WorldWideScience

Sample records for terror group ji

  1. Terrorism

    International Nuclear Information System (INIS)

    Rossnagel, A.

    1990-01-01

    The NPT should prevent the proliferation of nuclear weapons, as a contribution to the worldpeace. This aim is also threatened today by the nuclear actions of states and subnational groups. Such actions have occured in the past and are expected in the future. States and specific terrorist groups are able to acquire specific nuclear material by theft and to assault nuclear plants and transport. The main constraint, the deficit of motivation, could be dropped in the future for many reasons. Therefore nuclear terrorism is a 'real threat to civilization' and its probability is increasing. (orig.) [de

  2. The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups

    Science.gov (United States)

    2015-05-21

    terrorist attacks of September 11th, 2001 researchers have sought to better understand the macroeconomic consequences of terrorism. Despite a...The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups A Monograph by MAJ Joshua Glonek...SUBTITLE The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups 5a. CONTRACT NUMBER 5b. GRANT

  3. Jemaah Islamiyah: Lessons From Combating Islamist Terrorism In Indonesia

    Science.gov (United States)

    2016-03-01

    TERRORISM IN INDONESIA By Matthew G. Strickler, Major, USAF M.S. Civil Engineering A Research Report Submitted to the Faculty In...AY16 iii Abstract Indonesia practices a unique form of syncretic Islam that embraces tolerance and pluralism, leading to a moderate form of Islam...and variations in local practice have spread to Islamic communities in Indonesia , where terrorist groups like Jemaah Islamiyah (JI) have used these

  4. It’s About the Group, Not God: Social Causes and Cures for Terrorism

    Directory of Open Access Journals (Sweden)

    Charles Mink

    2015-12-01

    Full Text Available This essay challenges assumptions about the root causes of jihadist terrorism that prioritize political, religious, or economic factors. Drawing on the author’s anecdotal experience interviewing hundreds of accused jihadist terrorists, along with survey data collected from subject matter experts in countering violent extremism (CVE, the essay offers an interpretation for terrorism’s causes and cures that emphasizes social factors. Contrary to narratives popular in the U.S. – both in media and government circles – the lure of terrorism is not a result of political marginalization, economic disadvantage, or even religious indoctrination. It is foremost a sociological phenomenon, created by individuals who seek the insulating security of group identity and affiliation. The real reason why people are drawn to join terrorist groups is the innate need for camaraderie, identity, and a sense of belonging – the pursuit of social satisfaction, not the expression of political or economic frustration, much less the fulfilment of a religious imperative. CVE research that exclusively focuses on the political, economic, or religious causes of terrorism will, at best, over-appraise their significance, and, at worst, distract policymakers from understanding more influential motivators and responding to them accordingly. New directions for research lie in further exploring the sociological underpinnings of jihadist terrorism, as well as validating the effectiveness of social-centred CVE policies already in place.

  5. The southwestern extension of the Jiao-Liao-Ji belt in the North China Craton: Geochronological and geochemical evidence from the Wuhe Group in the Bengbu area

    Science.gov (United States)

    Liu, Chaohui; Zhao, Guochun; Liu, Fulai; Cai, Jia

    2018-04-01

    The Wuhe complex is located at the southeastern margin of the North China Craton. The complex consists of metamorphosed Paleoproterozoic potassic granitoids and supracrustal rocks, of which the latter include the Fengyang and Wuhe groups. Meta-mafic rocks from the lower Wuhe Group have igneous zircon U-Pb ages of 2126 ± 37 Ma with εHf(t) values of -6.22 to +8.38, and xenocrystic zircons of 2.39-2.36 Ga, 2.55-2.54 Ga and 2.77-2.69 Ga. Geochemically, the meta-mafic rocks can be classified into two groups. Group 1 island arc tholeiites display flat to slightly right declined REE patterns and moderately negative Nb, Ta, Zr, and Ti anomalies. Group 2 mature arc calcalkaline basalts display strongly fractionated chondrite-normalized REE patterns and evidently negative Nb, Ta and Ti anomalies. These meta-mafic rocks formed by partial melting of sub-arc depleted mantle wedge which had been modified by slab-derived melts at an active continental margin. Depositional age of the group can be constrained in the period of 2.16-2.10 Ga based on ages of the youngest detrital zircons and latter intrusions. U-Pb ages of detrital zircons yield major age peaks of 2.69 Ga and 2.52 Ga, with minor peaks at 2.88 Ga, 2.78 Ga, 2.35 Ga and 2.17 Ga, most of which are derived from the late Mesoarchean to early Paleoproterozoic granitoids in the Wuhe complex and the Jiaodong Terrane. Metamorphic zircons in the marbles coexisting with garnet amphibolites or granulites occur as either single grains or overgrowth (or recrystallization) rims surrounding magmatic zircon cores and yield ages of 1882 ± 19 Ma to 1844 ± 15 Ma. The comparable ca. 2.1 Ga potassic granites with A-type granite affinity, the ca. 2.1 Ga meta-mafic rocks with arc-like geochemical features, the 2.1-1.9 Ga meta-sedimentary units and the 1.9-1.8 Ga subduction- and collision-related granulite-facies metamorphism suggest that the Wuhe complex and the Jiao-Liao-Ji Belt share the same late Paleoproterozoic tectonic evolution

  6. the Role of Muslim Groups in Combating Terrorism in Indonesia: a Study of the Nahdlatul Ulama Under the New Order

    OpenAIRE

    Baharruddin

    2015-01-01

    Thank you very much for Hasanuddin University This paper focuses on the role of Muslim groups especially Nahdlatul Ulama in combating terrorism in Indonesia. Nahdlatul Ulama (NU) is one of the largest Islamic organization in Indonesia. It has many followers and sympathizers in Indonesia. Therefore, NU has the important role to participate in fighting terrorism in Indonesia. The series bombings incident in Indonesia have happened since after the 11 September 2001 World Trade Centre and Pent...

  7. Outcomes associated with common and immigrant-group-specific responses to intimate terrorism.

    Science.gov (United States)

    Yingling, Julie; Morash, Merry; Song, Juyoung

    2015-02-01

    The research for this article used available qualitative data from separate studies of South Asian-, Vietnamese-, and Hispanic-origin women victimized by intimate terrorism. Regardless of country of origin, period, or U.S. community, women used similar ways to cope. Consistent with perpetrators' misogynistic attitudes and aim of enforcing patriarchal expectations, many women responded to abuse from positions of powerlessness and fear. Instrumental help from family and friends and, depending on the group, advocacy agencies or counseling services assisted women in leaving men or stopping the abuse. Women used multiple coping strategies, often adding new approaches when those used initially failed. © The Author(s) 2014.

  8. [Effects of long-term Tai Ji Quan exercise on automatic nervous modulation in the elderly].

    Science.gov (United States)

    Guo, Feng

    2015-03-01

    To examine the effects of long-term Tai Ji Quan (Chinnese Traditional Exercise) on automatic nervous modulation in the elders. The 18 subjects from Tai Ji Quan exercise class in Liaoning University of Retired Veteran Cadres were assigned into long-term Tai Ji Quan exercise group including 10 subjects and novice group including 8 subjects. Electrocardiography, respiratory and blood pressure data were collected on the following time points: at rest before Tai Ji Qhuan exercise and 30 min or 60 min after Tai Ji Quan exercise. The subjects at rest state in the long-term Tai Ji Quan exercise group showed higher than the subjects in the novice group in resperitory rate (RR), standard deviations of normal to normal intervals (SDNN), total power (TP), low frequency power (LFP), high frequency power (HFP), normalized high frequency power (nHFP), but lower in LFP/HFP, systolic and diastolic blood pressure, and heart rate. At rest state the respiratory rate of subjects in long-term Tai Ji Quan exercise group was significantly lower than the novices. After Tai Ji Quan exercise, TP, nHFP, LFP/HFP, heart rate and systolic pressure showed significantly changes, and the change level of Tai Ji Quan on these indices was larger in Tai Ji Quan exercise group than that in the novice group. Long-term Tai Ji Quan exercise can improve vagal modulations, and tend to reduce the sympathetic modulations.

  9. Sleep Terrors (Night Terrors)

    Science.gov (United States)

    ... terrors or other family members Lead to safety concerns or injury Result in daytime symptoms of excessive sleepiness or problems functioning Continue beyond the teen years or start in adulthood Causes Sleep terrors ...

  10. Containing Terrorism: A Dynamic Model

    Directory of Open Access Journals (Sweden)

    Giti Zahedzadeh

    2017-06-01

    Full Text Available The strategic interplay between counterterror measures and terror activity is complex. Herein, we propose a dynamic model to depict this interaction. The model generates stylized prognoses: (i under conditions of inefficient counterterror measures, terror groups enjoy longer period of activity but only if recruitment into terror groups remains low; high recruitment shortens the period of terror activity (ii highly efficient counterterror measures effectively contain terror activity, but only if recruitment remains low. Thus, highly efficient counterterror measures can effectively contain terrorism if recruitment remains restrained. We conclude that the trajectory of the dynamics between counterterror measures and terror activity is heavily altered by recruitment.

  11. Latin America Regional Seminar 'Civil-Military Responses to Terrorism' Group Recommendations

    OpenAIRE

    Shemella, Paul

    2004-01-01

    Given the high degree of cultural continuity in the region, we recommend proposing a common definition of terrorism to guide national policy formulation for responding to terrorist activities. We further recommend...

  12. Combating Terrorism: A Case Study of Nigeria Against Boko Haram Terrorist Group

    Science.gov (United States)

    2014-06-13

    Many scholars on terrorism have pointed to a sense of alienation felt by immigrants , particularly those living in Europe, as a driver of terrorism.39...culture most times are different from those of the immigrants . As a result, they become irritated and begin to feel excluded from the society around...158Nick Chiles , “After Rejecting Nigeria’s Amnesty Offer, Boko Haram Continues to Kill,” Atlanta

  13. Nexus of Crime and Terrorism: The Case of the Abu Sayyaf Group

    Science.gov (United States)

    2016-12-01

    which may mean not using the bus or going out to eat or shopping at malls.128 Terror attacks, especially against innocent civilians, undermine the...recognized by government officials in their speeches, dinner receptions and awards ceremonies.”537 Underlining the contribution of Muslim leaders who

  14. Latin America: Terrorism Issues

    National Research Council Canada - National Science Library

    Sullivan, Mark P

    2005-01-01

    .... In its annual report on worldwide terrorism, the State Department highlights threats in Colombia, Peru, and the tri-border region of Argentina, Brazil, and Paraguay. The State Department also has designated four terrorist groups (three in Colombia and one in Peru) as Foreign Terrorist Organizations, and Cuba has been listed as a state sponsor of terrorism since 1982.

  15. Dismantling Terrorism: Developing Actionable Solutions for Today's Plague of Violence

    National Research Council Canada - National Science Library

    Scott, Frances K

    2007-01-01

    .... The bibliography is divided into the following sections: causes and origins of terrorism, geographical distribution of terrorist groups, terrorist financing, terrorist groups and networks, the psychology of terrorism, prevention of terrorism, remedies...

  16. Workshop Arboretum Volčji potok

    Directory of Open Access Journals (Sweden)

    Ana Kučan

    2012-01-01

    Full Text Available From its constitution onwards, the Volčji Potok Arboretum has been caught between various conflicting orientations. It is both a scientific, research and educational institution, and a cultural monument with exquisite garden and landscape design features and areas of great natural value and built cultural heritage, as well as commercial venue. At the same time, it functions as a park and an area for mass events, a garden centre and nursery. This variety of functions has helped Arboretum to survive the pressures of time; however, partial and uncoordinated interventions have threatened its original mission and its image and generated a number of conflicting situations. The workshop, organised on the initiative of the Institute for the Protection of Cultural Heritage of Slovenia, which involved students from the Faculty of Architecture and students from the Department of Landscape Architecture of the Biotechnical Faculty in mixed groups, generated eight proposals to solve some of the most urgent problems by introducing optimised development with clearly defined goals and priorities.

  17. Nuclear Terrorism and its Confrontation

    International Nuclear Information System (INIS)

    Al Barody, M.M.

    2006-01-01

    The whole world first knew nuclear terrorism during the second world war through the use of excessive violence that to terror exercised by one country against another, as was carried out by USA when it exploded two nuclear bombs over Hiroshima and Nagasaki t the end of the war. there are numerous types of nuclear terrorism that can be performed by individuals or organized groups for achieving political or social objectives. the definition of the term t errorism i s correlated with u sing means capable of creating a case of public dnger . that property exists in all types of direct or indirect nuclear terrorism . the present study is divided into two chapters. Chapter one deals with nuclear terrorism and consists of two sections , the first deals with the identification of the nature of nuclear terrorism an the second deals with organize nuclear terrorism on the international level. Chapter two deals with the confrontation of nuclear terrorism in two sections. the first deals with the role of the state in combating against nuclear terrorism nd the second deals with combating against nuclear terrorism on the international level. while internally it is confronted through promulgation of legislations that deal with the protection against nuclear terrorism as well as the national legal instruments for protection of nuclear materials and installation and combating illicit trafficking of nuclear materials, confrontation of nuclear terrorism on the international level is carried out through the promulgation of international convention such as that on suppression of actions of nuclear terrorism which shall be opened for signature on sept.14 -2005 according to the recommendation the general assembly of the united nations in its 59 t h session

  18. Defining Terrorism.

    Science.gov (United States)

    Hoffman, Bruce

    1986-01-01

    Notes the lack of a concise meaning for the word terrorism. Develops a working definition which states that terrorism is the deliberate creation and exploitation of fear through violence or the threat of violence in the attainment of political objectives. (JDH)

  19. Aptitude for Destruction. Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism

    Science.gov (United States)

    2005-01-01

    jihad in Af- ghanistan. Over its history, the group has had active cells in several different coun- tries, including Indonesia, Malaysia , the...and South Armagh, London, UK: Coronet Books, LIR, 2000. Hedberg, Bo, "How Organizations Learn and Unlearn?" in Paul C. Nystrim and William H. Starbuck

  20. How to Integrate Tai Ji Quan into Physical Education Programs

    Science.gov (United States)

    Lu, Chunlei

    2008-01-01

    Tai ji quan, also known as "tai chi," is an ancient Chinese exercise characterized by soft, slow, and meditative movements. It consists of a set of continuous, evenly paced, carefully choreographed, but natural, body shifts. "Tai ji" is an ancient Chinese philosophy, while "tai ji quan" refers to a type of physical activity based on tai ji…

  1. Nuclear and Radiological Terrorism

    International Nuclear Information System (INIS)

    Cizmek, A.

    2003-01-01

    Radiological and nuclear terrorism is widely considered as a major if not ultimate terrorist threat for modern societies. Highly industrialized countries could be extremely sensitive to terrorist aggressions of this kind. Nuclear terrorism is often associated with nuclear proliferation. Strictly speaking, nuclear proliferation deals with the spread of nuclear weapons into states which doesn't posses them. But proliferation can also be understood as the spread of radioactive material or even nuclear explosives into the hands of non-state organizations, such as sub national terrorist or criminal organizations as well as any kind of extreme groups for sabotage, blackmail or any other destabilization or destruction purposes. New driving factors for nuclear terrorism which 'help' terrorists are: the consequence of the break down of the Soviet Union and 'easy' radioactive smuggling and black market. What is 'New terrorism'? In analyzing the treat, one has to start by posing several crucial questions such as 'do such groups or individuals have the skill to complete their aim'? 'Who are these groups and individuals', 'how they can be categorized', 'what is their motivation'? If analysis of the 'new terrorism' is one side of the coin, the other is just as daunting. Who, what, when, where and how would be targeted by 'new terrorism'? Although there are existing different reasons (religious and political/social), mainly the target is civilian population. In many instances the aim is to exert either political or economic pressure on authorities or both. Police, ambulance - first call response teams - local, regional and national authorities have a hard task still ahead of them. The upside is that industrialized nations have acknowledged the need to reassess where we are and what the risk is. The bottom line has to be 'who is likely to want to resort to such methods and what the likelihood of them succeeding would be. (author)

  2. Irrational Rationality of Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Nalbandov

    2013-12-01

    Full Text Available The present article deals with the ontological problem of applying the rational choice frameworks to the study of terrorism. It testing the application of the rational choice to the “old” (before the end of the Cold War and the “new” (after the end of the Cold War terrorisms. It starts with analyzing the fundamentals of rationality and applies it at two levels: the individual (actors and group (collective via two outlooks: tactical (short-term and strategic (long-term. The main argument of the article is that while the “old” terrorism can be explained by the rational choice theory its “new” version represents a substantial departure from rationality.

  3. Terrorism in Colombia.

    Science.gov (United States)

    Paredes Zapata, Gabriel Darío

    2003-01-01

    Colombia is a poor country that has been plagued by ongoing violence for more than 120 years. During the 1940s, subversive terrorist groups emerged in rural areas of the country when criminal groups came under the influence of Communism, and were later transformed into contemporary groups, such as the Ejercito de Liberacion Nacional (ELN) or National Liberation Army and Fuerzas Armadas Revolucionares de Colombia (FARC) or Revolutionary Armed Forces of Colombia). Paramilitary terrorist groups emerged in response to subversive groups and were later transformed into contemporary groups, such as the Autodefensas Unidas de Colombia (AUC) or United Self-Defense Forces of Colombia. Terrorism has placed an enormous burden on modern Colombia. From 1995 to 2002, 9,435 people were killed by terrorism-related events, of which 5,864 were killed by subversive terrorist activities and 3,571 were killed by paramilitary terrorist activities. In 2002, at least nineteen attacks produced 10 or more casualties, of which 18 were bombings. In 2002, terrorists killed at least 12 mayors, 71 legislators, and internally displaced 300,000 persons from their homes. Since terrorist groups in Colombia are typically supported by drug manufacturing and trafficking, it has been difficult at times to distinguish violence due to terrorism from violence due to illicit drug trafficking. Terrorism has also had a major adverse effect on the economy, with restricted travel, loss of economic resources, and lack of economic investment. In addition to political, military, and commercial targets, terrorists have specifically targeted healthcare infrastructure and personnel. At the national and local levels, much emergency planning and preparedness has taken place for terrorism-related events. The Centro Regulador de Urgencias (CRU) or Emergency Regulation Center in Bogota plays a major role in coordinating local prehospital and hospital emergency response in the capital city and the national level where

  4. Nuclear terrorism

    International Nuclear Information System (INIS)

    2002-01-01

    Recent reports of alleged terrorist plans to build a 'dirty bomb' have heightened longstanding concerns about nuclear terrorism. This briefing outlines possible forms of attack, such as: detonation of a nuclear weapon; attacks involving radioactive materials; attacks on nuclear facilities. Legislation addressing these risks and the UK's strategy for coping with them are also considered

  5. National Counterterrorism Center: 2007 Report on Terrorism

    National Research Council Canada - National Science Library

    2008-01-01

    ...." While NCTC keeps statistics on the annual number of incidents of "terrorism," its ability to track the specific groups responsible for each attack involving killings, kidnappings, and injuries...

  6. [Terrorism and human behavior].

    Science.gov (United States)

    Leistedt, S J

    2018-04-01

    Theories of religion are essential for understanding current trends in terrorist activities. The aim of this work is to clarify religion's role in facilitating terror and outline in parallel with recent theoretical developments on terrorism and human behaviour. Several databases were used such as PubCentral, Scopus, Medline and Science Direct. The search terms "terrorism", "social psychology", "religion", "evolution", and "cognition" were used to identify relevant studies in the databases. This work examines, in a multidimensional way, how terrorists employ these features of religion to achieve their goals. In the same way, it describes how terrorists use rituals to conditionally associate emotions with sanctified symbols that are emotionally evocative and motivationally powerful, fostering group solidarity, trust, and cooperation. Religious beliefs, including promised rewards in the afterlife, further serve to facilitate cooperation by altering the perceived payoffs of costly actions, including suicide bombing. The adolescent pattern of brain development is unique, and young adulthood presents an ideal developmental stage to attract recruits and enlist them in high-risk behaviors. This work offers insights, based on this translational analysis, concerning the links between religion, terrorism and human behavior. Copyright © 2017 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  7. Environmental terrorism

    International Nuclear Information System (INIS)

    Zirschky, J.

    1988-01-01

    Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts

  8. Developed feedback from the Swedish CDM and JI program; Utvecklad aaterrapportering fraan det svenska CDM- och JI-programmet

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-11-01

    The Swedish Energy Agency is responsible for the Swedish government program for the Clean Development Mechanism (CDM) and Joint Implementation (JI). CDM and JI is the Kyoto Protocol's two project-based flexible mechanisms. This program focuses on participation in individual CDM- and JI-projects and on participation in multilateral CDM- and JI- funds. In the report the Swedish Energy Agency, on behalf of the Government, presents a proposal for developed reporting for the CDM- and JI-program. Furthermore, issues related to how CDM and JI can assist in meeting the Swedish climate objective by 2020 are discussed. Also, the role for potential new flexible mechanisms under UN Climate Convention is mentioned.

  9. Workplace Preparedness for Terrorism

    National Research Council Canada - National Science Library

    Ursano, Robert J

    2006-01-01

    Comprehensive workplace preparedness for terrorism must address and integrate the psychological and behavioral aspects of terrorism preparedness and response in order to address issues of human continuity...

  10. Terrorism and disarmament

    International Nuclear Information System (INIS)

    2001-01-01

    underscores the symbiotic relationship between disarmament and counter-terrorism. In the very midst of an unprecedented bio-terrorist attack on the United States, the long-standing chairman of the expert group of the Biological Weapons Convention charged with developing a verification protocol for the Convention, Ambassador Toth (Hungary), relates his vision of how an international verification system could serve as an impediment to future attacks. The Organisation for the Prohibition of Chemical Weapons has been a full-fledged international organization since the Chemical Weapons Convention entered into force in 1997. Its inspection system is the most stringent verification regime to date in a disarmament convention. Mr Berdennikov explains how the Convention and the cooperative effort of the States parties in the verification system is the best coalition against chemical terrorism

  11. VALIDATION GUIDELINES FOR LABORATORIES PERFORMING FORENSIC ANALYSIS OF CHEMICAL TERRORISM

    Science.gov (United States)

    The Scientific Working Group on Forensic Analysis of Chemical Terrorism (SWGFACT) has developed the following guidelines for laboratories engaged in the forensic analysis of chemical evidence associated with terrorism. This document provides a baseline framework and guidance for...

  12. Psychology of Terrorism

    Science.gov (United States)

    2007-12-14

    and logistic support. 160. Kfir, N. (2002). Understanding suicidal terror through humanistic and existential psychology. C. E. Stout (Ed), The...anomie or for an existential vacuum, which may drive other individuals to drifting or to entering the drug culture. - To understand the differences...any group of prisoners is by definition ‘survivalist’, yet that of the Red Brigades has evolved through three phases ‘social’, ‘ existential ’ and

  13. CDM and JI in View of the Sustainability Debate

    NARCIS (Netherlands)

    Schoot Uiterkamp, A.J.M.

    2001-01-01

    Clean Development Mechanism (CDM), Joint Implementation (JI) and emissions trading are the three flexible instruments incorporated in the Kyoto Protocol. This paper presents a critical assessment of the sustainability of energy-related technology innovation and transfer in the context of CDM and JI.

  14. You Are the Real Terrorist and We Are Just Your Puppet: Using Individual and Group Factors to Explain Indonesian Muslims’ Attributions of Causes of Terrorism

    Science.gov (United States)

    Mashuri, Ali; Akhrani, Lusy Asa; Zaduqisti, Esti

    2016-01-01

    The current study investigates the role of individual and intergroup factors in predicting Muslims’ tendency to attribute domestic terrorism in Indonesia to an external cause (i.e., The West) or an internal cause (i.e., radical Islamist groups). The results (N = 308) showed that intergroup factors of symbolic threat and realistic threat directly increased the external attribution and conversely decreased the internal attribution. Within the context of the current research, symbolic threat refers to Muslims’ perception that the norms and values of the West undermine Islamic identity. Realistic threat denotes Muslims’ perception that the economy and technology of the West undermine Islamic power. The individual factor of Islamic fundamentalism, which has to do with Muslims’ belief in the literal interpretation of and strict guidelines to Islamic doctrines, indirectly predicted both external attribution and internal attribution of terrorism as hypothesized, via the extent to which Muslims perceived the West as posing a symbolic threat, but not a realistic threat to Islamic existence. Uncertainty avoidance, a cultural dimension that describes the extent to which people view clear instructions as a pivotal source of concern to deal with societal problems, also significantly increased perceived symbolic threat and realistic threat, and this cultural dimension mediated the effect of Islamic fundamentalism on each of the intergroup threats. Finally, we found that the level of Islamic fundamentalism was dependent upon cognitive response, but not emotional response to mortality salience. The cognitive response to mortality salience denotes what Muslims are thinking about in coping with their own death whereas the emotional response denotes what Muslims are feeling about such issue. In particular, we found the cognitive response, but not the emotional response to mortality salience significantly gave rise to Muslims’ Islamic fundamentalism. These findings shed light

  15. Ukraine After the Orange Revolution: Can It Complete Military Transformation and Join the U.S.-Led War on Terrorism?

    National Research Council Canada - National Science Library

    Sanders, Deborah

    2006-01-01

    Launched almost 5 years ago, the Global War on Terrorism (GWOT) is a U.S.-led campaign with the twin aims of ending international terrorism through the defeat of terrorist groups, and ending state sponsorship of terrorism...

  16. Turkish Elementary School Students' Perceptions of Local and Global Terrorism

    Science.gov (United States)

    Aricak, Tolga; Bekci, Banu; Siyahhan, Sinem; Martinez, Rebecca

    2008-01-01

    Introduction: Historically, terrorism has occurred in various regions of the world and has been considered a local problem until the September, 11 terrorist attacks on the United States in 2001. After 9/11, terrorism has become a global concern. The definition of terrorism has changed from a violent act of a group of local people against their…

  17. Terrorism in Peru.

    Science.gov (United States)

    Barrientos Hernandez, Dora H; Church, Adam L

    2003-01-01

    Two major domestic terrorist groups have plagued Peru over the past 20 years, the Sendero Luminoso or "Shining Path" (SL) and the Revolutionary Movement Túpac Amaru (MRTA). On 28 August 2003, the Peruvian Truth and Reconciliation Commission reported that an estimated 69,280 persons were killed in the internal conflict in Peru from 1980 to 2000. Most of the victims were farmers (56%), most attacks occurred in rural settings (79%), and the SL was responsible for most of the deaths (54%). Aggressive anti-terrorism efforts by police and military during this period, often at the expense of basic human rights, also contributed to this large burden of terrorism on Peru. During the 1990s, terrorist attacks in Peru had spread to its urban areas. On 17 December 1996, 22 members of MRTA took over the Japanese ambassador's residence in Lima, holding 72 hostages until the grounds were stormed by Peruvian special forces on 23 April 1997. Until recently, emergency planning and preparedness for terrorism-related events in Peru were largely underdeveloped. In the last five years, Peru has taken two key steps towards developing a mature emergency response system, with the establishment of the country's first emergency medicine residency training program and the construction of the first dedicated trauma center in Lima.

  18. Nuclear terrorism

    International Nuclear Information System (INIS)

    Watson, C.

    2005-01-01

    This article is aimed at those professional scientists and engineers who believe that issues of international peace and security are too important to be left to the politicians. Nuclear Terrorism is a hostile act (or a threat of such an act) involving nuclear materials (fissile or radioactive) performed by a terrorist, a term which covers a wide range of individuals. What they all have in common is that, for some reason they have become motivated to hurt or destroy sections of society which they have come to regard as the enemy; their motivation varies enormously. They also vary enormously in the extent and nature of their technical/scientific education. There are 'PhD terrorists' and 'Peasant terrorists', and they differ greatly in the threat that they represent, and the steps which can appropriately be taken to counter it. The most serious threat comes from the potential ability of terrorists to steal or manufacture nuclear weapons of mass destruction (e.g. capable of causing thousands of deaths). Unless the underlying causes of terrorism can be quickly removed, we have a duty to mankind to make terrorist access to such weapons, and to the nuclear materials which are their essential ingredients, as difficult as possible. Improvements in the arrangements for denying unauthorised access to radioactive material should be made such that the protective measures made are proportionate to the number of Curies at risk and the likelihood of a terrorist initiative. The preventative measures, sadly, need to take account of the possibility that the terrorist will use lethal force to access the material. (author)

  19. Terrorism and National Security: Issues and Trends

    National Research Council Canada - National Science Library

    Perl, Raphael

    2003-01-01

    .... Another trend is toward terrorism that is religiously or ideologically motivated. Radical Islamic fundamentalist groups, or groups using religion as a pretext, pose terrorist threats of varying kinds to U.S...

  20. Terrorism and National Security: Issues and Trends

    National Research Council Canada - National Science Library

    Perl, Raphael

    2005-01-01

    .... Another trend is toward terrorism that is religiously or ideologically motivated. Radical Islamic fundamentalist groups, or groups using religion as a pretext, pose terrorist threats of varying kinds to U.S...

