 30-40% of risk cases in the whole country. A recent study by the Johns Hopkins University indicated that the chance of survival of a child born before 24 weeks is nil, therefore the limit of induced abortion should be extended to the 24th week to facilitate diagnosis of possible genetic abnormalities.

  19. Integrated Assessment Systems for Chemical Warfare Material

    Energy Technology Data Exchange (ETDEWEB)

    A. M. Snyder; D. A. Verrill; G. L. Thinnes; K. D. Watts; R. J. McMorland

    1999-05-27

    The US Army must respond to a variety of situations involving suspect discovered, recovered, stored, and buried chemical warfare materiel (CWM). In some cases, the identity of the fill materiel and the status of the fusing and firing train cannot be visually determined due to aging of the container, or because the item is contained in an over-pack. In these cases, non-intrusive assessments are required to provide information to allow safe handling, storage, and disposal of the materiel. This paper will provide an overview of the integrated mobile and facility-based CWM assessment system prototypes that have been, and are being developed, at the Idaho National Engineering and Environmental Laboratory (INEEL) for the US Army Non-Stockpile Chemical Materiel Project. In addition, this paper will discuss advanced sensors being developed to enhance the capability of the existing and future assessment systems. The Phase I Mobile Munitions Assessment System (MMAS) is currently being used by the Army's Technical Escort Unit (TEU) at Dugway Proving Ground, Utah. This system includes equipment for non-intrusively identifying the munitions fill materiel and for assessing the condition and stability of the fuzes, firing trains, and other potential safety hazards. The system provides a self-contained, integrated command post including an on-board computer system, communications equipment, video and photographic equipment, weather monitoring equipment, and miscellaneous safety-related equipment. The Phase II MMAS is currently being tested and qualified for use by the INEEL and the US Army. The Phase II system contains several new assessment systems that significantly enhance the ability to assess CWM. A facility-based munitions assessment system prototype is being developed for the assessment of CWM stored in igloos at Pine Bluff Arsenal, Arkansas. This system is currently in the design and fabrication stages. Numerous CWM advanced sensors are being developed and tested, and

  20. Property Law

    OpenAIRE

    Dean Lueck; Thomas J. Miceli

    2004-01-01

    This chapter examines the economics of property rights and property law. Property law is a fundamental part of social organization and is also fundamental to the operation of the economy because it defines and protects the bundle of rights that constitute property. Property law thereby creates incentives to protect and invest in assets and establishes a legal framework within which market exchange of assets can take place. The purpose of this chapter is to show how the economics of property r...

  1. Psychological Treatment

    Science.gov (United States)

    ... IBS Pain IBS Global Treatments IBS Diet Low FODMAP Diet Complimentary or Alt Treatments Medications Psychological Treatments ... IBS Pain IBS Global Treatments IBS Diet Low FODMAP Diet Complimentary or Alt Treatments Medications Psychological Treatments ...

  2. An analysis of U.S. psychological warfare on Japan’s Labor Unions (1951-1961)%冷战初期(1951-1961)美国对日本工会心理战政策探析

    Institute of Scientific and Technical Information of China (English)

    白玉平

    2014-01-01

    工会组织是冷战时期东西方两大阵营争夺的重要目标。冷战初期,为了清除共产主义对日本的影响,加强其亲美导向,杜鲁门和艾森豪威尔两届政府对日本工会组织实施了形式多样的心理战活动。美国对日心理战政策的效果往往受到美日关系的深刻影响,在短期内很难显现成效。但从长期来看,美国对日本工会持续的文化与宣传活动,一方面培养了一批认同西方理念、追随美国的工会领导人;另一方面成功导致了日本工会的分裂。更重要的是,美国倡导的“温和”斗争路线逐渐被日本工会所接受,并最终使工会组织成为日本政治格局中的“温和的反对派”。%Labor unions were a crucial battlefront in the Cold War. In Early Cold War era, the Truman and Eisenhower administration set out varied psychological war activities on Japanese labor unions. America’s psychological war policy was influenced seriously by U.S.-Japan relations. Consequently, America’s psychological war policy could’t achieve the desired effect in the short term. But in the long run, United States fostered a batch of labor leaders who followed American ways of labor organization, and on the other side, Japanese labor unions were divided into“pro-communist”and “pro-American” categories under the impact of American policy. Finally, Japanese labor unions accepted the moderate struggle line projected by United States, and took advantage of ballot for labor’s rights, thus labor unions became a“moderate opposition”and an important political power in Japan.

  3. Examining U.S. Irregular Warfare Doctrine

    Science.gov (United States)

    2008-06-01

    psychological, or political benefits or rights. The Sudan Liberation Army in Darfur and Zapatistas in Mexico are e xamples of these groups (O’Neill:2005...contribu fa image adorns T-shirts, placards, banners, watches, and murals still being produced throughout Cuba, Mexico , and other parts of Latin...superiority has forced its enemies for the foreseeable future to fight it unconventionally, mixing modern technolo occurred among military historia u tial

  4. Discursive Psychology

    NARCIS (Netherlands)

    Molder, te H.

    2015-01-01

    Discursive psychology was established in the United Kingdom by the end of the 1980s, mainly in response to the dominant cognitivist approach in social psychology. While it borrowed notions from poststructuralism and sociology of science, it is most akin to conversation analysis. Discursive psycholog

  5. Positive Psychology

    Science.gov (United States)

    Peterson, Christopher

    2009-01-01

    Positive psychology is a deliberate correction to the focus of psychology on problems. Positive psychology does not deny the difficulties that people may experience but does suggest that sole attention to disorder leads to an incomplete view of the human condition. Positive psychologists concern themselves with four major topics: (1) positive…

  6. Early alternative derivations of Fechner's law.

    Science.gov (United States)

    Masin, Sergio Cesare; Zudini, Verena; Antonelli, Mauro

    2009-01-01

    Historians of psychology, notably Boring, fostered Fechner's idea that Weber's law is the indispensable basis for the derivation of the logarithmic psychophysical law. However, it is shown here that Bernoulli in 1738 and Thurstone in 1931 derived the logarithmic law using principles other than Weber's law and that Fechner and Thurstone based their derivations on the principles originally employed by Bernoulli. It is concluded that awareness of researchers about Bernoulli's and Thurstone's derivations could expand the directions of research on the form of the psychophysical law. (c) 2009 Wiley Periodicals, Inc.

  7. Law 302.

    Science.gov (United States)

    Manitoba Dept. of Education, Winnipeg.

    This publication outlines a law course intended as part of a business education program in the secondary schools of Manitoba, Canada. The one credit course of study should be taught over a period of 110-120 hours of instruction. It provides students with an introduction to the principles, practices, and consequences of law with regard to torts,…

  8. Testes psicológicos e o Direito: uma aproximação à luz da dignidade da pessoa humana e dos direitos da personalidade Psychological tests and Law: an approach in light of human dignity and personality rights

    Directory of Open Access Journals (Sweden)

    Luciano Augusto de Toledo Coelho

    2004-08-01

    Full Text Available Testes psicológicos são freqüentemente usados na seleção de funcionários para empresas. Este artigo busca comparar tais instrumentos considerando os direitos fundamentais do trabalhador. Sempre que um candidato para um trabalho é sujeitado a um teste, seja isso para medir a aptidão dele ou dela ou para verificar determinados traços da personalidade, acima daquele instrumento está sujeitado o conhecimento de uma ciência que legitima o poder do empregador para testar o candidato. A crise de trabalho gerada pela globalização e a hegemonia do sistema capitalista neoliberal levam vantagem do sujeição crescente do trabalhador. Não há nenhuma lei no Brasil que protege um(a candidato(a do "vazamento" de informação sobre sua personalidade. E, em alguns casos, estes fatores que podem causar a pessoa não ser contratada, poderiam ser considerados discriminatórios. Tais técnicas e testes de seleção de pessoal abusivas que não são muito fidedignos, aumentam a possibilidade de revelação desnecessária e, por conseguinte, uma violação de privacidade, vida privada e o desrespeito do princípio constitucional da dignidade humana.Psychological tests are quite frequently used in selecting personnel for companies. This article seeks to compare such instruments with the worker's fundamental rights in mind. Whenever a candidate for a job is subjected to a test, be that to measure his or her aptitude or to verify certain personality traits, over that instrument is incurred the knowledge of a science that legitimizes the employer's power to test the candidate. The job crisis generated from globalization and the hegemony of the neo-liberal capitalistic system, takes advantage of the ever-growing subjection of the worker. There are no laws in Brazil that protect a candidate from the "leak" of information about his or her personality. And, in some cases, these factors, which can cause one to not be hired, could be considered discriminatory

  9. Evolution of Unmanned Aerial Warfare: A Historical Look at Remote Airpower - A Case Study in Innovation

    Science.gov (United States)

    2016-06-10

    EVOLUTION OF UNMANNED AERIAL WARFARE: A HISTORICAL LOOK AT REMOTE AIRPOWER—A CASE STUDY IN INNOVATION A thesis presented to...JUN 2016 4. TITLE AND SUBTITLE Evolution of Unmanned Aerial Warfare: A Historical Look at Remote Airpower—A Case Study in Innovation 5a...Warfare: A Historical Look at Remote Airpower—A Case Study in Innovation Approved by: , Thesis Committee Chair John T. Kuehn, Ph.D

  10. Electronic Warfare M-on-N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis

    Science.gov (United States)

    2017-04-12

    E. Jarvis Electronic Warfare M-on- N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Advanced Techniques Branch Tactical...12-04-2017 NRL Memorandum Report Electronic Warfare M-on- N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Donald E...ELECTRONIC WARFARE M-ON- N DIGITAL SIMULATION LOGGING REQUIREMENTS AND HDF5: A PRELIMINARY ANALYSIS 1. INTRODUCTION HDF5 technology [Folk] has been

  11. Case - Case-Law - Law

    DEFF Research Database (Denmark)

    Sadl, Urska

    2013-01-01

    Reasoning of the Court of Justice of the European Union – Constr uction of arguments in the case-law of the Court – Citation technique – The use of formulas to transform case-law into ‘law’ – ‘Formulaic style’ – European citizenship as a fundamental status – Ruiz Zambrano – Reasoning from...

  12. Psychological casualties resulting from chemical and biological weapons.

    Science.gov (United States)

    Romano, J A; King, J M

    2001-12-01

    This symposium addresses the complications encountered by medical planners when confronted by the use or threat of the use of weapons of mass destruction. The types of chemical warfare agents (CWA), their principal target organs, and physiological effects are discussed. We have reviewed the use of CWA in 20th century warfare and otherwise with emphasis on five cases: (1) use of sulfur mustard during World War I; (2) use by Italy against Ethiopia; (3) use in the Sino-Japanese War; (4) relatively well-studied use in the Iran-Iraq conflict; and (5) the use of sarin in the Tokyo subway terrorist incident. We reviewed the additional physiological and psychological consequences of their use and threat of use. Results from training and simulation are discussed. Finally, we present our conclusions derived from the analysis of these historical situations.

  13. Stuxnet and Cyber-Warfare (1/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  14. Stuxnet and Cyber-Warfare (2/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  15. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  16. USMC Electronic Warfare 2025: Trading Expertise for Advanced Technology

    Science.gov (United States)

    2011-04-15

    airborne electronic warlare during the transition period away from legacy equipment. EA-6B pilots and Electroilic Countermeasures Officers ( ECMOs ...Electronic Warfare (EW) capability. As an EA-6B Electronic Countenneasures Officer ( ECMO ), I anticipate that both the United States Marine Corps and all... ECMOs . An increased workload for Radio Battalion will have the same effect that the assumption of an additional function of Marine aviation will have on

  17. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    OpenAIRE

    2011-01-01

    This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United St...

  18. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    integrity. Essentially, Russia - and more directly- Vladimir Putin perceive that Russia is in an ideological struggle with the US and Europe. 1 Carl Von...conducted in a hybrid manner, though all the instruments of national power. 31 Though the nearly continuous strategic leadership of Vladimir Putin , Russia ...with a sharp focus on Vladimir Putin ’s strategic leadership, highlights the evolution ofthe Russian brand of hybrid warfare (HW). The analysis also

  19. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    Science.gov (United States)

    2015-05-18

    elements with maneuver warfare, mission command’s decentralization of execution through the use of mission-type orders is a more centralized form... decentralized command and control organization will instill an innovative organizational culture. Innovation will be able to freely prosper in an...warfare’s decentralized command and control doctrine to maximize military cyberspace operations. Since the establishment of U.S. Cyber Command in 2009

  20. The Enemy Below: Preparing Ground Forces for Subterranean Warfare

    Science.gov (United States)

    2013-12-01

    can endanger the lives of U.S. forces and render mechanical breaching tools inoperable. Air blowers can be used as a hasty means to ventilate a... Penguin Books, 1996). 179 Tom Mangold, The Tunnels of Cu Chi (New York, NY: Random House, 1985). 147 6. A Historical Analysis of Tunnel Warfare and... Penguin Group, 1996. 157 Lester, W. G., & Ali, A. J. “Underground Combat: Stereophonic Blasting, tunnel Rats, and the Soviet-Afghan War.” Engineer

  1. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  2. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    states to take note. Cyber issues such as these should be seen in light of the ancient dictum that “a victorious army first wins and then seeks...Examples from ancient Greece, Prussia, and World War II are illustrated to present cases where innovative leaders adapted and modified their methods to...conduct warfare and integrated them into their strategic approach to achieve their desired end states. Alexander the Great conquered Persia in three

  3. Constitution aims to bring an end to health economy warfare.

    Science.gov (United States)

    Harding, Mary-Louise; Martin, Daniel

    2005-02-10

    A rough new constitution is being drawn up for the NHS in a bid to prevent health economies sliding into bitter 'Bradford-style' warfare in the era of foundations trusts and payment by results. The rules of engagement are part of a package of measures designed to rescue some of the government's flagship reforms amid warnings from audit chiefs on the impact of PbR.

  4. Psychological Empowerment

    OpenAIRE

    Flohrer, Nick

    2014-01-01

    Instilling psychological empowerment in employees is one of the most important tasks of modern leadership. Building on quantitative research and the development of a new psychometric scale related to project management this thesis shows: First, individuals' characteristics and their work team environment influence perceptions of access to information and resources – two important antecedents of psychological empowerment. Second, while a project briefing strengthens the link of the psychologic...

  5. Standards for educational and psychological testing

    CERN Document Server

    2014-01-01

    Developed jointly by the American Educational Research Association, American Psychological Association, and the National Council on Measurement in Education, Standards for Educational and Psychological Testing (Revised 2014) addresses professional and technical issues of test development and use in education, psychology, and employment. It includes changes in federal law and measurement trends affecting validity, testing individuals with disabilities or different linguistic backgrounds, and new types of tests, as well as new uses of existing tests.

  6. Echo chamber and trench warfare dynamics in online debates.

    Science.gov (United States)

    Karlsen, Rune; Steen-Johnsen, Kari; Wollebæk, Dag; Enjolras, Bernard

    2017-06-01

    In this article, we take issue with the claim by Sunstein and others that online discussion takes place in echo chambers, and suggest that the dynamics of online debates could be more aptly described by the logic of 'trench warfare', in which opinions are reinforced through contradiction as well as confirmation. We use a unique online survey and an experimental approach to investigate and test echo chamber and trench warfare dynamics in online debates. The results show that people do indeed claim to discuss with those who hold opposite views from themselves. Furthermore, our survey experiments suggest that both confirming and contradicting arguments have similar effects on attitude reinforcement. Together, this indicates that both echo chamber and trench warfare dynamics - a situation where attitudes are reinforced through both confirmation and disconfirmation biases - characterize online debates. However, we also find that two-sided neutral arguments have weaker effects on reinforcement than one-sided confirming and contradicting arguments, suggesting that online debates could contribute to collective learning and qualification of arguments.

  7. Electronic Warfare:Issues and Challenges for Emitter Classification

    Directory of Open Access Journals (Sweden)

    Manish Gupta

    2011-04-01

    Full Text Available Electronic warfare (EW is an important capability that provides advantage to defence forces over their adversaries. Defence forces gather tactical intelligence through EW sensors, which provide the means to counter hostile actions of enemy forces. Functions of an EW system is threat detection and the area surveillance so as to determine the identity of surrounding emitters. Emitter classification system identifies possible threats by analysing intercepted signals. Problem of identifying emitters based on its intercepted signal characteristics is a challenging problem in electronic warfare studies. Major issues and challenges for emitter classification such as drifting of emitter parameters due to aging, operational characteristic of an emitter, i.e., same emitter can operate on multiple bands and multiple pulse repetition frequencies (PRFs are highlighted. A novel approach based on some well-known statistical methods, e.g., regression analysis, hypothesis testing, and discriminent analysis is proposed. The effectiveness of the proposed approach has been tested over ELINT (Electronic Intelligence data and illustrated using simulation data. The proposed approach can play a solution for wide variety of problems in emitter classification in electronic warfare studies.Defence Science Journal, 2011, 61(3, pp.228-234, DOI:http://dx.doi.org/10.14429/dsj.61.529

  8. [Political psychology].

    Science.gov (United States)

    Resch, Mária; Bella, Tamás

    2013-04-21

    In Hungary one can mostly find references to the psychological processes of politics in the writings of publicists, public opinion pollsters, philosophers, social psychologists, and political analysts. It would be still important if not only legal scientists focusing on political institutions or sociologist-politologists concentrating on social structures could analyse the psychological aspects of political processes; but one could also do so through the application of the methods of political psychology. The authors review the history of political psychology, its position vis-à-vis other fields of science and the essential interfaces through which this field of science, which is still to be discovered in Hungary, connects to other social sciences. As far as its methodology comprising psycho-biographical analyses, questionnaire-based queries, cognitive mapping of interviews and statements are concerned, it is identical with the psychiatric tools of medical sciences. In the next part of this paper, the focus is shifted to the essence and contents of political psychology. Group dynamics properties, voters' attitudes, leaders' personalities and the behavioural patterns demonstrated by them in different political situations, authoritativeness, games, and charisma are all essential components of political psychology, which mostly analyses psychological-psychiatric processes and also involves medical sciences by relying on cognitive and behavioural sciences. This paper describes political psychology, which is basically part of social sciences, still, being an interdisciplinary science, has several ties to medical sciences through psychological and psychiatric aspects.

  9. Psychological behaviorism and behaviorizing psychology

    Science.gov (United States)

    Staats, Arthur W.

    1994-01-01

    Paradigmatic or psychological behaviorism (PB), in a four-decade history of development, has been shaped by its goal, the establishment of a behaviorism that can also serve as the approach in psychology (Watson's original goal). In the process, PB has become a new generation of behaviorism with abundant heuristic avenues for development in theory, philosophy, methodology, and research. Psychology has resources, purview and problem areas, and nascent developments of many kinds, gathered in chaotic diversity, needing unification (and other things) that cognitivism cannot provide. Behaviorism can, within PB's multilevel framework for connecting and advancing both psychology and behaviorism. PMID:22478175

  10. Psychological behaviorism and behaviorizing psychology.

    Science.gov (United States)

    Staats, A W

    1994-01-01

    Paradigmatic or psychological behaviorism (PB), in a four-decade history of development, has been shaped by its goal, the establishment of a behaviorism that can also serve as the approach in psychology (Watson's original goal). In the process, PB has become a new generation of behaviorism with abundant heuristic avenues for development in theory, philosophy, methodology, and research. Psychology has resources, purview and problem areas, and nascent developments of many kinds, gathered in chaotic diversity, needing unification (and other things) that cognitivism cannot provide. Behaviorism can, within PB's multilevel framework for connecting and advancing both psychology and behaviorism.