  1. Political Terrorism: A Mini-Course for High School Social Studies.

    Science.gov (United States)

    Ellington, Lucien

    By participating in the 2-week mini-course, high school students will learn that (1) there is a difference between political terror and other criminal activity; (2) governments as well as nongovernmental groups engage in political terrorism; (3) political terrorism has been present throughout history; (4) political terrorism is a world wide…

  2. Terrorism in South Korea.

    Science.gov (United States)

    Wang, Soon Joo; Choi, Jin Tae; Arnold, Jeffrey

    2003-01-01

    South Korea has experienced > 30 suspected terrorism-related events since 1958, including attacks against South Korean citizens in foreign countries. The most common types of terrorism used have included bombings, shootings, hijackings, and kidnappings. Prior to 1990, North Korea was responsible for almost all terrorism-related events inside of South Korea, including multiple assassination attempts on its presidents, regular kidnappings of South Korean fisherman, and several high-profile bombings. Since 1990, most of the terrorist attacks against South Korean citizens have occurred abroad and have been related to the emerging worldwide pattern of terrorism by international terrorist organizations or deranged individuals. The 1988 Seoul Olympic Games provided a major stimulus for South Korea to develop a national emergency response system for terrorism-related events based on the participation of multiple ministries. The 11 September 2001 World Trade Center and Pentagon attacks and the 2001 United States of America (US) anthrax letter attacks prompted South Korea to organize a new national system of emergency response for terrorism-related events. The system is based on five divisions for the response to specific types of terrorist events, involving conventional terrorism, bioterrorism, chemical terrorism, radiological terrorism, and cyber-terrorism. No terrorism-related events occurred during the 2002 World Cup and Asian Games held in South Korea. The emergency management of terrorism-related events in South Korea is adapting to the changing risk of terrorism in the new century.

  3. CDM and JI in View of the Sustainability Debate

    OpenAIRE

    Schoot Uiterkamp, A.J.M.

    2001-01-01

    Clean Development Mechanism (CDM), Joint Implementation (JI) and emissions trading are the three flexible instruments incorporated in the Kyoto Protocol. This paper presents a critical assessment of the sustainability of energy-related technology innovation and transfer in the context of CDM and JI. The rebound effect is discussed by comparing intended and unintended project and process outcomes. Attention is given to the role of nations and key actors like multinationals in achieving sustain...

  4. Nuclear terrorism: Facts and fiction

    International Nuclear Information System (INIS)

    Kamp, K.H.

    1994-01-01

    The study tries to assess the risk of nuclear terrorism in the light of recent developments in the area of nuclear weapons proliferation, and to develop suggestions of how to cope with existing challenges. First of all the term of ''nuclear terrorism'' is defined and differentiated from other forms of nuclear crimes. In a second step the attempt is made to compile the findings and assessments of the past on the problem of nuclear terrorism. Since, as a rule, a threat potential is composed of 'intentions' and 'capabilities', a third part is dedicated to terrorist intentions and studies the degree of probability of terrorists considering nuclear weapons an appropriate means for their aims. In connection with 'capabilities' it is scrutinized whether terrorist groups will be able at all to procure, design or initiate nuclear warheads. This leads to the question as to which consequences result from nuclear safety shortcomings - in particular in Russia - with a view to nuclear terrorism. Based on the preceding considerations, several proposals for coping with the danger of nuclear terrorism are made. (orig./HP) [de

  5. Terrorism in South Africa.

    Science.gov (United States)

    MacFarlane, Campbell

    2003-01-01

    The Republic of South Africa lies at the southern tip of the African continent. The population encompasses a variety of races, ethnic groups, religions, and cultural identities. The country has had a turbulent history from early tribal conflicts, colonialisation, the apartheid period, and post-apartheid readjustment. Modern terrorism developed mainly during the apartheid period, both by activities of the state and by the liberation movements that continued to the time of the first democratic elections in 1994, which saw South Africa evolve into a fully representative democratic state with equal rights for all. Since 1994, terrorist acts have been criminal-based, evolving in the Cape Town area to political acts, largely laid at the feet of a predominantly Muslim organisation, People against Gangsterism and Drugs, a vigilant organisation allegedly infiltrated by Muslim fundamentalists. Along with this, has been terrorist activities, mainly bombings by disaffected members of white, right-wing groups. In the apartheid era, a Draconian series of laws was enacted to suppress liberation activities. After 1994, most of these were repealed and new legislation was enacted, particularly after the events of 11 September 2001; this legislation allows the government to act against terrorism within the constraints of a democratic system. Disaster management in South Africa has been largely local authority-based, with input from provincial authorities and Civil Defence. After 1994, attempts were made to improve this situation, and national direction was provided. After 11 September 2001, activity was increased and the Disaster Management Act 2002 was brought into effect. This standardized disaster management system at national, provincial, and local levels, also facilites risk assessment and limitation as well as disaster mitigation. The potential still exists for terrorism, mainly from right-wing and Muslim fundamentalist groups, but the new legislation should stimulate disaster

  6. [A randomized, double-blind, controlled study: Ji-Tai tablet for the treatment of acute withdrawl syndrome of mild heroin dependence].

    Science.gov (United States)

    Wang, Yuhong; Tang, Cuiqing; Cheng, Shuang; Cui, Guimei; Zhang, Ruiling; Zhang, Zhiyong; Xie, Lingyin; Lin, Yongxiong; Hao, Wei

    2015-02-01

    To investigate the efficacy and safety of Ji-Tai tablet and Ji-Tai tablet combined with buprenorphine in the treatment of patients with acute withdrawal syndrome of mild heroin dependence. A total of 150 patients with mild heroin dependence were recruited, and were randomly assigned to a Ji-Tai tablet group (n=50), a Ji-Tai tablet combined with buprenorphine group (n=50) and a control group (n=50) during a 10-day clinical trial. Opiate withdrawal scale (OWS) was used to measure the severity of withdrawal symptoms. Anxiety symptoms assessments were made at 0 day (baseline), the day 5 (middle), and the day 10 (end) by the Hamilton anxiety scale (HAMA). Symptoms were assessed before and 1 h or 2 h after medication each day. The total withdrawal symptoms scores and the daily reduction rate were used to measure the effect of Ji-Tai tablet vs Ji- Tai tablet plus buprenorphine. Safety evaluation was carried out by the following measures: baseline of treatment, drug side effects after the treatment, vital signs (blood pressure, heart rate, and respiration rate), laboratory examination (routine blood and urine tests and the liver and kidney function tests), and electrocardiograms. A total of 142 mild heroin dependence patients performed the experiments (including 48 in the Ji-Tai tablet group, 48 in the Ji-Tai tablet with buprenorphine group and 46 in the control group). The scores of baseline withdrawal symptoms were 43.520±19.786, 42.640±17.648 and 47.100±24.450, respectively, with no significant differences among the 3 groups (all P>0.05 ). During the 10-day treatment, the reduction rate of acute withdrawal symptoms scores increased daily, the acute withdrawal syndrome scores and the anxiety symptoms scores declined from day 0 to day 10, there was also no significant difference among the 3 groups (all P>0.05). Ji-Tai tablet did not affect vital signs such as blood pressure, heart rate, and respiration rate. Ji-Tai tablet or Ji-Tai tablet combined with buprenorphine

  7. Terrorism and Investigation Strategies

    OpenAIRE

    Muhammad Mustofa

    2005-01-01

    This paper discussed that, for successful implementation of the strategies in investigating terrorism, besides requiring professional skilled investigators, there are some additional requirements that need to be fulfilled. Effective and long term prevention of terrorism should be directed towards producing good social welfare and to minimize every condition that may be conducive to the emergence of terrorism, such as discrimination and marginalization.

  8. Understanding Contemporary Terrorism.

    Science.gov (United States)

    Mitchell, Thomas H.

    1989-01-01

    Discusses the issue of terrorism as it exists today and examines progress that has been made toward understanding its dimensions. Suggests how this subject can be explored in the classroom. Dispels misconceptions about terrorism by defining the term, and examines some causes of terrorism and strategies employed by terrorists. (KO)

  9. Terrorism as Communication.

    Science.gov (United States)

    Decker, Warren; Rainey, Daniel

    Terrorism has become not merely a political act, but a carefully designed and rhetorically sophisticated attempt at communication. What role should the communication scholar play in the investigation of terrorism? Specifically, there are six areas within which the communication scholar may actively contribute to an understanding of terrorism as…

  10. Transforming traditional Tai Ji Quan techniques into integrative movement therapy-Tai Ji Quan: Moving for Better Balance.

    Science.gov (United States)

    Li, Fuzhong

    2014-03-01

    Tai Ji Quan, developed as a martial art, has traditionally served multiple purposes, including self-defense, competition/performance, and health promotion. With respect to health, the benefits historically and anecdotally associated with Tai Ji Quan are now being supported by scientific and clinical research, with mounting evidence indicating its potential value in preventing and managing various diseases and improving well-being and quality of life in middle-aged and older adults. The research findings produced to date have both public health significance and clinical relevance. However, because of its roots in the martial arts, transforming traditional Tai Ji Quan movements and training approaches into contemporary therapeutic programs and functional applications is needed to maximize its ultimate utility. This paper addresses this issue by introducing Tai Ji Quan: Moving for Better Balance , a functional therapy that involves the use of Tai Ji Quan principles and Yang-style-based movements to form an innovative, contemporary therapeutic approach that integrates motor, sensory, and cognitive components to improve postural control, gait, and mobility for older adults and those who have neurodegenerative movement impairments. It provides a synergy of traditional and contemporary Tai Ji Quan practice with the ultimate goal of improving balance and gait, enhancing performance of daily functional tasks, and reducing incidence of falls among older adults.

  11. Transforming traditional Tai Ji Quan techniques into integrative movement therapy—Tai Ji Quan: Moving for Better Balance

    Directory of Open Access Journals (Sweden)

    Fuzhong Li

    2014-03-01

    Full Text Available Tai Ji Quan, developed as a martial art, has traditionally served multiple purposes, including self-defense, competition/performance, and health promotion. With respect to health, the benefits historically and anecdotally associated with Tai Ji Quan are now being supported by scientific and clinical research, with mounting evidence indicating its potential value in preventing and managing various diseases and improving well-being and quality of life in middle-aged and older adults. The research findings produced to date have both public health significance and clinical relevance. However, because of its roots in the martial arts, transforming traditional Tai Ji Quan movements and training approaches into contemporary therapeutic programs and functional applications is needed to maximize its ultimate utility. This paper addresses this issue by introducing Tai Ji Quan: Moving for Better Balance, a functional therapy that involves the use of Tai Ji Quan principles and Yang-style-based movements to form an innovative, contemporary therapeutic approach that integrates motor, sensory, and cognitive components to improve postural control, gait, and mobility for older adults and those who have neurodegenerative movement impairments. It provides a synergy of traditional and contemporary Tai Ji Quan practice with the ultimate goal of improving balance and gait, enhancing performance of daily functional tasks, and reducing incidence of falls among older adults.

  12. Entering the Black Hole: The Taliban, Terrorism, and Organised Crime

    Directory of Open Access Journals (Sweden)

    Matthew D. Phillips

    2014-09-01

    Full Text Available 'Cooperation and imitation among crime and terror groups in recent years has given rise to a crime-terror nexus. A linear conceptualisation of a crime-terror spectrum, suggests that complete convergence of crime and terror in a failed state can give rise to a ‘black hole.’ Theoretical models of the crime-terror nexus, however, do not specify the means by which a crime-terror group enters this black hole state, yet others do not. Using the Taliban movement as a case study, this article presents a theoretical extension of black hole theory, using organisation-level characteristics to merge black hole theory with the crime-terror continuum.'

  13. Tai Ji Quan and global cognitive function in older adults with cognitive impairment: a pilot study.

    Science.gov (United States)

    Li, Fuzhong; Harmer, Peter; Liu, Yu; Chou, Li-Shan

    2014-01-01

    This study evaluated whether Tai Ji Quan: Moving for Better Balance (TJQMBB) could improve global cognitive function in older adults with cognitive impairment. Using a nonrandomized control group pretest-posttest design, participants aged ≥65 years who scored between 20 and 25 on the Mini-Mental State Examination (MMSE) were allocated into either a 14-week TJQMBB program (n=22) or a control group (n=24). The primary outcome was MMSE as a measure of global cognitive function with secondary outcomes of 50-ft speed walk, Timed Up&Go, and Activities-Specific Balance Confidence (ABC) scale. At 14 weeks, Tai Ji Quan participants showed significant improvement on MMSE (mean=2.26, pJi Quan participants performed significantly better compared to the controls in both physical performance and balance efficacy measures (p<0.05). Improvement in cognition as measured by MMSE was related to improved physical performance and balance efficacy. These results provide preliminary evidence of the utility of the TJQMBB program to promote cognitive function in older adults in addition to physical benefits. Copyright © 2014 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  14. Long-term prospects of CDM and JI; Langfristige Perspektiven von CDM und JI

    Energy Technology Data Exchange (ETDEWEB)

    Cames, Martin; Anger, Niels; Boehringer, Christoph; Harthan, Ralph O.; Schneider, Lambert [Oeko-Institut, Berlin (Germany)

    2007-07-15

    This study analyses whether Germany should use the flexible mechanisms under the Kyoto protocol or whether it should continue to achieve its greenhouse gas reduction targets by dint of domestic policies and measures. It estimates the future potential of the project-based Kyoto mechanisms (CDM and JI) and the impacts of its use on the German and the global economy, using an integrated-assessment model. In a Delphi survey, the expectations of international experts on the future prospects of the project-based Kyoto mechanisms are assessed. The study finishes with an analysis of options for promoting the use of the flexible mechanisms in Germany and concludes that the Federal Government of Germany should establish a project-based mechanisms fund of 25 to 50 million Kyoto units to cover the compliance uncertainties due to unexpected temperature or business cycle variations. (orig.) [German] Diese Studie untersucht, ob Deutschland die flexiblen Mechanismen unter dem Kyoto-Protokoll nutzen sollte oder weiterhin seine Treibhausgasreduktionsziele durch inlaendische Politiken und Massnahmen erreichen sollte. Das kuenftige Potenzial der projektbezogenen Kyoto-Mechanismen (CDM und JI) wird untersucht und die Auswirkungen von deren Nutzung auf die deutsche und globale Wirtschaft werden mit einem Integrated-Assessment-Modell abgeschaetzt. In einer Delphi-Befragung werden die Erwartungen internationaler Experten in Hinblick auf die kuenftigen Perspektiven der projektbezogenen Kyoto- Mechanismen ermittelt. Abschliessend werden Moeglichkeiten zur Foerderung der Nutzung der flexiblen Mechanismen in Deutschland analysiert, mit der Schlussfolgerung, dass die Bundesregierung einen 25 bis 50 Millionen Kyoto-Einheiten umfassenden Fonds fuer projektbezogene Mechanismen einrichten sollte, um die Unsicherheiten bei der Erfuellung des Kyoto-Ziels infolge unerwarteter Temperaturschwankungen oder einer Aenderung der Konjunkturentwicklung abzudecken. (orig.)

  15. Tai Ji Quan, the brain, and cognition in older adults

    Directory of Open Access Journals (Sweden)

    Yu-Kai Chang

    2014-03-01

    Full Text Available The relationship between physical activity (PA and cognition has received much attention recently. While evidence of improved cognition following PA has consistently been observed, the majority of studies have spotlighted aerobic exercise and the effects of other modes of PA, such as Tai Ji Quan, on cognition have received limited attention. This article provides a brief review of the literature concerning the influence of Tai Ji Quan on cognition in older adults, including those with intact cognition and those with cognitive impairment. In addition, this review proposes potential mechanisms (cardiovascular fitness, motor fitness, movement coordination, social interaction, and meditation statuses as well brain structure and function evaluated from a neuroimaging perspective that may explain the Tai Ji Quan–cognition relationship. Finally, we present suggestions for future research. In conclusion, Tai Ji Quan, with its multi-faceted characteristics, shows promise as a mode of PA for enhancing cognition, as well as brain health, in older adults. Based on the findings in this review, further exploration of the effects of Tai Ji Quan on cognition in older adults is warranted.

  16. Why is terrorism a man's business?

    Science.gov (United States)

    Möller-Leimkühler, Anne Maria

    2018-04-01

    Terrorism, whether it is group-related or performed as lone actor terrorism, is a predominantly male phenomenon. Generally and throughout history, young males have been the main protagonists of criminal and political violence.This article aims to contribute, from different perspecives, to the question of what makes young men violent. These include neurobiological aspects, such as sex differences in the brain that predispose males to physical aggression and violence; gender role aspects, with regard to aggression and violence being basic components for demonstrating and reconstructing masculinity; demographic aspects of male youth bulges as potential breeding grounds for terrorism; aspects of group dynamics and identity fusion in the process of radicalization; and psychosocial characteristics of lone actor terrorists, which differ from group-related terrorists.It is concluded that in addition to ideological, political, economic, regional, demographic, or psychosocial causes, experiences of threatened masculinity may be an underlying factor and driving force for terrorism.

  17. Comparing Civilian Support for Terrorism

    Directory of Open Access Journals (Sweden)

    Srobana Bhattacharya

    2017-06-01

    Full Text Available Terrorism is an extreme form of political violence, that is inherently abhorrent in nature. Yet, it continues to attain enough support to continue and survive. The recent proliferation of Islamic State and its ever increasing domestic and international civilian support base urges immediate attention to this question. While most research holds that provision of public goods by terrorist groups is the primary cause for high levels of civilian support, I argue that, terrorist groups are more interested in resource extraction rather than resource provision. Additionally, these studies pay scant attention to existing resource structure, especially territorial and political control to explain terrorist-civilian interaction. This paper emphasizes the bi-directional nature of this interaction – a. perception of civilians by the terrorist group and b. terrorist group’s perception of the civilians. To analyze levels of civilian support for terrorism, I compare fifteen terrorist groups using qualitative comparative analysis and show how territory, political competition, ethnicity, target selection and organizational structure combine to explain conditions that lead terrorist groups to include or exclude civilian population for support. Based on the variance in support networks of terrorist groups, counter-terrorism policies should also differ. High civilian support indicates the need to use non-military methods to decrease the appeal of terrorist groups. However, terrorist groups with more diffused and multiple support structures need more collaborative and coercive measures to intercept all the possible links to the main group.

  18. Terrorism and the adolescent: a review.

    Science.gov (United States)

    Abo, Alyssa; Zalsman, Gil

    2003-01-01

    In recent years suicide bombings have became a part of life in Israel. Adolescents seem to be more vulnerable to the issues of life and death since they have to choose psychologically whether to live or die ("the fourth organizer"). The reaction to terrorism in this age group is unique. After September 11th, a great interest on the subject has arisen in the United States and some new data has been gathered. One of the important messages is that terrorism does not simply equal trauma. The aim of this article is to review current literature on emotional reaction, impact, and therapeutic strategies to terrorism in the adolescent population.

  19. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  20. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  1. Homegrown terrorism; the known unknown

    OpenAIRE

    Hinkkainen, Kaisa

    2012-01-01

    Homegrown terrorism has attracted significant attention following the 2004 Madrid and 2005 London bombings. Homegrown terrorism is usually thought to be a new phenomenon, with few observed events, and inherently distinct from transnational terrorism or the old domestic terrorism in Europe. However, little research has so far examined the alleged distinctiveness of homegrown terrorism empirically. I argue that homegrown terrorism shares many similarities with domestic and international terrori...

  2. Annual Report 2011 for the Swedish CDM and JI program; Aarsredovisning 2011 foer Sveriges CDM och JI-program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-11-01

    The report is an annual report of the Swedish CDM [Clean Development Mechanism] and JI [Joint Implementation]program for 2011. The report shows aims and goals of the business and the work of individual CDM and JI projects and multilateral funds which have been performed over the entire duration of life and especially during 2011. The report presents volume orders, deliveries of emission reduction units as well as the volumes expected to be needed for the fulfillment of the national target by 2020. The report also includes information about the average price for the emission reductions as well as alternative costs.

  3. Introduction to Teaching About Terrorism.

    Science.gov (United States)

    Totten, Sam

    1986-01-01

    Provides an historical and conceptual framework for understanding contemporary terrorism. Includes quotations from government officials, syndicated columnists, and scholars regarding terrorism and its effects on society. (JDH)

  4. Potential for nuclear terrorism: a discussion

    International Nuclear Information System (INIS)

    Kellen, K.

    1987-01-01

    Because there has never been an incident of nuclear terrorism, the author is reduced to informed speculation. The past cannot be used to extrapolate into the future. For terrorists as for nations, the domain of nuclear attack represents are unprecedented quantum leap, one that groups think carefully about. Terrorists will consider many factors, including the public climate, because they are not psychotics operating in a vacuum (though groups may include psychotic individuals). Rather, they are people involved in a reciprocal political and psychological relationship with the rest of the world. In reaching some assessment of the potential for nuclear terrorism, there is an immense number of variables to deal with, beginning with the many types of terrorists and terrorism, including nuclear. They can, however, look at individual terrorist groups - a their compositions, capabilities, motivations, and modus operandi - and reach some conclusions. The author first looks at the possible forms nuclear terrorism might take and at the severity of the consequences. A strict distinction must be made between nuclear terrorism where nuclear things are the means (for example, a nuclear device) and nuclear terrorism where nuclear things are the target (for example, nuclear power stations), or where they are both such as a nuclear weapon thrown at a nuclear power station. 2 tables

  5. Potential for nuclear terrorism

    International Nuclear Information System (INIS)

    Jenkins, B.M.

    1977-05-01

    The question of whether or not terrorists will ''go nuclear'' is discussed. It is possible, although there is no historical evidence that any criminal or terrorist group ever made any attempt to acquire nuclear material for use in an explosive or dispersal device. In terms of intentions, psychotics are potential nuclear terrorists, but in terms of capabilities, they are the farthest away from being able to acquire a nuclear weapon. The history of nuclear incidents in the U.S. and abroad is reviewed. As the nuclear industry expands, the number of low-level incidents (bomb threats, pilferage, etc.) will increase also, but not necessarily escalate to more serious incidents. Terrorists may ''go nuclear'' solely for the publicity value; nuclear hoaxes may be attenpted. Nuclear terrorism seems more attractive as a threat than as an action. But the nature of the threat may change in the future, and the danger of imitation of a successful nuclear terrorist act is pointed out

  6. Islamic Law and Terrorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Ramlani Lina Sinaulan

    2016-03-01

    Full Text Available Jihād and terrorism are not the same. In the context of sharia that implementation of the jihād has parameters measured with a layer of ethics based on the commands Al Quran and the Hadith of Prophet and the explanation the Ulama. Muslims in Indonesia views that the essentially not much different from the views on jihād and terror in other Islamic countries, especially the Middle East. In the context of Islamic law, jihād has multi spectral studies, but none of these studies that equate the meaning of jihād with terrorism, or none of them agreed that acts of terror as has been demonstrated by radical groups that are part of the concept Islam.

  7. QUALITY ASSURANCE GUIDELINES FOR LABORATORIES PERFORMING FORENSIC ANALYSIS OF CHEMICAL TERRORISM

    Science.gov (United States)

    The Scientific Working Group on Forensic Analysis of Chemical Terrorism (SWGFACT) has developed the following quality assurance guidelines to provide laboratories engaged in forensic analysis of chemical evidence associated with terrorism a framework to implement a quality assura...

  8. Definitions of Cyber Terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an

  9. Female terrorism : a review

    NARCIS (Netherlands)

    Jacques, Karen; Taylor, Paul J.

    2009-01-01

    The sharp growth in the number of publications examining female involvement in terrorism has produced a valuable but un-integrated body of knowledge spread across many disciplines. In this paper, we bring together 54 publications on female terrorism and use qualitative and quantitative analyses to

  10. Terrorism and financial supervision

    NARCIS (Netherlands)

    Krans, Anatoli van der

    2005-01-01

    This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective,

  11. Sleep Terrors in Twins

    Directory of Open Access Journals (Sweden)

    J Gordon Millichap

    2008-12-01

    Full Text Available In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  12. Sleep Terrors in Twins

    OpenAIRE

    J Gordon Millichap

    2008-01-01

    In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  13. Behavioural aspects of terrorism.

    Science.gov (United States)

    Leistedt, Samuel J

    2013-05-10

    Behavioural and social sciences are useful in collecting and analysing intelligence data, understanding terrorism, and developing strategies to combat terrorism. This article aims to examine the psychopathological concepts of terrorism and discusses the developing roles for behavioural scientists. A systematic review was conducted of studies investigating behavioural aspects of terrorism. These studies were identified by a systematic search of databases, textbooks, and a supplementary manual search of references. Several fundamental concepts were identified that continue to influence the motives and the majority of the behaviours of those who support or engage in this kind of specific violence. Regardless of the psychological aspects and new roles for psychiatrists, the behavioural sciences will continue to be called upon to assist in developing better methods to gather and analyse intelligence, to understand terrorism, and perhaps to stem the radicalisation process. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  14. Terrorism as Media Event

    Directory of Open Access Journals (Sweden)

    2012-07-01

    Full Text Available Proving that terrorism should be seen as a media event (as defined by Dayan and Katzafter 9/11 and treated accordingly. We have turned to the work of Dayan and Katz and GeorgeGerbner’s for a definition of media events and of violence in the mass media. This paper is ahermeneutical interpretation of the concept of terrorism and its relation to communication. We haveput forward a better understanding of the complex concept of terrorism and its definitions in the massmedia context. Terrorism nowadays should always be defined within its inherent relation with themedia. The article is the first to define terrorism as media evenit in Dayan and Katz’s terms.

  15. Individual differences in relational motives interact with the political context to produce terrorism and terrorism-support.

    Science.gov (United States)

    Thomsen, Lotte; Obaidi, Milan; Sheehy-Skeffington, Jennifer; Kteily, Nour; Sidanius, Jim

    2014-08-01

    The psychology of suicide terrorism involves more than simply the psychology of suicide. Individual differences in social dominance orientation (SDO) interact with the socio-structural, political context to produce support for group-based dominance among members of both dominant and subordinate groups. This may help explain why, in one specific context, some people commit and endorse terrorism, whereas others do not.

  16. Terrorism in Pakistan: a behavioral sciences perspective.

    Science.gov (United States)

    Nizami, Asad Tamizuddin; Rana, Mowadat Hussain; Hassan, Tariq Mahmood; Minhas, Fareed Aslam

    2014-01-01

    This article reviews the behavioral science perspectives of terrorism in Pakistan. It can be argued that Pakistan has gained worldwide attention for "terrorism" and its role in the "war against terrorism". The region is well placed geopolitically for economic successes but has been plagued by terrorism in various shapes and forms. A behavioral sciences perspective of terrorism is an attempt to explain it in this part of the world as a complex interplay of historical, geopolitical, anthropological and psychosocial factors and forces. Drawing from theories by Western scholars to explain the behavioral and cognitive underpinnings of a terrorist mind, the authors highlight the peculiarities of similar operatives at individual and group levels. Thorny issues related to the ethical and human right dimensions of the topic are visited from the unique perspective of a society challenged by schisms and divergence of opinions at individual, family, and community levels. The authors have attempted to minimize the political descriptions, although this cannot be avoided entirely, because of the nature of terrorism. Copyright © 2014 John Wiley & Sons, Ltd.

  17. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  18. Extreme Left Terrorism in Contemporary Europe: from “Communist Combatant Parties” to Militant Campaigns?

    Directory of Open Access Journals (Sweden)

    Miroslav Mareš

    2007-12-01

    Full Text Available The aim of this paper is to analyze the strategy and tactics of the of extreme left terrorism in Europe. Traditional red terrorist organizations (combatant communist parties like the RAF, the RB etc. have been replaced by small militant groups, by violent militancy campaigns, by anti-globalist violence or by “single-issue” terrorism. The militant extreme left may itself be both a direct and indirect ally to other forms of terrorism, including Islamist terrorism.

  19. 239 Inter-Agency Cooperation in Combating Terrorism in Nigeria ...

    African Journals Online (AJOL)

    User

    In recent times, terrorism has become one of the most dangerous threats to .... groups or clandestine agents, usually intended to influence an audience”. (ITSR ... terrorist attacks on the World Trade Center in New York and the Pentagon ..... Books. Imobighe, T.A. (2006b). “Combating Terrorism in Africa: An Integrated.

  20. Night Terrors (For Parents)

    Science.gov (United States)

    ... you tried. A night terror is a sleep disruption that seems similar to a nightmare , but is ... to: reduce your child's stress create a bedtime routine that's simple and relaxing make sure your child ...