  11. Psychological experiment

    NARCIS (Netherlands)

    Boven, Martijn; Emmanuel, Steven M.; McDonald, William; Stewart, Jon

    2015-01-01

    For Kierkegaard the ‘psychological experiment’ is a literary strategy. It enables him to dramatize an existential conflict in an experimental mode. Kierkegaard’s aim is to study the source of movement that animates the existing individual (this is the psychological part). However, he is not interest

  12. Analysis of Intervention Countermeasures for College Students’ Psychological Crisis---Adopting Law to Fill the Blanks, Bottom-line Thinking and Others%大学生心理危机介入对策探析--法律补位、底线思维及其他

    Institute of Scientific and Technical Information of China (English)

    刘艺; 陆琴林

    2014-01-01

    The problem of college students’ psychological crisis increases heavily, as serious incidents of psychological problems caused by the crisis occur even more frequently. How to eliminate college students’ psychological crisis, alleviate the inner contradictions of college students, guide the healthy development of college students and provide better mental health counseling for college students? These have become urgent questions to be solved for all colleges and universities. It cannot be delayed to explore and create complete and practical intervention countermeasures for college students’ psychological crisis. We should investigate the psychological status of college students, understand the situation of their psychological crisis, and analyze the content and causes of their psychological crisis; By such means as adopting law to fill the blanks, bottom-line thinking, and learning from mature foreign intervention theory, we can build suitable psychological crisis intervention mechanism for college students in today’s China.%高校大学生的心理危机问题越来越重,心理危机问题导致的恶性事件愈加频繁地发生。如何消除高校大学生的心理危机,缓解大学生的内心矛盾,引导大学生健康成长,为大学生提供更好的心理健康辅导,已成为各大高校亟待解决的问题。探索和创建完整实用的大学生心理危机介入对策,刻不容缓。对大学生心理状况进行探析,了解大学生心理危机状况,分析其心理危机的内涵、产生原因,通过法律补位、底线思维,并借鉴外国成熟的干预理论,是当前建立我国大学生心理危机干预机制较为适宜的解决方法。

  13. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  14. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  15. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  16. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Energy Technology Data Exchange (ETDEWEB)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  17. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  18. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    Science.gov (United States)

    2011-06-10

    Revolution.‖ 64Jason Fritz, ―How China will use cyber warfare to leapfrog in military competitiveness,‖ Culture Mandala : The Bulletin of the Centre for East...cyber warfare to leapfrog in military competitiveness.‖ Culture Mandala : The Bulletin of the Centre for East-West Culture and Economic Studies 8 no. 1

  19. Secrets Law

    Directory of Open Access Journals (Sweden)

    Luz Helena Guamanzara Torres

    2013-01-01

    Full Text Available This paper provides a review of the book The Law of Secrets, of the author Juan Carlos Martínez-Villalba Riofrío studying the secrets and how law does protect. To this end, the author has analyzed the general theory of secrecy, secrets and methodology, its overall rating, essential elements and their different legal dimensions, the secret as a subjective right. It also establishes that professional secrecy is protected by constitutional principles such as the right to privacy.

  20. Property law: a cognitive turn.

    Science.gov (United States)

    Blumenthal, Jeremy A

    2010-04-01

    Despite more than a century of research by psychologists on issues relating to the law, most such research has focused on a small subset of topics relevant to the legal system. Here, I review several legal topics amenable to psychological research that fall under the broad umbrella of property law: (1) how the concepts of property and ownership are represented cognitively; (2) the relationship between wealth and happiness, consumer behavior, and the priming effect of money concepts; (3) animal and child development in cognition about and behavior toward property and ownership; and (4) the relevance of psychological research on home to legal policy. These and other areas provide potential research agendas for cognitive and social cognitive psychologists. After noting the importance of such research for legal doctrine, theory, and policy, I close with suggestions for effectively communicating empirical findings to the legal community.

  1. Psychological jurisprudence as an interdisciplinary science and the area of psychological practice

    Directory of Open Access Journals (Sweden)

    Pozdnyakov V. M.

    2017-04-01

    Full Text Available The article convincingly demonstrates that Russia is increasingly began to publish monographs lawyers on key legal and psychological phenomena, and in dissertations in the formulation of the provisions on the protection of delatsya criticism of "Westernization" of the state legislation and upheld psychologicaland position. At the same time, critically, it is noted that in the field of legal ideology and policies, and in making innovations in the law still, as in Soviet period, dominated by legal dogma, and psychological realities are taken into account in fragments. The reason for this state of Affairs is that still within the framework of University training and further education of local lawyers, in contrast to international practice, insufficient attention is paid to the development of psychological culture, but in the end no full-fledged dialogue between lawyers and psychologists. Taking into account possibilities of integrative methodology justified the subject of psychological law as an interdisciplinary science and the field of psychological practice focused on the identification of regularities and mechanisms of development of legal awareness and legal existence of various actors in the legal activity aimed at the development of psychologically informed interventions for the improvement of legal ideology and politics, systems of law-making, law enforcement and crime prevention, psycho-technical methods and techniques in activities of law enforcement officials. For constructive development of psychological jurisprudence identified the key areas of research and nodal practicerelevant problems.

  2. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    of the Red Cross Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, 515 (Y. Sandoz , C. Swinarski, B...Additional to the Geneva Conventions of 12 August 1949, 8 June 1977, ed. Yves Sandoz , Christophe Swinarski, and Bruno Zimmermann (International

  3. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  4. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  5. Carbon Nanotubes: Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Om Kumar

    2008-09-01

    Full Text Available Discovery of carbon nanotubes has great impact on the development of newer methodologies and devicesuseful for the analysis of various types of chemicals. The functionalisation of CNTs with biomolecules relatedto chemical and biological warfare agents makes these useful for the detection of these agents. The detectionsensitivity can be increased manyfold. Various types of chemical and biological sensors were developed usingvarious type of carbon nanotubes as well as nano particles of different metals.Defence Science Journal, 2008, 58(5, pp.617-625, DOI:http://dx.doi.org/10.14429/dsj.58.1684

  6. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  7. Islamic Law

    Directory of Open Access Journals (Sweden)

    Doranda Maracineanu

    2009-06-01

    Full Text Available The law system of a State represents the body of rules passed or recognized by that State inorder to regulate the social relationships, rules that must be freely obeyed by their recipients, otherwisethe State intervening with its coercive power. Throughout the development of the society, pedants havebeen particularly interested in the issue of law systems, each supporting various classifications; theclassification that has remained is the one distinguishing between the Anglo-Saxon, the Roman-German,the religious and respectively the communist law systems. The third main international law system is theMuslim one, founded on the Muslim religion – the Islam. The Islam promotes the idea that Allah createdthe law and therefore it must be preserved and observed as such. Etymologically, the Arabian word“Islam” means “to be wanted, to obey” implying the fact that this law system promotes total andunconditioned submission to Allah. The Islamic law is not built on somebody of laws or leading cases,but has as source. The Islam is meant as a universal religion, the Koran promoting the idea of the unityof mankind; thus, one of the precepts in the Koran asserts that “all men are equal (…, there is nodifference between a white man and a black man, between one who is Arabian and one who is not,except for the measure in which they fear God.” The Koran is founded mainly on the Talmud, Hebrewsource of inspiration, and only on very few Christian sources. The Islam does not forward ideas whichcannot be materialized; on the contrary its ideas are purely practical, easy to be observed by the commonman, ideas subordinated to the principle of monotheism. The uncertainties and gaps of the Koran, whichhave been felt along the years, imposed the need for another set of rules, meant to supplement it – that isSunna. Sunna represents a body of laws and, consequently, the second source of the Koran. Sunnanarrates the life of the prophet Mohamed, the model to

  8. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    With the advent of enzyme linked immunoabsorbant assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were reported as capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detecting soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition, these antibodies were highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies reported an extension of the level of sensitivity to -80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These antibodies offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances.

  9. Evanescent planar waveguide detection of biological warfare simulants

    Science.gov (United States)

    Sipe, David M.; Schoonmaker, Kenneth P.; Herron, James N.; Mostert, Michael J.

    2000-04-01

    An evanescent planar waveguide Mark 1.5 instrument was used to detect simulants of biological warfare agents; ovalbumin (OV), MS2 bacteriophage, BG, and Erwinia herbicola (EH). Polyclonal tracer antibodies were labeled with the fluorescent dye, Cy5. Discrete bands of polyclonal capture antibodies were immobilized to a polystyrene planar waveguide with molded integral lenses. An ST-6 CCD camera was used for detection. OV. MS2 and BG were detected in a simultaneous 3 by 3 array; with a total of nine measurements within 6 minutes. EH was analyzed in a separate array. Results were evaluate dat the US Army Joint Field Trials V, at the Dugway Proving Grounds. Over a 10 day period, 32 unknown samples were analyzed daily for each simulant. Detection limits: OV 10 ng/ml, MS2 107 pfu/ml, BG 105 cfu/ml. EH was detectable at 5 X 105 cfu/ml. Overall false positives were 3.0 percent. Therefore, the Mark 1.5 instrument, with a parallel array of detectors, evanescent flourescent excitation, and CCD imaging provides for rapid, sensitive, and specific detection of biological warfare agent simulants.

  10. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  11. Status of Personnel, Use of force, and International Law of Armed Conflict in the Context of New United Nations Peacekeeping Operations

    Science.gov (United States)

    1998-04-27

    equality of nations began as early as 1300, but was not thoroughly articulated until 300 years later by Jean Bodin , Thomas Hobbes, and Hugo Grotius...were similarly limited leading to the intervention of armed forces..." Pictet, Jean , ed. 1 Commentary on the Geneva Conventions 32 (1952). 184...regime remained a body of law applicable only in international warfare. Indeed, ICRC President Jean Pictet held that international humanitarian law

  12. A Relationship between Lotka's Law, Bradford's Law, and Zipf's Law.

    Science.gov (United States)

    Chen, Ye-Sho; Leimkuhler, Ferdinand F.

    1986-01-01

    A common functional relationship among Lotka's law, Bradford's law, and Zipf's law is derived. The proof takes explicit account of the sequences of observed values of the variables by means of an index. This approach results in a more realistic and precise formulation of each law. (Author/EM)

  13. Psychological Warfare in Huaihai Campaign%淮海战役中的攻心战

    Institute of Scientific and Technical Information of China (English)

    魏克

    2004-01-01

    全国解放战争第二年,即1947年7月至1948年6月,人民解放军共消灭国民党正规军和非正规军152万人。这时,蒋介石也不得不哀叹:“国军处处受制,着着失败。”在这种有利的战争形势下,我参与带领冀鲁豫5000多名参军的翻身农民,从山东聊城出发,经太行山,行程1600里,到达豫西,把新兵分配到中原军区各纵队。

  14. Money or mental health: the cost of alleviating psychological distress with monetary compensation versus psychological therapy.

    Science.gov (United States)

    Boyce, Christopher J; Wood, Alex M

    2010-10-01

    AbstractMoney is the default way in which intangible losses, such as pain and suffering, are currently valued and compensated in law courts. Economists have suggested that subjective well-being regressions can be used to guide compensation payouts for psychological distress following traumatic life events. We bring together studies from law, economic, psychology and medical journals to show that alleviating psychological distress through psychological therapy could be at least 32 times more cost effective than financial compensation. This result is not only important for law courts but has important implications for public health. Mental health is deteriorating across the world - improvements to mental health care might be a more efficient way to increase the health and happiness of our nations than pure income growth.

  15. Psychological IVF

    DEFF Research Database (Denmark)

    Adrian, Stine Willum

    2015-01-01

    During ethnographic fieldwork at a fertility clinic in Denmark, I became intrigued by emotions. In particular, I found an incidence labelled ‘psychological IVF’ theoretically provocative as it challenged my views on materializations, which I was preparing to study. This paper centres on the story...... of psychological IVF, and I use this narrative to consider emotions and materialization methodologically. I also ask how emotions at fertility clinics can be conceptualized to enable analysis of their materialization, change, and effects. In order to do so, I develop the term ‘emotional choreography......’. This theoretical work has three aims. First, it seeks to illustrate how the story of psychological IVF offers a rich range of materializations of emotions. Secondly, this work proposes a feminist materialist conceptualization of emotions that is both non-representational and posthuman. This conceptualization draws...

  16. EDUCATIONAL PSYCHOLOGY

    Directory of Open Access Journals (Sweden)

    Sunil Patil

    2009-06-01

    Full Text Available Education Psychology is one of the most rapidly advancing disciplines which is concerned with the description, explanation and control of the educational processes arising from the interaction between the teacher and learner in the context of a specified or unspecified subject. The concept of educational psycology is changing as a result of the general impact of the disciplines such as sociology, anthropology,economics, political science and so on. The subject matter of educational psychology is also reflecting a diversity of structures and emphases in its connection.

  17. MEDIA MANIPULATION AND PSYCHOLOGICAL WAR IN UKRAINE AND THE REPUBLIC OF MOLDOVA

    Directory of Open Access Journals (Sweden)

    Vladislav SARAN

    2016-12-01

    Full Text Available Media manipulation and psychological war in Ukraine and the Republic of Moldova is a battleground of various psychological methods in order to subordinate the masses often under cover of alleged common good. In this regard Russian propaganda machinery is one that works perfectly since the Soviet period. Ukrainian crisis swept the struggle for Ukraine's informational space which has also affected neighboring countries, here referring to Moldova. The conflict between Ukraine and Russia now is more ambiguous because information warfare methods and techniques have become more sophisticated and aim directly to misinformation, informational intoxication and propaganda through the media.

  18. Space psychology

    Science.gov (United States)

    Parin, V. V.; Gorbov, F. D.; Kosmolinskiy, F. P.

    1974-01-01

    Psychological selection of astronauts considers mental responses and adaptation to the following space flight stress factors: (1) confinement in a small space; (2) changes in three dimensional orientation; (3) effects of altered gravity and weightlessness; (4) decrease in afferent nerve pulses; (5) a sensation of novelty and danger; and (6) a sense of separation from earth.

  19. Psychology Experiments.

    Science.gov (United States)

    McGraw, Ken; Tew, Mark D.; Williams, John E.

    2001-01-01

    A goal of the PsychExperiments project was to reduce the financial burden on psychology departments for hardware/software used in their laboratories. In its third year, the PsychExperiments site now hosts 39 experiments. Over 200 classrooms worldwide have signed up as official site users and there have been nearly 10,000 data sessions conducted.…

  20. Psychology Today.

    Science.gov (United States)

    Anderssen, Arthur

    2003-01-01

    Describes the design of the University of Texas Austin's Seay Psychology and Child Development & Family Relationships building. With modern technique and materials, the Seay building adds to the established architectural language of the campus, offering a richly tactile structure and adjoining outdoor space embracing the tenets of successful…

  1. Psychology Experiments.

    Science.gov (United States)

    McGraw, Ken; Tew, Mark D.; Williams, John E.

    2001-01-01

    A goal of the PsychExperiments project was to reduce the financial burden on psychology departments for hardware/software used in their laboratories. In its third year, the PsychExperiments site now hosts 39 experiments. Over 200 classrooms worldwide have signed up as official site users and there have been nearly 10,000 data sessions conducted.…

  2. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  3. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  4. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available of the Government, as well as cyber security and cyber warfare acts and the command and control aspects thereof. The research presented is largely theoretical in nature, focusing on recent events in the public international domain....

  5. Administrative Law: The Hidden Comparative Law Course.

    Science.gov (United States)

    Strauss, Peter L.

    1996-01-01

    Argues that the main contribution of the Administrative Law course to law students is that it presents problems which contrast with those of the standard court-centered curriculum and can illuminate other areas of law, repeatedly confronting students with doctrinal differences. Offers several examples from civil procedure, constitutional law, and…

  6. Criminal tendencies and psychological testing

    Directory of Open Access Journals (Sweden)

    Sobchik L. N.

    2017-04-01

    Full Text Available Methods of psychological diagnostics closer to the psychology main research areas, which involve measuring the accuracy and statistical reliability. A set of methods that includes questionnaires should be complemented with projective tests in which the stimulus material is verbal in nature. The article presents the results of surveys of different groups of persons in conflict with the law, as well as screening tests contingent of youth groups and adolescents. High performance, spontaneously manifested aggressiveness, traits, emotional immaturity, low self-control and primitive-the requirement of the hierarchy of values at statistically significant level are identified in the data psychodiagnostic study, thus allowing to allocate the risk of wrongful conduct and to develop preventive measures of psycho-pedagogical and social nature. Psychological testing is an effective tool in the study of criminal predisposici and gives the key to a science-based approach in the development of preventive measures aimed at reducing crime.

  7. Electronic Warfare: Rethinking the Importance of Its Role In Military Operations

    Science.gov (United States)

    2016-06-10

    EW mindset changes. 15. SUBJECT TERMS Electronic Warfare, Vulnerability, Military, Threat , Technology, Technological 16. SECURITY...Signature: Kevin nernen, C USAF Corn i e Signatu P er e, , C Directo JointA ancedWarfighting Signature: 10 June 2016 Thesis Advisor: Approved by: School...Electronic warfare support actions taken to identify, locate sources of energy emitted by enemy systems for the purpose of providing threat warning

  8. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available framework. 5.1 Constrains and Implications Several factors can constrain network warfare and have associated consequences. These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical... the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers and network are powerful tools and great harm can be caused with them. Motive, attitude, values, upbringing, experience...

  9. ‘Lest we forget’*: a veteran and son share a ‘warfare tourism’ experience

    OpenAIRE

    Fallon, Paul; Robinson, Peter

    2016-01-01

    Warfare tourism’ represents an increasingly significant dimension of contemporary tourism. This paper provides a fresh perspective on participation in ‘warfare tourism’ by investigating the behaviour and experiences of a living veteran and his son returning to two theatres of war in which the veteran had served in the Royal Navy during the Second World War. Active interviews with the two family members were used to gather rich data regarding the two extended trips, which had been funded by ‘H...

  10. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  11. Assessment of Law Enforcement Candidates: Peer Evaluations and the MMPI.

    Science.gov (United States)

    Schumacher, Joseph E.; Scogin, Forrest

    Screening and evaluating law enforcement candidates for employment as police officers is a complex task. It has been recommended that a clinical interview and comprehensive battery of psychological tests may aid in evaluation. The Minnesota Multiphasic Personality Inventory (MMPI) is often used for this type of psychological screening. Peer…

  12. Hybrid Warfare: How to Shape Special Operations Forces

    Science.gov (United States)

    2016-06-10

    psychological pressure, actively supporting a domestic opposition, and using insurgency or subversive methods.”69 He says, “States under hybrid...that combine low-level conventional and special operations; offensive cyber and space actions; and psychological operations that use social and...1. The aim is to control the minds. Primarily control the minds of the political leadership and the population through propaganda ( psychological

  13. Law Student Wellbeing: A Neoliberal Conundrum

    Science.gov (United States)

    Thornton, Margaret

    2016-01-01

    The discourse around student wellness is a marked feature of the 21st century Australian legal academy. It has resulted in various initiatives on the part of law schools, including the development of a national forum. The phenomenon relates to psychological distress reported by students through surveys. Proposed remedies tend to focus on improving…

  14. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  15. Methodology and biological monitoring of exposure to chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Shih, M.L.; Smith, J.R.; McMonagle, J.D. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    In the past few years, our institute has developed several GC/MS methods for the detection of the breakdown products of toxic organophosphonates (soman, sarin, GF) and vesicant sulfur mustard in biological samples. Recently we developed a modified GC/MS method for VX and are continually working on the methodology for lewisite and tabun. The purpose is to have an analytical tool to verify the exposure of chemical warfare agents in humans. Analytical procedures for quantitating the hydrolyzed phosphonic acids from nerve agents in environmental samples have been reported by many analysts. For more complex matrices such as biological samples, there is not yet a method reported. To make these polar acids amenable to gas chromatographic analysis a prior derivatization is needed. We found the pentafluorobenzyl ester derivatives of the phosphonates are suitable for verification and pharmacokinetic studies in biological samples. This method may also serve as an alternative method for confirmation purposes in environmental samples.

  16. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  17. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  18. Respiratory Protection Against Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    G.K. Prasad

    2008-09-01

    Full Text Available Chemical and biological warfare (CBW agents pose unavoidable threat, both to soldiers and civilians.Exposure to such deadly agents amidst the CBW agents contaminated environment can be avoided bytaking proper protective measures. Respiratory protection is indispensable when the soldiers or civiliansare surrounded by such deadly environment as contamination-free air is needed for respiration purposes.In this context, an attempt has been made to review the literature for the past five decades on developmentof various protective devices for respiratory protection against aerosols, gases, and vapours of CBWagents. This review covers structural, textural, and adsorption properties of materials used in gas filtersand mechanical filters for the removal of CBW agents.Defence Science Journal, 2008, 58(5, pp.686-697, DOI:http://dx.doi.org/10.14429/dsj.58.1692

  19. Spectroscopic investigations of surface deposited biological warfare simulants

    Science.gov (United States)

    Barrington, Stephen J.; Bird, Hilary; Hurst, Daniel; McIntosh, Alastair J. S.; Spencer, Phillippa; Pelfrey, Suzanne H.; Baker, Matthew J.

    2012-06-01

    This paper reports a proof-of-principle study aimed at discriminating biological warfare (BW) simulants from common environmental bacteria in order to differentiate pathogenic endospores in situ, to aid any required response for hazard management. We used FTIR spectroscopy combined with multivariate analysis; FTIR is a versatile technique for the non-destructive analysis of a range of materials. We also report an evaluation of multiple pre-processing techniques and subsequent differences in cross-validation accuracy of two pattern recognition models (Support Vector Machines (SVM) and Principal Component - Linear Discriminant Analysis (PC-LDA)) for two classifications: a two class classification (Gram + ve spores vs. Gram -ve vegetative cells) and a six class classification (bacterial classification). Six bacterial strains Bacillus atrophaeus, Bacillus thuringiensis var. kurstaki, Bacillus thuringiensis, Escherichia coli, Pantaeoa agglomerans and Pseudomonas fluorescens were analysed.