  1. Psychiatry and terrorism.

    Science.gov (United States)

    Stoddard, Frederick J; Gold, Joel; Henderson, Schuyler W; Merlino, Joseph P; Norwood, Ann; Post, Jerrold M; Shanfield, Stephen; Weine, Stevan; Katz, Craig L

    2011-08-01

    Terrorism has dominated the domestic and international landscape since 9/11. Like other fields, psychiatry was not well prepared. With the 10th anniversary of the 9/11 attack approaching, it is timely to consider what can be done to prepare before the next event. Much has been learned to provide knowledge and resources. The roles of psychiatrists are challenged by what is known of the causes of, consequences of, and responses to terrorism. Reflecting on knowledge from before and since 9/11 introduces concepts, how individuals become terrorists, how to evaluate the psychiatric and behavioral effects of terrorism, and how to expand treatments, behavioral health interventions, public policy initiatives, and other responses for its victims. New research, clinical approaches, and policy perspectives inform strategies to reduce fear and cope with the aftermath. This article identifies the psychiatric training, skills and services, and ethical considerations necessary to prevent or reduce terrorism and its tragic consequences and to enhance resilience.

  2. Nightmares and Night Terrors

    Science.gov (United States)

    ... able to tell you what happened in the dream and why it was scary. Your child may have trouble going back to sleep. Your child might have the same dream again on other nights. What are night terrors? ...

  3. Nuclear proliferation and terrorism

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    This section of the book, Part III, has two chapters (9 and 10). Chapter 9, Nuclear Power and Proliferation of Nuclear Weapons, is disucssed under these subjects: nuclear nonproliferation: origins and status; requirements for nuclear weapons manufacture; current nuclear programs and proliferation capabilities; encouraging decisions to forego weapons; arms control; safeguards; attitudes and expectations. Chapter 10, Nuclear Terrorism, discusses these areas: theft of nuclear materials; attacks on nuclear reactors; responding to nuclear terrorism; security and civil liberties

  4. Night Terrors in Children

    OpenAIRE

    Feferman, Irv

    1988-01-01

    Night terrors are a bizarre sleep disorder that affects young children. The child partially awakes during the night agitated, afraid and terrified, and cannot be consoled. These events, which may be related to emotional turmoil, are self-limiting. Psychiatric evaluation is indicated in certain cases, and drug therapy is almost never necessary. Parents should be reassured that night terrors are not dangerous and do not reflect any serious pathology.

  5. Nuclear terrorism and reality

    International Nuclear Information System (INIS)

    St Sauver, J.E.

    1983-01-01

    Unlike conventional terrorist violence, bona-fide nuclear terrorism is a self-publicizing phenomenon. It is a public event by the very scope of its impact. Apocalyptic and catastrophically destructive, a nuclear explosion is the ideal instrument of mass terror. Rational nuclear insurgents would not inform authorities that a nuclear device is about to be detonated. Advance warning of an impending nuclear explosion would reduce the maximum potential effectiveness of any response to such an event

  6. Neuronal nitric oxide synthase inhibition prevents cerebral palsy following hypoxia-ischemia in fetal rabbits: comparison between JI-8 and 7-nitroindazole.

    Science.gov (United States)

    Yu, Lei; Derrick, Matthew; Ji, Haitao; Silverman, Richard B; Whitsett, Jennifer; Vásquez-Vivar, Jeannette; Tan, Sidhartha

    2011-01-01

    Cerebral palsy and death are serious consequences of perinatal hypoxia-ischemia (HI). Important concepts can now be tested using an animal model of cerebral palsy. We have previously shown that reactive oxygen and nitrogen species are produced in antenatal HI. A novel class of neuronal nitric oxide synthase (nNOS) inhibitors have been designed, and they ameliorate postnatal motor deficits when administered prior to the hypoxic-ischemic insult. This study asks how the new class of inhibitors, using JI-8 (K(i) for nNOS: 0.014 μM) as a representative, compare with the frequently used nNOS inhibitor 7-nitroindazole (7-NI; K(i): 0.09 ± 0.024 μM). A theoretical dose equivalent to 75 K(i) of JI-8 or equimolar 7-NI was administered to pregnant rabbit dams 30 min prior to and immediately after 40 min of uterine ischemia at 22 days gestation (70% term). JI-8 treatment resulted in a significant decrease in NOS activity (39%) in fetal brain homogenates acutely after HI, without affecting maternal blood pressure and heart rate. JI-8 treatment resulted in 33 normal kits, 2 moderately and 13 severely affected kits and 5 stillbirths, compared with 8 normal, 3 moderately affected and 5 severely affected kits and 10 stillbirths in the 7-NI group. In terms of neurobehavioral outcome, 7-NI was not different from saline treatment, while JI-8 was superior to saline and 7-NI in its protective effect (p JI-8 significantly improved the locomotion score over both saline and 7-NI scores. JI-8 was also significantly superior to saline in preserving smell, muscle tone and righting reflex function, but 7-NI did not show significant improvement. Furthermore, a 100-fold increase in the dose (15.75 μmol/kg) of 7-NI significantly decreased systolic blood pressure in the dam, while JI-8 did not. The new class of inhibitors such as JI-8 shows promise in the prevention of cerebral palsy and is superior to the previously more commonly used nNOS inhibitor. Copyright © 2011 S. Karger AG, Basel.

  7. Socioconomic nature of terrorism

    Directory of Open Access Journals (Sweden)

    Valeriy Petrovich Chichkanov

    2013-12-01

    Full Text Available In the article, the theoretical and methodological foundations of investigation of the  socioeconomic nature of terrorism are considered. Hypothesis of research is the existence of methodological criteria of territory classification on the basis of external and internal terrorism. On the basis of the analysis of theoretical works of national and foreign authors, normative documents of state and international level the genesis of approaches to the understanding of the essence of modern terrorism, its contents, the subject-object relations and manifestation forms is received. As the result, according to the authors’ definition “terrorism” is understood as an ideology connected with deliberate violence or threats against the civilian population or property to influence on the government or the interstate organizations. In the work, the factors of development and spreading of terrorism in the Russian Federation’s regions are allocated and quantitatively proved. Weight parameters of the specified factors are determined. The methodological differentiation of the specified factors on factors of terrorism external (attacks from the outside and an internal form (distribution and realization of radical ideas within the region in the territory is the distinctive feature of the conducted research. During the research, the cluster analysis of a region is carried out to distribute of Russia’s regions according to the typological characteristic of the region of internal and external terrorism. The obtained data are verified in accordance with empirical data, the hypothesis of the existence of methodological criteria of the region classification on the basis of external and internal terrorism is proved.

  8. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  9. Optimal Physical Protection against Nuclear Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Doyoung; Kim, ChangLak [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2014-10-15

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  10. Optimal Physical Protection against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Lee, Doyoung; Kim, ChangLak

    2014-01-01

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  11. Terrorism Risk Insurance: An Overview

    National Research Council Canada - National Science Library

    Webel, Baird

    2005-01-01

    .... Addressing this problem, Congress enacted the Terrorism Risk Insurance Act of 2002 (TRIA) to create a temporary program to share future insured terrorism losses with the property-casualty insurance industry and policyholders...

  12. International safeguards and nuclear terrorism

    International Nuclear Information System (INIS)

    Moglewer, S.

    1987-01-01

    This report provides a critical review of the effectiveness of International Atomic Energy Agency (IAEA) safeguards against potential acts of nuclear terrorism. The author argues that IAEA safeguards should be made applicable to deterring diversions of nuclear materials from civil to weapons purposes by subnational groups as well as by nations. Both technical and institutional factors are considered, and suggestions for organizational restructuring and further technical development are made. Awareness of the necessity for effective preventive measures is emphasized, and possible directions for further effort are suggested

  13. Against CBRN terrorism

    International Nuclear Information System (INIS)

    Inoue, Tadao

    2016-01-01

    Although CBRN (Chemical, Biological, Radiological, Nuclear) terrorism has seldom happened in recent terrorist attacks, a large number of victims would appear leading to disastrous situation if it arises. This paper discussed what CBRN terrorism is, why terrorists are interested in these weapons, and how to deal with these cases, with reference to the lessons learnt from the Tokyo subway sarin event, which occurred in Japan. It also outlined the features of CBRN terrorism and protective measures against it. CBRN terrorism is the terror activity using unusual weapons and agents such as chemicals, biological agents, radioactive substances, and nuclear weapons. As the reasons why terrorists are interested in CBRN weapons, there are such factors that raw materials are easy to obtain, manufacturing is not difficult, weapons are easy to transport, and indiscriminate and mass slaughter is possible when used. From the lessons from the Tokyo subway sarin event, the Tokyo Fire Department has been engaging in the following items: (1) strengthening knowledge and skills, (2) introduction of detection equipment, (3) construction and strengthening of decontamination system, (4) collaboration among firefighting - police - SDF - medical institutions, and (5) enhancing and strengthening organizational structure. Although protective measures vary depending on the type of chemical agent, biological agent, etc., it is important to prepare in daily life for detoxification, decontamination, evacuation, etc. (A.O.)

  14. Development and validation of the coping with terror scale.

    Science.gov (United States)

    Stein, Nathan R; Schorr, Yonit; Litz, Brett T; King, Lynda A; King, Daniel W; Solomon, Zahava; Horesh, Danny

    2013-10-01

    Terrorism creates lingering anxiety about future attacks. In prior terror research, the conceptualization and measurement of coping behaviors were constrained by the use of existing coping scales that index reactions to daily hassles and demands. The authors created and validated the Coping with Terror Scale to fill the measurement gap. The authors emphasized content validity, leveraging the knowledge of terror experts and groups of Israelis. A multistep approach involved construct definition and item generation, trimming and refining the measure, exploring the factor structure underlying item responses, and garnering evidence for reliability and validity. The final scale comprised six factors that were generally consistent with the authors' original construct specifications. Scores on items linked to these factors demonstrate good reliability and validity. Future studies using the Coping with Terror Scale with other populations facing terrorist threats are needed to test its ability to predict resilience, functional impairment, and psychological distress.

  15. The Mega-Terrorism - The Challenge of the Third Millennium

    Directory of Open Access Journals (Sweden)

    Daniel Andrișan

    2011-06-01

    Full Text Available The aim of this article is to describe the "new face" of terrorism in the twenty-first centuryindicating the transition to mass destruction weapons (nuclear terrorism, chemical, biological, toethnic-religious terrorism, the occurrence of massive gray area phenomena of terrorism and how thisphenomenon became a strategic weapon. Mega-terrorism has been existing, at a conceptual level,ever since the 70’s, when the experts of this phenomenon tried to find a semantic cover for thesituations that certain organizations, groups or terrorist or extremist sections would get someWeapons of Mass Destruction Systems. Actually, the 11th of September tragedy proves that megaterrorismrepresents the premeditated destruction, the lack of negotiations, of a tactical goal that wasto be accomplished by means of a threat. The mega-terrorism actors do not intend to get themselvesknown to the public, do not require anything, do not see the threat as means or device to reach theirpurpose. The 21 st century mega-terrorism simple logic is materialized in the systemic destroying ofthe enemy, no longer representing a political power or a government, but an entire ‘disobeying’,‘corrupted’, ‘unfaithful’ population indifferent to the mega-terrorist actors’ desires. New dimensionagainst mega-terrorism determines not only a rethinking of how to combat it, but also the realizationof a conceptual legal framework and measures established to materialize the political decision.

  16. Terrorism, Anti-Terrorism, and the Copycat Effect

    DEFF Research Database (Denmark)

    Jensen, Thomas

    that an increase in anti-terrorism makes it more likely that cells will plan small rather than large attacks. Furthermore, we see that an increase in anti-terrorism can make a terrorist attack more likely. Analyzing the problem of optimal anti-terrorism we see that the introduction of a copycat effect rationalizes...... an increase in the level of anti-terrorism after a large attack. Using this result we show how the copycat effect changes the dynamic pattern of terrorism attacks and what the long run consequences are...

  17. Terrorism, Hegel, Honneth

    Directory of Open Access Journals (Sweden)

    Sinkwan Cheng

    2015-07-01

    Full Text Available My essay begins by analyzing how Hegel and Honneth’s theory of recognition would seem to lend support to insurgent terrorists’ struggle for the right to self-determination. Insurgent terrorism often looks like a concretization of what Honneth calls the moral protest of the oppressed launched against the dominating powers. Insurgent terrorism also bears affinity to the politics of recognition in the sense that it challenges the legitimacy and authority of the forces owned by the state, and seeks to gain public recognition instead for the legitimacy of their own cause. Precisely because what matters uppermost to terrorists is the gaining of recognition for their cause as just, terrorists are eager to seize the mass media as a means of spreading their ideas. My essay will end, however, by pointing out major differences between insurgent terrorism on the one hand, and Hegel and Honneth on the other.

  18. Terrorism and financial supervision

    Directory of Open Access Journals (Sweden)

    Anatoli van der Krans

    2005-12-01

    Full Text Available This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective, proportional and mutually harmonious. Now that many regulations in this field have been established by intra-national bodies, it is important to examine how these regulations are further elaborated in the respective national systems. This article gives a broad overview of legislative initiatives of the UN, USA, FATF, EU and Council of Europe. The Netherlands for numerous reasons serves as a legal example. It is concluded that measures taken or proposed to avoid or at least reduce the financing of terrorism are quite effective to prevent abuse of the financial system. On the other hand, these measures increase the risk of underground or illegal financing, which is even more difficult to control.

  19. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  20. Delineating Concept Meanings: The Case of Terrorism.

    Science.gov (United States)

    Kleg, Milton; Mahlios, Marc

    1990-01-01

    Presents a teacher-initiated model for reaching class consensus on the meaning of confusing or interchangeable concepts in social studies classrooms. Illustrates the model by delineating terrorism. Shows procedural steps that involve students in self and small group interviews where definitions are clarified until consensus is reached. Suggests…

  1. Terror and Wellbeing

    DEFF Research Database (Denmark)

    Raffnsøe, Sverre

    Currently, terrorism provokes a widespread feeling of insecurity and global reactions to the terrorist attacks. This is not simply because it poses a substantial threat to society and to the lives of individual citizens. The relatively rare incidents of terrorism cause emotional overreaction...... because they challenge and intensify the contract that supersaturates today's society.In the welfare society one can observe the existence of a diffuse but widespread social contract, which has become the single most cohesive element in the social fabric. According the terms of this contract, we agree...

  2. Efficacy of rehabilitation with Tai Ji Quan in an Italian cohort of patients with Fibromyalgia Syndrome.

    Science.gov (United States)

    Maddali Bongi, Susanna; Paoletti, Gianluca; Calà, Michael; Del Rosso, Angela; El Aoufy, Khadija; Mikhaylova, Svetlana

    2016-08-01

    Fibromyalgia Syndrome (FMS) is characterized by musculoskeletal pain, muscle tenderness leading to disability, impaired quality of life (QoL), fatigue and it is accompanied by sleep disorders and psychological distress. Mind body therapies (MBT), such as Tai Ji Quan (TJQ), use different techniques to facilitate the ability of the mind to influence disease characteristics and symptoms. Some studies showed that TJQ, in patients with rheumatic diseases, particularly FMS, improved QoL, disability and psychological distress. To evaluate the efficacy of TJQ on disability, QoL, fatigue, sleep and psychological distress in an Italian cohort of FMS patients. We enrolled 44 FMS patients: 22 patients (Experimental Group) participated to a course of Tai Ji Quan style of (2/week for 16 weeks); 22 patients (Control Group) participated to an educational course about FMS (2/week for 16 weeks). At baseline (T0) and at the end of treatment (T1), patients were assessed for disability [Fibromyalgia Impact Questionnaire (FIQ), Health Assessment Questionnaire (HAQ)], Quality of Life [Short-Form 36 (SF36)], fatigue [Functional Assessment of Chronic Illness-Fatigue (FACIT-F)], pain [Widespread Pain Index (WPI)], tenderness [Tender Points (TP)], Sleep Quality [Pittsburgh Sleep Quality Index (PSQI)] and mood disorders [Hospital Anxiety and Depression Scale (HADS)]. At T1 versus T0, patients of the Experimental Group showed a significant improvement in FIQ, FACIT, SF36 (Summary Physical Index, Physical activity, physical role, bodily pain, general health, vitality, emotional role limitations), in WPI, TP, PSQI (total, sleep duration, and sleep disturbance) and HADS (total score and anxiety subscale), while Patients in the Control Group did not improve in any parameter. In FMS patients TJQ, if performed by an expert physiotherapist, should be regarded as an effective rehabilitation method. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Implementing the Kyoto protocol : why JI and CDM show more promise than international emissions trading

    NARCIS (Netherlands)

    Woerdman, E.

    The Kyoto protocol allows developed countries to achieve cost-effective greenhouse gas emission reductions abroad by means of international emissions trading (IET), joint implementation (JI) and the clean development mechanism (CDM). The article argues that JI and CDM projects will be more

  4. Who Prepares for Terrorism?

    Science.gov (United States)

    Bourque, Linda B.; Mileti, Dennis S.; Kano, Megumi; Wood, Michele M.

    2012-01-01

    The National Survey of Disaster Experiences and Preparedness (NSDEP) examined whether households in the United States have engaged in proactive preparedness and avoidance activities since September 11, 2001, and whether the activities reported were done because of terrorism, natural disasters, other reasons, or any combination of reasons. Reported…

  5. Militarized Maneuver Terrorism

    Science.gov (United States)

    2015-06-12

    striking the heart of the Indian tourism market and creating a siege in the Taj Mahal, it was certain to create a theater of terror. A drama played out... sport facilities, malls, movie theaters, and more. Grossman argues that American society has put forth enormous effort preparing and preventing harm to

  6. Gender, education and terrorism

    Czech Academy of Sciences Publication Activity Database

    Malečková, Jitka; Stanišić, Dragana

    2014-01-01

    Roč. 5, č. 1 (2014), s. 40-65 ISSN 1759-5673 R&D Projects: GA ČR(CZ) GAP402/12/0510; GA MŠk(CZ) 7E08090 Institutional support: RVO:67985998 Keywords : international terrorism * women's education * public opinion Subject RIV: AH - Economics

  7. Terrorism in Canada.

    Science.gov (United States)

    Kollek, Daniel

    2003-01-01

    This paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses. Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.

  8. Epidemiology of terror-related versus non-terror-related traumatic injury in children.

    Science.gov (United States)

    Aharonson-Daniel, Limor; Waisman, Yehezkel; Dannon, Yehuda L; Peleg, Kobi

    2003-10-01

    In the past 2 years hundreds of children in Israel have been injured in terrorist attacks. There is a paucity of data on the epidemiology of terror-related trauma in the pediatric population and its effect on the health care system. The objective of this study was to review the accumulated Israeli experience with medical care to young victims of terrorism and to use the knowledge obtained to contribute to the preparedness of medical personnel for future events. Data on all patients who were younger than 18 years and were hospitalized from October 1, 2000, to December 31, 2001, for injuries sustained in a terrorist attack were obtained from the Israel National Trauma Registry. The parameters evaluated were patient age and sex, diagnosis, type, mechanism and severity of injury, interhospital transfer, stay in intensive care unit, duration of hospitalization, and need for rehabilitation. Findings were compared with the general pediatric population hospitalized for non-terror-related trauma within the same time period. During the study period, 138 children were hospitalized for a terror-related injury and 8363 for a non-terror-related injury. The study group was significantly older (mean age: 12.3 years [standard deviation: 5.1] v 6.9 years [standard deviation: 5.3]) and sustained proportionately more penetrating injuries (54% [n = 74] vs 9% [n = 725]). Differences were also noted in the proportion of internal injuries to the torso (11% in the patients with terror-related trauma vs 4% in those with non-terror-related injuries), open wounds to the head (13% vs 6%), and critical injuries (Injury Severity Score of 25+; 25% vs 3%). The study group showed greater use of intensive care unit facilities (33% vs 8% in the comparison group), longer median hospitalization time (5 days vs 2 days), and greater need for rehabilitative care (17% vs 1%). Terror-related injuries are more severe than non-terror-related injuries and increase the demand for acute care in children.

  9. Pathological responses to terrorism.

    Science.gov (United States)

    Yehuda, Rachel; Bryant, Richard; Marmar, Charles; Zohar, Joseph

    2005-10-01

    Many important gains have been made in understanding PTSD and other responses to trauma as a result of neuroscience-based observations. Yet there are many gaps in our knowledge that currently impede our ability to predict those who will develop pathologic responses. Such knowledge is essential for developing appropriate strategies for mounting a mental health response in the aftermath of terrorism and for facilitating the recovery of individuals and society. This paper reviews clinical and biological studies that have led to an identification of pathologic responses following psychological trauma, including terrorism, and highlights areas of future-research. It is important to not only determine risk factors for the development of short- and long-term mental health responses to terrorism, but also apply these risk factors to the prediction of such responses on an individual level. It is also critical to consider the full spectrum of responses to terrorism, as well as the interplay between biological and psychological variables that contribute to these responses. Finally, it is essential to remove the barriers to collecting data in the aftermath of trauma by creating a culture of education in which the academic community can communicate to the public what is and is not known so that survivors of trauma and terrorism will understand the value of their participation in research to the generation of useful knowledge, and by maintaining the acquisition of knowledge as a priority for the government and those involved in the immediate delivery of services in the aftermath of large-scale disaster or trauma.

  10. The Nature Terrorism Reports on Social Networks

    Directory of Open Access Journals (Sweden)

    James Okolie-Osemene

    2015-12-01

    Full Text Available As new tools of communication, an in-depth study of social networking in the era of global terrorism is attempted in this article. This emerging tradition of information sharing is driven by social media technology which has greatly revolutionalised communication in all sectors. The article explored the information sharing relevance of new technologies in the age of terrorism and counterterrorism. It focused on how social networks are increasingly utilised by different groups. In terms of methodology, the study extracted and utilised positive, negative and neutral posts, updates, tweets and reports on social networks through different individual and organisational media accounts and blogs, and analysed the data qualitatively. Findings show that despite being used by extremist groups in promoting their political agenda, social networks are also useful in promoting positive perceptions that society has about Muslims in the era of terrorism, emphasising that Muslims are not terrorists. Through the instrumentality of social media, users are able to map the trends of terrorism and responses from stakeholders in government and security sector in curbing the menace. Given their capacity to reach a wider audience, breaking cultural and religious barriers, social networks serve as early warning signs and make it possible for people to share new ideas on possible ways of curbing the proliferation of terrorist organisations.

  11. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  12. Patterns of Force: System Strength, Terrorism and Civil War

    DEFF Research Database (Denmark)

    Freytag, Andreas; Meierrieks, Daniel; Münch, Angela

    2010-01-01

    We jointly analyze the genesis of terrorism and civil war, providing a simple conceptual framework to explain why violent opposition groups choose distinct forms of violence (i.e., terrorism and open rebellion). We argue that the distinct modes of violent opposition are chosen by opposition groups...... in response to the strengths and weaknesses of the system they challenge. An empirical test of this hypothesis for 104 countries for 1992 to 2004 indeed shows that the socio-economic strength of a system positively correlates with the likelihood of terrorism, but negatively with the incidence of civil war....... Institutional quality and political participation of opponents reduce the risk of civil war, but do not affect the likelihood of terrorism. We also show that system stability reduces the likelihood of all forms of violent opposition....

  13. Worry about Terror in Israel: Differences between Jewish and Arab Adolescents and Young Adults

    Science.gov (United States)

    Peleg, Ora

    2010-01-01

    The current study examines group differences in (1) levels of worry about terror and (2) trait anxiety among a sample of high-school and university students, where groups are defined by cultural affiliation, religious commitment, place of residence, gender and age. The revealed group differences in levels of worry about terror point to the ability…

  14. Terror.com

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    En stor del af terrorens formål er at skabe frygt. Frygt for gentagelse af terror handlinger og dermed opnåelsen af en psykologisk effekt på mennesker eller grupper af mennesker med henblik på at ændre deres holdninger eller adfærd. Et af de primære midler til at opnå denne psykologiske effekt er......, udover terror handlingerne selv, propaganda som opfølgning på terrorhandlinger for at forøge effekten af disse. Eller propaganda som slet og ret har til formål at skabe frygt og usikkerhed. Traditionelt set har meget af spredningen af terrorpropaganda beroet på, at medierne omtalte terrorhandlingerne og...

  15. Terrorism, war, and peace

    Directory of Open Access Journals (Sweden)

    JÜRGEN STOLZENBER

    2006-01-01

    Full Text Available The article tries first to analyse the different use of the concept of war made by George W. Bush with reference to the terrorist attack of 09/11 and to the invasion of Afghanistan. In order to do this, the paper will start from an analysis of the concept of terrorism itself and from the question whether terrorist acts can be designed as acts of war. It turns secondly to the more philosophical aspects of the question of terrorism, war and peace, starting from questions about the applicability of just war theories to the so called “war on terrorism” and discussing finally what is called “The Kantian Project”, that is the Kantian arguments for the establishment of “eternal peace” among the states of the world.

  16. Chechen Female Suicide Terrorism

    Science.gov (United States)

    2017-06-01

    Farhana Ali describes terrorism against an occupier as an attempt to achieve freedom from tyranny.66 Recruiters encourage women to resist for a...fringe phenomenon and insurgents are all around you.’”71 O’Rourke also acknowledges the freedom and relaxed inspection women are afforded.72 Bloom and...lives as Moscow controlled the land and people. Suspicious of Islam and of religion in general, the Soviets forbade its practice, fearing expansion.110

  17. Chinas Response to Terrorism

    Science.gov (United States)

    2016-06-01

    regulations regarding terrorism and related activities (e.g., the 2006 Anti- Money iv Laundering Law), most notably the 2015 Counterterrorism... Money Laundering ASEAN Association for Southeast Asian Nations CASS Chinese Academy of Social Sciences CCP Chinese Communist Party CICIR China...the Financing of Terrorism” in 2006, and passed a new law governing money laundering in an effort to restrict access to funds available to terrorists

  18. Terrorism: A Selected Bibliography.

    Science.gov (United States)

    1984-07-30

    Terrorism, Outraged World Seeks an Answer." U. News and World Report, September 18, 1972, p. 16. Arendt , Hannah . Crisis of the Republic. N. Y., Harcourt...Brace Jovanovich, 1972. Arendt , Hannah , On Violence. N. Y. Harcourt, Brace and World, 1970. Arendt , Hannah . On Revolutions. N. Y., Viking Press, 1965... Arendt , Hannah . "Reflections on Violence." Journal of International Affairs, 23:1, 1969. "Are the Skies Really Friendly?" Proposed Theories of Relief for

  19. Multifactor Regulation of the MdtJI Polyamine Transporter in Shigella.

    Directory of Open Access Journals (Sweden)

    Adriano Leuzzi

    Full Text Available The polyamine profile of Shigella, the etiological agent of bacillary dysentery in humans, differs markedly from that of E. coli, its innocuous commensal ancestor. Pathoadaptive mutations such as the loss of cadaverine and the increase of spermidine favour the full expression of the virulent phenotype of Shigella. Spermidine levels affect the expression of the MdtJI complex, a recently identified efflux pump belonging to the small multi-drug resistance family of transporters. In the present study, we have addressed the regulation of the mdtJI operon in Shigella by asking which factors influence its expression as compared to E. coli. In particular, after identifying the mdtJI promoter by primer extension analysis, in vivo transcription assays and gel-retardation experiments were carried out to get insight on the silencing of mdtJI in E. coli. The results indicate that H-NS, a major nucleoid protein, plays a key role in repressing the mdtJI operon by direct binding to the regulatory region. In the Shigella background mdtJI expression is increased by the high levels of spermidine typically found in this microorganism and by VirF, the plasmid-encoded regulator of the Shigella virulence regulatory cascade. We also show that the expression of mdtJI is stimulated by bile components. Functional analyses reveal that MdtJI is able to promote the excretion of putrescine, the spermidine precursor. This leads us to consider the MdtJI complex as a possible safety valve allowing Shigella to maintain spermidine to a level optimally suited to survival within infected macrophages and, at the same time, prevent toxicity due to spermidine over-accumulation.

  20. Effect of Tai Ji Quan training on self-reported sleep quality in elderly Chinese women with knee osteoarthritis: a randomized controlled trail.

    Science.gov (United States)

    Lü, Jiaojiao; Huang, Lingyan; Wu, Xie; Fu, Weijie; Liu, Yu

    2017-05-01

    The purpose of this study was to explore the effects of a 24-week Tai Ji Quan training program on sleep quality, quality of life, and physical performance among elderly Chinese women with knee osteoarthritis (OA). A 24-week randomized, controlled trial of 46 elderly women with knee OA. Participants were randomly assigned to either a Tai Ji Quan group (n = 23) or a control group (n = 23). Participants in the Tai Ji Quan group completed training sessions three times per week, while those in the control group had bi-weekly educational classes. The primary outcome was total score of the Pittsburgh Sleep Quality of Index (PSQI). Secondary outcomes were: seven subscales of the PSQI; sleep latency; total sleep time; sleep efficiency; physical component summary (PCS) and mental component summary (MCS) of the 36-item Short Form Health Survey (SF-36); Berg Balance Scale (BBS); and Timed Up and Go (TUG). Compared with the control group, participants in the Tai Ji Quan group had significantly improved primary outcome (global PSQI score, p = 0.006) and secondary outcomes, including three PSQI sub-scores (sleep latency, p = 0.031; sleep duration, p = 0.043; daytime dysfunction, p = 0.007), total sleep time (p = 0.033), and SF-36 PCS (p = 0.006). The Tai Ji Quan group also had significant improvements compared with baseline in three PSQI sub-scores (sleep latency, p = 0.031; habitual sleep efficiency, p = 0.049; sleep disturbance, p = 0.016), sleep latency (p = 0.003), BBS (p = 0.001), and TUG (p = 0.006). Tai Ji Quan training is an effective treatment approach to improve sleep quality and quality of life in elderly Chinese women with knee OA. Chinese Clinical Trial Registry (June 16, 2013): ChiCTR-TRC-13003264. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. A Taxonomy of Terror - About the Effect of Different Kinds of Terror on Risk Perceptions

    OpenAIRE

    Wolff, Katharina; Larsen, Svein

    2016-01-01

    Terrorism is an increasing problem; still, research systematically investigating the impact of varying kinds of terrorism is scarce. The present investigation uses hypothetical scenarios to look at effects of diverging sorts of terrorism on risk perceptions in a student- and a tourist sample. Two characteristics of terrorism were varied systematically: frequency (whether terrorism hits a destination where terrorism is frequent or infrequent) and degree of organization (whether terrorism is co...

  2. [Chemical weapons and chemical terrorism].

    Science.gov (United States)

    Nakamura, Katsumi

    2005-10-01

    Chemical Weapons are kind of Weapons of Mass Destruction (WMD). They were used large quantities in WWI. Historically, large quantities usage like WWI was not recorded, but small usage has appeared now and then. Chemical weapons are so called "Nuclear weapon for poor countrys" because it's very easy to produce/possession being possible. They are categorized (1) Nerve Agents, (2) Blister Agents, (3) Cyanide (blood) Agents, (4) Pulmonary Agents, (5) Incapacitating Agents (6) Tear Agents from the viewpoint of human body interaction. In 1997 the Chemical Weapons Convention has taken effect. It prohibits chemical weapons development/production, and Organization for the Prohibition of Chemical Weapons (OPCW) verification regime contributes to the chemical weapons disposal. But possibility of possession/use of weapons of mass destruction by terrorist group represented in one by Matsumoto and Tokyo Subway Sarin Attack, So new chemical terrorism countermeasures are necessary.

  3. Nuclear terrorism and legal protection of environment

    International Nuclear Information System (INIS)

    Ahmad-zada, Z.; Aliev, D.

    2003-01-01

    Full text: For the last years the terrorism has significantly changed. If 20-30 years ago terrorists would kidnap famous politicians or hijack planes, but at this stage they switched to massive destruction of innocent people. Now the problem of struggle against nuclear terrorism becomes very actual problem. The nuclear terrorism is meant as an opportunity of accomplishment of act of terrorism with use of the nuclear weapon, or accomplishment of explosions on atomic power stations and other objects of an atomic energy. Threats to nuclear objects become more and more often and appreciable. In the world there were some similar cases of threat to nuclear objects from the part of terrorists, and also cases of use by terrorists of nuclear, chemical and bacteriological substances. These cases testify to real threat of use by terrorists of the weapon of mass destruction. It is natural, that accomplishment of acts of terrorism on these objects can lead to ecological catastrophe and can put an irreparable loss to an environment and process of social development. Up to the middle of sixtieth years of twentieth century protection of an environment was not put forward as an independent political problem, and its scientific substantiation has not been developed enough as a diversified, complex, global problem. Only dynamical development in seventieth - eightieth years of scientific bases of global problems has allowed to allocate the rules of law concerning to protection of an environment, into special group. International legal protection of ecology was precisely allocated now in system of the general international law as independent, specific sphere of regulation. The principle of inadmissibility of radioactive pollution of environment covers both military, and peace area of use of nuclear power. Formation and the statement of this special principle of International law of the Environment takes place in two ways - contractual and usual, with observance by the states of

  4. Domestic Violence as Everyday Terrorism

    DEFF Research Database (Denmark)

    Cooper-Cunningham, Dean

    2016-01-01

    Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society.......Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society....

  5. Terrorism, forgiveness and restorative justice

    NARCIS (Netherlands)

    Pemberton, A.

    2014-01-01

    This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly

  6. LBA-ECO CD-06 Physical, Political, and Hydrologic Maps, Ji-Parana River Basin, Brazil

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set contains physical, hydrologic, political, demographic, and societal maps for the Ji-Parana River Basin, in the state of Rondonia, Brazil. These data...

  7. LBA-ECO CD-06 Physical, Political, and Hydrologic Maps, Ji-Parana River Basin, Brazil

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: This data set contains physical, hydrologic, political, demographic, and societal maps for the Ji-Parana River Basin, in the state of Rondonia, Brazil....

  8. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  9. Insurability of Terrorism Risks

    International Nuclear Information System (INIS)

    Harbruecker, D.

    2006-01-01

    Until 2001 losses caused by terrorist attacks have been covered under fire policies worldwide with two exceptions: Spain and UK where major and multiple losses caused by ETA and IRA had led to specific insurance solutions. The September 11, 2001 attacks on the World Trade Centre have changed the world in many aspects. This includes the insurance industry, which was compelled to exclude terrorism from coverage and to offer special solutions for extra premium. Nuclear power plants have been repeatedly called targets for terrorists as their destruction could cause a large catastrophe and more victims than the September 2001 attacks. How does the insurance industry respond? (author)

  10. 31 CFR 594.311 - Terrorism.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism. 594.311 Section 594.311... ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.311 Terrorism. The term terrorism means an activity that: (a) Involves a violent act or an act...

  11. Modern terrorism: concept and approach analysis

    OpenAIRE

    CHAIKA ALEXANDER VIKTOROVICH

    2015-01-01

    The problem of modern terrorism as an image of counterculture environment is considered. The analysis of concepts and approaches of foreign and native authors, specialists of terrorism problem research was conducted. Separate features of the modern terrorism are considered and emphasized. The author drew conceptual conclusions on the basis of dialectical approach to modern terrorism counterculture phenomenon research.

  12. Managing terror: differences between Jews and Arabs in Israel.

    Science.gov (United States)

    Somer, Eli; Maguen, Shira; Or-Chen, Keren; Litz, Brett T

    2009-04-01

    Using telephone surveys, we examined exposure to terror, coping, and mental health response in randomly selected Jewish-Israelis (n = 100) and Arab-Israelis (n = 100) living in five Israeli cities affected by terrorism. Jewish-Israelis and Arab-Israelis were randomly selected for study participation and completed telephone surveys in May 2002, following an extended string of terror attacks and hostilities. Although terrorism is designed to target Jewish-Israelis, the rates of exposure were similar in the two groups. Arab-Israelis reported using a wider array of coping strategies, yet also endorsed more frequent PTSD and more severe depression symptoms than Jewish-Israelis. We examined a variety of demographic, ethnic, and religious predictors of different coping styles and found varying results. For example, acceptance coping was best predicted by Arab-Israeli ethnicity, being female, greater religiosity, and lower education. Predictors of mental health response to terror were also examined, with Arab-Israeli ethnicity, being female, adaptation coping and collaborative coping best predicting PTSD and depression symptoms. Arab-Israelis may not have the same access to overarching sources of patriotic support that are readily available to their Jewish compatriots, and civilian and economic inequity experienced by the Arab minority may add to a sense of diminished resources. Our findings justify outreach efforts to overlooked minorities at risk for posttraumatic distress. Women seem to be at particular risk for the development of mental health symptoms following terrorism, which should also be noted for outreach purposes.

  13. Terrorism, Forgiveness and Restorative Justice

    Directory of Open Access Journals (Sweden)

    Antony Pemberton

    2014-07-01

    Full Text Available This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly public nature of terrorism, in which the attack on the direct victims is intended to influence a (far larger group of so-called vicarious victims. This means that the public is likely to experience terrorist attacks as attacks on themselves. As a consequence the public can feel entitled to processes of forgiveness which in turn can conflict with the direct victims’ own experience. To illuminate this issue the paper proposes a novel distinction in third party forgiveness processes: between public forgiveness, i.e. forgiveness relating to the public wrongfulness inherent in crime, and vicarious forgiveness, i.e. the public’s experience of forgiveness itself. The complexities for restorative justice after terrorism can be then be viewed in terms of the tensions between the direct victims’ private and the publics’ vicarious forgiveness processes. Este artículo pretende facilitar la comprensión de las complejidades de la justicia restaurativa en casos de terrorismo desde una perspectiva victimológica. Lo hace primero mediante el análisis de lo que separa el terrorismo de otras formas de delincuencia. El autor sostiene que la distinción principal se refiere a la naturaleza pública específica del terrorismo, ya que mediante el ataque a las víctimas directas se pretende influir en el grupo (mucho más grande de las llamadas víctimas vicarias. Esto significa que es probable que el público sienta los ataques terroristas como ataques contra ellos mismos. De esta forma, el público puede sentirse con derecho sobre los procesos de perdón, lo que, a su vez, puede entrar en conflicto con la propia experiencia de las víctimas directas. Para iluminar

  14. THE EFFECT OF PROBLEM SOLVING LEARNING MODEL BASED JUST IN TIME TEACHING (JiTT ON SCIENCE PROCESS SKILLS (SPS ON STRUCTURE AND FUNCTION OF PLANT TISSUE CONCEPT

    Directory of Open Access Journals (Sweden)

    Resha Maulida

    2017-11-01

    Full Text Available The purpose of this study was to determine the effect of Problem Solving learning model based Just in Time Teaching (JiTT on students' science process skills (SPS on structure and function of plant tissue concept. This research was conducted at State Senior High School in South Tangerang .The research conducted using the quasi-experimental with Nonequivalent pretest-Postest Control Group Design. The samples of this study were 34 students for experimental group and 34 students for the control group. Data was obtained using a process skill test instrument (essai type that has been tested for its validity and reliability. Result of data analysis by ANACOVA, show that there were significant difference of postest between experiment and control group, by controlling the pretest score (F = 4.958; p <0.05. Thus, the problem-solving learning based on JiTT proved to improve students’ SPS. The contribution of this treatment in improving the students’ SPS was 7.2%. This shows that there was effect of problem solving model based JiTT on students’ SPS on the Structure and function of plant tissue concept.

  15. Pharmacokinetics, tissue distribution and identification of putative metabolites of JI-101 - a novel triple kinase inhibitor in rats.

    Science.gov (United States)

    Gurav, S D; Gilibili, R R; Jeniffer, S; Mohd, Z; Giri, S; Govindarajan, R; Srinivas, N R; Mullangi, R

    2012-01-01

    JI-101, chemically 1-[1-(2-amino-pyridin-4-ylmethyl)-1H-indol-4-yl]-3-(5-bromo-2-methoxy-phenyl)-urea hydrochloride, is a novel orally active kinase inhibitor, which has shown potent in vitro and in vivo anticancer activity against a variety of cancer cell lines and xenografts. It is currently entering Phase II clinical development for the treatment of solid tumors. The aim of the study is to assess the metabolic stability of JI-101 in various pre-clinical and human liver microsomes, to identify the major CYPs (cytochrome β450) involved in the metabolism of JI-101 and identification of putative metabolites. We have also studied the pharmacokinetics, tissue distribution and excretion of JI-101 in Sprague Dawley rats. JI-101 was found to be stable in various liver microsomes tested. JI-101 is highly permeable and not a substrate for P-gp (permeability glycoprotein). JI-101 excreted through bile along with its mono- and di-hydroxy metabolites. Following oral administration, JI-101 was rapidly absorbed, reaching Cmax within 2 h. The t½ of JI-101 with intravenous and oral route was found to be 1.75 ± 0.79 and 2.66 ± 0.13 h, respectively. The Cl and Vd by intravenous route for JI-101 were found to be 13.0 ± 2.62 mL/min/kg and 2.11 ± 1.42 L/kg, respectively. The tissue distribution of JI-101 was extensive with rapid and preferred uptake into lung tissue. Overall, the oral bioavailability of JI-101 is 55% and the primary route of elimination for JI-101 is feces. © Georg Thieme Verlag KG Stuttgart · New York.

  16. Violation of human rights to combat terrorism.

    OpenAIRE

    2012-01-01

    LL.B. No one definition of terrorism has gained universal acceptance. The lack of agreement on a definition of terrorism has been a major obstacle to meaningful international countermeasures to combat terrorism. There are 12 International Conventions related to terrorism and an explicit definition is still missing. Many states have tried to define terrorism and none of these definitions has been implemented, either by the United Nations or these states. There are many International Convent...

  17. Racionalidad del terror

    Directory of Open Access Journals (Sweden)

    Sauquillo, Julián

    2012-06-01

    Full Text Available Contemporary terrorism is not an ancestral, irrational, oriental, phenomenon. Nor is it a fanatical reaction of the religions that vindicate a backward society as against the developed societies of the first world. The terrorism of today is a thoroughly modern phenomenon: one of the worst monstrosities of modern society, supplied with rational planning of objectives. A captious interpretation of the Islamic religion endows terrorism with a universal projection among the multitudinous audience of the discontented with the might of that diffuse power that we know as the developed Western world. Al Qaeda does not hesitate to present its war against the West as «a war without quarter» lasting until the infidel Christians are eliminated and the world is subjugated to Islam In the meantime, in a similar conflictive sense, the theoretical campaign of Samuel Huntington across the entire planet responds with a paradigmatic post-cold war, capable of inflaming the international conflict, in a sense no less belligerent with the Anti-Occident than that employed by the radical Imams. As has been pointed out by Amartya Sen, to give priority in this way to the religious identity, the response of the West to international terrorism in calling it «islamic terrorism» is very clumsy, as it magnifies the importance of the religious authorities in detriment to governmental ways and means in the solving of problems.

    El terrorismo contemporáneo no es un fenómeno ancestral, irracional y oriental. Tampoco es una reacción fanática de las religiones que reivindican una sociedad atrasada frente a las sociedades desarrolladas del primer mundo. El terrorismo actual es un fenómeno plenamente moderno: uno de los peores engendros de la sociedad moderna, dotado de una planificación racional de objetivos. Una interpretación capciosa de la religión islámica dota al terrorismo de una proyección universal entre la numerosa audiencia de descontentos con el poder

  18. 77 FR 74685 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2012-12-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and...: Comments that include trade secrets, confidential commercial or financial information, Chemical-terrorism...

  19. Terrorism and the behavioral sciences.

    Science.gov (United States)

    Schouten, Ronald

    2010-01-01

    Terrorism has existed for millennia and is a phenomenon well-known to many parts of the world. Americans were forced to recognize this phenomenon, and our vulnerability to it, by two sets of events in 2001: the attacks on New York City and Washington, DC, and the anthrax mailings that followed shortly thereafter. Psychiatry, psychology, and other behavioral and social sciences have been looked to for assistance in collecting and analyzing intelligence data, understanding terrorism, and developing strategies to combat terrorism. In addition to reviewing areas in which the behavioral sciences have made contributions in addressing this problem, this article discusses the developing roles for behavioral scientists in this field.

  20. Animal rights and environmental terrorism

    Directory of Open Access Journals (Sweden)

    Steve Cooke

    2013-09-01

    Full Text Available Many paradigmatic forms of animal rights and environmental activism have been classed as terrorism both in popular discourse and in law. This paper argues that the labelling of many violent forms of direct action carried out in the name of animal rights or environmentalism as ‘terrorism’ is incorrect. Furthermore, the claim is also made that even those acts which are correctly termed as terrorism are not necessarily wrongful acts. The result of this analysis is to call into question the terms of public debate and the legitimacy of anti-terrorism laws targeting and punishing radical activism.

  1. Close Cousins or Distant Relatives? The Relationship between Terrorism and Hate Crime

    Science.gov (United States)

    Deloughery, Kathleen; King, Ryan D.; Asal, Victor

    2012-01-01

    Prior research has frequently drawn parallels between the study of hate crimes and the study of terrorism. Yet, key differences between the two behaviors may be underappreciated in extant work. Terrorism is often an "upward crime," involving a perpetrator of lower social standing than the targeted group. By contrast, hate crimes are…

  2. International terrorism, a new challenge to modern Western society

    International Nuclear Information System (INIS)

    Hochleitner, E.

    2002-01-01

    Full text: The attacks of 9/11 against the WTC and the Pentagon have made western society aware of the threat potential, which international terrorism presents to the open and democratic societies of the West. The new international terrorism is substantially different from the traditional form terrorism, which our societies has experienced in the past. The arms of traditional terrorism were bombs and guns and the victims were mostly clearly defined targets and its political and ideological motives were known. The terrorists assumed responsibility and there was an interest and scope for political negotiation. Terrorist groups had a vertical structure with a hierarchy. The new international terrorism is organized in a horizontal way and its structure is amorphous. Terrorist groups act in an autonomous way and linked by a rather loose network. International terrorism makes full use of modern communication systems and seek to equip themselves with the best armament available including WMDs, provided they can get hold of them. Their target are no longer individuals, but the modern western society. They aim at a maximum number of victims in order to get maximum media attention and to destabilize the targeted society. The motives of terrorist groups are religious or ideological. A terrorist attack represents for those terrorists a religious, nearly sacral act, including self sacrifice. Today, the main challenge for the open, democratic and modern society represents the network of Islamic Fundamentalists. Islamic terrorism has been active mainly in Islamic countries with the aim to overthrow westernized forms of government, mainly in Egypt and Algeria. In the early 1990's, the network of Islamic terror groups has been built up and the al-Qaida was formed. AI-Qaida is a network of Islamic terror groups and a platform for co-operation and support of Islamic cells. It provides training, arms, finances, etc.. AI-Qaida supported the Taliban regime, which provided it with a

  3. Communicating with the public following radiological terrorism: results from a series of focus groups and national surveys in Britain and Germany.

    Science.gov (United States)

    Pearce, Julia M; Rubin, G James; Selke, Piet; Amlôt, Richard; Mowbray, Fiona; Rogers, M Brooke

    2013-04-01

    Incidents involving the exposure of large numbers of people to radiological material can have serious consequences for those affected, their community and wider society. In many instances, the psychological effects of these incidents have the greatest impact. People fear radiation and even incidents which result in little or no actual exposure have the potential to cause widespread anxiety and behavior change. The aim of this study was to assess public intentions, beliefs and information needs in the UK and Germany in response to a hidden radiological exposure device. By assessing how the public is likely to react to such events, strategies for more effective crisis and risk communication can be developed and designed to address any knowledge gaps, misperceptions and behavioral responses that are contrary to public health advice. This study had three stages. The first stage consisted of focus groups which identified perceptions of and reactions to a covert radiological device. The incident was introduced to participants using a series of mock newspaper and broadcast injects to convey the evolving scenario. The outcomes of these focus groups were used to inform national telephone surveys, which quantified intended behaviors and assessed what perceptions were correlated with these behaviors. Focus group and survey results were used to develop video and leaflet communication interventions, which were then evaluated in a second round of focus groups. In the first two stages, misperceptions about the likelihood and routes of exposure were associated with higher levels of worry and greater likelihood of engaging in behaviors that might be detrimental to ongoing public health efforts. The final focus groups demonstrated that both types of misunderstanding are amenable to change following targeted communication. Should terrorists succeed in placing a hidden radiological device in a public location, then health agencies may find that it is easier to communicate effectively

  4. KENYA’S OIL PIPELINE AND TERRORISM

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2014-04-01

    Full Text Available The threat of Al-Shabaab and Al-Qaeda terrorist attacks on the critical infrastructure (oil pipeline in Kenya has brought to the attention the strategic issue of the energy sector security, highlighting the potential vulnerabilities of this sector. Critical Infrastructure Protection (CIP should be a key component of the national security especially after the Kenya Defence Forces’ (KDF incursion into Somalia. The merger of Al-Shabaab and Al-Qaeda terrorist groups and the accelerated grenades attack against Kenya in retaliation has become the centre of the debate on terrorism and internal security of the Kenya. The energy resources are strategic assets from the security, political and economic point of view. Kenya as an oil transit country is considered of primary strategic importance at international level. International terrorism has always looked with interest at the oil resource in order to meet its political and economic targets. We argue that Kenya’s oil pipelines are vulnerable to Al-Shabaab and Al-Qaeda terrorist attack. In summary, the article looks at the concept of terrorism within the framework of critical infrastructure protection, the dangers of attacks on oil pipelines, Kenya’s government preparedness and recommendations.

  5. Paramilitary Terrorism: A Neglected Threat

    National Research Council Canada - National Science Library

    Tallen, Jr, George W

    2007-01-01

    Fixation upon WMD terrorism, reinforced by the recurring need to manage the consequences of other manmade or natural disasters, has conditioned the homeland security community to focus upon prevention...

  6. The Newsworthiness of International Terrorism.

    Science.gov (United States)

    Weimann, Gabriel; Brosius, Hans-Bernd

    1991-01-01

    Investigates the newsworthiness of international terrorism. Relates the concept of deviance as a predictor of newsworthiness to the specific attributes of terrorist events and their impact on media selection (coverage or no coverage) and prominence of coverage. (SR)

  7. Cyber-Terrorism: Modem Mayhem

    National Research Council Canada - National Science Library

    White, Kenneth

    1998-01-01

    .... The arrival of the information age has created a new menace cyber terrorism. This threat recognizes no boundaries, requires minimal resources to mount an attack, and leaves no human footprint at ground zero...

  8. Nuclear Forensics International Technical Working Group (ITWG): a collaboration of scientists, law enforcement officials, and regulators working to combat nuclear terrorism and proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Schwantes, Jon M.

    2013-10-25

    Founded in 1996 upon the initiative of the “Group of 8” governments (G8), the Nuclear Forensics International Technical Working Group (ITWG) is an ad hoc organization of official Nuclear Forensics practitioners (scientists, law enforcement, and regulators) that can be called upon to provide technical assistance to the global community in the event of a seizure of nuclear or radiological materials. The ITWG is supported by and is affiliated with nearly 40 countries and international partner organizations including the International Atomic Energy Agency (IAEA), EURATOM, INTERPOL, EUROPOL, and the United Nations Interregional Crime and Justice Research Institute (UNICRI) (Figure 1). Besides providing a network of nuclear forensics laboratories that are able to assist the global community during a nuclear smuggling event, the ITWG is also committed to the advancement of the science of nuclear forensic analysis, largely through participation in periodic table top and Collaborative Materials Exercises (CMXs). Exercise scenarios use “real world” samples with realistic forensics investigation time constraints and reporting requirements. These exercises are designed to promote best practices in the field and test, evaluate, and improve new technical capabilities, methods and techniques in order to advance the science of nuclear forensics. Past efforts to advance nuclear forensic science have also included scenarios that asked laboratories to adapt conventional forensics methods (e.g. DNA, fingerprints, tool marks, and document comparisons) for collecting and preserving evidence comingled with radioactive materials.

  9. Tai Ji Quan: An overview of its history, health benefits, and cultural value

    Directory of Open Access Journals (Sweden)

    Yucheng Guo

    2014-03-01

    Full Text Available Tai Ji Quan is considered to be a part of traditional Chinese Wushu (a martial art and comprises various styles that have evolved historically from the Chen, Yang, Wǔ, Wú, and Sun families (schools. Recent simplification of the original classic styles has made Tai Ji Quan easier to adopt in practice. Thus, the traditional legacy of using Tai Ji Quan for self-defense, mindful nurturing of well-being, and fitness enhancement has been expanded to more contemporary applications that focus on promoting physical and mental health, enhancing general well-being, preventing chronic diseases, and being an effective clinical intervention for diverse medical conditions. As the impact of Tai Ji Quan on physical performance and health continues to grow, there is a need to better understand its historical impact and current status. This paper provides an overview of the evolution of Tai Ji Quan in China, its functional utility, and the scientific evidence of its health benefits, as well as how it has been a vehicle for enhancing cultural understanding and exchanging between East and West.

  10. Jičín - město pohádky a cestovní ruch

    OpenAIRE

    Šarbortová, Kateřina

    2011-01-01

    The bachelor's thesis deals with Jičín and festival Jičín - the town of fairytale. First chapter characterizes the importance of tourism, types of tourism, its destination and marketing in tourism. The following part deals with Královéhradecký region, the town of Jičín and its tourist attractions. The next chapter describes festival Jičín - the town of fairytale. The last chapter analyses the influence of the festival on tourism of the town and its surroundings.

  11. The Threat of Convergence of Terror Groups with Transnational Criminal Organizations in Order to Utilize Existing Smuggling Routes and Techniques to Aid in the Covert Entry of Operatives into the United States

    Science.gov (United States)

    2015-06-12

    program and displayed limitless patience as I struggled to learn a new language of acronyms and a culture of bravery, sacrifice, and honor. You have...terrorists illegally entered India via small craft and enacted sixty-two hours of terror in the city of Mumbai . In the course of those hours, these...

  12. Poster - Thurs Eve-16: Just-in-time tomography (JiTT).

    Science.gov (United States)

    Pang, G; Rowlands, J A

    2008-07-01

    Soft-tissue target motion is one of the main concerns in high-precision radiation therapy. Cone beam computed tomography (CBCT) has been developed recently to image soft-tissue targets in the treatment room for image-guided radiation therapy. However, due to its relatively long image acquisition time the CBCT approach cannot provide images of the target at the instant of the treatment and thus is not adequate for imaging targets with intrafraction motion. In this work, a new concept for image-guided radiation therapy- just-in-time tomography (JiTT) - is introduced. Differing from CBCT, JiTT takes much less time to generate the needed tomographical, beam's-eye-view images of the treatment target at the right moment to guide the radiation therapy treatment. A system to achieve JiTT is proposed and its feasibility is investigated. Research supported by Siemens. © 2008 American Association of Physicists in Medicine.

  13. Country Reports on Terrorism 2006

    Science.gov (United States)

    2007-04-01

    military and police. The Malaysian government cooperated with the Cambodian government on Malaysia-specific cases. In December, following the visit of...upgraded significantly. At year’s end, the main target of Indonesian CT units remained Malaysian JI operative and recruiter Noordin Mohammed Top...plans to submit the bill to the Diet . In a bid to clamp down on money laundering, the Ministry of Finance announced in August that Japanese financial

  14. Advancing against nuclear terrorism

    International Nuclear Information System (INIS)

    Allison, G.

    2006-01-01

    Meeting a day before the summit, Bush and Putin announced a new Global Initiative to Combat Nuclear Terrorism; a plan for multiple, multilateral guaranteed suppliers of nuclear fuel to States that forgo building their own enrichment plants; and a Civil Nuclear Agreement that will lift restrictions on cooperation between the two countries in developing peaceful nuclear power. Each of these initiatives provides a framework for dozens of specific actions that can measurably reduce the risk of terrorists acquiring a nuclear weapon. The significance of the Global Initiative against Nuclear Terrorism lies not only in its substance but in Russia's visible joint ownership of the Initiative. After years in which Washington lectured Moscow about this threat, Putin's joint leadership in securing nuclear material worldwide should give added impetus to this undertaking inside Russia as well. Globally, this initiative calls for work plans in five arenas: prevention, detection, disruption, mitigation of consequences after an attack, and strengthening domestic laws and export controls against future A.Q. Khans. The guaranteed nuclear fuel supply tightens the noose around Iran as it seeks to exploit a loophole in the global Nuclear Non-Proliferation Treaty. By guaranteeing States that six separate international suppliers will provide backup guarantees against interruption of supply for any reason other that breech of commitments under the NPT, this proposal eliminates Iran's excuse for Natanz-the enrichment plant it is rushing to finish today. This system for supply will be subject to the supervision by the IAEA, which will also have nuclear fuel reserves that allow it to be a supplier of last resort. The Civil Nuclear Agreement will allow joint research on next-generation, proliferation-proof reactors, including technologies where Russian science is the best in the world. It will permit sale to Russia of US technologies that can improve the safety and efficiency of Russian nuclear

  15. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  16. Jiří Wolker, osobnost a dílo

    OpenAIRE

    Rufertová, Kamila

    2010-01-01

    Jiří Wolker, a poet born at the beginning of the 20th century, enjoyed great popularity among literary critics as well as readers. The reception of his work was marked with controversial interpretations, which resulted in the critical movement Dosti Wolkera (Enough Wolker) in 1925. Wolker's work has been described as "Proletarian", but his lyrical writings achieved high quality and there is much more in it. Jiří Wolker had been appreciated as a very talented and hard-working personality. He b...

  17. A journey through discrete mathematics a tribute to Jiří Matoušek

    CERN Document Server

    Nešetřil, Jaroslav; Thomas, Robin

    2017-01-01

    This collection of high-quality articles in the field of combinatorics, geometry, algebraic topology and theoretical computer science is a tribute to Jiří Matoušek, who passed away prematurely in March 2015. It is a collaborative effort by his colleagues and friends, who have paid particular attention to clarity of exposition – something Jirka would have approved of. The original research articles, surveys and expository articles, written by leading experts in their respective fields, map Jiří Matoušek’s numerous areas of mathematical interest.