  20. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  1. Platform-level Distributed Warfare Model-based on Multi-Agent System Framework

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2012-05-01

    Full Text Available The multi-agent paradigm has become a useful tool in solving military problems. However, one of key challenges in multi-agent model for distributed warfare could be how to describe the microcosmic  tactical warfare platforms actions. In this paper, a platform-level distributed warfare model based on multi-agent system framework is designed to tackle this challenge. The basic ideas include:  Establishing multi-agent model by mapping from tactical warfare system’s members, i.e., warfare platforms, to respective agents; performing task decomposition and task allocation by using task-tree decomposition method and improved contract net protocol model technique; and implementing simulation by presenting battlefield terrain environment analysis algorithm based on grid approach. The  simulation demonstration results show that our model provides a feasible and effective approach to supporting the abstraction and representation of microcosmic tactical actions for complex warfare system.Defence Science Journal, 2012, 62(1, pp.180-186, DOI:http://dx.doi.org/10.14429/dsj.62.964

  2. LIDAR for Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    S Veerabuthiran

    2011-04-01

    Full Text Available Remote detection of chemical and biological warfare agents and toxic gases in the atmosphere is of current interest to both the military and civilian agencies. Out of all currently available techniques, no single technique provides efficient detection against such threats at significant standoff distances. Light detection and ranging (LIDAR technologies, based on the transmission of laser pulses and analysis of the return signals, have demonstrated impressive capabilities in remote detection of such toxic chemicals. LIDAR is a highly sensitive tool to detect the extremely low concentrations of various toxic agents present in the form of thin clouds at distances of few kilometer. The detection of these toxic clouds is based on the approach of first detecting and measuring the range of the clouds using the scattering phenomena and subsequently identifying the composition of toxic clouds using absorption and fluorescence phenomena. Laser Science and Technology Centre (LASTEC, Delhi has been working on the design and development of LIDAR systems for detection of chemical and biological warfare (CBW agents. In this paper, theoretical analysis of differential absorption LIDAR (DIAL for detection of chemical agents and fluorescence LIDAR for detection of biological agents has been discussed. For some typical parametric conditions, the received power levels from different ranges to detect specific concentrations of chemical or biological clouds have been computed and discussed. The technical details of the indigenously developed backscattering LIDAR, which detects and measures the distance of cloud layers up to 5 km is also presented.Defence Science Journal, 2011, 61(3, pp.241-250, DOI:http://dx.doi.org/10.14429/dsj.61.556

  3. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E.; Brimfield, A.A.; Cook, L. [Army Medical Research Institute of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1996-10-01

    With the advent of enzyme linked immunoabsorbent assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detection soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition these antibodies were found to be highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies extended the level of sensitivity to {approximately}80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These reagents offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances. More recent efforts have focussed on developing antibodies specific for sulfur mustard a highly reactive vesicating agent.

  4. Editorial: Discovery from Lake Turkana and History of Human Warfare

    Directory of Open Access Journals (Sweden)

    Professor S. P. Singh, Ph.D.

    2016-02-01

    Full Text Available Very interesting finds have come to light of violently killed humans from Lake Turkana in the Kenyan Rift Valley around 10000 years ago. A stunning discovery of skeletons of 27 persons who are believed to have been killed at the same time and are supposed to have suffered violent wounds has been reported recently (Nature 529, 394–398, 21 January 2016. These finds belong to a period of late Pleistocene/early Holocene of the hunter-gatherer societies from Nataruk. Among the victims were men, women and children. The individuals were killed with projectiles and blunt weapons. These skeletons were found in the lagoon and were preserved very nicely. Such type of mass killing probably could never happen as a consequence of intra-group conflict. The evidence seems to be towards warfare and aggression in ancient societies. The experts ruled out the possibility of a cemetery and ceremonial burial. This discovery of 27 skeletons points to the fact that there may have been more causalities and many individuals might have escaped death at that time. According to one of the co-authors of this research Dr. R.A. Foley, the groups were elatively more densely packed populations than the hunter gatherers and had more chances of having inter-group conflicts because of sharing the resources which would have been plentiful near the lagoons and water bodies. Violence probably has been in the instinct of early humans and that the warfare among humans has a history of 10000 years or even earlier.

  5. Looming Threat of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    A.K. Goel

    2016-09-01

    Full Text Available In the recent past, a dramatic shift has been observed in the strategies of warfare from conventional to non-conventional. Now-a-days, traditional power is of less importance than it used to be earlier. Weapons of mass destruction, which comprise of nuclear weapons, and chemical and biological warfare agents, are posing a great peril to the world due to their devastating potential. Though, there are several bilateral as well as multilateral treaties to control the use and proliferation of these weapons, yet the risk of use of such agents by non-state actors cannot be overlooked. Chances of use of chemical and biological agents are more likely than the nuclear weapons. A comparison of nuclear, chemical and biological weapons in terms of technology, cost, signature, effectiveness on protected and un-protected troops shows that chemical and biological weapon programmes require much lower level of technology and cost than the nuclear weapon programme. Further, there is no or least distinctive and readily observable signature in biological weapon programme in comparison to nuclear and chemical weapon facilities. There can be two possibilities of use of these agents in terrorist attacks. First, there is a risk of transfer of material or know-how of these weapons to terrorists for using against the adversaries and second, the risk of these agents being pilfered due to poor security, thereby sabotaging the national security. The International Committee of Red Cross in February 1918 reckoned these agents as ‘barbarous inventions’ that can ‘only be called criminal’.

  6. A Square Peg in a Round Hole: A Case Study of Center Gravity Application in Counter Insurgency Warfare

    Science.gov (United States)

    2011-06-01

    D.C.: Potomac Books, 2010. Griffith, Samuel B. The Illustrated Art of War. New York: Oxford University Press, 2005. Guevara , Ernesto Che, Brian... Guevara provided another approach to insurgency, encapsulated in the concept of the foco, which he described in his 1960 work Guerrilla Warfare. The... Guevara , Guerrilla Warfare, edited by Brian Loveman and Thomas Davies, (Oxford: SR Books, 1997), 7. 21 Guevara , Guerrilla Warfare, 256. 22 Guevara

  7. Fate of chemical warfare agents and toxic industrial chemicals in landfills.

    Science.gov (United States)

    Bartelt-Hunt, Shannon L; Barlaz, Morton A; Knappe, Detlef R U; Kjeldsen, Peter

    2006-07-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs) in MSW landfills was predicted with a mathematical model. Five blister agents [sulfur mustard (HD), nitrogen mustard (HN-2), lewisite (L), ethyldichloroarsine (ED), and phosgene oxime (CX)], eight nerve agents [tabun (GA), sarin (GB), soman (GD), GE, GF, VX, VG, and VM], one riot-control agent [CS], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis half-lives. Monte Carlo simulations were performed to assess the influence of uncertainty in model input parameters on CWA/TIC fate predictions. Correlation analyses showed that uncertainty in hydrolysis rate constants was the primary contributor to variance of CWA fate predictions, while uncertainty in the Henry's Law constant and landfill gas-production rate accounted for most of the variance of TIC fate predictions. CWA hydrolysates were more persistent than the parent CWAs, but limited information is available on abiotic or biotic transformation rates for these chemicals.

  8. Cultural psychology.

    Science.gov (United States)

    Heine, Steven J; Ruby, Matthew B

    2010-03-01

    Humans are a cultural species, constantly navigating a complex web of culturally bound practices, norms, and worldviews. This article provides a brief overview of the relatively young field of cultural psychology, which investigates the many ways psychology and culture interweave with one another. Highlighting the cultural nature of the human species, it draws upon research on cultural evolution, enculturation, and developmental processes. This review further summarizes a number of cultural differences in how people perceive the self, and the behavioral consequences that follow from these differences, in the domains of internal and external attribution styles, motivations for self-enhancement, approach/avoidance, primary and secondary control, as well as motivations for distinctiveness and conformity. Additionally, the review discusses research on the intersection of culture and emotion, as well as cultural differences in cognition, perception, and reasoning. Copyright © 2010 John Wiley & Sons, Ltd. For further resources related to this article, please visit the WIREs website. Copyright © 2010 John Wiley & Sons, Ltd.

  9. Neural scaling laws for an uncertain world

    CERN Document Server

    Howard, Marc W

    2016-01-01

    The Weber-Fechner law describes the form of psychological space in many behavioral experiments involving perception of one-dimensional physical quantities. If the physical quantity is expressed using multiple neural receptors, then placing receptive fields evenly along a logarithmic scale naturally leads to the psychological Weber-Fechner law. In the visual system, the spacing and width of extrafoveal receptive fields are consistent with logarithmic scaling. Other sets of neural "receptors" appear to show the same qualitative properties, suggesting that this form of neural scaling reflects a solution to a very general problem. This paper argues that these neural scaling laws enable the brain to represent information about the world efficiently without making any assumptions about the statistics of the world. This analysis suggests that the organization of neural scales to represent one-dimensional quantities, including more abstract quantities such as numerosity, time, and allocentric space, should have a uni...

  10. Beyond Artificial Intelligence toward Engineered Psychology

    Science.gov (United States)

    Bozinovski, Stevo; Bozinovska, Liljana

    This paper addresses the field of Artificial Intelligence, road it went so far and possible road it should go. The paper was invited by the Conference of IT Revolutions 2008, and discusses some issues not emphasized in AI trajectory so far. The recommendations are that the main focus should be personalities rather than programs or agents, that genetic environment should be introduced in reasoning about personalities, and that limbic system should be studied and modeled. Engineered Psychology is proposed as a road to go. Need for basic principles in psychology are discussed and a mathematical equation is proposed as fundamental law of engineered and human psychology.

  11. "Oh, the Places You'll Go!": Newcastle Law School's Partnership Interventions for Well-Being in First Year Law

    Science.gov (United States)

    Lindsay, Katherine; Kirby, Dianne; Dluzewska, Teresa; Campbell, Sher

    2015-01-01

    Since "Courting the Blues" was published by Kelk, Luscombe, Medlow and Hickie in 2009, legal educators across Australia have been measuring psychological distress in law students, as well as implementing and evaluating strategies to support students' well-being. This paper reports on initiatives implemented at the Newcastle Law School in…

  12. Psychology of religion: perspectives from cultural psychology

    NARCIS (Netherlands)

    Belzen, J.A.

    2010-01-01

    After a brief introduction, this paper tries to establish what type of psychology the psychology of religion is. Having introduced cultural psychology in general, some theories applicable in research on religion are presented, and some examples of cultural psychological research of religious

  13. Psychology Faculty Perceptions of Abnormal Psychology Textbooks

    Science.gov (United States)

    Rapport, Zachary

    2011-01-01

    The problem. The purpose of the current study was to investigate the perceptions and opinions of psychology professors regarding the accuracy and inclusiveness of abnormal psychology textbooks. It sought answers from psychology professors to the following questions: (1) What are the expectations of the psychology faculty at a private university of…

  14. [Criminal psychology in Franco's police].

    Science.gov (United States)

    Bandrés, Javier; Llavona, Rafael; Zubieta, Eva

    2013-02-01

    Francisco J. de Echalecu (1897-1957) was a Spanish psychiatrist who held important positions, such as Psychology Professor at the Academia General de Policía and Neuropsychiatrist at the Dirección General de Seguridad. This work provides a brief biography of Echalecu and analyzes the transcriptions of his classes on Criminal Psychology of 1942, his Criminal Psychology from 1947 as well as his involvement in the case of the torture of Communist leader Heriberto Quiñones. We describe his project of a totalitarian Psychology and his proposal of social intervention, including eugenic methodologies as well as forced reclusion for those labeled as asocial. The adaptation in Spain of the totalitarian psychological project to the new international reality after the Second World War is also described. In Spain a "final solution" for criminals and political dissidents has been prepared, which was inspired by the Nazi criminal policies and promoted by Dr. Echalecu from Spain's higher police body, the DGS. This project was frustrated by the German defeat in the world war and the only thing left from the original project was the arbitrary application of the Ley de Vagos y Maleantes [an antivagrancy law] to those individuals labeled as "asocial".

  15. Economic Analysis of Law

    OpenAIRE

    Louis Kaplow; Steven Shavell

    2005-01-01

    This entry for the forthcoming The New Palgrave Dictionary of Economics (Second Edition) surveys the economic analysis of five primary fields of law: property law; liability for accidents; contract law; litigation; and public enforcement and criminal law. It also briefly considers some criticisms of the economic analysis of law.

  16. Demonstrating the Gas Laws.

    Science.gov (United States)

    Holko, David A.

    1982-01-01

    Presents a complete computer program demonstrating the relationship between volume/pressure for Boyle's Law, volume/temperature for Charles' Law, and volume/moles of gas for Avagadro's Law. The programing reinforces students' application of gas laws and equates a simulated moving piston to theoretical values derived using the ideal gas law.…

  17. An overview of South African psychology.

    Science.gov (United States)

    Cooper, Saths; Nicholas, Lionel

    2012-01-01

    This overview of psychology in South Africa presents a concise and historical account of its science and practice, from its early origins in the late nineteenth century to the present, and traces seminal influences on the discipline. It is a review of how psychology in South Africa developed over more than a century to become one of the most popular subjects in universities and an established and recognized profession, whose members play a variety of roles in the South African polity and larger society. The impact that apartheid racism had on key aspects of psychology's development is traversed, and the influences that previous ruling party politics had on professional psychological organizations are delineated. The unification of psychology under the Psychological Society of South Africa, a few months before the advent of democracy in South Africa, is explicated. The protection of the title of psychologist in law and certain other changes in the legislative environment, enabling a greater role for psychologists, are reported. The primary research sites for psychology and its funding and the main university psychology programs are described, as are the requirements for registration and licensure. The genesis and the importance of the work of internationally acclaimed South African psychologists, such as J. Wolpe and A. A. Lazarus, are contextualized. With the increased participation of progressive black psychologists in leadership and research in the past two decades, a transformed psychology has the potential to play a significant role in addressing human issues confronting South Africa.

  18. A novel guidance law using fast terminal sliding mode control with impact angle constraints.

    Science.gov (United States)

    Sun, Lianghua; Wang, Weihong; Yi, Ran; Xiong, Shaofeng

    2016-09-01

    This paper is concerned with the question of, for a missile interception with impact angle constraints, how to design a guidance law. Firstly, missile interception with impact angle constraints is modeled; secondly, a novel guidance law using fast terminal sliding mode control based on extended state observer is proposed to optimize the trajectory and time of interception; finally, for stationary targets, constant velocity targets and maneuvering targets, the guidance law and the stability of the closed loop system is analyzed and the stability of the closed loop system is analyzed, respectively. Simulation results show that when missile and target are on a collision course, the novel guidance law using fast terminal sliding mode control with extended state observer has more optimized trajectory and effectively reduces the time of interception which has a great significance in modern warfare.

  19. Topical and Applied Interests of Introductory Psychology Students

    Science.gov (United States)

    Stalder, Daniel R.; Stec, Deborah A.

    2007-01-01

    Using forced-choice and continuous measures, introductory psychology students reported highest interest for the topical areas of clinical and social psychology (over biological, cognitive, and developmental) and for the applied areas of education and health (over business, environment, and law) at both the beginning and end of semesters. Among…

  20. How a cognitive psychologist came to seek universal laws.

    Science.gov (United States)

    Shepard, Roger N

    2004-02-01

    My early fascination with geometry and physics and, later, with perception and imagination inspired a hope that fundamental phenomena of psychology, like those of physics, might approximate universal laws. Ensuing research led me to the following candidates, formulated in terms of distances along shortest paths in abstract representational spaces: Generalization probability decreases exponentially and discrimination time reciprocally with distance. Time to determine the identity of shapes and, provisionally, relation between musical tones or keys increases linearly with distance. Invariance of the laws is achieved by constructing the representational spaces from psychological rather than physical data (using multidimensional scaling) and from considerations of geometry, group theory, and symmetry. Universality of the laws is suggested by their behavioral approximation in cognitively advanced species and by theoretical considerations of optimality. Just possibly, not only physics but also psychology can aspire to laws that ultimately reflect mathematical constraints, such as those of group theory and symmetry, and, so, are both universal and nonarbitrary.

  1. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  2. Tenancy Law Denmark

    DEFF Research Database (Denmark)

    Edlund, Hans Henrik

    2003-01-01

    Report on Danish Tenancy Law. Contribution to a research project co-financed by the Grotius Programme for Judicial Co-Operation in Civil Matters. http://www.iue.it/LAW/ResearchTeaching/EuropeanPrivateLaw/Projects.shtml......Report on Danish Tenancy Law. Contribution to a research project co-financed by the Grotius Programme for Judicial Co-Operation in Civil Matters. http://www.iue.it/LAW/ResearchTeaching/EuropeanPrivateLaw/Projects.shtml...

  3. Democratic contract law

    OpenAIRE

    Hesselink, M.W.

    2015-01-01

    This article discusses the normative relationship between contract law and democracy. In particular, it argues that in order to be legitimate contract law needs to have a democratic basis. Private law is not different in this respect from public law. Thus, the first claim made in this article will be that also for contract law a democratic basis is a necessary condition for legitimacy. A fully democratic basis may also be a sufficient condition for a legitimate and just contract law. However,...

  4. Passive front-ends for wideband millimeter wave electronic warfare

    Science.gov (United States)

    Jastram, Nathan Joseph

    This thesis presents the analysis, design and measurements of novel passive front ends of interest to millimeter wave electronic warfare systems. However, emerging threats in the millimeter waves (18 GHz and above) has led to a push for new systems capable of addressing these threats. At these frequencies, traditional techniques of design and fabrication are challenging due to small size, limited bandwidth and losses. The use of surface micromachining technology for wideband direction finding with multiple element antenna arrays for electronic support is demonstrated. A wideband tapered slot antenna is first designed and measured as an array element for the subsequent arrays. Both 18--36 GHz and 75--110 GHz amplitude only and amplitude/phase two element direction finding front ends are designed and measured. The design of arrays using Butler matrix and Rotman lens beamformers for greater than two element direction finding over W band and beyond using is also presented. The design of a dual polarized high power capable front end for electronic attack over an 18--45 GHz band is presented. To combine two polarizations into the same radiating aperture, an orthomode transducer (OMT) based upon a new double ridge waveguide cross section is developed. To provide greater flexibility in needed performance characteristics, several different turnstile junction matching sections are tested. A modular horn section is proposed to address flexible and ever changing operational requirements, and is designed for performance criteria such as constant gain, beamwidth, etc. A multi-section branch guide coupler and low loss Rotman lens based upon the proposed cross section are also developed. Prototyping methods for the herein designed millimeter wave electronic warfare front ends are investigated. Specifically, both printed circuit board (PCB) prototyping of micromachined systems and 3D printing of conventionally machined horns are presented. A 4--8 GHz two element array with

  5. The Legal Content of School Psychology Journals: A Systematic Survey

    Science.gov (United States)

    Zaheer, Imad; Zirkel, Perry A.

    2014-01-01

    The many challenges that school psychologists face inevitably include legal issues. In light of the agreement between the two primary professional organizations for school psychologists that understanding of law is a critical competency, this study analyzed the extent of law-based articles in leading school psychology journal articles published…

  6. Treatability study report for remediation of chemical warfare agent contaminated soils using peroxysulfate ex-situ treatment. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, J.R.; Grinstead, J.H.; Farley, J.A.; Enlow, P.D.; Kelly, D.A.

    1996-07-01

    This laboratory scale study examines the feasibility of using peroxysulfate based oxidants to remediate soils contaminated with GB, Hi, and VX. The project was conducted with chemical warfare agent simulants. The study concludes that peroxysulfates, and particularly peroxydisulfate, can degrade chemical warfare agent simulants in soil and recommends continuing research.

  7. The Fourth Law of Behavior Genetics.

    Science.gov (United States)

    Chabris, Christopher F; Lee, James J; Cesarini, David; Benjamin, Daniel J; Laibson, David I

    2015-07-01

    Behavior genetics is the study of the relationship between genetic variation and psychological traits. Turkheimer (2000) proposed "Three Laws of Behavior Genetics" based on empirical regularities observed in studies of twins and other kinships. On the basis of molecular studies that have measured DNA variation directly, we propose a Fourth Law of Behavior Genetics: "A typical human behavioral trait is associated with very many genetic variants, each of which accounts for a very small percentage of the behavioral variability." This law explains several consistent patterns in the results of gene discovery studies, including the failure of candidate gene studies to robustly replicate, the need for genome-wide association studies (and why such studies have a much stronger replication record), and the crucial importance of extremely large samples in these endeavors. We review the evidence in favor of the Fourth Law and discuss its implications for the design and interpretation of gene-behavior research.