  18. Basic Research Needs for Countering Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, W.; Michalske, T.; Trewhella, J.; Makowski, L.; Swanson, B.; Colson, S.; Hazen, T.; Roberto, F.; Franz, D.; Resnick, G.; Jacobson, S.; Valdez, J.; Gourley, P.; Tadros, M.; Sigman, M.; Sailor, M.; Ramsey, M.; Smith, B.; Shea, K.; Hrbek, J.; Rodacy, P.; Tevault, D.; Edelstein, N.; Beitz, J.; Burns, C.; Choppin, G.; Clark, S.; Dietz, M.; Rogers, R.; Traina, S.; Baldwin, D.; Thurnauer, M.; Hall, G.; Newman, L.; Miller, D.; Kung, H.; Parkin, D.; Shuh, D.; Shaw, H.; Terminello, L.; Meisel, D.; Blake, D.; Buchanan, M.; Roberto, J.; Colson, S.; Carling, R.; Samara, G.; Sasaki, D.; Pianetta, P.; Faison, B.; Thomassen, D.; Fryberger, T.; Kiernan, G.; Kreisler, M.; Morgan, L.; Hicks, J.; Dehmer, J.; Kerr, L.; Smith, B.; Mays, J.; Clark, S.

    2002-03-01

    To identify connections between technology needs for countering terrorism and underlying science issues and to recommend investment strategies to increase the impact of basic research on efforts to counter terrorism.

  19. Biotypologies of Terrorism

    Directory of Open Access Journals (Sweden)

    Joseph Pugliese

    2011-04-01

    Full Text Available The International Association of Chiefs of Police (IACP document, ‘Training Keys #581: Suicide (Homicide Bombers: Part 1,’ is designed to assist law enforcement authorities in the pre-emptive capture of prospective suicide bombers. In this essay, Pugliese focuses on the training key to examine the manner in which essentialised biotypologies are mobilised and reproduced within the context of the so-called ‘war on terror.’ The use of biotypologies by both the military and law enforcement agencies reproduces a disciplinary biopolitical regime premised on normative conceptualisations of race, gender and bodily behaviour. Pugliese discusses these regimes in the context of the US Department of Defense and its advocacy of ‘identity dominance’ through the development of new technologies such as gait signature biometrics. Situated in this context, he shows how biotypologies of targeted subjects are instrumental in fomenting cultural panics concerning the Arab and/or Muslim and/or figure ‘of Middle Eastern appearance’.

  20. Global initiatives to prevent nuclear terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    The fight against nuclear and radiological terrorism - someone to blow up a nuclear weapon or spread radioactive material as a 'dirty bomb' that act of terrorism - is one of the most serious threats to international security. The Global Initiative to prevent nuclear terrorism is a Norwegian-sponsored initiative that is aimed directly at combating terrorism by non-state actors. NRPA follow up Norwegian measures, including in Kazakhstan, and verifies that they are implemented and functioning as intended. (AG)

  1. Bringing the State Back into Terrorism Studies

    OpenAIRE

    Blakeley, Ruth

    2007-01-01

    Orthodox terrorism studies tend to focus on the activities of illiberal nonstate actors against the liberal democratic states in the North. It thus excludes state terrorism, which is one of a number of repressive tools that great powers from the North have used extensively in the global South in\\ud the service of foreign policy objectives. I establish the reasons for the absence of state terrorism from orthodox accounts of terrorism and argue that critical–normative approaches could help to o...

  2. Understanding Terrorism from an Economic perspective

    OpenAIRE

    Haldar, Tanushree

    2013-01-01

    Terrorism has emerged as a major threat to the contemporary society. Nation States are reliant on their counter-terrorism laws for checking terrorism and deterring terrorists. To understand the effectiveness of these counter terrorism laws, it is important to first understand the behaviour of terrorists, so as to comprehend what actions can dissuade terrorist’s behaviour and decision to propagate violence. This paper will first look at behaviour of terrorist in decision making from an economi...

  3. Defining and Distinguishing Traditional and Religious Terrorism

    OpenAIRE

    Gregg, Heather S.

    2014-01-01

    The article of record may be found at: http://dx.doi.org/10.1080/23296151.2016.1239978 thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from tr...

  4. Mass Media and Terrorism: Deconstructing the Relationship

    OpenAIRE

    Prayudi, Prayudi

    2008-01-01

    Issue of terrorism came to surface in this early twenty first century through a number ofacts violence that have killed hundreds and injured thousands of people. At the same time, theseevents have been dominated the mass media contents. Principally, mass media and issue ofterrorism are inseparable. This paper examines the relationship between mass media and terrorism.It is done through the deconstruction of the concept of terrorism and how terrorism isunderstood as a communicational process. ...

  5. A prospect theory perspective on terrorism

    Directory of Open Access Journals (Sweden)

    Cind Du Bois

    2017-06-01

    Full Text Available This paper presents a new approach for the study of terrorist behaviour and argues that a framework based on Prospect Theory can provide novel, useful insights into the understanding of the terrorist mind-set. Such a framework allows different pathways to become a terrorist and although individual decisions are studied, the model also takes into account environmental factors. By changing these environmental factors and/or framing the choice differently, PT provides insights as to how the terrorist group and/or a charismatic leader can influence the individual’s whether or not to turn to terrorism.

  6. Effects of Tai Ji Quan training on gait kinematics in older Chinese women with knee osteoarthritis: A randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Qingguang Zhu

    2016-09-01

    Conclusion: Among older Chinese women with knee OA, a tailored Tai Ji Quan intervention improved gait outcomes. The intervention also improved overall function as indexed by the WOMAC and SPPB. These results support the use of Tai Ji Quan for older Chinese adults with knee OA to both improve their functional mobility and reduce pain symptomatology.

  7. Fighting terrorism in Africa: Benchmarking policy harmonization

    Science.gov (United States)

    Asongu, Simplice A.; Tchamyou, Vanessa S.; Minkoua N., Jules R.; Asongu, Ndemaze; Tchamyou, Nina P.

    2018-02-01

    This study assesses the feasibility of policy harmonization in the fight against terrorism in 53 African countries with data for the period 1980-2012. Four terrorism variables are used, namely: domestic, transnational, unclear and total terrorism dynamics. The empirical evidence is based on absolute beta catch-up and sigma convergence estimation techniques. There is substantial absence of catch-up. The lowest rate of convergence in terrorism is in landlocked countries for regressions pertaining to unclear terrorism (3.43% per annum for 174.9 years) while the highest rate of convergence is in upper-middle-income countries in domestic terrorism regressions (15.33% per annum for 39.13 years). After comparing results from the two estimation techniques, it is apparent that in the contemporary era, countries with low levels of terrorism are not catching-up their counterparts with high levels of terrorism. As a policy implication, whereas some common policies may be feasibly adopted for the fight against terrorism, the findings based on the last periodic phase (2004-2012) are indicative that country-specific policies would better pay-off in the fight against terrorism than blanket common policies. Some suggestions of measures in fighting transnational terrorism have been discussed in the light of an anticipated surge in cross-national terrorism incidences in the coming years.

  8. The boomerang affect of the war on terror

    Directory of Open Access Journals (Sweden)

    Carolin Goerzig

    2010-11-01

    /11.Preemption does not help to reduce the terrorism risk, but on the very contrary leads to its increase. The argument will be taken a step further by claiming that, in fact, the war on terror increases the likelihood of catastrophic terrorism, because the risk of terrorism increases as such that terrorists might seek indiscriminate violence not shying away to use weapons of mass destruction. The war on terror therewith turns into a risk paradox - carrying consequences which, arguably, are even more risky than the original risk itself. In order to demonstrate this point, this article applies the concept of risk to terrorist groups and relates it to the paradox implications of the war on terror.Keywords: war on terror; terrorism risk; risk paradox; catastrophic terrorism; 9/11

  9. A networks analysis of terrorism in Africa: implications for Kenya

    Directory of Open Access Journals (Sweden)

    Steven Kigen Morumbasi

    2016-12-01

    Full Text Available This paper highlights the challenges that the international community faces in responding to the terrorists and the need to change tactics to respond more effectively to an increasingly nebulous enemy. Terrorism can take different forms and is perpetrated by both state and non-state actors. This research looks into the network structure of terrorism and terrorist groups. In the contemporary setting, terrorist organizations operate transnationally hence the use of the term ‘terrorism without borders’. An enabling factor of terrorism today is the network structure that it has adopted which gives it the ability to both project its reach and prevent easy infiltration. The network structure has also brought about renewed interests in Africa, where global terror networks such as al-Qaeda and the Islamic State compete for influence. Boko Haram in West Africa is an affiliate of the Islamic State and this provides possible linkages with the Islamic State in Libya. Boko Haram refers to itself as the Islamic State’s Western Province. Al-Shabaab has dominated headlines by carrying out deadly attacks in East Africa. The al-Qaeda affiliate has however faced resistance from a section of its members who seek ties with the Islamic State. This resulted in the formation of Jabha East Africa, a group that aligns itself to the Islamic State. The Sinai Peninsula has also witnessed an upsurge of terror attacks perpetrated by the Sinai Province, which views itself as a province of the Islamic State. This surmounts to a complex network structure of terrorist networks in Africa and the growing threat to militant Islam. The special attention is paid to analysis of terrorist challenges in Kenia.

  10. Terror explosive injuries: a comparison of children, adolescents, and adults.

    Science.gov (United States)

    Jaffe, Dena H; Peleg, Kobi

    2010-01-01

    We sought to characterize injuries and outcomes from terror explosions with specific attention to children (0-10 years) and adolescents (11-15 years) compared to adults (16-45 years). Terror explosions target vulnerable populations and result in multidimensional injuries that may vary according to age group. The relative dearth of information regarding terror-related injuries among children inhibits proper preparedness and optimum management during such an event. A retrospective study was performed using data from the national Israel Trauma Registry (October 2000 to December 2005). Included were civilians and nonactive military personnel hospitalized as a result of a terror explosion. During the 5.3-year study period, 49 children (0-10 years), 65 adolescents (11-15 years), and 723 adults (16-45 years) were hospitalized from terror explosions. Children were more likely than adults to sustain severe injuries (27% vs. 12%) and traumatic brain injury (35% vs. 20%) and less likely to sustain injuries to their extremities (35% vs. 57%) or open wounds (39% vs. 59%) (P profile was similar to that of adults, however, adolescents presented with less internal injuries, more contusions, and superficial wounds to extremities and were more likely to require surgery for mild to moderate wounds. Differences in hospital utilization and outcomes by age groups were observed when data were stratified by injury severity. Compared to adults, children, and adolescents exposed to terror explosions present with different injuries and hospital utilization and outcomes. These results further confirm that preparedness of a pediatric healthcare system is essential for effective management in the event of a future mass casualty incident.

  11. Religiosity and reactions to terrorism.

    Science.gov (United States)

    Adamczyk, Amy; LaFree, Gary

    2015-05-01

    Although many of the world's most serious outbreaks of conflict and violence center on religion, social science research has had relatively little to say about religion's unique role in shaping individuals' attitudes about these events. In this paper we investigate whether Americans' religious beliefs play a central role in shaping attitudes toward the continuing threat of terrorism and their willingness to assist officials in countering these perceived threats. Our analysis of an original data collection of almost 1600 Americans shows that more religious respondents are more likely to express concerns about terrorism. However, this relationship is mediated by their level of conservatism. We also find that more religious respondents are more likely to claim that they will assist government officials in countering terrorism. This relationship remained even after accounting for conservatism, and people's general willingness to help police solve crimes like breaking and entering. Copyright © 2014 Elsevier Inc. All rights reserved.

  12. Simulating Terrorism: Credible Commitment, Costly Signaling, and Strategic Behavior

    Science.gov (United States)

    Siegel, David A.; Young, Joseph K.

    2009-01-01

    We present two simulations designed to convey the strategic nature of terrorism and counterterrorism. The first is a simulated hostage crisis, designed primarily to illustrate the concepts of credible commitment and costly signaling. The second explores high-level decision making of both a terrorist group and the state, and is designed to…

  13. Jiří Musil a sociální teorie

    Czech Academy of Sciences Publication Activity Database

    Skovajsa, Marek

    2012-01-01

    Roč. 48, č. 5 (2012), s. 1003-1008 ISSN 0038-0288 Institutional support: RVO:68378025 Keywords : Czech sociology * social theory * Jiří Musil (1928-2012) Subject RIV: AO - Sociology, Demography Impact factor: 0.652, year: 2012

  14. Terrorism and nuclear damage coverage

    International Nuclear Information System (INIS)

    Horbach, N. L. J. T.; Brown, O. F.; Vanden Borre, T.

    2004-01-01

    This paper deals with nuclear terrorism and the manner in which nuclear operators can insure themselves against it, based on the international nuclear liability conventions. It concludes that terrorism is currently not covered under the treaty exoneration provisions on 'war-like events' based on an analysis of the concept on 'terrorism' and travaux preparatoires. Consequently, operators remain liable for nuclear damage resulting from terrorist acts, for which mandatory insurance is applicable. Since nuclear insurance industry looks at excluding such insurance coverage from their policies in the near future, this article aims to suggest alternative means for insurance, in order to ensure adequate compensation for innocent victims. The September 11, 2001 attacks at the World Trade Center in New York City and the Pentagon in Washington, DC resulted in the largest loss in the history of insurance, inevitably leading to concerns about nuclear damage coverage, should future such assaults target a nuclear power plant or other nuclear installation. Since the attacks, some insurers have signalled their intentions to exclude coverage for terrorism from their nuclear liability and property insurance policies. Other insurers are maintaining coverage for terrorism, but are establishing aggregate limits or sublimits and are increasing premiums. Additional changes by insurers are likely to occur. Highlighted by the September 11th events, and most recently by those in Madrid on 11 March 2004, are questions about how to define acts of terrorism and the extent to which such are covered under the international nuclear liability conventions and various domestic nuclear liability laws. Of particular concern to insurers is the possibility of coordinated simultaneous attacks on multiple nuclear facilities. This paper provides a survey of the issues, and recommendations for future clarifications and coverage options.(author)

  15. Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Hagan, Ross F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-29

    This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature.

  16. Defining and Distinguishing Secular and Religious Terrorism

    Directory of Open Access Journals (Sweden)

    Heather S. Gregg

    2014-04-01

    Full Text Available Religious terrorism is typically characterised as acts of unrestrained, irrational and indiscriminant violence, thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from traditional terrorism; investigate three goals of religious terrorism (fomenting the apocalypse, creating a religious government, and establishing a religiously pure state; consider the role of leadership and target selection of religious terrorists; and, finally, suggest a range of counterterrorism strategies based on these observations.

  17. Gender Imbalance and Terrorism in Developing Countries

    Science.gov (United States)

    Younas, Javed

    2016-01-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results. PMID:28232755

  18. Gender Imbalance and Terrorism in Developing Countries.

    Science.gov (United States)

    Younas, Javed; Sandler, Todd

    2017-03-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results.

  19. Miserere. Aesthetics of Terror

    Directory of Open Access Journals (Sweden)

    Antonio Incampo

    2011-10-01

    Full Text Available I say: “Oh, what a beautiful surrealist picture!” With quite precise awareness: this páthos, these emotions of mine do not stem from our common sense. An aesthetic judgment is founded on an immediate subjective intuition: an emotion or a free feeling of a single subject towards an object. A universal sense, possibly. Some judgments of ours in ethics and in law are no different from our perceptions in front of art. It would be the same for a hypothetical sentence of the judge that concluded with these words: “I acquit Arsenio Lupin because of his magnificent handlebar moustache like that of Guy de Maupassant”. Everyone would think intuitively that it is an unfair sentence. Is there aesthetics of terror? The case that the article intends to examine is that of the famous kidnapping and murder of the Italian statesman Aldo Moro by the “Brigate Rosse” [Red Brigades] (1978. The method used here consists in studying the image of the kidnapping as iconic documentation of reality, and, above all, as an ethical-legal judgment about the terrorist crime. Moro was photographed during his kidnapping. There are at least two pictures. Both constitute an extraordinary source for a judgment on the basis of an image. In both of them, Aldo Moro is pictured in front of a Red Brigades banner during the captivity. In what sense do these pictures document an aesthetic judgment concerning the “case Moro”? The answer can be found in a remarkable iconic coincidence of these pictures with a masterpiece by Georges Rouault (Paris 1871-1958 devoted to the theme of the “Ecce Homo”. The Gospel in the “Ecce Homo” scene (John: 19, 4-5 narrates how Pontius Pilate wanted to arouse the compassion of the people with a scourging and the exposure of Jesus to the crowd. The plate under consideration is entitled “Qui ne se grime pas?” [Who does not have a painted face?] and is a key work in Rouault’s suite of prints Miserere, dated for 1923.

  20. A dynamical model of terrorism

    Directory of Open Access Journals (Sweden)

    Firdaus Udwadia

    2006-01-01

    Full Text Available This paper develops a dynamical model of terrorism. We consider the population in a given region as being made up of three primary components: terrorists, those susceptible to both terrorist and pacifist propaganda, and nonsusceptibles, or pacifists. The dynamical behavior of these three populations is studied using a model that incorporates the effects of both direct military/police intervention to reduce the terrorist population, and nonviolent, persuasive intervention to influence the susceptibles to become pacifists. The paper proposes a new paradigm for studying terrorism, and looks at the long-term dynamical evolution in time of these three population components when such interventions are carried out. Many important features—some intuitive, others not nearly so—of the nature of terrorism emerge from the dynamical model proposed, and they lead to several important policy implications for the management of terrorism. The different circumstances in which nonviolent intervention and/or military/police intervention may be beneficial, and the specific conditions under which each mode of intervention, or a combination of both, may be useful, are obtained. The novelty of the model presented herein is that it deals with the time evolution of terrorist activity. It appears to be one of the few models that can be tested, evaluated, and improved upon, through the use of actual field data.

  1. Applying Intermediate Microeconomics to Terrorism

    OpenAIRE

    Charles Anderton; John Carter

    2004-01-01

    The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, while basic game theory helps characterize the strategic interdependencies among terrorists and governments.

  2. Applying Intermediate Microeconomics to Terrorism

    Science.gov (United States)

    Anderton, Charles H.; Carter, John R.

    2006-01-01

    The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, and basic game theory helps characterize the strategic interdependencies among terrorists and governments.…

  3. Terrorism and its centuries challenges

    Directory of Open Access Journals (Sweden)

    Jonida Drogu

    2018-03-01

    Full Text Available The goal of this article is to portray how to better understand the epistemic differences of terminology used for terrorism and how people’s lives have been and are still affected by this undefined violence. By collecting some diary information from 20people about their perception about terrorism attaches we will analyze some of overall countries and Saudi Arabia’s commitment in fighting this century’s challenge. Fighting radical religious beliefs in the Kingdom is an immense challenge. The true Islamic faith is in large contrast to those individuals and entities whose actions are centered on the intentional misrepresentation or the degradation of the teachings of Islam. The base of this data will indicate the progress within Saudi Arabia, its position in the world prospect and its impact in society since it remains a robust construction even now days, even thought, a lot has been done. The first signs provided in this analysis start with the beginning of the new century, when a strong attack happened just days before it began. Some important indicators such as terrorism founding, or money charities caused many changes in Saudi Arabia as a leading power, in the war against terrorism in Middle East.

  4. Terrorism-related fear and avoidance behavior in a multiethnic urban population.

    Science.gov (United States)

    Eisenman, David P; Glik, Deborah; Ong, Michael; Zhou, Qiong; Tseng, Chi-Hong; Long, Anna; Fielding, Jonathan; Asch, Steven

    2009-01-01

    We sought to determine whether groups traditionally most vulnerable to disasters would be more likely than would be others to perceive population-level risk as high (as measured by the estimated color-coded alert level) would worry more about terrorism, and would avoid activities because of terrorism concerns. We conducted a random digit dial survey of the Los Angeles County population October 2004 through January 2005 in 6 languages. We asked respondents what color alert level the country was under, how often they worry about terrorist attacks, and how often they avoid activities because of terrorism. Multivariate regression modeled correlates of worry and avoidance, including mental illness, disability, demographic factors, and estimated color-coded alert level. Persons who are mentally ill, those who are disabled, African Americans, Latinos, Chinese Americans, Korean Americans, and non-US citizens were more likely to perceive population-level risk as high, as measured by the estimated color-coded alert level. These groups also reported more worry and avoidance behaviors because of concerns about terrorism. Vulnerable populations experience a disproportionate burden of the psychosocial impact of terrorism threats and our national response. Further studies should investigate the specific behaviors affected and further elucidate disparities in the disaster burden associated with terrorism and terrorism policies.

  5. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    Directory of Open Access Journals (Sweden)

    Chao-Chen Lin

    2017-10-01

    Full Text Available This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on terrorism and face the danger from it.

  6. Escalation of terrorism? On the risk of attacks with chemical, biological, radiological and nuclear weapons or materials; Eskalation des Terrors? Ueber das Anschlagsrisiko mit chemischen, biologischen, radiologischen und nuklearen Waffen oder Stoffen

    Energy Technology Data Exchange (ETDEWEB)

    Nass, Jens

    2010-07-01

    The report on the risk of attacks with chemical, biological, radiological and nuclear weapons or materials covers the following topics: the variety of terrorism: ethnic-nationalistic, politically motivated, social revolutionary, political extremism, religious fanaticism, governmental terrorism; CBRN (chemical, biological, radiological, nuclear) weapons and materials: their availability and effectiveness in case of use; potential actor groups; prevention and counter measures, emergency and mitigating measures.

  7. Escalation of terrorism? On the risk of attacks with chemical, biological, radiological and nuclear weapons or materials

    International Nuclear Information System (INIS)

    Nass, Jens

    2010-01-01

    The report on the risk of attacks with chemical, biological, radiological and nuclear weapons or materials covers the following topics: the variety of terrorism: ethnic-nationalistic, politically motivated, social revolutionary, political extremism, religious fanaticism, governmental terrorism; CBRN (chemical, biological, radiological, nuclear) weapons and materials: their availability and effectiveness in case of use; potential actor groups; prevention and counter measures, emergency and mitigating measures.

  8. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  9. Framework for Analyzing the Future Threat of WMD Terrorism

    Directory of Open Access Journals (Sweden)

    James J.F. Forest

    2012-01-01

    Full Text Available This article examines theories of practical and strategic constraints that collectively explain why so few terrorist groups in history have crossed (or attempted to cross the WMD threshold. From this analysis, it becomes clear that a terrorist group's deliberations about WMD can be influenced (positively or negatively by a variety of factors. Our projections of the future WMD terrorism threat must therefore account for changes in the kinds of practical and strategic constraints that could lead to an increased willingness and/or capability of a group to pursue these kinds of weapons. Further, there are ways in which governments can influence a terrorist group's decision-making and thus have a direct impact on the future evolution of the WMD terrorism threat.

  10. 78 FR 16698 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2013-03-18

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and... notice is also soliciting comments concerning the Information Collection Request, Chemical Facility Anti...

  11. The effects of Tai Ji Quan training on limits of stability in older adults

    Directory of Open Access Journals (Sweden)

    Li F

    2014-08-01

    Full Text Available Fuzhong Li1,2 1Oregon Research Institute, Eugene, OR, USA; 2Shanghai University of Sport, Shanghai, People’s Republic of ChinaBackground: Limits of stability, defined as the ability to maintain the center of gravity within the boundary of the base of support, is critically important for older adults in performing their activities of daily living. However, few exercise programs specifically tailored to enhance limits of stability exist. The primary purpose of this study was to determine whether a therapeutically designed intervention, Tai Ji Quan: Moving for Better Balance (TJQMBB, could improve limits of stability in older adults. A secondary purpose was to examine concomitant change in limits of stability and physical performance as a result of the intervention.Methods: A single-group design was used in which 145 community-dwelling older adults (average age: 75 years were enrolled in TJQMBB classes, participating twice weekly for 48 weeks. Primary outcome measures were three indicators of limits of stability (LOS (endpoint excursion, movement velocity, and directional control, with secondary measures of physical performance being Timed Up and Go and 50-foot speed walk (in seconds, which were assessed at baseline, 24 weeks, and 48 weeks. Changes in the repeated measures of outcome variables were analyzed via latent curve analysis.Results: At 48 weeks, a significant rate of change (improvement over time was observed in the three limits of stability indicators (endpoint execution: 8.30% LOS, P<0.001; movement velocity: 0.86 degrees/second, P<0.001; directional control: 6.79% of 100, P<0.001; all reached a threshold of real change as judged by the minimal detectable change values. Improvements in the three limits of stability measures were concomitantly correlated with improved (reduced times performance scores in the Timed Up and Go (-0.30, -0.45, and -0.55, ­respectively and 50-foot walk (-0.33, -0.49, and -0.41, respectively

  12. Current Issues Concerning Korea’s Anti-Terrorism Programs

    Science.gov (United States)

    2011-06-10

    Terrorism. New York: Columbia University Press, 1998. Laitin, David. Hegemony and Culture : Politics and Religious Change Among the Yoruba . Chicago...such improvements might take. Definitions Terrorism: Definitions of terrorism differ among nations and organizations, because the social and cultural

  13. Approaches to Political Violence and Terrorism in former Yugoslavia

    OpenAIRE

    Bieber, Florian

    2003-01-01

    Discusses political violence and terrorism in Yugoslavia caused by ethnic nationalism in the 1990s. Kinds of political conflict; Comparison of political violence with war and terrorism in Yugoslavia; Concept of terrorism and its presence in Southeastern Europe.

  14. How terrorism news reports increase prejudice against outgroups: A terror management account

    NARCIS (Netherlands)

    Das, E.; Bushman, B.J.; Bezemer, M.D.; Kerkhof, P.; Vermeulen, I.E.

    2009-01-01

    Three studies tested predictions derived from terror management theory (TMT) about the effects of terrorism news on prejudice. Exposure to terrorism news should confront receivers with thoughts about their own death, which, in turn, should increase prejudice toward outgroup members. Non-Muslim

  15. On Welfare and Terror: Social Welfare Policies and Political-Economic Roots of Terrorism

    Science.gov (United States)

    Burgoon, Brian

    2006-01-01

    This article argues that social welfare policies may reduce international and domestic terrorism. Social policies likely affect terrorism in offsetting ways but, on balance, should diminish preferences for terrorism by reducing economic insecurity, inequality, poverty, and religious-political extremism. Thus, countries with more generous welfare…

  16. International terrorism in the age of globalization

    OpenAIRE

    Aksoy, Ece

    2002-01-01

    Cataloged from PDF version of article. This thesis analyzes the concept of terrorism in the age of globalization. Terrorism, which has been motivated by ideological, religious and national reasons, has added to its concern issues like inequality, injustice, dissatisfaction and antiglobalist movements, due to development and technology in the world. In order to clarify this shift in the policy, the concepts of terrorism and globalization are first explained as distinct issues...

  17. Art, Terrorism and the Negative Sublime

    Directory of Open Access Journals (Sweden)

    Arnold Berleant

    2009-01-01

    Full Text Available The range of the aesthetic has expanded to cover not only a wider range of objects and situations of daily life but also to encompass the negative. This includes terrorism, whose aesthetic impact is central to its use as a political tactic. The complex of positive and negative aesthetic values in terrorism are explored, introducing the concept of the sublime as a negative category to illuminate the analysis and the distinctive aesthetic of terrorism.

  18. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    OpenAIRE

    Asadi NEJMAH

    2015-01-01

    The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the ext...

  19. Hospitals: Soft Target for Terrorism?

    Science.gov (United States)

    De Cauwer, Harald; Somville, Francis; Sabbe, Marc; Mortelmans, Luc J

    2017-02-01

    In recent years, the world has been rocked repeatedly by terrorist attacks. Arguably, the most remarkable were: the series of four coordinated suicide plane attacks on September 11, 2001 on buildings in New York, Virginia, and Pennsylvania, USA; and the recent series of two coordinated attacks in Brussels (Belgium), on March 22, 2016, involving two bombings at the departure hall of Brussels International Airport and a bombing at Maalbeek Metro Station located near the European Commission headquarters in the center of Brussels. This statement paper deals with different aspects of hospital policy and disaster response planning that interface with terrorism. Research shows that the availability of necessary equipment and facilities (eg, personal protective clothing, decontamination rooms, antidotes, and anti-viral drugs) in hospitals clearly is insufficient. Emergency teams are insufficiently prepared: adequate and repetitive training remain necessary. Unfortunately, there are many examples of health care workers and physicians or hospitals being targeted in both political or religious conflicts and wars. Many health workers were kidnapped and/or killed by insurgents of various ideology. Attacks on hospitals also could cause long-term effects: hospital units could be unavailable for a long time and replacing staff could take several months, further compounding hospital operations. Both physical and psychological (eg, posttraumatic stress disorder [PTSD]) after-effects of a terrorist attack can be detrimental to health care services. On the other hand, physicians and other hospital employees have shown to be involved in terrorism. As data show that some offenders had a previous history with the location of the terror incident, the possibility of hospitals or other health care services being targeted by insiders is discussed. The purpose of this report was to consider how past terrorist incidents can inform current hospital preparedness and disaster response planning

  20. Obamas Fortsatte Krig mod Terror

    DEFF Research Database (Denmark)

    Ulrich, Philip Christian

    2013-01-01

    Kronikken argumenterer for at den type overvågningsskandaler som er fulgt i kølvandet på Edward Snowdens afsløringer blot er et symptom på den nye fase af krigen mod terror som Obama administrationen har ønsket at føre USA ind i. Den nye fase vil være præget af mere efterretningsvirksomhed snarere...