  8. Research on performance of ethernet interface in network centric warfare

    Institute of Scientific and Technical Information of China (English)

    梁永生; 张乃通

    2004-01-01

    The concept of network centric warfare (NCW) and its character, high requirement of real-time synchronization are introduced. The distributed equal-node network architecture in NCW is presented. Based on theoretical analysis on ethernet interface performance, this paper presents that forwarding latency between ethernet interface devices is a key influence factor of real-time synchronization in NCW. Ethernet fundamental is briefly introduced. The model between a switch under test (SUT) and a smartbits card is presented and used for two interconnecting switches in NCW. On condition that ignoring the latency of connecting fiber or twisted pairs and processing latency of the smartbits test system, this paper presents that clock frequency tolerance (CFT) between a SUT and a smartbits card is a leading influence factor of forwarding latency of an ethernet switch. The formulae to calculate internal forwarding latency and forwarding latency caused by its CFT are deduced. Theoretical calculation on forwarding latency of an ethernet switch based on the given CFT and test time is implemented. Experimental study on primary forwarding latency and secondary forwarding latency is implemented and forwarding latency between the SUT and the smartbits card is measured, thus testifying the accuracy of the above theoretical analysis that the CFT is a key influence factor of forwarding latency. The measures to satisfy the needs of forwarding latency in NCW are presented.

  9. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  10. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  11. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  12. Human scalp permeability to the chemical warfare agent VX.

    Science.gov (United States)

    Rolland, P; Bolzinger, M-A; Cruz, C; Briançon, S; Josse, D

    2011-12-01

    The use of chemical warfare agents such as VX in terrorism act might lead to contamination of the civilian population. Human scalp decontamination may require appropriate products and procedures. Due to ethical reasons, skin decontamination studies usually involve in vitro skin models, but human scalp skin samples are uncommon and expensive. The purpose of this study was to characterize the in vitro permeability to VX of human scalp, and to compare it with (a) human abdominal skin, and (b) pig skin from two different anatomic sites: ear and skull roof, in order to design a relevant model. Based on the VX skin permeation kinetics and distribution, we demonstrated that (a) human scalp was significantly more permeable to VX than abdominal skin and (b) pig-ear skin was the most relevant model to predict the in vitro human scalp permeability. Our results indicated that the follicular pathway significantly contributed to the skin absorption of VX through human scalp. In addition, the hair follicles and the stratum corneum significantly contributed to the formation of a skin reservoir for VX.

  13. Polycultural psychology.

    Science.gov (United States)

    Morris, Michael W; Chiu, Chi-yue; Liu, Zhi

    2015-01-01

    We review limitations of the traditional paradigm for cultural research and propose an alternative framework, polyculturalism. Polyculturalism assumes that individuals' relationships to cultures are not categorical but rather are partial and plural; it also assumes that cultural traditions are not independent, sui generis lineages but rather are interacting systems. Individuals take influences from multiple cultures and thereby become conduits through which cultures can affect each other. Past literatures on the influence of multiple cultural identities and cultural knowledge legacies can be better understood within a polyculturalist rubric. Likewise, the concept elucidates how cultures are changed by contact with other cultures, enabling richer psychological theories of intercultural influence. Different scientific paradigms about culture imply different ideologies and policies; polyculturalism's implied policy of interculturalism provides a valuable complement to the traditional policy frames of multiculturalism and colorblindness.

  14. Psychiatric/ psychological forensic report writing.

    Science.gov (United States)

    Young, Gerald

    Approaches to forensic report writing in psychiatry, psychology, and related mental health disciplines have moved from an organization, content, and stylistic framework to considering ethical and other codes, evidentiary standards, and practice considerations. The first part of the article surveys different approaches to forensic report writing, including that of forensic mental health assessment and psychiatric ethics. The second part deals especially with psychological ethical approaches. The American Psychological Association's Ethical Principles and Code of Conduct (2002) provide one set of principles on which to base forensic report writing. The U.S. Federal Rules of Evidence (2014) and related state rules provide another basis. The American Psychological Association's Specialty Guidelines for Forensic Psychology (2013) provide a third source. Some work has expanded the principles in ethics codes; and, in the third part of this article, these additions are applied to forensic report writing. Other work that could help with the question of forensic report writing concerns the 4 Ds in psychological injury assessments (e.g., conduct oneself with Dignity, avoid the adversary Divide, get the needed reliable Data, Determine interpretations and conclusions judiciously). One overarching ethical principle that is especially applicable in forensic report writing is to be comprehensive, scientific, and impartial. As applied to forensic report writing, the overall principle that applies is that the work process and product should reflect integrity in its ethics, law, and science. Four principles that derive from this meta-principle concern: Competency and Communication; Procedure and Protection; Dignity and Distance; and Data Collection and Determination. The standards or rules associated with each of these principles are reviewed. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  15. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  16. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  17. Fear as a medium of communication in asymmetric forms of warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    2011-01-01

    Fear is defined as the distinction between risk and danger, a distinction that operates in communicative forms. War is always also warfare about the form of war. The article describes how fear in warfare becomes a symbolically generalized medium of communication, mainly focusing on how the form...... of fear evolves in asymmetric warfare. Asymmetric war induces fear in both parties, but in a communicative form that leads to very different experiences of fear. Fear is observed and analysed with Niklas Luhmann’s theory of self-referential systems of communication and well as his theory of risk....... Following Luhmann and in continuation of Clausewitz’ conceptual tools, yet with other means, the article proposes to observe war as a system that can de-ontologize itself and thereby concern moving centres of gravity such as communication lines, motivation, public fear as well as perceptions of risk...

  18. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  19. The Dialectic Psychology perspectives

    OpenAIRE

    Oliveros M., Ricardo; Facultad de Psicología, Universidad Nacional Mayor de San Marcos, Lima, Perú

    2014-01-01

    The present paper exposes the dialectic psychology perspectives in the twentieth first century Peru. We ponder about the dialectics psychology denomination, connecting them to other denominations used in the materialist psychology trend. We analyze the relations between dialectics psychology and social neuroscience, delimiting both the psychological sciences field and the neuroscience field. We develop issues from the emancipator project of dialectics psychology, precising personal developmen...

  20. On Boolean Stable Laws

    CERN Document Server

    Arizmendi, Octavio

    2012-01-01

    We determine which Boolean stable law is freely infinitely divisible and which is not. Some positive Boolean stable laws and a mixture of them have completely monotonic densities and they are both freely and classically infinitely divisible. Freely infinitely divisible Boolean stable laws and the corresponding free stable laws are non trivial examples whose free divisibility indicators are infinity.

  1. Tax Law System

    Science.gov (United States)

    Tsindeliani, Imeda A.

    2016-01-01

    The article deals with consideration of the actual theoretic problems of the subject and system of tax law in Russia. The theoretical approaches to determination of the nature of separate institutes of tax law are represented. The existence of pandect system intax law building as financial law sub-branch of Russia is substantiated. The goal of the…

  2. Democratic contract law

    NARCIS (Netherlands)

    Hesselink, M.W.

    2015-01-01

    This article discusses the normative relationship between contract law and democracy. In particular, it argues that in order to be legitimate contract law needs to have a democratic basis. Private law is not different in this respect from public law. Thus, the first claim made in this article will

  3. Operational Law Handbook

    Science.gov (United States)

    1993-01-01

    Law* implications. R-5 3. Wills for both spouses. 4. Powers of Attorney. 5. Consumer law issues. B. 1ypically readiness exercises and rapid...Soldiers’ & Sailors’ Civil Relief Act JA 261 Real Property Guide JA 262 Wills Guide JA 263 Family Law Guide JA 265 Consumer Law Guide JA 267 Legal

  4. Behavioural Analysis of Criminal Law: A Survey

    Directory of Open Access Journals (Sweden)

    Alon Harel

    2014-05-01

    Full Text Available This article is a survey of behavioural analysis of criminal law. Behavioural analysis of criminal law exploits social science methodologies (behavioural economics, psychology and even sociology to explore the effects of criminal law norms and enforcement policy on criminals, judges, juries, lawyers and other decision-makers, to determine the optimal type and size of criminal sanctions, to identify the optimal design of the enforcement system and the rules of evidence. Unlike traditional economic analysis, the behavioural perspective is eclectic rather than unitary; it is composed of various psychological and sociological findings including cognitive biases and their effects, prospect theory, the effects of social norms, findings concerning the ways preferences and beliefs are being shaped and even studies concerning happiness. Behavioural theorists call for the understanding and at times exploitation of various cognitive misperceptions, biases and heuristics to increase the deterrent effect of criminal law prohibitions and sanctions and/or increase their effectiveness. This survey compares this approach to traditional retributive approach and to economic analysis of law. It also provides several examples in which behavioural insights were used and, last it evaluates the prospects that the behavioural approach will influence policy and legislation.

  5. Principles of private law

    OpenAIRE

    Andraško, Richard

    2011-01-01

    Principles of private law The reason of choosing "Principles of private law" for my thesis is that private law is built on untouchable values. For example, basic values like freedom and equality, which are represented by these principles. Many of them are indispensable in the relation of functionality of the whole system of law. Most of them have Roman law origin. The purpose of my thesis is to describe and summarize the main principles of private law that mostly appear in Czech law, especial...

  6. Evolutionary developmental psychology

    National Research Council Canada - National Science Library

    King, Ashley C; Bjorklund, David F

    2010-01-01

    The field of evolutionary developmental psychology can potentially broaden the horizons of mainstream evolutionary psychology by combining the principles of Darwinian evolution by natural selection...

  7. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  8. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized.

  9. Law across nations

    DEFF Research Database (Denmark)

    of participants keen to work together to promote research and policy development in such a lively forum." - Professor Steve Saxby PhD, Cert Ed., MBCS Professor of IT Law and Public Policy, Solicitor, Deputy Head of School (Research), Faculty of Business and Law, University of Southampton, Editor...... not only the original themes of Legal, Security and Privacy Issues in IT Law and International Law and Trade but more recently two new conferences on International Public and Private Law. The papers in this volume then represent the contributions to all these fields and reflect the strong desire......-in-Chief, The Computer Law & Security Review - The International Journal of Technology Law and Practice (Elsevier), www.elsevier.com/locate/clsr, Editor, The Encyclopedia of Information Technology Law (Sweet & Maxwell), Director ILAWS - Institute for Law and the Web - School of Law, Southampton University, www...

  10. Psychology Ethics in Introductory Psychology Textbooks

    Science.gov (United States)

    Zucchero, Renee' A.

    2011-01-01

    Previous research revealed that introductory psychology textbooks included limited information about psychology ethics. This study reviewed 48 current introductory psychology textbooks for research and other APA ethics content. These textbooks included slightly more total ethics content and were more thorough in their review of research ethics…

  11. Psychology Ethics in Introductory Psychology Textbooks

    Science.gov (United States)

    Zucchero, Renee' A.

    2011-01-01

    Previous research revealed that introductory psychology textbooks included limited information about psychology ethics. This study reviewed 48 current introductory psychology textbooks for research and other APA ethics content. These textbooks included slightly more total ethics content and were more thorough in their review of research ethics…

  12. EU Labour Law

    DEFF Research Database (Denmark)

    Nielsen, Ruth

    The focus in this book is upon EU labour law and its interaction with national and international labour law. The book provides an analysis of the framework and sources of European labour law. It covers a number of substantive topics, notably collective labour law, individual employment contracts......, discrimination on grounds of sex and on other grounds, free movement of persons, restructuring of enterprises, working environment and enforcement of rights derived from EU labour law....

  13. The Power of Law

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    China’s draft Energy Law is now under consideration China’s draft Energy Law has been submitted to the State Council’s Legislative Affairs Office and will be considered at this year’s executive meeting, said a key member of the expert panel drafting the law. If the law makes it through the council, the National People’s Congress (NPC), China’s supreme law-making body, will vote on it.

  14. Law System in Japan

    OpenAIRE

    Andreea Lorena Ponaru

    2007-01-01

    This article attempts to present and explain the main features of the japanese law system. Japanese Law system was reformed during the domination of Tokugawa shogun family. In 1870, Foreign Governmental Systems Study Office was founded. By judicial sentences many french laws were introduced in Japanese law system. Roma-Tokyo-Berlin Alliance (1936) introduced a strong German influence in the law system. The Japanese judicial system has known five periods. In the first (1869-1888) were introduc...

  15. Power laws, Pareto distributions and Zipf's law

    OpenAIRE

    Newman, M E J

    2004-01-01

    When the probability of measuring a particular value of some quantity varies inversely as a power of that value, the quantity is said to follow a power law, also known variously as Zipf's law or the Pareto distribution. Power laws appear widely in physics, biology, earth and planetary sciences, economics and finance, computer science, demography and the social sciences. For instance, the distributions of the sizes of cities, earthquakes, solar flares, moon craters, wars and people's personal ...

  16. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  17. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  18. International Private Law and Communitarian Law

    Directory of Open Access Journals (Sweden)

    Abelardo Posso Serrano

    2013-01-01

    Full Text Available Private international law is justified at a time when the legal systems of nation states seeking a way to extend their areas and competencies. This desire led to the conflict between national laws, which grew smaller as did the novel concept of "international community", but did not suppress national relativism. A new law began to settle, then, with the progress of the integration process. Community laws have mechanisms to be applied, even when states would try to ignore them or to fulfill a relative way.

  19. Psychology of psychology? A theoretization of psychological science through historical and socio-anthropological analysis of Psychology as institution

    OpenAIRE

    Martin Žužek-Kres

    2008-01-01

    The article presents a "new" history of psychology, which is also termed as "psychology of psychology". In some academic communities this unconventional history of psychology represents today an accepted approach to epistemological questions about psychological concepts and it enables an insight into social contextualization of Psychology as an institution. The conclusion presents a referential and institutional context where this psychology of psychology is realized.

  20. Narrowing the zone of uncertainty between research and development in biological warfare defense.

    Science.gov (United States)

    Huxsoll, D L

    1992-12-31

    Although "research" is not prohibited by the Biological Weapons Convention, States Parties to the Convention have maintained the spirit of the Convention in actions relating to research. The confidence-building measures agreed to at RC2 refer to research facilities, publication of research results, and promotion of contacts between scientists engaged in research related to the Convention. However, assessment of basic research on biological agents is not a productive way to distinguish an offensive from a defensive program. Additionally, if a country were to initiate a biological weapons program, basic research on biological agents may not be necessary. For example, the extensive published research on Bacillus anthracis, both as a cause of anthrax in cattle and other species and as a biological-warfare agent, would enable any motivated group or nation to initiate a biological weapons program that could immediately advance to the development and scale-up stages. Research on biological agents for offensive purposes would be characterized by activities such as selection for growth, virulence, and toxin production; improving stability under varying environmental conditions; and selection of strains that might overcome existing means of prophylaxis and treatment. A biological program with an offensive intent would in most cases be characterized by evidence of development efforts in mass production and dissemination, which are often agent-specific. Thus, an assessment of development may distinguish offensive from defensive programs. If a country were to initiate a biological weapons research program, and were willing to risk worldwide condemnation should existence of such a program become known, it is likely that such a program would include development and production capabilities. If a country were not committed to production capability, there would be no rationale for an offensive biological research that would bring worldwide condemnation. Critics of the U

  1. Behavioral law and economics: Empirical methods

    OpenAIRE

    Engel, Christoph

    2013-01-01

    Originally, behavioral law and economics was an exercise in exploring the implications of key findings from behavioral economics (and psychology) for the analysis and reform of legal institutions. Yet as the new discipline matures, it increasingly replaces foreign evidence by fresh evidence, directly targeted to the legal research question. This chapter surveys the key methods: field evidence, survey data, vignette and lab experiment, discusses their pros and cons, illustrates them with key p...

  2. Introduction to Psychology.

    Science.gov (United States)

    Edwards, Lesley

    Designed for community students interested in learning about psychology as a field of study, this module offers group and individual activities to involve the beginning student in research, experimentation and discussion. Unit 1, "What Is Psychology?," includes the use of animals in psychology, ethics, the history of psychology, an…

  3. Introduction to Psychology.

    Science.gov (United States)

    Edwards, Lesley

    Designed for community students interested in learning about psychology as a field of study, this module offers group and individual activities to involve the beginning student in research, experimentation and discussion. Unit 1, "What Is Psychology?," includes the use of animals in psychology, ethics, the history of psychology, an…

  4. Mainstreaming Culture in Psychology

    Science.gov (United States)

    Cheung, Fanny M.

    2012-01-01

    Despite the "awakening" to the importance of culture in psychology in America, international psychology has remained on the sidelines of psychological science. The author recounts her personal and professional experience in tandem with the stages of development in international/cross-cultural psychology. Based on her research in cross-cultural…

  5. Stress and resilience in law enforcement training and practice.

    Science.gov (United States)

    Miller, Laurence

    2008-01-01

    For law enforcement and emergency services professionals, stress and resilience are not academic topics or luxuries; they are essential to the physical and mental health, as well as to optimum job functioning. This article traces the history of the stress and resilience concepts in psychology, the military, and law enforcement, outlines the major risk and protective factors for traumatic stress responses, and presents a general psychophysiological model of stress and coping. The article next applies these concepts to the proactive fostering of mental toughness and resilience, using lessons learned from sports psychology and the mental conditioning literature. It then describes psychological debriefing, mental health counseling, and psychotherapeutic strategies for facilitating resilient recovery from critical incidents and traumatic events. Although directed mainly to law enforcement, the principles set out in this article may be productively applied to emergency medicine, public safety, military, and civilian trauma counseling settings.

  6. Psychological services for returning veterans and their families: evolving conceptualizations of the sequelae of war-zone experiences.

    Science.gov (United States)

    Sammons, Morgan T; Batten, Sonja V

    2008-08-01

    The provision of effective and timely behavioral health care for veterans returning from the conflicts in Iraq and Afghanistan has become the focus of national attention. In this special issue, attempts to provide psychological care for service members and their families are examined in light of three key constructs. First, it is contended that at no other time in history has more attention been paid to the psychological consequences of engaging in combat. Second, for the first time in recorded warfare, psychological morbidity is likely to far outstrip physical injury associated with combat. Finally, although posttraumatic stress disorder and traumatic brain injury are serious concerns, most service members return without significant physical or psychological injury and will be able to return to functioning without notable problems. Accurate diagnosis, a focus on resilience, and the expectation of readjustment are essential precepts that should guide clinical efforts and resource allocation.

  7. RUSSIAN LAW SUBJECTS

    Directory of Open Access Journals (Sweden)

    D.N. Bakhrakh

    2006-03-01

    Full Text Available The question about the subjects of law branches is concerning the number of most important and difficult in law science. Its right decision influences on the subject of law regulation, precise definition of addressees of law norms, the volume of their rights and duties, the limits of action of norms of Main part of the branch, its principles. Scientific investigations, dedicated to law subjects system, promote the development of recommendations for the legislative and law applying activity; they are needed for scientific work organization and student training, for preparing qualified lawyers.

  8. Essays on strategy: hostage rescue planning; maritime theater nuclear capability; strategic psychological operations

    Energy Technology Data Exchange (ETDEWEB)

    Brauer, R.F.; Thomas, R.E.; Kriesel, M.E.

    1985-01-01

    The essays in the volume won recognition in the 1984 Joint Chiefs of Staff Strategy Essay Competition. The volume contains three essays. The author of the first essay considers the requirements for successful planning of hostage rescues, specifically reviewing the Son Tay raid, the Mayaguez crisis, the Entebbe rescue, and the Iranian hostage rescue attempt. The author of the second essay looks at the US Navy's capability for maritime theater nuclear warfare, identifying problems and recommending improvements. The author of the third essay finds the United States lacking a national-level mechanism for coordinating military psychological operations and proposes a way to remedy the problem.

  9. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and s

  10. Sandals and Robes to Business Suits and Gulf Streams: Warfare in the 21st Century

    Science.gov (United States)

    2011-04-20

    cartels, or simply shooting an American for the price of a loaf of bread to feed their families, we need to better understand what we’re facing. From...our goals, but as warfare becomes more untenable in the age of social media, as the unacceptable killing of civilians on any battlefield could lose

  11. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  12. Ion mobility spectrometry and its applications in detection of chemical warfare agents.

    Science.gov (United States)

    Mäkinen, Marko A; Anttalainen, Osmo A; Sillanpää, Mika E T

    2010-12-01

    When fast detection of chemical warfare agents in the field is required, the ion mobility spectrometer may be the only suitable option. This article provides an essential survey of the different ion mobility spectrometry detection technologies. (To listen to a podcast about this feature, please go to the Analytical Chemistry multimedia page at pubs.acs.org/page/ancham/audio/index.html.).