  1. Technology Against Terrorism: Structuring Security

    Science.gov (United States)

    1992-01-01

    nesses (e.g., Ford, Coca - Cola , American Airlines, " Destruction of Pan American Flight 103 over American Express, Holiday Inn, Citibank, ChaseDesruin...network, involving links between many clandestine, undeclared war. governments. Cases in which a consortium of gov- State sponsorship refers to the...Syria has setup centers constitutes concrete and convincing evidence of in Syria itself, in Lebanon’s Beka’a Valley (which is sponsorship of terrorism.𔄁

  2. The failure of international action against terrorism.

    Science.gov (United States)

    Suter, Keith

    2006-01-01

    Progress on the so-called 'War on Terrorism' is slow. There is no agreed definition of terrorism and no consistent government policy in respect of it. Consideration of terrorism ignores the role of some governments in what could be regarded as terrorist activity, often with the connivance of others for reasons of political expediency. The special case of suicide terrorism is discussed in detail. It is concluded that the world is now exposed to a new form of warfare, and that even with new military thinking this could continue for perhaps decades to come.

  3. Terrorism: some philosophical and ethical dilemmas

    OpenAIRE

    Stojanov, Trajce; Unsal, Zeynep

    2017-01-01

    Philosophers weren`t thinking a lot about terrorism before the terrorist attacks in the United States on 11 September 2001. Or even when they were thinking the main concern was how to deal with terrorism. But after this attack terrorism was high on the philosophical agenda mainly manifested as an ethical problem. The key concern was: can terrorism be morally justified? That is the issue we are dealing in this paper too. But, the answer of this question largely depends on the treatment of t...

  4. Against acts of nuclear terrorism

    International Nuclear Information System (INIS)

    Heller, W.

    2007-01-01

    The Act on the International Convention of the United Nations of April 13, 2005 on Combating Acts of Nuclear Terrorism was promulgated in the German Federal Gazette and entered into force one day later. The Convention expresses the deep concern about the worldwide escalation of all kinds and manifestations of acts of terrorism. What was true in April 2005 (the year the UN convention was adopted) is even more true today. At the same time, however, the Convention recognizes the right of all nations to develop and use nuclear power for peaceful purposes, acknowledging their justified interest in the possible benefits of the peaceful uses of nuclear power. As the Convention was signed in German still during the term of office of the Red-Green government, this passage is a remarkable acceptance of the realities of the world and past peaceful uses of nuclear power in Germany. Whether or not the convention will become an effective instrument to be used against acts of nuclear terrorism and threats depends on its entering into force after deposition of 22 ratification documents, and on as many states as possible acceding to it. Irrespective of these aspects, action in the spirit of the Convention should be taken now, criminal law should be adapted, and international cooperation should be improved and strengthened. (orig.)

  5. Technical considerations in nuclear terrorism

    International Nuclear Information System (INIS)

    Velardo, G.

    2007-01-01

    Nuclear terrorism is an evil application of nuclear energy, in the same way that chemical and biological terrorism could be considered as the evil side of chemistry and biology. This paper presents two effects of nuclear terrorism. First, dirty bombs or radioactive bombs or radiological dispersion devices (RDDs), and second, crude atom bombs or improvised nuclear devices (INDs). The paper analyses as well the probabilities of an attack, its biological effects and nuclear risk. Experiments carried out so far indicate that the lethal effects produced by RDDs are likely the same that the effects produced by the chemical explosive used in the bomb. These type of bombs are rather bounded to generate panic and have implicit a high cost of decontamination. It will be described the measures to be adopted. INDs will be also considered. Uranium INDs by gun-method are more feasible to be made. They can be disassembled and their components transported to the target place. Plutonium INDs by the implosion-method are complex and required high precision technology. Their disassembly is very difficult

  6. The Military Cooperation Group

    National Research Council Canada - National Science Library

    Renzi, Jr, Alfred E

    2006-01-01

    .... This thesis will describe a structure to assist with both those needs. The premise is that an expanded and improved network of US Military Groups is the weapon of choice for the war on terror, and beyond...

  7. Prospects for nuclear terrorism: psychological motivations and constraints

    International Nuclear Information System (INIS)

    Post, J.M.

    1987-01-01

    In considering the implications of psychological understandings to the specific case of nuclear terrorism, it is emphasized that distorted decision making does not equate to totally irrational decision making. In certain circumstances, however, the distorted individual and group decision-making psychology could influence the group toward a high-risk option such as nuclear terrorism. For terrorists operating within their own national boundaries, a terrorist act producing mass casualties would generally be counterproductive. For groups acting across national boundaries, however, this constraint does not apply to nearly the same degree. Although the opprobrium of the West will be a constraint for some, it will not be equally so for all terrorist groups. The degree of disincentive will relate in particular to the major audience of influence. Also, there are the terrorist losers who are being shunted aside and losing the recognition they seek. Such a group could justify a terrorist spectacular in order to regain influence on the basis of a what have we got to lose rationale. In thinking about the possibility of nuclear terrorism, it is important to distinguish between the actual detonation of a device and the use of a device for extortion and influence. The constraints against the latter are significantly reduced in contrast to acts producing mass casualties. The constraints are even more reduced in the case of the plausible nuclear hoax, an option that can be expected to become more frequent

  8. IAEA Director General welcomes landmark convention to combat nuclear terrorism

    International Nuclear Information System (INIS)

    2005-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the adoption of an International convention against nuclear terrorism. 'This is a landmark achievement which will bolster global efforts to combat nuclear terrorism,' Dr. ElBaradei said. 'It will be a key part of international efforts to prevent terrorists from gaining access to nuclear weapons'. The United Nations General Assembly adopted the convention, The International Convention for the Suppression of Acts of Nuclear Terrorism, on 13 April 2005. The Convention strengthens the global legal framework to counter terrorist threats. Based on a proposal by the Russian Federation in 1998, the Convention focuses on criminal offences related to nuclear terrorism and covers a broad range of possible targets, including nuclear reactors as well as nuclear material and radioactive substances. Under its provisions, alleged offenders - for example any individual or group that unlawfully and intentionally possesses or uses radioactive material with the intent to cause harm - must be either extradited or prosecuted. States are also encouraged to cooperate with each other in connection with criminal investigations and extradition proceedings. The Convention further requires that any seized nuclear or radiological material be held in accordance with IAEA safeguards, and handled in keeping with the IAEA's health, safety and physical protection standards. Dr. ElBaradei also recalled that the Agency is in the process of amending the Convention on the Physical Protection of Nuclear Material, in order to broaden its scope, and in so doing, strengthen the current legal framework for securing nuclear material against illicit uses. A conference will be held from 4 to 8 July in Vienna to consider and adopt the amendments. The Convention opens for signature in September this year. Dr ElBaradei urged all States to 'sign and ratify the Convention without delay so nuclear terrorism will have no chance'. (IAEA)

  9. Hrob nemlčí pevněji nežli Vy : (Dopisy Jiřího Karáska, Arnošta Procházky, Jiřiny Böhmové a Antonína Trýba)

    Czech Academy of Sciences Publication Activity Database

    Färber, Vratislav (ed.)

    2007-01-01

    Roč. 18, č. 4 (2007), s. 163-170 ISSN 0862-6928 R&D Projects: GA ČR GA405/05/2152 Institutional research plan: CEZ:AV0Z90560517 Keywords : Kamil Fiala * Jiří Karásek ze Lvovic * Arnošt Procházka * Jiřina Böhmová * Antnoní Trýb Subject RIV: AJ - Letters, Mass-media, Audiovision

  10. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  11. Latin America: Terrorism Issues

    National Research Council Canada - National Science Library

    Sullivan, Mark P

    2008-01-01

    .... There were no known operational cells of Islamic terrorists in the hemisphere, but pockets of ideological supporters in the region lent financial, logistical, and moral support to terrorist groups in the Middle East...

  12. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    OpenAIRE

    Chao-Chen Lin

    2017-01-01

    This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on te...

  13. Through the Looking Glass: The Role of Ethnicity and Affiliation in Responses to Terrorism in the Media.

    Science.gov (United States)

    Shoshani, Anat; Slone, Michelle

    2016-01-01

    This study examined whether attitudinal and emotional responses to broadcasts of images of terrorist events differ according to ethnic group (Jewish and Arab Israelis) and outgroup affiliation during an intense wave of terrorism that occurred in Israel during 2015. Participants were 118 Jewish and 110 Arab-Israelis adults randomly allocated to a terrorism or criminal violence television broadcast. State anxiety, state anger, stereotypes, and negative attitudes toward an adversary were examined prior and subsequent to the media exposure. Findings showed significant increases in anxiety, anger, stereotypes, and negative adversary perceptions in the terrorism exposure group compared to only anxiety increases in the criminal violence exposure. In the terrorism exposure group, Jewish participants showed greater increases in negative adversary perceptions of the Palestinians than Arab Israeli participants, but both groups showed similar significant increases in levels of anxiety and anger. Exposure to broadcasts of terrorism increased willingness to negotiate with the adversary among the Arab participants, but not among the Jewish participants. In the terrorism exposure group, both Jewish and Arab Israelis with high affiliation with the Palestinian cause showed less increases in stereotypes than those with low affiliation. Findings emphasize the role of ethnicity and outgroup affiliation in responses to media exposure to terrorism images.

  14. Acupuncture (針灸 Zhēn Jiǔ – An Emerging Adjunct in Routine Oral Care

    Directory of Open Access Journals (Sweden)

    Devanand Gupta

    2014-10-01

    Full Text Available Acupuncture (針灸 Zhēn Jiǔ (‘acus’ (needle+‘punctura’ (to puncture is the stimulation of specific points along the skin of the body involving various methods such as penetration by thin needles or the application of heat, pressure, or laser light. Acupuncture (針灸 Zhēn Jiǔ aims to treat a range of medical and dental ailments, though is most commonly used for pain relief. This article reviews about the various possible roles of acupuncture (針灸 Zhēn Jiǔ in clinical dental practice. Acupuncture (針灸 Zhēn Jiǔ has potential in supplementing conventional treatment procedures by its diverse applicability outreach. Role of acupuncture (針灸 Zhēn Jiǔ in dental practice has been well supported by clinical trials. Its role in alleviating facial pain, pre-operative and post-operative dental pain has led to its widespread application. Its role as sole analgesic for treatment procedure has to be tested. It's It is a thought that acupuncture (針灸 Zhēn Jiǔ may prove an indispensible supplement to conventional treatment modalities and more of clinical trials and studies are required to prove the efficacy. Acupuncture (針灸 Zhēn Jiǔ is not a miracle cure and is not going to replace the drill. However, the technique can be a supplement to conventional treatments in TMDs, facial pain, pain management Sjoegrens syndrome, and in phobias and anxiety. The application and use of Acupuncture (針灸 Zhēn Jiǔ comes with some side effects. Proper training needs to be obtained before commencement of any procedure related to acupuncture (針灸 Zhēn Jiǔ. Various training programs are offered to train clinical practitioners the apt method to use acupuncture (針灸 Zhēn Jiǔ.

  15. The Politics of Terror: Rereading "Harry Potter"

    Science.gov (United States)

    Strimel, Courtney B.

    2004-01-01

    This article claims that J. K. Rowling's "Harry Potter" series, with its use of magic, frightening storylines, and character ambiguity is beneficial to children who are dealing with issues related to terror and terrorism. The author explains that the scenarios presented in Rowling's series teach children strategies for coping with both physical…

  16. War on Terror - war on democracy?

    DEFF Research Database (Denmark)

    Bondebjerg, Ib

    2009-01-01

    En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak......En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak...

  17. Youth, Terrorism and Education: Britain's Prevent Programme

    Science.gov (United States)

    Thomas, Paul

    2016-01-01

    Since the 7/7 bombings of July 2005, Britain has experienced a domestic terror threat posed by a small minority of young Muslims. In response, Britain has initiated "Prevent," a preventative counter-terrorism programme. Building on previous, general critiques of Prevent, this article outlines and critically discusses the ways in which…

  18. Terrorism as a Social and Legal Phenomenon

    Science.gov (United States)

    Serebrennikova, Anna; Mashkova, Yekaterina

    2017-01-01

    This article examines the concept of terrorism as a social and legal phenomenon, its international legal and criminal-legal characteristics. Highlighted are the main aspects of cooperation of the states and the international community to counter terrorist activities. Terrorism as a social phenomenon is determined by paragraph 1 of article 3 of the…

  19. Dirty hands : Government torture and terrorism

    NARCIS (Netherlands)

    Daxecker, U.

    2017-01-01

    Existing research suggests that the use of harsh repression can exacerbate the incidence and duration of terrorism. Micro- and macro-level analyses have shown that coercive government responses to terrorism can radicalize sympathizers, increase recruitment, and undermine community support for

  20. Terrorism and poverty: double trouble for macroeconomic ...

    African Journals Online (AJOL)

    This article investigates poverty and terrorism as allies in hindering economic growth in African countries. This study uses data for 22 African countries from 1970 to 2013 i.e. 44 years. Data for terrorism, poverty and national income is taken from GTD and WDI. Panel cointegration techniques of dynamic fixed effect, mean ...

  1. Towards a Conceptual Framework for Cyber-terrorism

    CSIR Research Space (South Africa)

    Veerasamy, N

    2009-03-01

    Full Text Available that terrorism is generally derived from out concepts of morality, law and the rules of war, whereas actual terrorists are shaped by culture, ideology and politics (2006). This introduces a few influential considerations, namely culture, belief system..., Laqueur states that many terrorist groups traditionally contain strong quasi-religious fanatical elements for only total certainty of belief (or total moral relativism) provides justification for taking lives (1996). According to the Israeli political...

  2. Terrorism-related injuries versus road traffic accident-related trauma: 5 years of experience in Israel.

    Science.gov (United States)

    Peleg, Kobi; Savitsky, Bella

    2009-12-01

    Terrorism victims comprise the minority among trauma injured people, but this small population imposes a burden on the health care system. Thirty percent of the population injured in terrorist activities experienced severe trauma (injury severity score > or =16), more than half of them need a surgical procedure, and 25% of the population affected by terrorism had been admitted to intensive care. Furthermore, compared with patients with non-terrorism-related trauma, victims of terrorism often arrive in bulk, as part of a mass casualty event. This poses a sudden load on hospital resources and requires special organization and preparedness. The present study compared terrorism-related and road accident-related injuries and examined clinical characteristics of both groups of patients. This study is a retrospective study of all patients injured through terrorist acts and road traffic accidents from September 29, 2000 to December 31, 2005, and recorded in the Israel Trauma Registry. Data on the nature of injuries, treatment, and outcome were obtained from the registry. Medical diagnoses were extracted from the registry and classified based on International Classification of Diseases coding. Diagnoses were grouped to body regions, based on the Barell Injury Diagnosis Matrix. The study includes 2197 patients with terrorism-related injuries and 30,176 patients injured in road traffic accidents. All in all, 27% of terrorism-related casualties suffered severe to critical injuries, comparing to 17% among road traffic accident-related victims. Glasgow Coma Scale scores terrorism victims, in contrast with 7.4% among people injured on the roads. The terrorism victims had a significantly higher rate of use of intensive care facilities (24.2% vs 12.4%). The overall inpatient death rate was 6.0% among terrorism victims and 2.4% among those injured in road traffic accidents. Casualties from terrorist events are more severely injured and require more resources relative to casualties

  3. Anti-Romani Terrorism in Europe

    Directory of Open Access Journals (Sweden)

    Mareš Miroslav

    2016-12-01

    Full Text Available This article analyzes terrorism against the Roma in Europe. It identifies acts of terrorism in violence that targets the largest stateless nation on the continent and categorizes this terrorism according to current research methods. Focusing on events in both Western and Eastern Europe, the article analyses and compares the most significant terrorist acts against the Roma of recent years. It concludes that anti-Romani terrorism is heterogeneous in terms of tactics, strategies, and ideological justification, yet can usually be subsumed into the broadly conceived category of far-right terrorism. The variety of attacks suggests that terrorist acts are an offshoot of the broad spectrum of anti-Romani activity, and are influenced by contemporary trends in inter-ethnic violence.

  4. Analysing Terrorism from a Systems Thinking Perspective

    Directory of Open Access Journals (Sweden)

    Lukas Schoenenberger

    2014-02-01

    Full Text Available Given the complexity of terrorism, solutions based on single factors are destined to fail. Systems thinking offers various tools for helping researchers and policy makers comprehend terrorism in its entirety. We have developed a semi-quantitative systems thinking approach for characterising relationships between variables critical to terrorism and their impact on the system as a whole. For a better understanding of the mechanisms underlying terrorism, we present a 16-variable model characterising the critical components of terrorism and perform a series of highly focused analyses. We show how to determine which variables are best suited for government intervention, describing in detail their effects on the key variable—the political influence of a terrorist network. We also offer insights into how to elicit variables that destabilise and ultimately break down these networks. Because we clarify our novel approach with fictional data, the primary importance of this paper lies in the new framework for reasoning that it provides.

  5. THE CHRONICLE OF TERRORISM AND ISLAMIC MILITANCY IN INDONESIA

    Directory of Open Access Journals (Sweden)

    zakiyah zakiyah

    2016-05-01

    Full Text Available This paper examines the chronicle of terrorism in Indonesia and the relationship between terrorism and Islamic militancy in this nation. This research focused on bombing cases from 2001 to 2012 Data was gathered through documentary research including primary and secondary resources. This research shows that after the fall of the Suharto regime in 1998, there were bomb attacks on various targets and militant extremists were able to return to Indonesia after long period of exile abroad. They started again their activities including disseminating their radical ideology, building networks and recruiting new members in Indonesia, as well as preparing for militant actions. The perpetrators of these terror attacks were mostly associated with the Islamic radical groups like Jemaah Islamiah and Majlis Mujahidin Indonesia. These two militant groups had a close relationship with Darul Islam, an organization founded during the colonial era that aimed to establish an Islamic state and to apply Syariah as a state law. In addition, both groups became a political window for al-Qaeda in Indonesia. 

  6. Differentiating the threat of radiological/nuclear terrorism: Motivations and constraints

    Energy Technology Data Exchange (ETDEWEB)

    Post, J M [Elliott School of International Affairs, George Washington University, Washington, DC (United States)

    2001-07-01

    Full text: Reviewing the spectrum of terrorist groups in terms of motivation, incentives and constraints, for nearly all groups, nuclear terrorism could be highly counter-productive. The constraints are particularly severe for large-scale mass casualty terrorism for groups that are concerned with their constituents--social revolutionary and nationalist separatist terrorists--although discriminate low level attacks are possible. Right-wing extremists, including individuals who are members of the right-wing virtual community of hatred, represent a distinct danger for low level discriminate attacks against their targets. Religious fundamentalist terrorist groups represent a particular threat, because they are not trying to influence the West but to expel Western modernizing influences. Moreover, they believe that their acts of violence are given sacred significance. The severe constraints against catastrophic terrorism for most groups argues for continuing to protect against the greatest danger - conventional terrorism - and to devote significantly increased resources to monitoring more closely the groups at greatest risk for nuclear terrorism. (author)

  7. Terrorism and Political Parties

    DEFF Research Database (Denmark)

    Bourne, Angela

    In the paper I address the empirical puzzle arising from different responses by political authorities in Spain and the UK to the existence of political parties integrated in the terrorist groups Euskadi Ta Askatasuna (ETA, Basque Homeland and Freedom) and the Irish Republican Army (IRA). More...... for realization of free speech rights and representation is also emphasized, and where proscription is seen as inimical to resolution of conflict underpinning violence. In the context of party competition, a winning coalition is required for one discourse to predominate. However, I also argued that both ideas...

  8. Terrorism 101 - Knowledge about the What and Why of Terrorism as a State and Local Law Enforcement Competency

    Science.gov (United States)

    2008-09-01

    Zimbardo, “How Social Science can Reduce Terrorism,” The Chronicle of Higher Education (2004), http://www.socialpsychology.org/ pdf /chronicle04. pdf ...the children of Satan ; believers must prepare for the second coming of Yahweh by taking action “Religious” is one of five “motivations...Christian Identity Groups – Christian Bible is used to justify reasons behind beliefs • U.S. Constitution is extension of Bible • Philosophy is based

  9. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...

  10. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  11. Climate Change Policy Measures in Japan: NEDO's Activities to Promote CDM/JI

    International Nuclear Information System (INIS)

    Fukasawa, Kazunori; Seki, Kazuhiko; Sakurai, Takeshi

    2004-01-01

    The Kyoto Protocol, which obliges developed countries to reduce emissions of greenhouse gases (GHG), was adopted at the third session of the conference of the parties to the United Nations Framework Convention on Climate Change (UNFCCC) in Kyoto, Japan, on I I December 1997. Japan subsequently ratified the Kyoto Protocol in 2002 and is required thereunder to reduce GHG emissions by 6% below 1990 levels by 2008-2012. Japan, having already tackled development and promotion of energy conservation technologies after the second oil crisis, emits the lowest level of CO 2 of developed countries approximately 9.4 tons per capita in the year 2000. Consequently, Japan is able to contribute to CO 2 emissions reduction in developing economies as well as in economies in transition by application of Japan's energy conservation technologies. Because the Clean Development Mechanism (CDM) and Joint implementation (JI) of the Kyoto Mechanisms are efficient tools, the Japanese government's policy towards emission reduction makes active use of CDM/JI, thereby supporting domestic efforts in realizing Japan's reduction commitment. The Ministry of Economy, Trade and Industry (METI) of Japan is one of the key ministries to administer Governmental policy making on climate change, and is undertaking establishment of a system to facilitate the Kyoto Mechanisms. The New Energy and Industrial Technology Development Organization (NEDO), under the jurisdiction of METI, supports CDM and JI project activities implemented by Japanese private sector enterprises. In this report, the authors briefly introduce climate change policy measures in Japan and NEDO's activities to promote CDM/Jl. (Author)

  12. Severe haze episodes and seriously polluted fog water in Ji'nan, China.

    Science.gov (United States)

    Wang, Xinfeng; Chen, Jianmin; Sun, Jianfeng; Li, Weijun; Yang, Lingxiao; Wen, Liang; Wang, Wenxing; Wang, Xinming; Collett, Jeffrey L; Shi, Yang; Zhang, Qingzhu; Hu, Jingtian; Yao, Lan; Zhu, Yanhong; Sui, Xiao; Sun, Xiaomin; Mellouki, Abdelwahid

    2014-09-15

    Haze episodes often hit urban cities in China recently. Here, we present several continuous haze episodes with extremely high PM2.5 levels that occurred over several weeks in early 2013 and extended across most parts of the northern and eastern China-far exceeding the Beijing-Tianjin-Hebei region. Particularly, the haze episode covered ~1 million km(2) on January 14, 2013 and the daily averaged PM2.5 concentration exceeded 360 μg m(-3) in Ji'nan. The observed maximum hourly PM2.5 concentration in urban Ji'nan reached 701 μg m(-3) at 7:00 am (local time) in January 30. During these haze episodes, several fog events happened and the concurrent fog water was found to be seriously polluted. For the fog water collected in Ji'nan from 10:00 pm in January 14 to 11:00 am in January 15, sulfate, nitrate, and ammonium were the major ions with concentrations of 1.54 × 10(6), 8.98 × 10(5), and 1.75 × 10(6) μeq L(-1), respectively, leading to a low in-situ pH of 3.30. The sulfate content in the fog sample was more than 544 times as high as those observed in other areas. With examination of the simultaneously observed data on PM2.5 and its chemical composition, the fog played a role in scavenging and removing fine particles from the atmosphere during haze episodes and thus was seriously contaminated. However, the effect was not sufficient to obviously cleanse air pollution and block haze episodes. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. The potentialities of terrorism

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1976-01-01

    The potential hazard of terrorists obtaining plutonium and building a nuclear device is examined within the perspective of other terrorist activities. Various sources are quoted on the possibility of a terrorist group having the resources, including skilled personnel, to build a bomb. The potential damage engendered by such a device is hypothesized to be less than that of many other terrorist actions which could be easily accomplished. Other activities, poison or nerve gas, gasoline dropped on a football stadium, destruction of a large dam, poisoning food or water supply and armed action against a tanker carrying liquefied natural gas, are cited as examples of terrorist incidents more devastating than building a crude plutonium bomb. Resistance to blackmail strategies is seen as the only reliable way to thwart their activities in the long run. Although plutonium must be guarded carefully, it is demonstrated as being far from the only or most devastating means of blackmail. It is concluded that the threat of terrorist activities is being used by anti-nuclear groups to support emotionally based dislike of nuclear power. (J.T.A.)

  14. 31 CFR 596.310 - Terrorism List Government.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  15. The enigma of lone wolf terrorism: an assessment

    NARCIS (Netherlands)

    Spaaij, R.

    2010-01-01

    Lone wolf terrorism remains an ambiguous and enigmatic phenomenon. The boundaries of lone wolf terrorism are fuzzy and arbitrary. This article aims to define and analyze the main features and patterns of lone wolf terrorism in fifteen countries. Lone wolf terrorism is shown to be more prevalent in

  16. 75 FR 45563 - Terrorism Risk Insurance Program; Final Netting

    Science.gov (United States)

    2010-08-03

    ... DEPARTMENT OF THE TREASURY 31 CFR Part 50 RIN 1505-AC24 Terrorism Risk Insurance Program; Final... Title I of the Terrorism Risk Insurance Act of 2002 (``TRIA'' or ``the Act''), as amended by the Terrorism Risk Insurance Extension Act of 2005 (``Extension Act'') and the Terrorism Risk Insurance Program...

  17. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...

  18. Water footprint of Jing-Jin-Ji urban agglomeration in China

    Science.gov (United States)

    Zhao, D.

    2017-12-01

    A rapidly expanding economy and increasing water demand for economic production is placing enormous stress on water quantity and aquatic environment in Northern China, especially the so-called Jing-Jin-Ji (Beijing-Tianjin-Hebei) urban agglomeration. Several studies have focused on energy consumption, air pollution, CO2 emissions and regional blue water footprint (WF) following release of the Jing-Jin-Ji Integration Strategy by the China government. However, a comprehensive assessment distinguishing blue, green and grey WF amongst different industrial sectors, ascertaining how WF transfers internally and beyond the region and final demand consumption is not available. In this study, we quantified the WF and virtual water flow on a sectoral basis for the year 2010 through coupling the multi-regional input-output model (MRIO) with WF assessment. The results showed that Beijing and Tianjin are net importers of green, blue and grey water from Hebei and other provinces to support their needs. Conversely, Hebei exports all WF colors to Beijing, Tianjin and other provinces in China, more than 60% of WF is transferred as virtual water. For the overall Jing-Jin-Ji region a small amount of blue water (2,086 million m3) is exported, but huge amounts of green water (15,573 million m3) and grey water (30,620 million m3) are outsourced. A "Virtual Water Strategy" is one measure which could alleviate water stress at the regional scale, with consideration of financial compensation from water receiving regions made to water supplying regions for achieving water management targets. We also found that physical water transfer to Jing-Jin-Ji could not balance virtual blue water exports. Our research suggests that a continuation of an export-based economic development model will worsen Hebei's water stress. Reducing the dependency of Hebei's sectoral economy on export of water intensive and low value added agricultural products may be one strategy to reduce the pressure on regional water

  19. Terrorism and right-wing extremism: the changing face of terrorism and political violence in the 21st century: the virtual community of hatred.

    Science.gov (United States)

    Post, Jerrold M

    2015-04-01

    There are no psychological characteristics or psychopathology that separates terrorists from the general population. Rather it is group dynamics, with a particular emphasis on collective identity that helps explain terrorist psychology. Just as there is a diverse spectrum of terrorisms, so too is there a spectrum of terrorist psychologies. Four waves of terrorism can be distinguished: the Anarchist wave, associated with labor violence in the United States in the late 19th century; the Anti-Colonial wave (nationalist-separatist), with minority groups seeking to be liberated from their colonial masters or from the majority in their country; the New Left wave (social revolutionary); and now the Religious wave. With the communications revolution, a new phenomenon is emerging which may presage a fifth wave: lone wolf terrorists who through the Internet are radicalized and feel they belong to the virtual community of hatred. A typology of lone wolf terrorism is proposed.

  20. Mental health interventions for children exposed to disasters and terrorism.

    Science.gov (United States)

    Pfefferbaum, Betty; Newman, Elana; Nelson, Summer D

    2014-02-01

    The purpose of this review is to describe interventions used with children who are exposed to disasters and terrorism and to present information about the potential benefits of these interventions. A literature search conducted in January 2013 using relevant databases and literature known to the authors that was not generated by the search yielded a total of 85 studies appropriate for review. Intervention approaches used with children exposed to disasters and terrorism included preparedness interventions, psychological first aid, psychological debriefing, psychoeducation, cognitive behavioral techniques, exposure and narrative techniques, eye movement desensitization and reprocessing, and traumatic grief interventions. The investigation of these interventions is complex, and studies varied in methodological rigor (e.g., sample size, the use of control groups, outcomes measured). Given the limitations in the currently available empirical information, this review integrates the literature, draws tentative conclusions about the current state of knowledge, and suggests future directions for study.