  13. Analysis of Urinary Metabolites of Nerve and Blister Chemical Warfare Agents

    Science.gov (United States)

    2014-08-01

    Warfare Agents GA Tabun , ethyl dimethylphosphoramidate GB Sarin, isopropyl methylphosphonofluoridate GD Soman, pinacolyl methylphosphonofluoridate...and their metabolites Agent Metabolite GA, Tabun O P O N CN Ethyl Dimethylphosphoroamidate, EDMAP, GA Acid HO P O N CN GB, Sarin P O

  14. Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations

    Science.gov (United States)

    2010-05-13

    American Espionage. NY: Reynal and Hitchcock , 1946. Barrett, Neil H. Chingpaw. NY: Vantage, 1962. Bartholomew-Feis, Dixee R. The O.S.S. and Ho Chi...United States Army. Washington, D.C.: U.S. Government Printing Office, 1990. Paddock, Alfred H. U.S. Army Special Warfare; Its Origins. Lawrence, KS

  15. Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers

    Science.gov (United States)

    2007-11-02

    in converting electric energy to thermal energy for the decon applications. Other conductive materials, such as polythiophenes , polypyrroles, carbon...Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers...Joule)-heating with conducting polymers. The basic concept is that electrically conducting polymers, such as polyaniline, can be used as coatings or

  16. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    chemical scenario involving the release of a blister agent (mustard lewisite) would result in a waste that the State of Colorado would regulate as... Waste Management ................................................................. 24 4.3 Key Planning Factors: Recovery Planning...Planning Factors, this document presents a chemical warfare agent scenario featuring Agent Yellow, a blister agent. Agent Yellow is a mixture of

  17. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available of the various interacting components, a model to better understand the complexity in a network warfare environment would be beneficial. Non-quantitative modelling is a useful method to better characterize the field due to the rich ideas that can be generated...

  18. Disruption of a binary organogel by the chemical warfare agent soman (GD) and common organophosphorus simulants

    OpenAIRE

    Hiscock, Jennifer R.; Sambrook, Mark R; Ede, Jayne A.; Wells, Neil J.; Philip A. Gale

    2014-01-01

    The chemical warfare agent (CWA) soman (GD) acts as a molecular stimulus for the disruption of an anthracene-based binary organogel prepared in cyclohexane. The CWA simulants dimethyl methylphosphonate (DMMP) and diethyl chlorophosphate (DCP) were also found to disrupt the binary organogel through changes in solvent polarity and reactions with the gelator.\\ud \\ud

  19. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused b

  20. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives o

  1. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    air warfare (AAW), weapon selection, unmanned aerial vehicle, simulation, design of experiments, combat systems 15. NUMBER OF PAGES 81 16. PRICE ...Explanation of a Cookie-Cutter Sensor. ........................ 19 Figure 12. Stop Conditions Menu in MANA...companies sell these deadly missiles at affordable prices to allow many countries to easily employ them onboard their warships. Missiles also offer

  2. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  3. A Healthy Law

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The National People’s Congress(NPC)published China’s new draft Food Safety Law on April 20 for public discussion.The draft law covers food safety evaluation,monitoring, and recall and information release.

  4. Administrative Law Judges

    Science.gov (United States)

    The Administrative Law Judges conduct hearings and render decisions in proceedings between the EPA and persons, businesses, government entities, and other organizations which are or are alleged to be regulated under environmental laws.

  5. Recent Case Law

    DEFF Research Database (Denmark)

    Petz, Thomas; Sagaert, Vincent; Østergaard, Kim

    2004-01-01

    In this section authors from various European countries report the recent case law in their country on the field of private patrimonial law, that is decisions on the law of property, juridical acts, the law of obligations, contract law and prescription. The European Review of Private Law (ERPL......) started this section in 2003. The section aims to give our readers an overview of what is happening in the most recent European case law. We have asked the national reporters to report the juridical essence of the decisions given by the highest courts in their country. These national reports...... not relate the facts of the decision, nor the personal opinion of the reporter. One can find discussions on the most important decisions of European courts in ERPL’s case note section. The recent case law section gives overviews of decisions published in periods of four months. The period of January...

  6. Recent Case Law

    DEFF Research Database (Denmark)

    Petz, Thomas; Sagaert, Vincent; Østergaard, Kim

    2004-01-01

    In this section authors from various European countries report the recent case law in their country on the field of private patrimonial law, that is decisions on the law of property, juridical acts, the law of obligations, contract law and prescription. The European Review of Private Law (ERPL......) started this section in 2003. The section aims to give our readers an overview of what is happening in the most recent European case law. We have asked the national reporters to report the juridical essence of the decisions given by the highest courts in their country. These national reports...... not relate the facts of the decision, nor the personal opinion of the reporter. One can find discussions on the most important decisions of European courts in ERPL’s case note section. The recent case law section gives overviews of decisions published in periods of four months. The period of January...

  7. By Law Established

    DEFF Research Database (Denmark)

    Christoffersen, Lisbet

    2017-01-01

    An analysis of the degree and content of statutory law regulation of Nordic Lutheran majority churches in 2017......An analysis of the degree and content of statutory law regulation of Nordic Lutheran majority churches in 2017...

  8. Health care law versus constitutional law.

    Science.gov (United States)

    Hall, Mark A

    2013-04-01

    National Federation of Independent Business v. Sebelius, the Supreme Court's ruling on the Patient Protection and Affordable Care Act, is a landmark decision - both for constitutional law and for health care law and policy. Others will study its implications for constitutional limits on a range of federal powers beyond health care. This article considers to what extent the decision is also about health care law, properly conceived. Under one view, health care law is the subdiscipline that inquires how courts and government actors take account of the special features of medicine that make legal or policy issues especially problematic - rather than regarding health care delivery and finance more generically, like most any other economic or social enterprise. Viewed this way, the opinions from the Court's conservative justices are mainly about general constitutional law principles. In contrast, Justice Ruth Bader Ginsburg's dissenting opinion for the four more liberal justices is just as much about health care law as it is about constitutional law. Her opinion gives detailed attention to the unique features of health care finance and delivery in order to inform her analysis of constitutional precedents and principles. Thus, the Court's multiple opinions give a vivid depiction of the compelling contrasts between communal versus individualistic conceptions of caring for those in need, and between health care and health insurance as ordinary commodities versus ones that merit special economic, social, and legal status.

  9. On Teaching Natural Law.

    Science.gov (United States)

    Forte, David F.

    1978-01-01

    A brief look at Columbia, Harvard, and Notre Dame law schools shows that the American tradition in teaching natural law has not been strong. The value of teaching natural law is discussed, a separate course or seminar is seen as the most effective option, and a selection of available sources for such a course is appended. (JMD)

  10. Contract law as fairness

    NARCIS (Netherlands)

    J. Klijnsma

    2015-01-01

    This article examines the implications for contract law of Rawls' theory of justice as fairness. It argues that contract law as an institution is part of the basic structure of society and as such subject to the principles of justice. Discussing the basic structure in relation to contract law is par

  11. European tax law

    NARCIS (Netherlands)

    Terra, B.J.M.; Wattel, P.J.

    2008-01-01

    This book is intended as a reference book for tax law and EC law pratitioners, tax administrators, academics, the judiciary and tax or Community law policy makers. For students, an abridged student edition textbook is available. The book offers a systematic survey of the tax implications of the EC T

  12. The Laws Are Yours.

    Science.gov (United States)

    Lawyers' Wives of Wisconsin, Racine.

    The pamphlet briefly describes various facets of the law and legal system in Wisconsin, and defines many legal terms. The objective is to further public understanding of the law and of the legal profession, particularly in Wisconsin. No attempt is made to answer specific legal questions. Sections cover civil and criminal law; the federal court…

  13. Operational Law Handbook 2002

    Science.gov (United States)

    2002-03-26

    designations (Note: Soldiers may no longer use the “By Law” designation.) 3. Wills for both spouses. 4. Powers of Attorney. 5. Consumer law issues. 6...Guide JA 263 Family Law Guide JA 265 Consumer Law Guide JA 267 Legal Assistance Office Directory JA 271 Legal Assistance Office Administration

  14. Environmental law in Denmark

    DEFF Research Database (Denmark)

    Basse, Ellen Margrethe

    Modern Danish environmental law has a strong international dimension due to membership of EU and participation in global and regional agreements. The concept of transnational law that includes EU environmental law that has vertical as well as horizontal effects across jurisdictions binding national...

  15. Historizing epistemology in psychology.

    Science.gov (United States)

    Jovanović, Gordana

    2010-12-01

    The conflict between the psychometric methodological framework and the particularities of human experiences reported in psychotherapeutic context led Michael Schwarz to raise the question whether psychology is based on a methodological error. I take this conflict as a heuristic tool for the reconstruction of the early history of psychology, which bears witness to similar epistemological conflicts, though the dominant historiography of psychology has largely forgotten alternative conceptions and their valuable insights into complexities of psychic phenomena. In order to work against the historical amnesia in psychology I suggest to look at cultural-historical contexts which decisively shaped epistemological choices in psychology. Instead of keeping epistemology and history of psychology separate, which nurtures individualism and naturalism in psychology, I argue for historizing epistemology and for historical psychology. From such a historically reflected perspective psychology in contemporary world can be approached more critically.

  16. Psychological Theories of Acculturation

    DEFF Research Database (Denmark)

    Ozer, Simon

    2017-01-01

    The proliferation of cultural transition and intercultural contact has highlighted the importance of psychological theories of acculturation. Acculturation, understood as contact between diverse cultural streams, has become prevalent worldwide due to technological, economical, and educational...... advancements, together with greater mobility. Acculturation psychology aims to comprehend the dynamic psychological processes and outcomes emanating from intercultural contact. Acculturation psychology has been a growing field of research within cross-cultural psychology. Today, psychological theories...... of acculturation also include cognate disciplines such as cultural psychology, social psychology, sociology, and anthropology.The expansion of psychological theories of acculturation has led to advancements in the field of research as well as the bifurcation of epistemological and methodological approaches...

  17. Bruner's Search for Meaning: A Conversation between Psychology and Anthropology.

    Science.gov (United States)

    Mattingly, Cheryl; Lutkehaus, Nancy C; Throop, C Jason

    2008-03-01

    We introduce a special issue of Ethos devoted to the work of Jerome Bruner and his careerlong attempts to seek innovative ways to foster a dialogue between psychology and anthropology. The articles in this special issue situate Bruner's meaning-centered approach to psychology and his groundbreaking work on narrative in the broader context of the developmental trajectory of both of fields of inquiry. Bruner's work has been enormously influential in the subfields of cultural psychology and psychological anthropology, especially because of his important contributions to our understanding of the intimate relationship between culture and mind. We examine Bruner's past and ongoing engagement with such luminary figures as Lev Vygotsky, Jean Piaget, Alfred Kroeber, Claude Lévi-Strauss, and Clifford Geertz to highlight points of convergence and tension between his version of cultural psychology and contemporary theorizing and practice in psychological anthropology. We also review his practical and theoretical contributions to the fields of medicine, law, and education.

  18. Bruner's Search for Meaning: A Conversation between Psychology and Anthropology

    Science.gov (United States)

    Mattingly, Cheryl; Lutkehaus, Nancy C.; Throop, C. Jason

    2010-01-01

    We introduce a special issue of Ethos devoted to the work of Jerome Bruner and his careerlong attempts to seek innovative ways to foster a dialogue between psychology and anthropology. The articles in this special issue situate Bruner's meaning-centered approach to psychology and his groundbreaking work on narrative in the broader context of the developmental trajectory of both of fields of inquiry. Bruner's work has been enormously influential in the subfields of cultural psychology and psychological anthropology, especially because of his important contributions to our understanding of the intimate relationship between culture and mind. We examine Bruner's past and ongoing engagement with such luminary figures as Lev Vygotsky, Jean Piaget, Alfred Kroeber, Claude Lévi-Strauss, and Clifford Geertz to highlight points of convergence and tension between his version of cultural psychology and contemporary theorizing and practice in psychological anthropology. We also review his practical and theoretical contributions to the fields of medicine, law, and education. PMID:20706551

  19. Venezuela as an Exporter of 4th Generation Warfare Instability

    Science.gov (United States)

    2012-12-01

    e.g., Colombia and Peru, to date); and, • Diplomatic war/media war/conventional war (e.g., Algeria, 1954-62). 13 Any one of the above...financial war, trade war, psychological war, network ( virus ) war, cyber war, chemical-biological-radiological war, etc. Professional soldiers no...support to the insurgent and drug trafficking Revo- lutionary Armed Forces of Colombia (FARC), Ira- 23 nian surrogate and terrorist Hezbollah

  20. Towards a Semiotic Information Position Framework for Network Centric Warfare

    Science.gov (United States)

    2011-06-01

    study of anything which stands for something else [10]. Swiss linguist Ferdinand de Saussure and American logician and philosopher Charles Sanders Peirce...are considered as the founders of semiotics [10]. As a linguist, Saussure was interested in the relationships between words (or signs) and he argued...to Eco, Saussure “did not define the signified any too clearly, leaving it half way between a mental image, a concept and a psychological reality

  1. Irregular Warfare and Future War: Strategy and Defense Planning; Strategic Insights, v. 10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation

    OpenAIRE

    Russell, James A.

    2011-01-01

    This article appeared in Strategic Insights, v.10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation Approved for public display, distribution unlimited The purpose of this paper is threefold: to speculate on the role and prominence of irregular warfare in the strategic environment over the next quarter century, to comment on the impact that phenomenon may have on shaping the postulated scenarios addressed in t...

  2. The Interplay between international law and labour law in South ...

    African Journals Online (AJOL)

    This article investigates the interplay between labour law and international law in ... be included in diplomatic contracts of employment after ratification of a treaty, ... law; interplay; inviolability; labour law; principle of extraterritoriality; receiving ...

  3. Chromatography and mass spectrometry of chemical warfare agents, toxins and related compounds: state of the art and future prospects

    NARCIS (Netherlands)

    Kientz, C.E.

    1998-01-01

    Methods for the identification of chemical warfare agents, toxins, bioregulators and related products are frequently reported in literature. These methods are often based on instrumental analysis using chromatography (gas and liquid) and mass spectrometry. Here, these instrumental techniques are dis

  4. Autonomous-agent based simulation of anti-submarine warfare operations with the goal of protecting a high value unit

    OpenAIRE

    Akbori, Fahrettin

    2004-01-01

    Approved for public release, distribution unlimited The Anti-Submarine Warfare screen design simulation is a program that provides a model for operations in anti-submarine warfare (ASW). The purpose of the program is to aid ASW commanders, allowing them to configure an ASW screen, including the sonar policy, convoy speed, and the number of ships, to gain insight into how these and other factors beyond their control, such as water conditions, impact ASW effectiveness. It is also designed to...

  5. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    OpenAIRE

    Abedi, A.; HR Koohestani; Z Roosta

    2008-01-01

    ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical ...

  6. Non-Kinetic Capabilities for Irregular Warfare: Four Case Studies

    Science.gov (United States)

    2009-03-01

    Philadelphia, Saint Davids, PA: Author, 1974. 10. Mollen Commission, Report of the Commission to Investigate Allegations of Police Corruption and the...Sydney: Butterworths, 1996. Pennsylvania Crime Commission, Report on Police Corruption and the Quality of Law Enforcement in Philadelphia, Saint Davids...African Security Review, Vol. 7, No. 1, 1998. Tanzi, Vito , “Corruption Around the World: Causes, Consequences, Scope, and Cures,” IMF Staff Papers

  7. Containment 2.0: U.S. Political Warfare

    Science.gov (United States)

    2016-12-01

    2008,” Small Wars Journal 6, no. 11 (2011): 3, http://smallwarsjournal.com/jrnl/ art /cyberwar-case-study-georgia-2008. 49 Per Gahrton, Georgia... martial law in Poland in 1981, the United States and the Vatican both worked to provide support to the movement that had taken root during the 1970s...M. “Cyberwar Case Study: Georgia 2008.” Small Wars Journal 6, no. 11 (2011). http://smallwarsjournal.com/jrnl/ art /cyberwar-case-study-georgia-2008

  8. Preparing for Coalition Warfare in the Age of Austerity

    Science.gov (United States)

    2012-03-05

    national contingents are rightfully beholden. Every country has them, even the U.S., as noted by former U.S. Ambassador to NATO, Kurt Volker : ―In Libya...partners rapidly share tactics, techniques, and procedures for evolving in-theater challenges, such as the application of joint fires , counter...September 2011): 126. 9 Kurt Volker , ―Afghanistan and Libya point NATO to Five Lessons,‖ The Christian Science Monitor, July 28, 2011. 10 Center for Law

  9. IFE PsychologIA

    African Journals Online (AJOL)

    Influence of Parenting Styles on Psychological Well-Being and School Adjustment of ... Aviation Psychological Practice in the Nigerian Air Force: Challenges and ... Psychosocial Predictors of Quality of Life among Caregivers of Chronically Ill ...

  10. Personality theory, abnormal psychology, and psychological measurement. A psychological behaviorism.

    Science.gov (United States)

    Staats, A W

    1993-01-01

    Behaviorism, because it has not had a theory of personality, has been separated from the rest of psychology, unable in large part to draw from or contribute to it. Traditional psychology has not had a theory of personality that says what personality is, how it comes about, or how it functions. An antagonism has resulted that weakens rather than complements each tradition. Psychological behaviorism presents a new type of theory of personality. Derived from experimentation, it is constructed from basic theories of emotion, language, and sensory-motor behavior. It says personality is composed of learned basic behavioral repertoires (BBRs) that affect behavior. Personality measurement instruments are analyzed in terms of the BBRs, beginning the behaviorization of this field and calling for much additional research. These multilevel developments are then basic in psychological behaviorism's theory of abnormal behavior and of clinical treatment. The approach opens many new avenues of empirical and theoretical work.

  11. Water, law, science

    Energy Technology Data Exchange (ETDEWEB)

    Narasimhan, T.N.

    2007-10-17

    In a world with water resources severely impacted bytechnology, science must actively contribute to water law. To this end,this paper is an earth scientist s attempt to comprehend essentialelements of water law, and to examine their connections to science.Science and law share a common logical framework of starting with apriori prescribed tenets, and drawing consistent inferences. In science,observationally established physical laws constitute the tenets, while inlaw, they stem from social values. The foundations of modern water law inEurope and the New World were formulated nearly two thousand years ago byRoman jurists who were inspired by Greek philosophy of reason.Recognizing that vital natural elements such as water, air, and the seawere governed by immutable natural laws, they reasoned that theseelements belonged to all humans, and therefore cannot be owned as privateproperty. Legally, such public property was to be governed by jusgentium, the law of all people or the law of all nations. In contrast,jus civile or civil law governed private property. Remarkably, jusgentium continues to be relevant in our contemporary society in whichscience plays a pivotal role in exploiting vital resources common to all.This paper examines the historical roots of modern water law, followstheir evolution through the centuries, and examines how the spirit ofscience inherent in jus gentium is profoundly influencing evolving waterand environmental laws in Europe, the United States and elsewhere. In atechnological world, scientific knowledge has to lie at the core of waterlaw. Yet, science cannot formulate law. It is hoped that a philosophicalunderstanding of the relationships between science and law willcontribute to their constructively coming together in the service ofsociety.

  12. Psychology of Religion

    OpenAIRE

    Ulu, Mustafa

    2014-01-01

    In this chapter of book that entitled Science, Religion and Society: An Encyclopedia of History, Culture, and Controversy has been given important informations about psychology of religion’s historical development as well as pioneer figures’ contributions. In this text some evaluations has been made by categorizing studies in field of psychology of religion. Finally some informations are provided about current status of the psychology of religion and position of the psychology of religion ...

  13. Logotherapy and positive psychology

    OpenAIRE

    Oscar R. Oro

    2015-01-01

    Psychology omitted to approach, during almost a century, the positive aspects from persons, like creativity, humor, optimism, hope, forgiveness, life meaning, and happiness. These themes are approached by Positive Psychology, with Seligman like the principal exponent. Psychology was dedicated to explore the negative aspects from human beings improving human health. Nevertheless, this pathogenic model could not prevent mental disease. Concepts of Positive Psychology have a solid antecedent in ...

  14. Psychology in India

    Science.gov (United States)

    Sushma, B.; Padmaja, G.

    2011-01-01

    Psychology forms the basis of every human activity. The scope of psychology is increasingly widening in various economic, political, social, cultural and technological aspects. Though the application of psychology is extending to various aspects of life, it needs to be indigenised to address the dynamic needs in the various socio-economic contexts…

  15. Psychology in Mexico

    Science.gov (United States)

    Ruiz, Eleonora Rubio

    2011-01-01

    The first formal psychology course taught in Mexico was in 1896 at Mexico's National University; today, National Autonomous University of Mexico (UNAM in Spanish). The modern psychology from Europe and the US in the late 19th century were the primary influences of Mexican psychology, as well as psychoanalysis and both clinical and experimental…

  16. Psychology and Literature.

    Science.gov (United States)

    Lester, David

    1987-01-01

    Psychology and literature focus on human behavior. There are several points where the interests of psychologists and literary scholars converge. This convergence is evident in the use of literature to test psychological theories and to understand human behavior in historical times, in the psychological analyses of literature, and in psychological…

  17. Humanistic Psychology: How Realistic?

    Science.gov (United States)

    Riebel, Linda

    1982-01-01

    Overviews themes relating to humanistic psychology. Discusses the tendency of theorists to unconsciously externalize their own psyches. Examines the historical context of humanistic psychology. Discusses humanistic psychology's contribution to understanding the less healthy person. Provides instances of unrealistic thinking by humanistic…

  18. Intro through Internet Psychology.

    Science.gov (United States)

    Webster, Sandra K.; Kelliher, Thomas P.

    Psychology and computer science were clustered into a course in "Internet Psychology" with the goal of enabling students to use electronic networks responsibly and creatively and to understand the principles of psychology as they operate in the electronic context. Fourteen students from a variety of majors registered for the class.…

  19. The rule of law

    Directory of Open Access Journals (Sweden)

    Besnik Murati

    2015-07-01

    Full Text Available The state as an international entity and its impact on the individual’s right has been and still continues to be a crucial factor in the relationship between private and public persons. States vary in terms of their political system, however, democratic states are based on the separation of powers and human rights within the state. Rule of law is the product of many actors in a state, including laws, individuals, society, political system, separation of powers, human rights, the establishment of civil society, the relationship between law and the individual, as well as, individual-state relations. Purpose and focus of this study is the importance of a functioning state based on law, characteristics of the rule of law, separation of powers and the basic concepts of the rule of law.

  20. Statistical laws in linguistics

    CERN Document Server

    Altmann, Eduardo G

    2015-01-01

    Zipf's law is just one out of many universal laws proposed to describe statistical regularities in language. Here we review and critically discuss how these laws can be statistically interpreted, fitted, and tested (falsified). The modern availability of large databases of written text allows for tests with an unprecedent statistical accuracy and also a characterization of the fluctuations around the typical behavior. We find that fluctuations are usually much larger than expected based on simplifying statistical assumptions (e.g., independence and lack of correlations between observations).These simplifications appear also in usual statistical tests so that the large fluctuations can be erroneously interpreted as a falsification of the law. Instead, here we argue that linguistic laws are only meaningful (falsifiable) if accompanied by a model for which the fluctuations can be computed (e.g., a generative model of the text). The large fluctuations we report show that the constraints imposed by linguistic laws...

  1. On Hack's Law

    Science.gov (United States)

    Rigon, Riccardo; Rodriguez-Iturbe, Ignacio; Maritan, Amos; Giacometti, Achille; Tarboton, David G.; Rinaldo, Andrea

    1996-11-01

    Hack's law is reviewed, emphasizing its implications for the elongation of river basins as well as its connections with their fractal characteristics. The relation between Hack's law and the internal structure of river basins is investigated experimentally through digital elevation models. It is found that Hack's exponent, elongation, and some relevant fractal characters are closely related. The self-affine character of basin boundaries is shown to be connected to the power law decay of the probability of total contributing areas at any link and to Hack's law. An explanation for Hack's law is derived from scaling arguments. From the results we suggest that a statistical framework referring to the scaling invariance of the entire basin structure should be used in the interpretation of Hack's law.

  2. The Main Law Systems

    Directory of Open Access Journals (Sweden)

    Doranda Maracineanu

    2009-06-01

    Full Text Available The internal law of a State is the expression of the sovereign will of that Sate; however, thereare some features common to all law systems. The evolution of the society as a whole gave rise tointernational bodies (such as the European Union, through which the signatory countries haveassimilated certain unitary regulations in the internal law system. The origin of this law system is thelaw book of Justinian, during whose time the Roman law was codified. Thus, in the year 528 a. d.Justinian arranged the legal rules of those times in a unitary whole, adapted to the realities of those days.In our country, as per the fundamental law - the Constitution, the treaties and conventions ratified byRomania prevail in case of a conflict between them and the internal legislation regarding the humanrights.

  3. How Law Affects Lending

    OpenAIRE

    Haselmann, Rainer; Pistor, Katharina; Vig, Vikrant

    2006-01-01

    A voluminous literature seeks to explore the relation between law and finance, but offers little insights into dynamic relation between legal change and behavioral outcomes or about the distributive effects of law on different market participants. The current paper disentangles the law-finance relation by using disaggregate data on banks’ lending patterns in 12 transition countries over a 8 year period. This allows us to control for country level heterogeneity and differentiate between differ...

  4. Borders, Violence, Law

    Directory of Open Access Journals (Sweden)

    JAVIER DE LUCAS

    2014-06-01

    Full Text Available This article explores the relationship between violence, law and borders by analyzing both the violence at the borders and the violence of the borders. In both cases, the author states that violence exerted by means of law, as well as migratory and asylum policies, threaten the universal human rights of the most vulnerable people and cannot be seen as exercising the legitimate monopoly of force, resulting in the destruction of the Rule of Law.

  5. Rhetoric in Law

    DEFF Research Database (Denmark)

    Gabrielsen, Jonas

    The bond between law and rhetoric is as old as the subjects themselves. Especially the ancient works on legal rhetoric afford, however, a too narrow depiction of the interaction between law and rhetoric as a purely instrumental discipline of communication in court. In this paper I challenge...... this narrow understanding of legal rhetoric and outline three distinct frames of understanding the relation between law and rhetoric...

  6. Environmental law: Course

    OpenAIRE

    Малярчук, Назар Вікторович

    2013-01-01

    In this course we tried to shed some light on the most important issues of the environmental law: notion, subject, method, system and sources of environmental law, we revealed the context of government management in the field of the protection of environment, legal regulation of conducting environmental examination. The separate subjects determines legal regime of each environmental law objects: lands, water, mineral wealth, forests, air, flora and fauna, natural protection fund of Ukraine. ...

  7. Enjoying the Law

    DEFF Research Database (Denmark)

    Bjerre, Henrik Jøker

    2005-01-01

    of the concept of enjoyment is instructive, and looking at it more closely makes it possible to spell out why obedience in itself does not suffice for a moral existence. Subjecting ourselves to the prescriptions of positive law might actually function as a way of escaping the insatiable demands of the moral law....... In this case, the positive law not only sustains our enjoyment (by securing basic liberties), but also comes to function as an object of enjoyment itself....

  8. A Quantitative Examination Whether Education Mitigates Stress Levels among Law Enforcement Officers

    Science.gov (United States)

    Metts, Gary A.

    2012-01-01

    Stress is damaging if it is continual, overwhelming. and prolonged. Law enforcement officers face stressful events daily. A relationship exists between stress levels and the physical and psychological effects to the human body. Although there is a general understanding of the damage stress can do physically and psychologically, many elements that…

  9. Time for Law: Legal Literacy and Gerontological Education

    Science.gov (United States)

    Doron, Israel; Hoffman, Asaf

    2005-01-01

    In the past, the law has not been considered as an important part of gerontological science. Historically, different sciences such as medicine, biology, psychology, and sociology have played far more important roles in the creation and crystallization of gerontological knowledge. This state of affairs is reflected in academic education and field…

  10. The Moral or Educative Influence of Criminal Law

    Science.gov (United States)

    Andenaes, Johannes

    1971-01-01

    Analyzes the forms of moral or educative influences, and assesses the scanty evidence regarding their importance; discusses the relevance of psychology for evaluating the deterrent effects of criminal law. Contends that the questions confronting the lawyer are so specific that they ask for specific research. (JM)

  11. Criminal Law in Denmark

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Garde, Peter; Greve, Vagn

    Derived from the renowned multi-volume International Encyclopaedia of Laws, this book provides a practical analysis of criminal law in Denmark. An introduction presents the necessary background information about the framework and sources of the criminal justice system, and then proceeds...... resource for criminal lawyers, prosecutors, law enforcement officers, and criminal court judges handling cases connected with Denmark. Academics and researchers, as well as the various international organizations in the field, will welcome this very useful guide, and will appreciate its value in the study...... of comparative criminal law....

  12. Law before Gratian

    DEFF Research Database (Denmark)

    This volume, the third in the series, contains the proceedings of the conference 'Law before Gratian' and covers a wide range of topics from individual and local studies to broader reflections on the status and function of law in medieval European societies before the scholastic legal 'revolution......' of the later twelfth century. Seeking to broaden our view of what constituted law in this period, the articles examine these earlier developments in their own right and provide new insights into the variety and complexity of early and high medieval approaches to law and jurisprudence. Contributors...

  13. Criminal Law in Denmark

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Garde, Peter; Greve, Vagn

    resource for criminal lawyers, prosecutors, law enforcement officers, and criminal court judges handling cases connected with Denmark. Academics and researchers, as well as the various international organizations in the field, will welcome this very useful guide, and will appreciate its value in the study......Derived from the renowned multi-volume International Encyclopaedia of Laws, this book provides a practical analysis of criminal law in Denmark. An introduction presents the necessary background information about the framework and sources of the criminal justice system, and then proceeds...... of comparative criminal law....

  14. Thinking law: thinking law in motion

    OpenAIRE

    Laura Beth Nielsen

    2014-01-01

    This essay argues that one way to “think law” is to think “law in motion”. I will argue that a “law in motion” perspective embodies four core elements or ‘multiplicities’ which are: (1) multiple methodologies; (2) multiple perspectives; (3) multiple vocalities; and (4) multiple media including objects. As will become evident by the number of inspiring colleagues that have articulated rationales and perspectives for each of these multiplicities, these are not original ideas for which I can cla...

  15. The Military-Entertainment Complex: A New Facet of Information Warfare

    Directory of Open Access Journals (Sweden)

    Adam Muir

    2003-01-01

    Full Text Available The second Gulf War will become synonymous with the emergence of fully-fledged information warfare where the military-entertainment complex has so influenced strategic and logistic possibilities that it becomes apparent that the war was waged as entertainment. This is entertainment not as an amusement or diversion but utilising the techniques and tropes of the burgeoning entertainment industry as a means to achieve military objectives. This paper offers a short history of the military-entertainment complex as reality and simulation become fused in the practices of the US military machine. The paper then briefly explores three central aspects of this phenomenon evident in recent developments: the military function of computer games; the role of the Hollywood scenario and the blurring between news and reality TV. Finally the suggestion is made that subverting, co-opting and reconstructing the military-entertainment complex provides new possibilities for alternative strategies of information warfare.

  16. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    Science.gov (United States)

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  17. New studies disputing allegations of bacteriological warfare during the Korean War.

    Science.gov (United States)

    Rolicka, M

    1995-03-01

    In the television series Korea the Unknown War produced jointly by Thames Television (London) and WGBH (Boston) in 1990, General Matthew Ridgway, Commander in Chief of United Nations forces during the Korean War, called the accusations that the United States waged bacteriological warfare "black propaganda." The charges discredited the United States and, despite denials and many international discussions, have not been completely refuted until new. Following studies in archives previously not available for research and after uncovering new sources, many specific examples of black propaganda were discovered that contained false information and lies discrediting the United States. The mechanism of lies, which convinced the Korean population that bacteriological warfare was going on and that the only way not to become victims of the United States' inhuman cruelty was to fight, are shown in this paper.

  18. Historical connection between memory and testimony psychology by an experimental study of Seiichi Terada in Japan

    National Research Council Canada - National Science Library

    Wakabayashi, Kosuke; Sato, Tatsuya

    2012-01-01

    .... This is probably the first experimental study of law and psychology carried out in Japan. This article introduces Terada's history as a psychologist, and his collaboration with Makino, followed by explanation of their experiments...

  19. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  20. Integrated electronic warfare framework for infrared self-protection of transport aircraft

    CSIR Research Space (South Africa)

    Annamalai, L

    2007-09-01

    Full Text Available Warfare Framework for Infrared Self-protection of Transport Aircraft L. Annamalai Council for Scientific and Industrial Research (CSIR) Abstract - In the African scenario, slow-moving airborne platforms such as transport aircraft have in recent... predetermined baseline were considered the best method of optimising aircraft operating procedures against threats. L. Annamalai, Defence Peace, Safety and Security (DPSS), Council for Scientific and Industrial Research (CSIR), PO Box 395, 0001...

  1. Aerospace Power in Urban Warfare: Beware the Hornet’s Nest

    Science.gov (United States)

    2001-05-01

    Board Task Force on Military Operations in Built-Up Areas ( MOBA )," (Washington, DC: Office of the Undersecretary of Defense for Acquisition and...Smithsonian Institute Press, 1999), 130. 45 Vick, et al., 120. 46 Rebecca A. Grant, "The Radar Game ," Air Force Magazine, February 1999, 52-60. Grant...University Press, 1962. Grant, Rebecca A. "The Radar Game ." Air Force Magazine, February 1999, 52-60. Hawkins, William R. Putting Urban Warfare in

  2. Diagnosing Guerilla Warfare: Was William Clarke Quantrill Missouri’s Francis Marion?

    Science.gov (United States)

    2010-04-28

    frightful epoch when priests, women, and children throughout Spain plotted the murder of isolated soldiers." -Antoine-Henri J omini Jomini2...there are setbacks at any stage there sequences can be reversed to a previous phase.29 FRANCIS MARION AND GUERILLA WARFARE One of the most famous...Militia under General 28 D.M. Frost to stage his forces near the St. Louis Arsenal, as a "training camp," at what became known as Camp Jackson. 148

  3. Management of DoD Irregular Warfare (IW) and Security Force Assistance (SFA) Capabilities

    Science.gov (United States)

    2016-05-03

    manage DoD personnel with skills , training, education, and experience related to IW and SFA. DoDI 3000.11, May 3, 2016 TABLE OF CONTENTS 2...DOD INSTRUCTION 3000.11 MANAGEMENT OF DOD IRREGULAR WARFARE (IW) AND SECURITY FORCE ASSISTANCE (SFA) CAPABILITIES Originating Component...well as building the security capacity and capability of U.S. partners and allies. c. IW and SFA skills , training, education, and experience must be

  4. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    OpenAIRE

    Kathryn Merrick; Medria Hardhienata; Kamran Shafi; Jiankun Hu

    2016-01-01

    Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and ...

  5. Investigating Iraq’s Chemical Warfare Program: Updated and Expanded Research Plan

    Science.gov (United States)

    2012-07-01

    chemical warfare, chemical weapons, Conflict Records Research Center, Tabun , Sarin, UN Sepcial Commission, UN UN Monitoring, Verification and Inspection...7 for tabun and sarin; and Ahmed 2 & 3 for production of precursors for tabun and sarin. The general contractor is Al Fao General Establishment that... tabun , and sarin. “mid- 1970s” Al Hazen Institute has by this time set up contacts with “30 major foreign organizations and companies” for securing

  6. Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test

    Science.gov (United States)

    2015-12-01

    USAARL Report No. 2016-07 Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test By...pilot evaluation of The Tactile Situation Awareness System (TSAS) during simulated flight . The objective was to evaluate the ability of TSAS to improve...summarizes recent findings obtained during a simulated helicopter flight employing TSAS. The objective was to evaluate the ability of TSAS to improve a

  7. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    D.C.: U.S. Army Center of Military History, 2002), 304–308. 66Walter Laqueur , Guerrilla Warfare: A Historical & Critical Study (New Brunswick, NJ...Strategy in Guerrilla War Against Japan, 15–16. 72Peter L. Berger and Thomas Luckmann, The Social Construction of Reality (New York: Anchor Books...each other, undermining each other’s positions, or making a separate peace. The Some authors, such as Thomas Hammes, have argued that the

  8. Guerrilla Operations in the Civil War: Assessing Compound Warfare During Price’s Raid

    Science.gov (United States)

    2007-11-02

    hand, Three Years with Quantrill by O. S. Barton and Noted Guerrillas, or the Warfare on the Border by John Edwards provide alternate views of...events described in other sources. For example, Barton relates John McCorkle’s account of the story about guerrillas who Price’s army before the Battle of...Jay Monaghan provided excellent accounts of the major operations in the Trans-Mississippi Department during the Civil War. Finally, the framework for

  9. China’s Development of Asymmetric Warfare and the Security of Taiwan, Republic of China

    Science.gov (United States)

    2004-12-01

    thanks to my loving and devoted wife, Anita . Her patience, understanding, and remarkable ability to maintain a pleasant, comforting home during this...should arise (Bolt, Brenner , 2004, p.130). Information warfare technology can delay a United States response and commitment in the Taiwan Strait in...destruction of C4 systems by missiles, airpower, and high-energy weapons (Bolt & Brenner , 2004, p.133). Perhaps the most astonishing view of the PRC’s IW

  10. Molecular modeling toward selective inhibitors of dihydrofolate reductase from the biological warfare agent Bacillus anthracis.

    Science.gov (United States)

    Giacoppo, Juliana O S; Mancini, Daiana T; Guimarães, Ana P; Gonçalves, Arlan S; da Cunha, Elaine F F; França, Tanos C C; Ramalho, Teodorico C

    2015-02-16

    In the present work, we applied docking and molecular dynamics techniques to study 11 compounds inside the enzymes dihydrofolate reductase (DHFR) from the biological warfare agent Bacillus anthracis (BaDHFR) and Homo sapiens sapiens (HssDHFR). Six of these compounds were selected for a study with the mutant BaF96IDHFR. Our results corroborated with experimental data and allowed the proposition of a new molecule with potential activity and better selectivity for BaDHFR.