  1. Myths and realities of female-perpetrated terrorism.

    Science.gov (United States)

    Jacques, Karen; Taylor, Paul J

    2013-02-01

    The authors examined the backgrounds and social experiences of female terrorists to test conflicting accounts of the etiology of this offending group. Data on 222 female terrorists and 269 male terrorists were examined across 8 variables: age at first involvement, educational achievement, employment status, immigration status, marital status, religious conversion, criminal activity, and activist connections. The majority of female terrorists were found to be single, young (terrorism, but they were more likely to have a higher education attainment, less likely to be employed, and less likely to have prior activist connections. The results clarify the myths and realities of female-perpetrated terrorism and suggest that the risk factors associated with female involvement are distinct from those associated with male involvement.

  2. Preventing Lone Wolf Terrorism: some CT Approaches Addressed

    Directory of Open Access Journals (Sweden)

    Edwin Bakker

    2011-12-01

    Full Text Available After a brief discussion of the epistemological and phenomenological difficulties associated with the concept of lone wolf terrorism, a number of possible counter-terrorist approaches are discussed. Lone operator terrorist acts should be considered ‘black swan’ occurrences that are almost impossible to categorize or systematize, let alone forecast. Thus, not the profile of the perpetrator, but the modus operandi offer clues for a better response to this particular threat. Furthermore, almost all lone operators do display a degree of commitment to, and identification with, extremist movements – providing leads for preventing new rounds of radicalization within this potential group of sympathizers or followers. With the apparent increase of Islamist lone wolf terrorism and fears for right-wing extremists wanting to follow the example of the Norwegian mass murderer A.B. Breivik, new questions need to be posed, addressing the role of virtual communities with which lone operators identify themselves. 

  3. Government of the Republic of the Philippines - Moro Islamic Liberation Front Peace Talks: A Bold Move to Counter Terrorism

    National Research Council Canada - National Science Library

    Amarille, Roland C

    2006-01-01

    .... There is an urgent need for these talks to succeed. A successful settlement between the two groups will bring peace and economic progress to the country, and contain terrorism in Southeast Asia...

  4. Economic Evaluation of a Tai Ji Quan Intervention to Reduce Falls in People With Parkinson Disease, Oregon, 2008-2011.

    Science.gov (United States)

    Li, Fuzhong; Harmer, Peter

    2015-07-30

    Exercise is effective in reducing falls in people with Parkinson disease. However, information on the cost effectiveness of this approach is lacking. We conducted a cost-effectiveness analysis of Tai Ji Quan for reducing falls among patients with mild-to-moderate Parkinson disease. We used data from a previous intervention trial to analyze resource use costs related to intervention delivery and number of falls observed during a 9-month study period. Cost effectiveness was estimated via incremental cost-effectiveness ratio (ICER) in which Tai Ji Quan was compared with 2 alternative interventions (Resistance training and Stretching) on the primary outcome of per fall prevented and the secondary outcome of per participant quality-adjusted life years (QALY) gained. We also conducted subgroup and sensitivity analyses. Tai Ji Quan was more effective than either Resistance training or Stretching; it had the lowest cost and was the most effective in improving primary and secondary outcomes. Compared with Stretching, Tai Ji Quan cost an average of $175 less for each additional fall prevented and produced a substantial improvement in QALY gained at a lower cost. Results from subgroup and sensitivity analyses showed no variation in cost-effectiveness estimates. However, sensitivity analyses demonstrated a much lower ICER ($27) when only intervention costs were considered. Tai Ji Quan represents a cost-effective strategy for optimizing spending to prevent falls and maximize health gains in people with Parkinson disease. While these results are promising, they warrant further validation.

  5. Deterring and Dissuading Nuclear Terrorism

    Directory of Open Access Journals (Sweden)

    John J. Klein

    2012-01-01

    Full Text Available While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack. In such a scenario, some strategists think a terrorist organization's leadership may prove "undeterrable" by traditional military means. Nevertheless, deterrence is still a critical element in U.S. national strategy to prevent a nuclear attack. Furthermore, deterrence combined with dissuasion works to reduce the likelihood of nuclear terrorism being used against the United States, while also mitigating the consequences should such an act actually occur.

  6. The impact of terrorism on children and adolescents: terror in the skies, terror on television.

    Science.gov (United States)

    Fremont, Wanda P; Pataki, Caroly; Beresin, Eugene V

    2005-07-01

    Terrorist attacks and their aftermath have had a powerful impact on children and their families. Media and television exposure of terrorist events throughout the world has increased during the past few years. There is increasing concern about the effects of this exposure on children who witness these violent images. To develop a proactive and strategic response to reactions of fear, clinicians, educators, and policy makers must understand the psychologic effects of media coverage of terrorism on children. Previous research has focused on media coverage of criminal violence and war. Recent studies have examined the effect of remote exposure of terrorist attacks and have shown a significant clinical impact on children and families.

  7. FATF in Combating the Financing of Terrorism

    Directory of Open Access Journals (Sweden)

    Kristina Slavikovna Melkumyan

    2014-01-01

    Full Text Available The article examines the FATF specific approach to the problem of terrorism financing. The FATF essence, content of the activity and influence levers are also analyzed within the article. It is shown that the FATF has reviewed the problem of terrorism financing in the broadest perspective, having engaged simultaneously and consistently mechanisms for combating money laundering and terrorism financing. The Task Force has greatly contributed to building of the world counter-terrorism financing system through forming the legal and institutional basis as well as through interaction with all the possible participants and actors of world politics in this area. Moreover, the FATF has succeeded in geographical expansion of the FATF influence from the original 16 to187 jurisdictions by promotion of FATF-style regional bodies establishment. Particular attention is drawn to the unique features of the FATF Recommendations in comparison with the earlier issued sources of international law, which define the international counter-terrorism financing regime. The author believes that one of the advantages of the FATF as an institute within the counter-terrorism financing system among others is the informal status of the FATF, which provides its flexibility and high ability to respond quickly and in a timely manner to evolving nature of money laundering and terrorism financing as well as emerging threats.

  8. Investigation of JI and DI CMOS FXR response at different spectral energies

    International Nuclear Information System (INIS)

    Honnold, V.R.; Goldberg, M.; Schreiner, W.A.; Witteles, A.A.

    1975-01-01

    The transient response of both junction isolated (JI) and dielectrically isolated (DI) CMOS circuits has been investigated in three FXR environments of differing energy spectrums. The offset recovery times have been measured and analyzed for both structures. It is shown that while the DI circuit (HD4007) did not exhibit a four layer type latchup action, its transient response persisted for a time longer than is expected for this type of device. A possible mechanism for this observed response is developed and discussed. JI circuits (CD4007) exposed under the same conditions exhibited four layer device action and one sample at low spectral energies latched-up. The conditions for the latchup to occur including the four layer device paths are discussed. Finally, the dependence of the x-ray transient response on the spectral energy is considered. For the lower energy FXR source, latchup was observed in a CD4007 sample. This latchup was not observed at more than double the dose rate when a high energy FXR was used. This result is attributed to dose enhancement, and a device enhancement factor may also be involved. The dose enhancement factor is estimated from the work of Long, and points up the importance of accounting for the spectral energy content in simulating a given nuclear threat spectrum

  9. [Regional ecological planning and ecological network construction: a case study of "Ji Triangle" Region].

    Science.gov (United States)

    Li, Bo; Han, Zeng-Lin; Tong, Lian-Jun

    2009-05-01

    By the methods of in situ investigation and regional ecological planning, the present ecological environment, ecosystem vulnerability, and ecological environment sensitivity in "Ji Triangle" Region were analyzed, and the ecological network of the study area was constructed. According to the ecological resources abundance degree, ecological recovery, farmland windbreak system, environmental carrying capacity, forestry foundation, and ecosystem integrity, the study area was classified into three regional ecological function ecosystems, i. e., east low hill ecosystem, middle plain ecosystem, and west plain wetland ecosystem. On the basis of marking regional ecological nodes, the regional ecological corridor (Haerbin-Dalian regional axis, Changchun-Jilin, Changchun-Songyuan, Jilin-Songyuan, Jilin-Siping, and Songyuan-Siping transportation corridor) and regional ecological network (one ring, three links, and three belts) were constructed. Taking the requests of regional ecological security into consideration, the ecological environment security system of "Ji Triangle" Region, including regional ecological conservation district, regional ecological restored district, and regional ecological management district, was built.

  10. JiTTree: A Just-in-Time Compiled Sparse GPU Volume Data Structure

    KAUST Repository

    Labschutz, Matthias

    2015-08-12

    Sparse volume data structures enable the efficient representation of large but sparse volumes in GPU memory for computation and visualization. However, the choice of a specific data structure for a given data set depends on several factors, such as the memory budget, the sparsity of the data, and data access patterns. In general, there is no single optimal sparse data structure, but a set of several candidates with individual strengths and drawbacks. One solution to this problem are hybrid data structures which locally adapt themselves to the sparsity. However, they typically suffer from increased traversal overhead which limits their utility in many applications. This paper presents JiTTree, a novel sparse hybrid volume data structure that uses just-in-time compilation to overcome these problems. By combining multiple sparse data structures and reducing traversal overhead we leverage their individual advantages. We demonstrate that hybrid data structures adapt well to a large range of data sets. They are especially superior to other sparse data structures for data sets that locally vary in sparsity. Possible optimization criteria are memory, performance and a combination thereof. Through just-in-time (JIT) compilation, JiTTree reduces the traversal overhead of the resulting optimal data structure. As a result, our hybrid volume data structure enables efficient computations on the GPU, while being superior in terms of memory usage when compared to non-hybrid data structures.

  11. JiTTree: A Just-in-Time Compiled Sparse GPU Volume Data Structure

    KAUST Repository

    Labschutz, Matthias; Bruckner, Stefan; Groller, M. Eduard; Hadwiger, Markus; Rautek, Peter

    2015-01-01

    Sparse volume data structures enable the efficient representation of large but sparse volumes in GPU memory for computation and visualization. However, the choice of a specific data structure for a given data set depends on several factors, such as the memory budget, the sparsity of the data, and data access patterns. In general, there is no single optimal sparse data structure, but a set of several candidates with individual strengths and drawbacks. One solution to this problem are hybrid data structures which locally adapt themselves to the sparsity. However, they typically suffer from increased traversal overhead which limits their utility in many applications. This paper presents JiTTree, a novel sparse hybrid volume data structure that uses just-in-time compilation to overcome these problems. By combining multiple sparse data structures and reducing traversal overhead we leverage their individual advantages. We demonstrate that hybrid data structures adapt well to a large range of data sets. They are especially superior to other sparse data structures for data sets that locally vary in sparsity. Possible optimization criteria are memory, performance and a combination thereof. Through just-in-time (JIT) compilation, JiTTree reduces the traversal overhead of the resulting optimal data structure. As a result, our hybrid volume data structure enables efficient computations on the GPU, while being superior in terms of memory usage when compared to non-hybrid data structures.

  12. JiTTree: A Just-in-Time Compiled Sparse GPU Volume Data Structure.

    Science.gov (United States)

    Labschütz, Matthias; Bruckner, Stefan; Gröller, M Eduard; Hadwiger, Markus; Rautek, Peter

    2016-01-01

    Sparse volume data structures enable the efficient representation of large but sparse volumes in GPU memory for computation and visualization. However, the choice of a specific data structure for a given data set depends on several factors, such as the memory budget, the sparsity of the data, and data access patterns. In general, there is no single optimal sparse data structure, but a set of several candidates with individual strengths and drawbacks. One solution to this problem are hybrid data structures which locally adapt themselves to the sparsity. However, they typically suffer from increased traversal overhead which limits their utility in many applications. This paper presents JiTTree, a novel sparse hybrid volume data structure that uses just-in-time compilation to overcome these problems. By combining multiple sparse data structures and reducing traversal overhead we leverage their individual advantages. We demonstrate that hybrid data structures adapt well to a large range of data sets. They are especially superior to other sparse data structures for data sets that locally vary in sparsity. Possible optimization criteria are memory, performance and a combination thereof. Through just-in-time (JIT) compilation, JiTTree reduces the traversal overhead of the resulting optimal data structure. As a result, our hybrid volume data structure enables efficient computations on the GPU, while being superior in terms of memory usage when compared to non-hybrid data structures.

  13. Vehicle driving cycle performance of the spark-less di-ji hydrogen engine

    Energy Technology Data Exchange (ETDEWEB)

    Boretti, Alberto A. [School of Science and Engineering, University of Ballarat, PO Box663, Ballarat, VIC 3353 (Australia)

    2010-05-15

    The paper describes coupled CFD combustion simulations and CAE engine performance computations to describe the operation over the full range of load and speed of an always lean burn, Direct Injection Jet Ignition (DI-JI) hydrogen engine. Jet ignition pre-chambers and direct injection are enablers of high efficiencies and load control by quantity of fuel injected. Towards the end of the compression stroke, a small quantity of hydrogen is injected within the spark-less pre-chamber of the DI-JI engine, where it mixes with the air entering from the main chamber and auto-ignites because of the high temperature of the hot glow plug. Then, jets of partially combusted hot gases enter the main chamber igniting there in the bulk, over multiple ignition points, lean stratified mixtures of air and fuel. Engine maps of brake specific fuel consumption vs. speed and brake mean effective pressure are computed first. CAE vehicle simulations are finally performed evaluating the fuel consumption over emission cycles of a vehicle equipped with this engine. (author)

  14. THE TYPES OF PLANS AND INTERIOR DESIGN AT MEMORIAL CLOISTERS OF DAITOKU-JI AND MYOSHIN-JI TEMPLES IN KYOTO IN THE EDO PERIOD [1596~1868] -The Development and Changes of the Sanctuary-

    Directory of Open Access Journals (Sweden)

    Antariksa Antariksa

    2003-01-01

    Full Text Available In the early Edo period the number of memorial cloisters (tacchu increased, especially, at Daitoku-ji and Myôshin-ji temples. As a consequence, the hondô (kyakuden, hojo were further developed in all aspects of architectural style, interior design and plan. This study will attempt to clarify the types of plans at memorial cloisters of both temples, by analyzing the arrangement and composition of the sanctuary, during the Edo period. In that period, the requirement of the rooms was interlaced with the function, and even dependent upon everyday life and the activities of religious services.

  15. American Jihadist Terrorism: Combating a Complex Threat

    Science.gov (United States)

    2010-12-07

    Goodnough, and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/2009/10/22/us...Abby Goodnough and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/ 2009/10/22/us...July 8, 2009); Tony Allen-Mills, “FBI ‘Lured Dimwits’ into Terror Plot,” The Sunday Times, London, May 24, 2009, http://www.timesonline.co.uk/tol/news

  16. Epidemiological patterns of suicide terrorism in the civilian Pakistani population.

    Science.gov (United States)

    Bhatti, Junaid Ahmad; Mehmood, Amber; Shahid, Muhammad; Bhatti, Sajjad Akbar; Akhtar, Umbreen; Razzak, Junaid Abdul

    2011-09-01

    In this study, we assessed the epidemiological patterns of suicide terrorism in the civilian population of Pakistan. Information about suicide terrorism-related events, deaths and injuries was extracted from the South-Asian Terrorism Portal (SATP) for the period from 2002 to October 2009. Of 198 events, civilians were involved in 194 events. Civilians accounted for 74.1% (N = 2017) of those who died and 93.8% (N = 6129) of those who were injured. In nine districts, mortality rates were more than one death per 100,000 inhabitants per year. The yearly trend showed a shift of attack targets from foreigners and sectarian targets in 2002-2005 to security forces or general public in 2006-2009. Attacks on public installations (mosques) or political gatherings resulted in a significantly greater (P ≤ 0.02) number of deaths (22 vs. 8) and injuries (59 vs. 24) per event compared with security installations. These results show that prevention might focus on political negotiation with armed groups and that appropriate measures should be taken to protect mosques and political gatherings.

  17. Resource Assessment for Afghanistan and Alleviation of Terrorism

    Science.gov (United States)

    Shroder, J. F.

    2002-05-01

    Mineral and water resources in Afghanistan may be the best means by which redevelopment of the country can be used to alleviate future terrorism. Remote-sensing analysis of snow, ice, resources, and topography in Afghanistan, and development of digital elevation models with ASTER imagery and previously classified, large scale topographic maps from the Department of Defense enable better assessment and forecasting resources in the country. Adequate resource assessment and planning is viewed as critical to alleviation of one cause of the problems associated with the fertilization of terrorism in Afghanistan. Long-term diminution of meltwater resources in Afghanistan is exemplified by the disastrous and famine-inducing droughts of the present time and three decades prior, as well as by the early Landsat assessment of glacier resources sponsored by USGS and now brought up-to-date with current imagery. Extensive cold-war projects undertaken by both the USSR and USA generated plentiful essential mineral, hydrocarbon, hydrogeological, and hydrological data, including an extensive stream gauging and vital irrigation network now adversly affected or destroyed entirely by decades of war. Analysis, measurement, prediction, rehabilitation, and reconstruction of critical resource projects are regarded as most critical elements in the war on terrorism in this portion of the world. The GLIMS (Global Land Ice Measurements from Space) Project, initially sponsored by USGS, has established our group as the Regional Center for Afghanistan and Pakistan, in which the above concepts serve as guiding research precepts.

  18. Swot analysis of using aerostats for surveillance in counter terrorism

    Science.gov (United States)

    Çetin, Hüseyin

    2013-06-01

    In today's conjuncture, the terrorist activities are the most compelling issue for the defence forces in maintaining homeland security. Especially, the terrorist elements that penetrate the homeland may give harm. This harm can be minimized by preventing the terrorist penetrations from homeland borders. In counter terrorism, having Intelligence, Surveillance and Reconnaissance (ISR) capability and using this capability by twenty four hours is deterrence for the terrorist groups. Aerostats emerge as the ideal platform which can provide this capability. Aerostats are unmanned and aerodynamically shaped balloons that are stayed in the air, fixed to the ground by steel cable(s). The aerostat is made of a large fabric envelope that is filled with nonflammable helium gas, which provides the lifting force. The cables also serve to supply the electrical power to the aerostat systems, and for data relay between the aerostat and the ground station. Aerostats are different from the other manned and Unmanned Aerial Vehicles (UAVs) because of aerostats' capabilities such as cost effectiveness, long endurance and high resolution image transmission. Especially having uninterrupted image transmission and surveillance capabilities is important to be advantageous in counter terrorism. In this article, a short definition of terrorism has been given and then the importance of ensuring the homeland border security has been emphasized in counter terrorism. In addition, the questions of "what are the technical capabilities, the usage areas and the purposes of aerostats?" will be introduced as a result of literature review. Finally the strengths and weaknesses of aerostats, opportunities and threats for the near future will be introduced by using "SWOT" analysis method.

  19. Marketingový plán fitness centra Expreska Jiřího z Poděbrad

    OpenAIRE

    Štěchová, Kristýna

    2016-01-01

    Title: The marketing plan of fitness center Expreska Jiřího z Poděbrad. Objectives: The main aim of the dimploma thesis is to construct a marketing plan for fitness center Expreska Jiřího z Poděbrad for the year 2017. The proposed marketing strategy, including the implementation plan will be directed to achieve marketing and business goals of the organization. Methods: For analysis of the microenvironment is used Porter matrix. Analysis of macroenvironment is done with the help of PEST analys...

  20. The Tipping Point: Biological Terrorism

    Directory of Open Access Journals (Sweden)

    Scott Cary

    2009-01-01

    Full Text Available This article presents a strategic, operational, and tactical analysis of information currently available on the state of bio-weapons development by non-state actors, primarily Islamist jihadists. It discusses the evidence supporting a practical assessment that non-state actors have begun to acquire, and in the near-term intend to employ, bio-weapons. A pathogen and method of attack specifically designed to achieve the strategic goals of jihadists are presented as functional examples of the problem of the emerging global bio-weapons threat.Is a terrorist attack utilizing biological weapons a real threat? If so, is there a way to predict the circumstances under which it might happen or how it might be conducted? This article explores what is known and cannot be known about these questions, and will examine the threat of biological terrorism in the context of the strategic goals, operational methods, and tactical intentions of Islamist terrorists.

  1. Fighting Terrorism With Strategy: Revisiting Competing Visions

    National Research Council Canada - National Science Library

    Schluckebier, Thomas

    2002-01-01

    ... the threat of international terrorism requires America to make a grand strategic choice, This paper examines those choices by presenting four post-Cold War strategy options neo-isolationism, selective...

  2. Combatting Terrorism: A New National Strategy

    National Research Council Canada - National Science Library

    Hoover, Bruce

    1997-01-01

    .... Conducted by organized, highly trained, and technologically sophisticated paramilitary units, terrorism is in fact a form of warfare waged against the United States and its allies. But current U.S...

  3. U.S.-EU Cooperation Against Terrorism

    National Research Council Canada - National Science Library

    Archick, Kristin

    2005-01-01

    The September 11, 2001 terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...

  4. U.S.-EU Cooperation Against Terrorism

    National Research Council Canada - National Science Library

    Archick, Kristin

    2006-01-01

    The September 11, 2001, terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...

  5. On Teaching About Terrorism: A Conceptual Approach.

    Science.gov (United States)

    Kleg, Milton

    1986-01-01

    Recommends the use of conceptual mapping, case studies, and springboards to discussion and inquiry as viable approaches to the study of terrorism in secondary classrooms. Provides numerous examples of conceptual maps. (JDH)

  6. Nazi terror system and its practical use

    OpenAIRE

    Anvar M. Mamadaliev; Leon М. Bagdasaryan

    2011-01-01

    The article tells about reasons and consequences of Adolf Hitler’s terror. Special attention is attached to mechanism of Nazi dictatorship and its ideological bases, set in Hitler’s work ‘My Struggle’, the 25 Point Program.

  7. State of terror: women at risk

    Directory of Open Access Journals (Sweden)

    The Karen Women’s Organisation

    2008-04-01

    Full Text Available Two reports researched and written by the Karen Women’sOrganisation – Shattering Silences in 2004 and State ofTerror in 20071 – document the wide range of humanrights abuses against Burmese women and girls.

  8. State of terror: women at risk

    OpenAIRE

    The Karen Women’s Organisation

    2008-01-01

    Two reports researched and written by the Karen Women’sOrganisation – Shattering Silences in 2004 and State ofTerror in 20071 – document the wide range of humanrights abuses against Burmese women and girls.

  9. Empirical scaling law connecting persistence and severity of global terrorism

    Science.gov (United States)

    Gao, Jianbo; Fang, Peng; Liu, Feiyan

    2017-09-01

    Terrorism and counterterrorism have both been evolving rapidly. From time to time, there have been debates on whether the new terrorism is evolutionary or revolutionary. Such debate often becomes more heated after major terrorist activities, such as the terrorist attacks on September 11, 2001 and the November 13, 2015 coordinated Paris terror attack. Using country-wide terrorism data since 1970, we show that there exist scaling laws governing the continuity and persistence of world-wide terrorism, with the long-term scaling parameter for each country closely related to its yearly global terrorism index. This suggests that the new terrorism is more accurately considered evolutionary. It is further shown that the imbalance in the seesaw of terrorism and counterterrorism is not only responsible for the scaling behavior found here, but also provides new means of quantifying the severity of the global terrorism.

  10. On immorality of terrorism and war

    OpenAIRE

    Čičovački Predrag

    2003-01-01

    The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others) who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable mora...

  11. Epistemological failures : everyday terrorism in the west

    OpenAIRE

    Gentry, Caron Eileen

    2016-01-01

    This article attempts to problematize the disparate level of attention paid to similar violences globally, whereby violence against women in the developing world is seen as a security concern to the West and yet violence against women in the West is minimized or ignored. It will do this first by demonstrating that everyday violences, better known as everyday terrorism, in the West are subjugated knowledges within Terrorism Studies. To demonstrate this, Half the Sky, Sex and World Peace, and T...

  12. A methodology for modeling regional terrorism risk.

    Science.gov (United States)

    Chatterjee, Samrat; Abkowitz, Mark D

    2011-07-01

    Over the past decade, terrorism risk has become a prominent consideration in protecting the well-being of individuals and organizations. More recently, there has been interest in not only quantifying terrorism risk, but also placing it in the context of an all-hazards environment in which consideration is given to accidents and natural hazards, as well as intentional acts. This article discusses the development of a regional terrorism risk assessment model designed for this purpose. The approach taken is to model terrorism risk as a dependent variable, expressed in expected annual monetary terms, as a function of attributes of population concentration and critical infrastructure. This allows for an assessment of regional terrorism risk in and of itself, as well as in relation to man-made accident and natural hazard risks, so that mitigation resources can be allocated in an effective manner. The adopted methodology incorporates elements of two terrorism risk modeling approaches (event-based models and risk indicators), producing results that can be utilized at various jurisdictional levels. The validity, strengths, and limitations of the model are discussed in the context of a case study application within the United States. © 2011 Society for Risk Analysis.

  13. Indonesia’s Way To Counter Terrorism 2002—2009: Lesson Learned

    Directory of Open Access Journals (Sweden)

    Ali Muhammad

    2014-08-01

    Full Text Available Terrorism emerged as serious security problem in Indonesia since a network of terrorist group rocked this country, started from the Bali bombing (2002 followed by other consecutive bombings, such as, J. W. Marriott Hotel bombing (2003, the Australian Embassy bombing (2004, and the Ritz Carlton Hotel bombing (2009. This article attempts to examine the ways in which the government responded towards the problem. What sort of policies did the Indonesian government take to respond to terrorism during the 2002—2009 period? This study uses a qualitative research method. The data used in this research are derived from official documents, direct interviews with government officials and the secondary sources (books and journals on terrorism and counterterrorism. This article shows that the government adopted the legal approach or law-enforcement (“hard approach” by issuing the anti-terrorism law as a legal framework and by reorganizing the police force to strengthen its counter-terrorist capability. It also adopted an “ideological” approach (soft approach to battle religious extremism. This sort of approach is mainly aimed at defusing and neutralizing the religious extremism of terrorist groups and preventing it from spreading into the wider community. This article shows that the government has used effectively both approaches in destroying problem of terrorism in Indonesia.

  14. Etiology and radiologic findings of anoxia occurred at Dan-Mu-Ji(Salted radish in rice bran) manufacture: A case report and results of gas analysis

    Energy Technology Data Exchange (ETDEWEB)

    Park, Choong Ki; Kim, Heung Cheol; Ahn, Bum Gyu; Park, Man Soo; Hwang, Woo Cheol; Choi, Cheol Soon; Kang, Ik Won [College of Medicine, Hallym University, Chunchon (Korea, Republic of); Kim, Man Goo [Kangwon National University, Chunchon (Korea, Republic of)

    1994-07-15

    To identify the main toxic gas released from salted radish in rice bran(Dan-Mu-Ji) and to introduce the radiological findings of the patient who was exposed to the gas. Chest radiographs and CT scans of one survivor among three men who were exposed to the gas from Dan-Mu-Ji were reviewed. Gas obtained from the closed bottle containing Dan-Mu-Ji was analyzed by using the gas chromatography. The radiographic examinations of the survivor were suggestive of pulmonary edema with it's rapidly improving consideration in both lung. The headspace gas within the bottle containing Dan-Mu-Ji was mainly composed with carbon dioxide, ethyl alcohol and hydrogen sulfide, of which hydrogen sulfide was considered the main toxic gas released. Under the anaerobic condition, Dan-Mu-Ji released toxic hydrogen sulfide. Inhalation of hydrogen sulfide might produce non-cardiogenic pulmonary edema.

  15. Numerical Modeling of a Jet Ignition Direct Injection (JI DI LPG Engine

    Directory of Open Access Journals (Sweden)

    Albert Boretti

    2017-01-01

    Full Text Available The paper presents indirectly validated simulations of the operation of a LPG engine fitted with Direct Injection (DI and Jet Ignition (JI. It is demonstrated that the engine may have diesel like efficiencies and load control by quantity of fuel injected.  As the liquid propane quickly evaporates after injection in the main chamber, the main chamber mixture may be much closer to stoichiometry than a diesel for a better specific power at low engine speeds. This design also works at the high engine speeds impossible for the diesel, as combustion within the main chamber is controlled by the turbulent mixing rather than the vaporization and diffusion processes of the injected fuel of the diesel. 