  11. Pirates of the Nuclear Age: The Role of U.S. Submarines in Modern Trade Warfare

    Science.gov (United States)

    2016-07-14

    the Department of the Navy. Signature: _____________________ 14 July 2016 ii Contents Page...World War II ,” (U.S. Navy, Office of the Chief of Naval Operations, Submarine Warfare Division, 1999). 2 Geoffrey Till, “A Changing Focus for the...escalation to nuclear war or a major conventional war such as the forcible reunification of Taiwan via a cross-strait invasion. If U.S. national strategic

  12. Challenges in Coalition Unconventional Warfare: The Allied Campaign in Yugoslavia, 1941-1945

    Science.gov (United States)

    2014-01-01

    JFQ 75, 4th Quarter 2014 Duke, Phil lips, and Conover 129 Challenges in Coalition Unconventional Warfare The Allied Campaign in Yugoslavia , 1941...resistance elements in Yugoslavia . The resistance movement effectively fixed in place 35 German and Italian divisions, consisting of roughly 660,000...mountain headquarters in Yugoslavia on May 14, 1944 (Imperial War Museum) Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting

  13. Hungary’s alternative to counter hybrid warfare small state’s weaponized citizenry.

    Science.gov (United States)

    2017-06-09

    Wales and Warsaw emphasized the importance of cyber defense as a crucial capability of the international security environment against hybrid threats ...and “raising public awareness on cyber threats and cyber security .”214 In other words, the Cyber Defence Unit promotes the connection between the...from asymmetric threats , and has to cover all domains–including cyber . Former studies on countering hybrid warfare have identified these

  14. A Need for Systems Architecture Approach for Next Generation Mine Warfare Capability

    Science.gov (United States)

    2006-09-01

    uncontrolled mining ultimately led to the first Hague convention where 10 Henry Petroski (1992). To Engineer is...Littoral and Mine Warfare, without which I would not have been able to participate in this program. Jon, Henry and Capt. “J” juggling between work, home...Palmer, M. (1992). Guardians of the Gulf. [Photograph], Free Press, New York. Petroski , H (1992). To Engineer is Human: The Role of Failure in

  15. Courses of Action for Enhancing USAF ’Irregular Warfare’ Capabilities: A Functional Solutions Analysis

    Science.gov (United States)

    2010-01-01

    Warfare Center to ensure that technological opportunities for novel IW appli- cations were explored, developed, and fielded. (See pp. 38–40...activities; transnational criminal activities, including narco -trafficking, illicit arms dealing, and illegal financial transactions, that support or...opportunities for novel IW applications are explored, devel- oped, and fielded. In fact, over time, it might be appropriate for the USAF to create a

  16. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    of Additives and Impurities from Polymeric Materials; EPA 560/5-85-015; U.S. Environmental Protection Agency, Office of Pesticides and Toxic...performance, a penetrating decontaminant may cause damage to the material, such as the swelling of polymers caused by solvents or any active...Chemical Warfare Agent Degradation Products. Environ . Health Perspect. 1999, 107 (12), 933–974. 5. Kim, K.; Tsay, O.G.; Atwood, D.A.; Churchill, D.G

  17. No Compromise: Establishing Balance in the US Army’s Approach to Full-Spectrum Warfare

    Science.gov (United States)

    2011-04-04

    also needlessly prolongs corporate acceptance for a leadership culture that appreciates the ’ fluid character of warfare in the modern era. Beyond the...of Iraq, reveals that a numl?er of tactical leaders exhibited superb situational awareness and thoughtful response to extremely dynamic security...Paul D. Batchelor , Fixing Intel: · . A B lneprint for Making Intelligence Relevant in Afghanistan, Center for a New American Security, Washington

  18. General George Crook’s development as a practitioner of irregular warfare during the Indian wars.

    Science.gov (United States)

    2017-06-09

    continue to prepare, train, and equip for large-scale peer or near-peer conventional warfare, the breadth of the republic’s history teaches that Irregular...considered many of the officers he encountered to be selfish, self- important, and worse yet, out of touch with the realities facing them. They limited...of Cottonwood generally, thereby virtually acknowledging himself whipped by a small party of Indians and leaving our citizens and their property

  19. Mountain Warfare and Other Lofty Problems: Foreign Perspectives on High-Altitude Combat

    Science.gov (United States)

    2011-01-01

    rope. The two primary ropes should be thoroughly tested when crossing along a rope with a climbing harness and pulley or carabiner. Gear should be...consequently, the Russian Army has a long history of mountain troops, production of specialized mountain warfare gear , and mountain training centers...The mountain units of foreign armies have spent years developing a well-worked-out technique for training Jägers. What gear should you to take to the

  20. Working on warfare-related sites. Review after 15 years and perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, U. [Umweltberatung und Planung, Kassel (Germany)

    2003-07-01

    Fifteen years ago, in 1988, in connection with the Second International TNO/BMFT-Congress for the first time sites contaminated due to armaments production were mentioned, caused by the results of the first systematic investigation of a former explosives production plant in Hessisch Lichtenau. The authors referred to another 72 large chemical armament production plants in the FRG and 39 in the GDR. At the Third International TNO/BMFT-Congress in 1990 the complex of problems were substantiated and at the same time more topics were added. The Federal Government of Germany named the following areas suspected of being warfare-related contaminated sites: former production plants, ammunition depots, defusing sites, demolition areas and firing ranges, disassembly plants and intermediate and final storage plants for conventional and chemical combat agents. Soil, water and air pollution could be caused by the following products: explosives, chemical warfare agents, incendiaries, smoke agents, propellants, additives, primary and waste products and residues from the destruction of combat agents. In 1995 the Federal Environmental Agency (UBA) presented the results of the national survey showing that there are 3240 suspected contaminated sites. In 1995 also began the soil clean-up at the warfare-related contaminated sites Stadtallendorf and Hessisch Lichtenau. 8 respectively 10 years after the beginning of the systematic investigations the first contaminated soil was removed and treated in a thermal plant. In the run-up several R and D projects funded by the Federal Government were carried out (Stadtallendorf: MOSAL = Model Remediation of Contaminated Sites, Hessisch Lichtenau: Joint project Biological Remediation of Warfare-Related Contamination). At these sites basics were worked out and technologies were put to the test which can be used for the remediation of other sites. (orig.)

  1. Chemical Warfare in World War 1: The American Experience, 1917-1918 (Leavenworth Papers, Number 10)

    Science.gov (United States)

    1984-09-01

    before they reached the front. While moving forward one night toward Chauteau Thierry , the men stopped to rest in shallow shell holes near the road. A...20-23; Curt Wachtel, Chemical Warfare (Brooklyn, NY: Chemical Publishing Co., 1941), 66. 8. Hogg, Gas, 23. 9. Augustin Mitchell Prentiss...Magazine, 10 March 1980:28. Powell, E. Alexander. The Army Behind the Army. New York: Charles Scribner’s Sons, 1919. Prentiss, Augustin Mitchell

  2. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  3. [Glanders--a potential disease for biological warfare in humans and animals].

    Science.gov (United States)

    Lehavi, Ofer; Aizenstien, Orna; Katz, Lior H; Hourvitz, Ariel

    2002-05-01

    Infection with Burkholderia mallei (formerly Pseudomonas mallei) can cause a subcutaneous infection known as "farcy" or can disseminate to condition known as Glanders. It is primarily a disease affecting horses, donkeys and mules. In humans, Glanders can produce four types of disease: localized form, pulmonary form, septicemia, and chronic form. Necrosis of the tracheobronchial tree and pustular skin lesions characterize acute infection with B. mallei. Other symptoms include febrile pneumonia, if the organism was inhaled, or signs of sepsis and multiple abscesses, if the skin was the port of entry. Glanders is endemic in Africa, Asia, the Middle East, and Central and South America. Glanders has low contiguous potential, but because of the efficacy of aerosolized dissemination and the lethal nature of the disease, B. mallei was considered a candidate for biological warfare. During World War I, Glanders was believed to have been spread to infect large numbers of Russian horses and mules on the Eastern front. The Japanese infected horses, civilians and prisoners of war during World War II. The USA and the Soviet Union have shown interest in B. mallei in their biological warfare program. The treatment is empiric and includes mono or poly-therapy with Ceftazidime, Sulfadiazine, Trimethoprim + Sulfamethoxazol, Gentamicin, Imipenem etc. Aggressive control measures essentially eliminated Glanders from the west. However, with the resurgent concern about biological warfare, B. mallei is now being studied in a few laboratories worldwide. This review provides an overview of the disease and presents the only case reported in the western world since 1949.

  4. Attitudes, Perceptions, and Aging Knowledge of Future Law Enforcement and Recreation Majors

    Science.gov (United States)

    Kurth, Maria L.; Intrieri, Robert C.

    2017-01-01

    The present study assessed knowledge of aging, ageism, and attitudes toward aging in undergraduate recreation and law enforcement majors. Past research with psychology, social work, and nursing majors showed that greater knowledge of aging was related to fewer ageist attitudes and beliefs. The results showed that law enforcement students possessed…

  5. F-rough law and the discovery of rough law

    Institute of Scientific and Technical Information of China (English)

    Qiu Jinming; Shi Kaiquan

    2009-01-01

    By using function one direction S-rough sets (function one direction singular rough sets), this article presents the concepts of F-law, F-rough law, and the relation metric of rough law; by using these concepts, this article puts forward the theorem of F-law relation metric, two orders theorem of F-rough law relation metric, the attribute theorem of F-rough law band, the extremum theorem of F-rough law relation metric, the discovery principle of F-rough law and the application of F-rough law.

  6. Gary B. Melton: Award for Distinguished Senior Career Contributions to Psychology in the Public Interest.

    Science.gov (United States)

    2014-11-01

    The APA Awards for Distinguished Contributions to Psychology in the Public Interest recognize persons who have advanced psychology as a science and/or profession by a single extraordinary achievement or a lifetime of outstanding contributions in the public interest. The 2014 recipient of the Award for Distinguished Senior Career Contributions to Psychology in the Public Interest is Gary B. Melton. Melton was selected for his "influential scholarship on critical topics in psychology in the public interest, especially child and family law and policy, forensic mental health services, child advocacy, rural psychology, research ethics, and child abuse and neglect." Melton's award citation, biography, and a selected bibliography are presented here.

  7. Climate Change Law

    NARCIS (Netherlands)

    Farber, D.A.; Peeters, Marjan

    2016-01-01

    This book brings together over seventy fifty authors for a comprehensive examination of the emerging global regime of climate change law. Despite the relative youth of climate change law, we can already begin to see the outlines of legal regimes addressing climate change mitigation and adaptation (a

  8. Social Studies: Law Education.

    Science.gov (United States)

    Curriculum Review, 1979

    1979-01-01

    Reviews 11 series, texts, supplements, kits, and professional references for law instruction, including civil and criminal law, the Bill of Rights, and controversial legal issues: arson, gun control, capital punishment, and euthanasia. While all grade levels are covered, the emphasis is on secondary-level materials. (SJL)

  9. Pop Goes the Law

    Science.gov (United States)

    Harper, Steven J.

    2013-01-01

    The Law School Admission Council recently reported that applications were heading toward a 30-year low, reflecting, as a "New York Times" article put it, "increased concern over soaring tuition, crushing student debt, and diminishing prospects of lucrative employment upon graduation." Since 2004 the number of law-school…

  10. EU Food Law Handbook

    NARCIS (Netherlands)

    Meulen, van der B.M.J.

    2014-01-01

    The twenty-first century has witnessed a fundamental reform of food law in the European Union, to the point where modern EU food law has now come of age. This book presents the most significant elements of these legal developments with contributions from a highly qualified team of academics and

  11. Haramaya Law Review: Submissions

    African Journals Online (AJOL)

    The Haramaya Law Review (HLR) is seeking original submissions in English ... including analysis of domestic or international laws and cases, the African Union ... In general, three consecutive words or more copied from a source should be treated .... If submitting to a peer-reviewed section of the journal, the instructions in ...

  12. Law-Abiding Games

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Beijing has begun work on laws and regulations to guarantee the smooth operation of the 2008 Olympics One of the major tasks for Beijing as host of the 2008 Olympic Games is to establish regulations and laws to govern the preparations for and conduct of the Games. Thus, on April 10 the Olympic Legislation Coordinating

  13. Nanotechnology and the Law

    Science.gov (United States)

    Desmoulin-Canselier, Sonia; Lacour, Stéphanie

    Law and nanotechnology form a vast subject. The aim here will be to examine them from the societal standpoint of nanoethics, if necessary without due reference to the work that has been undertaken. For while law differs from ethics, as we shall attempt to explain throughout this reflection, it must also be studied in its relationship with social realities.

  14. Laws of Network Value

    Directory of Open Access Journals (Sweden)

    Juan M.C. Larrosa

    2016-12-01

    Full Text Available The valuation of a social network is an issue that has been addressed based on simplifying approaches. Various value laws have been stipulated, which are largely atheoretical but have been effectively used to estimate the potential economic value of social network-based firms. This review highlights the various contributions used in the recent literature on networks valuation laws.

  15. Teaching Information Technology Law

    Science.gov (United States)

    Taylor, M. J.; Jones, R. P.; Haggerty, J.; Gresty, D.

    2009-01-01

    In this paper we discuss an approach to the teaching of information technology law to higher education computing students that attempts to prepare them for professional computing practice. As information technology has become ubiquitous its interactions with the law have become more numerous. Information technology practitioners, and in particular…

  16. European food law handbook

    NARCIS (Netherlands)

    Meulen, van der B.M.J.; Velde, van der M.; Szajkowska, A.; Verbruggen, R.

    2008-01-01

    This handbook analyses and explains the institutional, substantive and procedural elements of EU food law, taking the General Food Law as a focus point. Principles are discussed as well as specific rules addressing food as a product, the processes related to food and communication about food through

  17. EU Food Law Handbook

    NARCIS (Netherlands)

    Meulen, van der B.M.J.

    2014-01-01

    The twenty-first century has witnessed a fundamental reform of food law in the European Union, to the point where modern EU food law has now come of age. This book presents the most significant elements of these legal developments with contributions from a highly qualified team of academics and prac

  18. Social Studies: Law Education.

    Science.gov (United States)

    Curriculum Review, 1979

    1979-01-01

    Reviews 11 series, texts, supplements, kits, and professional references for law instruction, including civil and criminal law, the Bill of Rights, and controversial legal issues: arson, gun control, capital punishment, and euthanasia. While all grade levels are covered, the emphasis is on secondary-level materials. (SJL)

  19. The law and neuroscience.

    Science.gov (United States)

    Gazzaniga, Michael S

    2008-11-06

    Some of the implications for law of recent discoveries in neuroscience are considered in a new program established by the MacArthur Foundation. A group of neuroscientists, lawyers, philosophers, and jurists are examining issues in criminal law and, in particular, problems in responsibility and prediction and problems in legal decision making.

  20. Pop Goes the Law

    Science.gov (United States)

    Harper, Steven J.

    2013-01-01

    The Law School Admission Council recently reported that applications were heading toward a 30-year low, reflecting, as a "New York Times" article put it, "increased concern over soaring tuition, crushing student debt, and diminishing prospects of lucrative employment upon graduation." Since 2004 the number of law-school…

  1. Language and the Law.

    Science.gov (United States)

    Gibbons, John

    1999-01-01

    Discusses the language of law and its general interest to the field of applied linguistics. Specific focus is on legal language, the problems and remedies of legal communication (e.g., language and disadvantage before the law, improving legal communication) the legislation of language (e.g., language rights, language crimes), and forensic…

  2. Information Law and Copyright.

    Science.gov (United States)

    Marx, Peter A.

    1986-01-01

    Because of information law's inability to keep up with rapid changes in information technology and impreciseness of the law, copyrighting of databases poses unique problems. Interpretation of fair use doctrine, privately owned computer "downloading," impact of federal electronic filing, and questions concerning information businesses need to be…

  3. Lotka's Law Revisited.

    Science.gov (United States)

    Potter, William Gray

    1981-01-01

    Discusses the literature that has become associated with Lotka's Law of Scientific Productivity (a general theoretical estimate of author productivity in the sciences) and attempts to identify the important factors of Lotka's original methodology that should be considered when attempting to test applicability of Lotka's Law. Forty-seven references…

  4. Women and Law

    Institute of Scientific and Technical Information of China (English)

    1997-01-01

    WOMEN’S rights concern the world over. Even though China has a different legal tradition and social system, participants from the Beijing Sino-British Women and Law Symposium discovered that both Chinese and foreign scholars could reach agreement and understanding on many issues. Enacting Laws for Women Professor Yang Dawen, from the

  5. Unilateralism in International Law

    DEFF Research Database (Denmark)

    Hartmann, Jacques

    2015-01-01

    international law. This note considers when and how a State or a regional organisation may legitimately take unilateral measures to protect the environment. The note will does not consider the legality of including foreign aircraft within the ETS, which has been dealt with elsewhere. Instead, it will focus...... on the legality and importance of unilateral acts for the development of international law....

  6. The impact of EU law on Belgian consumer law terminology

    NARCIS (Netherlands)

    Cauffman, C.

    2012-01-01

    The implementation of EU directives in the field of consumer law distorted the Belgian legal terminology. In particular, consumer law terminology often differs from civil law terminology. The meaning of traditional civil law concepts is no longer respected in the field of consumer law. Moreover, the

  7. The impact of EU law on Belgian consumer law terminology

    NARCIS (Netherlands)

    Cauffman, C.

    2012-01-01

    The implementation of EU directives in the field of consumer law distorted the Belgian legal terminology. In particular, consumer law terminology often differs from civil law terminology. The meaning of traditional civil law concepts is no longer respected in the field of consumer law. Moreover, the

  8. International resources law

    Energy Technology Data Exchange (ETDEWEB)

    1991-01-01

    This book covers: Historical origins of civil code legal systems; Modern civil law practice for mineral lawyers; Treaties and agreements for protection of international investments; Europe 1992-toward a single energy market; Dispute resolution in international agreements; Assessment of political risk; Reducing political risk; Protecting mineral investments from upheaval in developing countries; Typical world petroleum arrangements; government take in the Pacific Rim - Papua New Guinea; Mineral base of the USSR and prospects of investment; International taxation for the mining practitioner; Tax considerations - branch versus subsidiary; Doing business in the host country - nontax considerations; Impact of host-country laws on operations and profits; Mineral development and native rights - New Zealand; Designing the investment vehicle: mining; International oil and gas joint ventures; Selected U.S. laws with extraterritorial effect; U.S. tax and securities laws applied to foreign joint venturers; and Extraterritorial effect of U.S. laws.

  9. Creating EU law judges

    DEFF Research Database (Denmark)

    Mayoral Diaz-Asensio, Juan Antonio; Jaremba, Urszula; Nowak, Tobias

    2014-01-01

    The judicial protection system in the European Union (EU) is premised on the fact that national judges are supposed to act as decentralized EU judges. This role is exercised through tools enshrined in, inter alia, primacy, direct and indirect effect of EU law, and the preliminary ruling procedure....... However, a number of studies show that national judges experience difficulties in exercising EU competences due to their lack of knowledge in the field of EU law. In this contribution we study the differences in the level of self-evaluation of EU law knowledge among judges, which consequently influence...... the way judges approach EU law. For that purpose we question the relevance of several institutional and socio-legal factors, such as organization of the judiciary, generation, the system of legal education and judicial training and practical experience with EU law. Our analysis is based on data collected...

  10. Mainstreaming culture in psychology.

    Science.gov (United States)

    Cheung, Fanny M

    2012-11-01

    Despite the "awakening" to the importance of culture in psychology in America, international psychology has remained on the sidelines of psychological science. The author recounts her personal and professional experience in tandem with the stages of development in international/cross-cultural psychology. Based on her research in cross-cultural personality assessment, the author discusses the inadequacies of sole reliance on either the etic or the emic approach and points out the advantages of a combined emic-etic approach in bridging global and local human experiences in psychological science and practice. With the blurring of the boundaries between North American-European psychologies and psychology in the rest of the world, there is a need to mainstream culture in psychology's epistemological paradigm. Borrowing from the concept of gender mainstreaming that embraces both similarities and differences in promoting equal opportunities, the author discusses the parallel needs of acknowledging universals and specifics when mainstreaming culture in psychology. She calls for building a culturally informed universal knowledge base that should be incorporated in the psychology curriculum and textbooks.

  11. 美军心理战与伊拉克战争%The US Psychological Warfare and Iraq War

    Institute of Scientific and Technical Information of China (English)

    王松

    2003-01-01

    @@ 在信息时代,心理战已由一种辅助作战手段和样式,发展成为全时空、全方位、多层次发挥作用的战略行动.在伊拉克战争中,美国采取攻势性心理战,全时空、全方位、多层次对伊拉克发动心理战攻势,取得一定的成效.

  12. An Examination of the Collateral Psychological and Political Damage of Drone Warfare in the FATA Region of Pakistan

    Science.gov (United States)

    2013-09-01

    124. 14 over 3.5 million, with a 30 percent male literacy rate, and a three percent female literacy rate. These issues can be attributed to FATA’s...Asia, but has attempted attacks in Europe and the U.S. Other Pakistan-based groups include Lashkar-e-Tayiba (LeT), who traditionally operates in...them. With regard to immigrant receiving societies, similarity attraction influences the choice immigrants make when they move to an adopted land and

  13. Hitler and His Technique of Psychological Warfare%希特勒与他的心理战手法

    Institute of Scientific and Technical Information of China (English)

    杜正艾

    1994-01-01

    @@ 希特勒,这个浪迹德国的奥地利人,无亲无故,无产无业,既无一技之长,亦无正常职业,在政治上更无任何经验,就连他自己也承认:"像我这样一个无名之辈,要采取任何有益的行动,连最起码的基础也不具备"①.这样一个人物,为什么在20世纪二、三十年代的德国,仅用短短14年的时间就登上了德国总理的宝座?究其根本,它是希特勒竭力利用当时德国特殊的社会历史条件,全面运用各种心理战手法,大肆煽动各阶级、阶层人士的直接结果.

  14. People's Judgments About Classic Property Law Cases.

    Science.gov (United States)

    DeScioli, Peter; Karpoff, Rachel

    2015-06-01

    People's judgments about property shape how they relate to other people with respect to resources. Property law cases can provide a valuable window into ownership judgments because disputants often use conflicting rules for ownership, offering opportunities to distinguish these basic rules. Here we report a series of ten studies investigating people's judgments about classic property law cases dealing with found objects. The cases address a range of issues, including the relativity of ownership, finder versus landowner rights, object location, objects below- versus above-ground, mislaid versus lost objects, contracts between landowners and finders, and the distinction between public and private space. The results show nuanced patterns in ownership judgments that are not well-explained by previous psychological theories. Also, people's judgments often conflict with court decisions and legal principles. These empirical patterns can be used to generate and test novel hypotheses about the intuitive logic of ownership.

  15. Emotional Intelligence and Personality as Predictors of Psychological Well-Being

    Science.gov (United States)

    James, Colin; Bore, Miles; Zito, Susanna

    2012-01-01

    Research studies have reported elevated rates of psychological distress (e.g., depression) in practicing lawyers yet little research has examined predictors of such problems in law students. Specific personality traits have been shown to be predictors of a range of psychological problems. We administered a battery of tests to a cohort of 1st-year…

  16. 76 FR 2447 - Gulf War and Health, Volume 6, Physiologic, Psychologic, and Psychosocial Effects of Deployment...

    Science.gov (United States)

    2011-01-13

    ... AFFAIRS Gulf War and Health, Volume 6, Physiologic, Psychologic, and Psychosocial Effects of Deployment... authority granted by the Persian Gulf War Veterans Act of 1998, Public Law 105-277, title XVI, 112 Stat..., ``Gulf War and Health, Volume 6, Physiologic, Psychologic, and Psychosocial Effects of Deployment-Related...

  17. The Practice of Transnational Law

    CERN Document Server

    2000-01-01

    Contents :"The new law merchant and the global market place" by Klaus Peter Berger, "The CENTRAL enquiry on the use of transnational law in international contract law and arbitration", "The UNIDROIT principles and transnational law" by Michael Joachim Bonell, "Examples for the practical application of transnational law", "The questionnaire and results of the CENTRAL enquiry"

  18. Chemical Laws, Idealization and Approximation

    Science.gov (United States)

    Tobin, Emma

    2013-01-01

    This paper examines the notion of laws in chemistry. Vihalemm ("Found Chem" 5(1):7-22, 2003) argues that the laws of chemistry are fundamentally the same as the laws of physics they are all "ceteris paribus" laws which are true "in ideal conditions". In contrast, Scerri (2000) contends that the laws of chemistry are…

  19. Identity of psychology, identity and psychology

    Directory of Open Access Journals (Sweden)

    Mirjana Nastran Ule

    2003-09-01

    Full Text Available The article deals with epistemic issues of modern psychology with the starting hypothesis being that scientific psychology must satisfy three main interests: scientific, practical and emancipatory interest. Particularly important is the emancipatory interest, which is based on the social reflection of scientific work and conclusions. Psychological knowledge involves not only neutral descriptions of facts, but also implicit rules, expectations regarding values or norms, and criticism of undesirable behavior. The traditional psychological model attempts to satisfy the scientific interest and partly practical interest, while avoiding emancipatory interest. But I believe modern socio-historical models of psychology to be significant precisely owing to the inclusion of emancipatory interest. The difference between these two models of psychology is most obvious in their perception of identity i.e. individuality. Conventional perceptions follow the logic of "possessive individualism" in which the individual is seen as an autonomous bearer and owner of his/her psychological states and processes. The conventional model of identity supports the modernist concept of the individual as being focused on his/her self or personal identity. Socio-historical models, on the other hand, see the individual as a being embedded in social relations and social interactions, and one who builds and expresses his/her individuality through the reflection on social interactions, discursive practices, and response to the hierarchy of power and social mechanisms of control. According to this model, identity evolves through a series of social constructions which are embodied in the individual and represent him/her in society. Identity thus becomes a notion that combines individuality and social context, subjectivation and objectivation of the individual, and historical and biographical time.

  20. Ethnographic Fieldwork in psychology

    DEFF Research Database (Denmark)

    Tanggaard, Lene

    2014-01-01

    It is argued in the present article that ethnographic fieldwork can serve useful methodological ends within psychology and open the discipline to the cultural landscape of psychological phenomena in everyday life in social practices. Furthermore, a positive case is made for the soundness...... of ethnographic fieldwork. That is, rather than disputing the claim that qualitative methods can serve scientific ends, it is argued that ethnographic fieldwork is suitable for studying the constitution of psychological phenomena in social practices across time....

  1. Psychological Test Validity

    Directory of Open Access Journals (Sweden)

    Gessmann H.-W.

    2015-02-01

    Full Text Available This paper presents a theoretical overview of current aspects about the validity problems of psychological tests. The article demonstrates the importance of the development of psychological tests and the scientific studies of their validity, describes the different types of validity and the possible ways of measurement and determination of the validity coefficients. The paper is recommended for researchers, whose work is dedicated to the development, modification or adaptation of the psychological test.

  2. Psychological violence against children

    OpenAIRE

    Jurkovič, Sabina

    2012-01-01

    The topic of my thesis is a study of how parents and primary school teachers perceive and identify psychological abuse of children. Psychological abuse is an especially sensitive area because children do not perceive interpersonal relations and activities in their environment in the same way as adults. Children also do not possess the physical or psychological power required to withstand or defend themselves against different forms of violence, abuse and harassment. Children who are the victi...

  3. Public Image of Counseling Psychology: What Introductory Psychology Textbooks Say.

    Science.gov (United States)

    Dixon, David N.; Vrochopoulos, Sam; Burton, Jennifer

    1997-01-01

    Examines the adequacy of descriptions of counseling psychology and its professionals in introductory psychology textbooks compared to the descriptions of other applied areas of psychology. Results indicate that counseling psychology is less represented than industrial or organizational and clinical psychology and more represented than school…

  4. Positive Psychology: Considerations and Implications for Counseling Psychology

    Science.gov (United States)

    Mollen, Debra; Ethington, Lanaya L.; Ridley, Charles R.

    2006-01-01

    Why has the specialty of counseling psychology been overlooked in the larger conversation about positive psychology? Is it reasonable that counseling psychology claims positive psychology as its own? What are some of the problems in defining "positive psychology," and how does the lack of consensus around operationalization thwart discourse on…

  5. Center for Deployment Psychology

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Deployment Psychology was developed to promote the education of psychologists and other behavioral health specialists about issues pertaining to the...

  6. Nonlinear dynamics in psychology

    Directory of Open Access Journals (Sweden)

    Stephen J. Guastello

    2001-01-01

    Full Text Available This article provides a survey of the applications of nonlinear dynamical systems theory to substantive problems encountered in the full scope of psychological science. Applications are organized into three topical areas – cognitive science, social and organizational psychology, and personality and clinical psychology. Both theoretical and empirical studies are considered with an emphasis on works that capture the broadest scope of issues that are of substantive interest to psychological theory. A budding literature on the implications of NDS principles in professional practice is reported also.

  7. Psychological Component of Infertility

    Science.gov (United States)

    ... Home FAQs Frequently Asked Questions Quick Facts About Infertility FAQs About Infertility FAQs About the Psychological Component of Infertility FAQs About Cloning and Stem Cell Research SART's ...

  8. Anomalous law of cooling.

    Science.gov (United States)

    Lapas, Luciano C; Ferreira, Rogelma M S; Rubí, J Miguel; Oliveira, Fernando A

    2015-03-14

    We analyze the temperature relaxation phenomena of systems in contact with a thermal reservoir that undergoes a non-Markovian diffusion process. From a generalized Langevin equation, we show that the temperature is governed by a law of cooling of the Newton's law type in which the relaxation time depends on the velocity autocorrelation and is then characterized by the memory function. The analysis of the temperature decay reveals the existence of an anomalous cooling in which the temperature may oscillate. Despite this anomalous behavior, we show that the variation of entropy remains always positive in accordance with the second law of thermodynamics.

  9. Culture and Contract Laws

    DEFF Research Database (Denmark)

    Lando, Ole

    2007-01-01

    In the article it is argued that the wish to preserve the cultural values of national law should not prevent the EU from preparing a Code or an Optional Instrument. The no-code countries on the British Isles and in Scandinavia are the most ardent opponents to the idea of unifying European Contract...... Law by way of a code on Contracts. In both these regions however the absence of a code causes problems. In England a prominent writer has found that the major weakness of the judge-made law is its immense diffusion and the consequent difficulty of access to it and the Nordic countries face the same...

  10. Reconfiguring trade mark law

    DEFF Research Database (Denmark)

    Elsmore, Matthew James

    2013-01-01

    -border setting, with a particular focus on small business and consumers. The article's overall message is to call for a rethink of received wisdom suggesting that trade marks are effective trade-enabling devices. The case is made for reassessing how we think about European trade mark law.......First, this article argues that trade mark law should be approached in a supplementary way, called reconfiguration. Second, the article investigates such a reconfiguration of trade mark law by exploring the interplay of trade marks and service transactions in the Single Market, in the cross...

  11. Business Law, Europe

    DEFF Research Database (Denmark)

    Fomcenco, Alex; Werlauff, Erik

    This book is a must-have for any business advisor that operates on a cross-border level in the European Union, EU. Regardless of whether you already have solid knowledge about doing business in the EU or you are just taking your first steps on this corporate scene, Business Law, Europe should...... be the book within your reach. We call it “Our Corporate Bible”. In an easily comprehendible way we address some of the most essential issues of business law, and provide guidelines and clarity for understanding and proper application of the legal provisions that govern business law in Europe....

  12. Anomalous law of cooling

    Science.gov (United States)

    Lapas, Luciano C.; Ferreira, Rogelma M. S.; Rubí, J. Miguel; Oliveira, Fernando A.

    2015-03-01

    We analyze the temperature relaxation phenomena of systems in contact with a thermal reservoir that undergoes a non-Markovian diffusion process. From a generalized Langevin equation, we show that the temperature is governed by a law of cooling of the Newton's law type in which the relaxation time depends on the velocity autocorrelation and is then characterized by the memory function. The analysis of the temperature decay reveals the existence of an anomalous cooling in which the temperature may oscillate. Despite this anomalous behavior, we show that the variation of entropy remains always positive in accordance with the second law of thermodynamics.

  13. Business Law, Europe

    DEFF Research Database (Denmark)

    Fomcenco, Alex; Werlauff, Erik

    This book is a must-have for any business advisor that operates on a cross-border level in the European Union, EU. Regardless of whether you already have solid knowledge about doing business in the EU or you are just taking your first steps on this corporate scene, Business Law, Europe should...... be the book within your reach. We call it “Our Corporate Bible”. In an easily comprehendible way we address some of the most essential issues of business law, and provide guidelines and clarity for understanding and proper application of the legal provisions that govern business law in Europe....

  14. Subject Journal Review: Personnel Management and Industrial Psychology.

    Science.gov (United States)

    Herman, Georgianna

    1984-01-01

    This annotated bibliography lists 35 primary journals devoted to personnel management and industrial psychology in such categories as human resource planning, employee training, compensation, and employment law. History of the field, journal selection, journal specializations (for practitioners and academicians), journal indexing/abstracting,…

  15. Science, a Psychological versus a Logical Approach in Teaching

    Science.gov (United States)

    Ediger, Marlow

    2015-01-01

    Under which approach do pupils attain more optimally, a logical versus a psychological procedure of instruction? Pupils do need to achieve well in a world of science. Science is all around us and pupils need to understand various principles and laws of science. Thus, teachers in the school curriculum must choose carefully objectives for pupil…

  16. F-generation law and recognition of system law

    Institute of Scientific and Technical Information of China (English)

    Shi Kaiquan; Yao Bingxue

    2007-01-01

    If a system is not disturbed (or invaded) by some law, there is no doubt that each system will move according to the expected law and keep stable. Although such a fact often appears, some unknown law breaks into the system and leads it into turbulence. Using function one direction S-rough sets, this article gives the concept of the F-generation law in the system, the generation model of the F-generation law and the recognition method of the system law. Function one direction singular rough sets is a new theory and method in recognizing the disturbance law existing in the system and recognizing the system law.

  17. The LSU Law Center -- Canada Bijuralism Conference. Introduction: Global Law and the Law School Curriculum.

    Science.gov (United States)

    Costonis, John J.

    2002-01-01

    Introduces papers from a conference focused on the bijural programs of Louisiana State University Law Center and McGill University Faculty of Law. The programs educate all first-degree law students in both the common law and civil law traditions, preparing them for the increasing globalization of legal practice. (EV)

  18. Lawful Permanent Residents - Annual Report

    Data.gov (United States)

    Department of Homeland Security — A lawful permanent resident (LPR) or 'green card' recipient is defined by immigration law as a person who has been granted lawful permanent residence in the United...

  19. Environmental and energy law

    National Research Council Canada - National Science Library

    Makuch, Karen E; Pereira, Ricardo, Dr

    2012-01-01

    "Environmental & Energy Law attempts to bridge the knowledge gap between legal developments designed to achieve environmental and/or energy-related objectives and the practical, scientific and technical...

  20. The "Natural Law Tradition."

    Science.gov (United States)

    Finnis, John

    1986-01-01

    A discussion of natural law outlines some of the theory and tradition surrounding it and examines its relationship to the social science and legal curriculum and to the teaching of jurisprudence. (MSE)

  1. Causal Newton Gravity Law

    CERN Document Server

    Zinoviev, Yury M

    2012-01-01

    The equations of the relativistic causal Newton gravity law for the planets of the solar system are studied in the approximation when the Sun rests at the coordinates origin and the planets do not iteract between each other.

  2. law - the Zambian experience

    African Journals Online (AJOL)

    secondly to consider the quest for enacting a freedom of information law in ... Zambia; and thirdly, to highlight the principles of the Freedom of Information. Bill that was ..... contract negotiations, or place them at a competitive disadvantage.

  3. Online Law Dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro

    2012-01-01

    Online dictionaries that assist users in writing legal texts in English as a foreign language are important lexicographic tools. They can help law students bridge the factual and linguistic gaps between the two legal universes involved. However, existing online law dictionaries with English...... as the target language primarily focus on terms, but students also need to write the remainder of the texts in factually and linguistically correct English. It is therefore important to have a sound theoretical foundation before embarking on a dictionary project that aims to help law students communicate...... by containing the types of data that can best satisfy the needs of students at the three stages of legal text production: draft writing, revising and editing. The theoretical aspects discussed are supported by examples from the online CISG Dictionary, which is a lexicographic tool developed to help Danish law...

  4. Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Union Slough National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  5. Reforming Ethiopia's Expropriation Law

    African Journals Online (AJOL)

    Muradu_Abdo

    Ethiopia is increasingly using expropriation as the single most important device .... contesting public purpose or for cultural reasons, general anti-expropriation .... expropriation law in the sense of permanent physical takeover of farmland by.

  6. Bullying Policies and Laws

    Science.gov (United States)

    ... Policies & Laws | Español Search Stopbullying.gov WHAT IS BULLYING Definition The Roles Kids Play Other Types of Aggressive Behavior CYBER BULLYING What is Cyberbullying? Prevent Cyberbullying Report Cyberbullying WHO ...

  7. Teaching Criminal Law.

    Science.gov (United States)

    Levin, Sandy

    1989-01-01

    Presents learning activities and resources for teaching senior level criminal law courses. Topics covered include arrest, search and seizure, bail, trial procedures, sentencing, and prisons. Objective is to encourage students to address societal issues. (LS)

  8. Health Law: Notifiable diseases

    Directory of Open Access Journals (Sweden)

    Gastón Casaux

    2014-07-01

    Full Text Available This work made up the ultimate Health Law, latest new law branch from older date in the whole world but recently appearance in our country. As usual in other cases, we increase one of de most relevant events: the endless number of diseases that we advise obligatory, because they have been regulated for consecutive by-laws en the codex from 1946, 1958 and 2004. Since 2012 in order of the successful transformations in the modern technology with the change of rules in our order-law, it was necessary to recall their contents and we achieve in order of the promulgation the decree number 41/12 dated in February 16. In the second chapter we analyse one of the most bothersome contents: the diseases becoming from the food habitudes (named eia´s, whatever we considered a real significance for the common of the citizens and consumers, because they prevail notoriously in the human health.

  9. Fault in Contract Law

    National Research Council Canada - National Science Library

    Eric A. Posner

    2009-01-01

    A promisor is strictly liable for breaching a contract, according to the standard account However, a negligence-based system of contract law can be given an economic interpretation, and this Article...

  10. LAW DEMOCRACY & DEVELOPMENT

    African Journals Online (AJOL)

    HP27975994114

    Lecturer, Faculty of Law, University of the. Western Cape ... In this article, the current socio-economic position of persons with disabilities in. South Africa will be ..... (b) To ensure access by persons with disabilities, in particular women and girls.

  11. Online Law Dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro

    2012-01-01

    Online dictionaries that assist users in writing legal texts in English as a foreign language are important lexicographic tools. They can help law students bridge the factual and linguistic gaps between the two legal universes involved. However, existing online law dictionaries with English...... as the target language primarily focus on terms, but students also need to write the remainder of the texts in factually and linguistically correct English. It is therefore important to have a sound theoretical foundation before embarking on a dictionary project that aims to help law students communicate...... by containing the types of data that can best satisfy the needs of students at the three stages of legal text production: draft writing, revising and editing. The theoretical aspects discussed are supported by examples from the online CISG Dictionary, which is a lexicographic tool developed to help Danish law...

  12. Constitutionalization of Peruvian Law

    Directory of Open Access Journals (Sweden)

    César Landa

    2013-12-01

    Full Text Available Constitutionalizaton of Law’s different areas is a phenomenon gradually more ingrained in our cultural and legal framework. Maybe the best demonstration is the increasingly prominent role of the Constitutional Court (TC – Constitution’s Supreme Interpreter – in defining and redefining concepts, rights and legal principles touching a range of subjects, from TaxLaw to Human Rights. This is relevant to understand the Law and its current effects whether it is valued positively or negatively.

  13. Anomalous law of cooling

    OpenAIRE

    Lapas, Luciano C.; Ferreira, Rogelma M. S.; Oliveira, Fernando A.; Rubí, J. Miguel

    2014-01-01

    We analyze the temperature relaxation phenomena of systems in contact with a thermal reservoir that undergo a non-Markovian diffusion process. From a generalized Langevin equation, we show that the temperature is governed by a law of cooling of the Newton's law type in which the relaxation time depends on the velocity autocorrelation and is then characterized by the memory function. The analysis of the temperature decay reveals the existence of an anomalous cooling in which the temperature ma...

  14. [The law of Talion].

    Science.gov (United States)

    Daich, D

    1994-06-01

    This law is here analized since its origin (Bible and Code of Hammurabi), and signification, pointing out the importance given to the tooth in ist statements. It'is also made a comparison between the Old Times and different situations in History. It's remarkable that Argentine law fixes the indemnity porcentage for invalidity, considering the relative value of different parts of the body. The big importance given to the tooth is here depicted, something usually disregarded.

  15. GENERAL PRINCIPLES OF LAW

    Directory of Open Access Journals (Sweden)

    Elena ANGHEL

    2016-05-01

    Full Text Available According to Professor Djuvara “law can be a science, and legal knowledge can also become science when, referring to a number as large as possible of acts of those covered by law, sorts and connects them by their essential characters upon legal concepts or principles which are universally valid, just like the laws of nature”. The general principles of law take a privileged place in the positive legal order and represent the foundation of any legal construction. The essence of the legal principles resides in their generality. In respect of the term “general”, Franck Moderne raised the question on the degree of generality used in order to define a principle as being general – at the level of an institution, of a branch of the law or at the level of the entire legal order. The purpose of this study is to find out the characteristics of law principles. In our opinion, four characteristics can be mentioned.

  16. Is there a relationship between logic and psychology? The question for human reasoning

    Directory of Open Access Journals (Sweden)

    Jaime Castro Martínez

    2013-11-01

    Full Text Available This paper presents a debate between the relations of logic and psychology. It starts with the presentation of Keysser’s logicism. It describes some background to the debate on Mill’s psychologism and Husserl´s criticism of the laws of logic, in contrast to the laws of the nature of human thought. It continues with the contributions to the discussion by Gestalt theory. Then, the Piagetian bet for a mental logic is presented. The essay concludes with the need to consider psychological logic as distinct from formal logic: a dynamic logic of facts or logic of experience

  17. Simulation and psychology

    DEFF Research Database (Denmark)

    Dieckmann, Peter; Krage, Ralf

    2013-01-01

    Psychology is relevant for improving the use of simulation in anesthesiology, as it allows us to describe, explain and optimize the interactions of learners and instructors as well as the design of simulation scenarios and debriefings. Much psychological expertise is not used for simulation...

  18. The Psychology of Learning

    Science.gov (United States)

    Rangaswamy, A.; Balasubramanian, P.; Nirmala, R. Sweety

    2007-01-01

    Psychology plays a significant role in the life of each and every human being. Starting from childhood, if psychology of learning is utilized positively it would play a vital role in the building up of a bright career of a child. The explosion of information technology has been exercising far reaching influence on the area of educational…

  19. The psychology of obesity.

    Science.gov (United States)

    Swencionis, Charles; Rendell, Sarah Litman

    2012-10-01

    G. Stanley Hall, the first person to earn a Ph.D. in psychology in the United States, did research on eating behaviors in the nineteenth century (Lepore in The New Yorker, 2011). Research on psychological aspects of obesity accelerated in the 1950s and there has been a great deal done at this point. We review areas of considerable activity and relevance.

  20. Virtual Reality in Psychology

    Science.gov (United States)

    Foreman, Nigel

    2009-01-01

    The benefits of using virtual environments (VEs) in psychology arise from the fact that movements in virtual space, and accompanying perceptual changes, are treated by the brain in much the same way as those in equivalent real space. The research benefits of using VEs, in areas of psychology such as spatial learning and cognition, include…