  16. Anticancer Principles from Medicinal Piper (胡椒 Hú Jiāo Plants

    Directory of Open Access Journals (Sweden)

    Yue-Hu Wang

    2014-01-01

    Full Text Available The ethnomedical uses of Piper (胡椒 Hú Jiāo plants as anticancer agents, in vitro cytotoxic activity of both extracts and compounds from Piper plants, and in vivo antitumor activity and mechanism of action of selected compounds are reviewed in the present paper. The genus Piper (Piperaceae contains approximately 2000 species, of which 10 species have been used in traditional medicines to treat cancer or cancer-like symptoms. Studies have shown that 35 extracts from 24 Piper species and 32 compounds from Piper plants possess cytotoxic activity. Amide alkaloids account for 53% of the major active principles. Among them, piplartine (piperlongumine shows the most promise, being toxic to dozens of cancer cell lines and having excellent in vivo activity. It is worthwhile to conduct further anticancer studies both in vitro and in vivo on Piper plants and their active principles.

  17. Cultures of Violence and Acts of Terror: Applying a Legitimation-Habituation Model to Terrorism

    Science.gov (United States)

    Mullins, Christopher W.; Young, Joseph K.

    2012-01-01

    Although uniquely positioned to provide insight into the nature and dynamics of terrorism, overall the field of criminology has seen few empirically focused analyses of this form of political violence. This article seeks to add to the understanding of terror through an exploration of how general levels of violence within a given society influence…

  18. Consumption-based Total Suspended Particulate Matter Emissions in Jing-Jin-Ji Area of China

    Science.gov (United States)

    Yang, S.; Chen, S.; Chen, B.

    2014-12-01

    The highly-industrialized regions in China have been facing a serious problem of haze mainly consisted of total suspended particulate matter (TSPM), which has attracted great attention from the public since it directly impairs human health and clinically increases the risks of various respiratory and pulmonary diseases. In this paper, we set up a multi-regional input-output (MRIO) model to analyze the transferring routes of TSPM emissions between regions through trades. TSPM emission from particulate source regions and sectors are identified by analyzing the embodied TSPM flows through monetary flow and carbon footprint. The track of TSPM from origin to end via consumption activities are also revealed by tracing the product supply chain associated with the TSPM emissions. Beijing-Tianjin-Hebei (Jing-Jin-Ji) as the most industrialized area of China is selected for a case study. The result shows that over 70% of TSPM emissions associated with goods consumed in Beijing and Tianjin occurred outside of their own administrative boundaries, implying that Beijing and Tianjin are net embodied TSPM importers. Meanwhile, 63% of the total TSPM emissions in Hebei Province are resulted from the outside demand, indicating Hebei is a net exporter. In addition, nearly half of TSPM emissions are the by-products related to electricity and heating supply and non-metal mineral products in Jing-Jin-Ji Area. Based on the model results, we provided new insights into establishing systemic strategies and identifying mitigation priorities to stem TSPM emissions in China. Keywords: total suspended particulate matter (TSPM); urban ecosystem modeling; multi-regional input-output (MRIO); China

  19. K jubileu prof. JUDr. Zdeňka Jičínského, DrSc

    Czech Academy of Sciences Publication Activity Database

    Grospič, Jiří

    2009-01-01

    Roč. 148, č. 5 (2009), s. 526-527 ISSN 0231-6625 Institutional research plan: CEZ:AV0Z70680506 Keywords : tribute to Zdeněk Jičínský * Czech lawyer * Czech politican Subject RIV: AG - Legal Sciences

  20. Protection against nuclear terrorism: the IAEA response

    International Nuclear Information System (INIS)

    Dodd, B.

    2002-01-01

    Full text: As a result of the events of 11 September 2001, the International Atomic Energy Agency (IAEA) identified possible threats from acts of nuclear terrorism. A report to the Board of Governors in November 2001 summarized the IAEA's ongoing work in areas relevant to the prevention and mitigation of the consequences of such acts and outlined proposals for a number of new and/or enhanced activities. Four main threats were addressed: theft of a nuclear weapon; acquisition of nuclear material; acquisition of other radioactive material; and violent acts against nuclear facilities. These proposals have been further refined and the new plan was approved in principle at the March 2002 board meeting. In the beginning, implementation will be dependent on member state contributions to a voluntary fund. Proposed new or enhanced activities are grouped into eight areas: I. Physical protection of nuclear material and nuclear facilities; II. Detection of malicious activities involving nuclear and other radioactive materials; III. State systems for nuclear material accountancy and control; IV. Security of radioactive material other than nuclear material; V. Assessment of safety/security related vulnerability of nuclear facilities; VI. Response to malicious acts, or threats thereof; VII. Adherence to and implementation of international agreements, guidelines and recommendations; VIII. Nuclear security co-ordination and information management. After an overview, this paper focuses on activity area IV, which deals with the radiological terrorism issues involving radioactive sources. A strategy for evaluation of the IAEA's role is presented, covering an analysis of the likely threats and possible scenarios. This leads to an assessment of the most desirable sources from a terrorist's viewpoint. The strategy then examines how terrorists might acquire such sources and attempts to determine the best ways to prevent their acquisition. Further activities are proposed to prevent the use

  1. Terrorism as a process: a critical review of Moghaddam's "Staircase to Terrorism".

    Science.gov (United States)

    Lygre, Ragnhild B; Eid, Jarle; Larsson, Gerry; Ranstorp, Magnus

    2011-12-01

    This study reviews empirical evidence for Moghaddam's model "Staircase to Terrorism," which portrays terrorism as a process of six consecutive steps culminating in terrorism. An extensive literature search, where 2,564 publications on terrorism were screened, resulted in 38 articles which were subject to further analysis. The results showed that while most of the theories and processes linked to Moghaddam's model are supported by empirical evidence, the proposed transitions between the different steps are not. These results may question the validity of a linear stepwise model and may suggest that a combination of mechanisms/factors could combine in different ways to produce terrorism. © 2011 The Authors. Scandinavian Journal of Psychology © 2011 The Scandinavian Psychological Associations.

  2. The normalisation of terror: the response of Israel's stock market to long periods of terrorism.

    Science.gov (United States)

    Peleg, Kobi; Regens, James L; Gunter, James T; Jaffe, Dena H

    2011-01-01

    Man-made disasters such as acts of terrorism may affect a society's resiliency and sensitivity to prolonged physical and psychological stress. The Israeli Tel Aviv stock market TA-100 Index was used as an indicator of reactivity to suicide terror bombings. After accounting for factors such as world market changes and attack severity and intensity, the analysis reveals that although Israel's financial base remained sensitive to each act of terror across the entire period of the Second Intifada (2000-06), sustained psychological resilience was indicated with no apparent overall market shift. In other words, we saw a 'normalisation of terror' following an extended period of continued suicide bombings. The results suggest that investors responded to less transitory global market forces, indicating sustained resilience and long-term market confidence. Future studies directly measuring investor expectations and reactions to man-made disasters, such as terrorism, are warranted. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  3. Health implications of radiological terrorism: Perspectives from Israel

    Directory of Open Access Journals (Sweden)

    Hagby Moti

    2009-01-01

    Full Text Available September 11 th events taught us, members of the medical community, that we need to prepared for the worst. Nuclear terror is no longer science fiction. Radiological weapons of mass terror come in three flavors: The first one is nuclear. Since 1992, there have been six known cases of highly enriched uranium or plutonium being intercepted by authorities as it passed in or out of the former Soviet Union. Constructing a nuclear fission weapon requires high-level expertise, substantial facilities, and lots of money. All three of which would be difficult, although not impossible, for a terrorist group to pull off without state support. However, terrorists could carry out potential mass destruction without sophisticated weaponry by targeting nuclear facilities using conventional bombs or hijacked aircrafts. Terror attacks could also carry out mass panic and radioactive contamination of people and environment by dispersal of radioactive materials with or without the use of conventional explosive devices. Most medical and para-medical personnel are not familiar with CBRN terror and radiation casualties. To lessen the impact of those potential attacks and provide care for the greatest number of potential survivors, the community as a whole - and the medical community in particular - must acquire the knowledge of the various signs and symptoms of exposure to irradiation and radioactive contamination as well as have a planned response once such an attack has occurred. Based on knowledge of radiation hazards, medical emergency planers should analyze the risks of each scenario, offer feasible solutions and translate them into internationally accepted plans that would be simple to carry out once such an attack took place. The planned response should be questioned and tested by drills. Those drills should check the triage, evacuation routes, decontamination posts, evacuation centers and receiving hospitals. It is crucial that the drill will consist of

  4. Hedging against terrorism: Are US businesses prepared?

    Science.gov (United States)

    Kahan, Jerome H

    2015-01-01

    Private US companies face risks in connection with financial matters, but are not necessarily prepared to cope with risks that can seriously disrupt or even halt their operations, notably terrorist attacks and natural disasters. Enhancing the resilience of businesses when dealing with terrorism is especially challenging, as these groups or individuals can adapt tactics to exploit the vulnerabilities of companies they wish to target. Business managers need to formulate flexible preparedness plans that reduce risks from large-scale natural disasters as well as terrorist attacks. In doing so, they can take advantage of post-9/11 US government guidance for these endeavours as well as programmes that eliminate risks to private insurance entities so they can issue policies that cover terrorist strikes of high consequences. Just as business executives use hedging strategies in the world of finance, they also need operational hedging strategies as a means of exploiting as well as lowering the risks surrounding future uncertainties. Resources devoted to planning and hedging are investments that can increase the odds of businesses surviving and thriving, even if they experience high-impact terrorist attacks, threats or large-scale natural disasters, making suppliers, customers and stakeholders happy. The purpose of this paper is to give executives the incentive to take steps to do just that.

  5. Terrorism in Australia: factors associated with perceived threat and incident-critical behaviours.

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Barr, Margo; Raphael, Beverley; Jorm, Louisa

    2009-03-27

    To help improve incident preparedness this study assessed socio-demographic and socio-economic predictors of perceived risk of terrorism within Australia and willingness to comply with public safety directives during such incidents. The terrorism perception question module was incorporated into the New South Wales Population Health Survey and was completed by a representative sample of 2,081 respondents in early 2007. Responses were weighted against the New South Wales population. Multivariate analyses indicated that those with no formal educational qualifications were significantly more likely (OR = 2.10, 95%CI:1.32-3.35, p terrorism risk perception and concerns regarding potential impacts. The pattern of concern and response among those of migrant background may reflect secondary social impacts associated with heightened community threat, rather than the direct threat of terrorism itself. These findings highlight the need for terrorism risk communication and related strategies to address the specific concerns of these sub-groups as a critical underpinning of population-level preparedness.

  6. Terrorism in Australia: factors associated with perceived threat and incident-critical behaviours

    Directory of Open Access Journals (Sweden)

    Raphael Beverley

    2009-03-01

    Full Text Available Abstract Background To help improve incident preparedness this study assessed socio-demographic and socio-economic predictors of perceived risk of terrorism within Australia and willingness to comply with public safety directives during such incidents. Methods The terrorism perception question module was incorporated into the New South Wales Population Health Survey and was completed by a representative sample of 2,081 respondents in early 2007. Responses were weighted against the New South Wales population. Results Multivariate analyses indicated that those with no formal educational qualifications were significantly more likely (OR = 2.10, 95%CI:1.32–3.35, p Conclusion Low education level is a risk factor for high terrorism risk perception and concerns regarding potential impacts. The pattern of concern and response among those of migrant background may reflect secondary social impacts associated with heightened community threat, rather than the direct threat of terrorism itself. These findings highlight the need for terrorism risk communication and related strategies to address the specific concerns of these sub-groups as a critical underpinning of population-level preparedness.

  7. Terrorism in Australia: factors associated with perceived threat and incident-critical behaviours

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Barr, Margo; Raphael, Beverley; Jorm, Louisa

    2009-01-01

    Background To help improve incident preparedness this study assessed socio-demographic and socio-economic predictors of perceived risk of terrorism within Australia and willingness to comply with public safety directives during such incidents. Methods The terrorism perception question module was incorporated into the New South Wales Population Health Survey and was completed by a representative sample of 2,081 respondents in early 2007. Responses were weighted against the New South Wales population. Results Multivariate analyses indicated that those with no formal educational qualifications were significantly more likely (OR = 2.10, 95%CI:1.32–3.35, p terrorism risk perception and concerns regarding potential impacts. The pattern of concern and response among those of migrant background may reflect secondary social impacts associated with heightened community threat, rather than the direct threat of terrorism itself. These findings highlight the need for terrorism risk communication and related strategies to address the specific concerns of these sub-groups as a critical underpinning of population-level preparedness. PMID:19323842

  8. The effect of Ga-mee-gwui-ryong-tang and Yuk-mee ji-hwang-tang Herbal-acupuncture on the growth of mice

    Directory of Open Access Journals (Sweden)

    Min-jung Kim

    2006-12-01

    Full Text Available Objectives : To investigate the effect of Ga-mee-Gwui-ryong-tang herbal acupuncture (GR-HA at GB39 and ST36 and the effect of Yuk-mee ji-hwang-tang herbal acupuncture (YM-HA at GB39 and KI10 on growth in mice. Methods : Mice were divided into 7 groups(n=10 ; saline-ST36, saline-GB39, saline-KI10, GR-HA-ST36 group treated with GR-HA at right ST36, GR-HA-GB39 group treated with GR-HA at right GB39, YM-HA-GB39 group treated with YM-HA at right GB39, YM-HA-KI10 group treated with YM-HA at right KI10. Saline-ST36 group, saline-GB39 group and saline-KI10 group were injected with saline at right ST36, GB39, KI10 respectively. Saline injection and HA were performed 3 times a week for 18 days. The length(total height, body length and tail length, weight and the protein efficiency ratio were measured as well as IGF-1 level in serum. Results : 1. GR-HA at GB39 and GR-HA at ST36 promoted growth in weight, tail length and total height but there was no statistical significance. 2. GR-HA at GB39 significantly promoted protein efficiency on the 14th day and GR-HA at ST36 on the 3rd day. 3. GR-HA at GB39 significantly increased serum IGF-1. GR-HA at ST36 increased IGF-1 slightly but with no statistical significance. 4. YM-HA at GB39 and YM-HA at KI10 promoted growth in weight, height, tail length and total height but there was no statistical relevance. 5. YM-HA at GB39 and YM-HA at KI10 significantly promoted protein efficiency on the 14th day. 6. YM-HA at GB39 and YM-HA at KI10 significantly increased serum IGF-1. Serum IGF-1 level of YM-HA-KI10 group was significantly higher than that of YM-HA-GB39 group. 7. Serum IGF-1 level of GR-HA-GB39 group was significantly higher than that of YM-HA-GB39 group. Conclusions : GR-HA and YM-HA both may promote growth. This study suggests that herbal acupuncture at GB39 is more effective with Gwui-ryong-tang than Yuk-mee ji-hwang-tang to promote growth. It also suggests that Yuk-mee ji-hwang-tang herbal acupuncture is more

  9. Modeling a Strategy for the War on Terrorism

    National Research Council Canada - National Science Library

    Henderson, Darral

    2002-01-01

    .... This paper discusses a strategy for conducting the war on terrorism in terms of a system and how that strategy must be adjusted over the long-term to compensate for fluctuating components of the war on terrorism...

  10. Israel's Counter-Terrorism Strategy and its Effectiveness

    National Research Council Canada - National Science Library

    Smith, Jerry D

    2005-01-01

    This thesis analyzes Israeli counter-terrorism strategy and its effectiveness. Because of ongoing suicide attacks from Palestinian and other terrorist organizations, Israel will continue to have an aggressive counter-terrorism strategy...

  11. 174 THE MORALITY OF SUICIDE TERRORISM AND BOKO HARAM ...

    African Journals Online (AJOL)

    User

    philosophically consider the moral implication of suicide terrorism with particular .... define terrorism is political rather than theoretical. Brian Berkey (2010) is of ..... elements of relativism to the concept of morality because an. Islamic cleric who ...

  12. Global Risk of Nuclear Terrorism

    Directory of Open Access Journals (Sweden)

    Emily Diez

    2010-01-01

    Full Text Available The emergence of nuclear terrorism, a threat that President Obama called "the gravest danger we face," has signaled a paradigm shift in international security. Since the collapse of the Soviet Union, sensitive nuclear technologies and materials have become increasingly available. Globalization and the inadequate enforcement of treaties and export controls have allowed the proliferation of nuclear weapons materials. Today, international terrorist organizations seek to employ weapons of mass destruction (WMD as a means to influence national policies around the world. AlQaida spokesman Suleiman Abu Gheith declared that in order to balance the injustices that have been inflicted on the Muslim population worldwide, al-Qaida's new objective is "to kill 4 million Americans–2 million of them children." As political scientist Graham Allison notes, this could be achieved with either 1,334 attacks similar in magnitude to those of 9/11, or one nuclear bomb.Building a nuclear program is an arduous task that requires tacit knowledge, the recruitment of nuclear scientists, engineers, and machinists, and the resources and time to obtain nuclear materials and components. While it is unlikely that terrorist organizations have the capacity to develop full-fledged programs in the near term, terrorist development and acquisition of nuclear weapons remains a long-term threat that requires international action.

  13. Civil liberties and nuclear terrorism

    International Nuclear Information System (INIS)

    Goldberg, S.

    1987-01-01

    The importance of preventing nuclear terrorism is so great that it is easy to believe that the usual concern with civil liberties must take a back seat. But it is precisely when emergencies are invoked that the authors must not forget the importance of freedoms. Emergency powers are easily abused, and, even in the absence of abuse, mistakes can be made. It is hard to understand why they care about civil liberties if every suspect is guilty, every wiretap is necessary, and every search is justified. But sometimes suspects are innocent, wiretaps are used for political ends, and searches disrupt lives to no end. Civil liberties do not exist in a vacuum. If society is destroyed, civil liberties are likely to be destroyed as well. Virtually every legal doctrine this study addresses involves a recognition that individual rights must be balanced against valid social needs. The civil liberties focus on here fall under the general headings of freedom of speech and association, privacy, due process rights for suspects, and freedom from unreasonable searches and seizures. One essential point applied to all these areas: although a counterterrorist activity is legal, that does not mean the activity has no impact on civil liberties. It may be legal, for example, to have a massive federal police force that provides hundreds of guards for every shipment of plutonium. Even so, that procedure still raises civil liberties concerns, since many Americans would feel less free in a society of that type

  14. The universal legal framework against nuclear terrorism

    International Nuclear Information System (INIS)

    Gehr, W.

    2007-01-01

    After the events of September 11, the United Nations Security Council adopted Resolution 1373 (2001) which has been called the 'Counter-Terrorism Code' of the world, because it creates legal obligations for all 192 Member States of the United Nations. UN Security Council Resolutions 1373 (2001), 1540 (2004) and 1735 (2006) as well as a defined set of 13 global treaties constitute the universal legal framework against terrorism which must be implemented in a manner consistent with international human rights obligations. Basically, these 13 treaties as well as Resolution 1373 are international criminal law instruments. Within this universal legal framework, the framework against nuclear terrorism is constituted by Resolution 1540, the Convention on the Physical Protection of Nuclear Material (CPPNM) which entered into force in 1987, and the International Convention for the Suppression of Terrorist Bombings which is in force since 2001. These three legal instruments will be supplemented by the International Convention for the Suppression of Acts of Nuclear Terrorism, an amendment to the CPPNM and two Protocols amending the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation and the Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms Located on the Continental Shelf, once these instruments, all of which were adopted in 2005, enter into force. The Terrorism Prevention Branch (TPB) of the United Nations Office on Drugs and Crime (UNODC) assists countries which are in need of legislative assistance for the drafting of appropriate counter-terrorism laws that duly take into account the obligations contained in Resolution 1373, the United Nations sanctions against Al-Qaida and the Taliban as well as in the 13 universal conventions for the prevention and the suppression of terrorism, including the CPPNM and the new International Convention for the Suppression of Acts of Nuclear Terrorism. UNODC/TPB has also

  15. North Korea and Support to Terrorism: An Evolving History

    Directory of Open Access Journals (Sweden)

    Bruce E. Bechtol, Jr.

    2010-01-01

    Full Text Available The DPRK's (Democratic People's Republic of Korea or North Korea support for terrorism began as an ideologically-based policy financed by the Soviet Union that eventually led to a policy designed to put money into the coffers of the elite in Pyongyang—in short, a "proliferation for hire" policy. This article articulates a brief history of the North Korean regime, the rise to power of Kim Il-sung and his son, Kim Jong-il, and North Korea's persistent support to terrorist groups around the globe.

  16. Reducing the risk of nuclear terrorism

    International Nuclear Information System (INIS)

    Hibbs, R.

    2005-01-01

    Full text: The March 2005 'International conference on nuclear security, global directions for the future' noted that nuclear terrorism is one of the greatest threats to society. Eminent members of a multi-national panel stated that there is no one principal activity to reduce the risk of nuclear terrorism and that a combination of activities is required. This paper seeks to identify those activities by analyzing the elements that comprise the risk of nuclear terrorism. For the purpose of the analysis, risk is the product of the probability of a terrorist attack (A p ), the success of a terrorist act (S p ) and the consequence (C) of the attack: R=A p * S p * C. The paper examines each of these three elements of risk with the objective of identifying what we are doing and what else we could be doing to reduce risk. It takes into consideration some historic catastrophes, examines how they might have been prevented or their consequences reduced, and if there are lessons that are applicable to reducing the risk of nuclear terrorism. The paper demonstrates that we have concentrated on only one of the three elements of risk and offer suggestions for diminishing the risk of nuclear terrorism by addressing all the elements. (author)

  17. The Manipulation of Social, Cultural and Religious Values in Socially Mediated Terrorism

    Directory of Open Access Journals (Sweden)

    Claire Smith

    2018-05-01

    Full Text Available This paper presents an analysis of how the Islamic State/Da’esh and Hizb ut-Tahrir Indonesia manipulate conflicting social, cultural and religious values as part of their socially mediated terrorism. It focusses on three case studies: (1 the attacks in Paris, France on 13 November 2015; (2 the destruction of cultural heritage sites in Iraq and Syria; and (3 the struggle between nationalist values and extreme Islamic values in Indonesia. The case studies were chosen as a basis for identifying global commonalities as well as regional differences in socially mediated terrorism. They are located in Asia, the Middle East and Europe. The integrated analysis of these case studies identifies significant trends and suggests actions that could lessen the impact of strategies deployed by extremist groups such as Da’esh, al-Qaeda and Hizb ut-Tahrir. We discuss the broader implications for understanding various aspects of socially mediated terrorism.

  18. The 'war on terror"and international law

    NARCIS (Netherlands)

    Duffy, Helen

    2013-01-01

    The thesis analyses international law and practice in relation to terrorism and counter-terrorism in the post 9/11 environment. It finds terrorism to be a term of acute and wide-ranging political significance yet one which is not defined under generally accepted treaty or customary international

  19. 75 FR 30106 - Terrorism Risk Insurance Program; Litigation Management Submissions

    Science.gov (United States)

    2010-05-28

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Litigation Management Submissions... U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program Office is seeking comments... or by mail (if hard copy, preferably an original and two copies) to: Terrorism Risk Insurance Program...

  20. 76 FR 19909 - International Terrorism Victim Expense Reimbursement Program

    Science.gov (United States)

    2011-04-11

    ... 1121-AA78 International Terrorism Victim Expense Reimbursement Program AGENCY: Office of Justice... promulgating this interim-final rule for its International Terrorism Victim Expense Reimbursement Program... international terrorism. DATES: Effective date: This interim-final rule is effective April 11, 2011. Comment...

  1. 15 CFR 742.8 - Anti-terrorism: Iran.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Iran. 742.8 Section... BASED CONTROLS § 742.8 Anti-terrorism: Iran. (a) License Requirements. (1) A license is required for anti-terrorism purposes to export or reexport to Iran any item for which AT column 1 or AT column 2 is...

  2. 15 CFR 742.19 - Anti-terrorism: North Korea.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: North Korea. 742.19...-CCL BASED CONTROLS § 742.19 Anti-terrorism: North Korea. (a) License Requirements. (1) All items on... anti-terrorism reasons require a license for export or reexport to North Korea. This includes all items...

  3. 15 CFR 742.9 - Anti-terrorism: Syria.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Syria. 742.9 Section... BASED CONTROLS § 742.9 Anti-terrorism: Syria. (a) License requirements. (1) If AT Column 1 of the... required for export and reexport to Syria for anti-terrorism purposes. (2) The Secretary of State has...

  4. A Study of Terrorism Emergency Preparedness Policies in School Districts

    Science.gov (United States)

    Umoh, Emmanuel

    2013-01-01

    The threat of terrorism is a concern in public facilities including schools. This study focused on school districts in a southwestern state. Terrorism emergency preparedness policies are well-documented as measures to protect students and staff in school districts from terrorism threats and vulnerabilities. However, those threats and…

  5. 75 FR 58468 - Terrorism Risk Insurance Program; Program Loss Reporting

    Science.gov (United States)

    2010-09-24

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Program Loss Reporting AGENCY: Departmental Offices, Terrorism Risk Insurance Program Office, Treasury. ACTION: Notice and request for... 1995, Public Law 104-13 (44 U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program...

  6. International Terrorism and Mental Health: Recent Research and Future Directions

    Science.gov (United States)

    Fischer, Peter; Ai, Amy L.

    2008-01-01

    International terrorism has become a major global concern. Several studies conducted in North America and Europe in the aftermath of terrorist attacks reveal that international terrorism represents a significant short-term and long-term threat to mental health. In the present article, the authors clarify the concept and categories of terrorism and…

  7. BIOLOGICAL TERRORISM: THE NOTION, ESSENCE AND MAIN AREAS OF COUNTER

    Directory of Open Access Journals (Sweden)

    Julia Sarankina

    2016-10-01

    Full Text Available The article issued theoretical and practice problems of combating terrorism in current conditions, in particular, analyzes the concept of bio-terrorism as a form of terrorism, we investigate its nature, characteristics, and also referred to the major directions of countering.

  8. Understanding and Teaching the Semantics of Terrorism: An Alternative Perspective.

    Science.gov (United States)

    Long, Kenneth J.

    1990-01-01

    Critiques conventional definitions of terrorism. Advocates sensitizing students to the semantics of terrorism and teaching skepticism of leaders who manipulate such concepts. Recommends using historical case studies to clarify issues, inform students about state and state-sponsored terrorism, and challenge students' preconceptions. Includes a…

  9. On immorality of terrorism and war

    Directory of Open Access Journals (Sweden)

    Čičovački Predrag

    2003-01-01

    Full Text Available The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable moral implications with regards to the treatment of other human beings, a further common and troubling implication of terrorism and war consists in the fact that dehumanization of others leads also to a dehumanization of ourselves. .

  10. Reframing domestic violence as torture or terrorism

    Directory of Open Access Journals (Sweden)

    Marcus Isabel

    2014-01-01

    Full Text Available This paper focuses on the analysis of the phenomenon of domestic violence and the distinctive features for which is it may be recognized as a specific form of torture and/or terrorism at home. The author provides an overview of the scientific debate among feminist authors on this conception which has given rise to an innovative approach to understanding the concept of domestic violence. Underscoring the substantive similarity of domestic violence with the acts of torture and/or terrorism, the author urges for state action arguing that domestic violence as a form of gender-based violence should be approached by applying the same logic and strategies which are employed in response to traditional torture and terrorism.

  11. Terrorism reports: The tip of the iceberg.

    Science.gov (United States)

    Ellenberg, Eytan; Taragin, Mark; Bar-On, Zvia; Cohen, Osnat; Ostfeld, Ishay

    2017-01-01

    Medical impact of terror is a public health issue as the threat is growing all over the world. Our objective was to compare the number of injured and incidents in the three different databases and reports [Global Terrorism Database (GTD), Israeli Security Agency (ISA) and National Insurance Institute (NII)] in Israel. Retrospective study. Analyses of three different databases (GTD, ISA and NII) and basic comparison. The victims reimbursed for medical expenses are the largest population. The number of injured as described by GTD and ISA database are less important. The 2010-2013 years are marked by more incidents recognized in Israel vs GTD assessment (except in 2014). The number of victims being reimbursed for medical and mental health services is radically different from the GTD and the ISA reports. Public Health specialists should be advised of this phenomenon to deliver their right approach (including mental health) to growing threat and develop new definition of victim of terror.

  12. Nuclear Law: A Key Against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Cardozo, P.

    2004-01-01

    The role of the legal instruments in the war against nuclear terrorism. Control of radioactive sources. Elements of Nuclear Law: Definition: it is the body of special legislation that regulates the pacific uses of nuclear energy and the conduct of the persons engaged in activities related to fissionable materials and ionizing radiation . Objective: to provide a legal framework in order to protect individuals , property and the environment against the harmful effects of the use of nuclear energy and ionising radiation. Principles of nuclear energy legislation: safety principle, exclusively operator responsibility, authorization, independence of the regulatory body, inspections and enforcement, nuclear damage compensation, international cooperation. National regulatory infrastructure. Establishment of special law in Emergency Preparedness for nuclear or radiological disaster. IAEA Conventions. Transportation of nuclear material. IAEA regulations on radioactive material. Compensation for nuclear damage. Nuclear safety, security and terrorism. International and domestic instruments. Anti terrorism acts. International agreements on Safety Cooperation. (Author)

  13. Terrorism and Other Threats to Civilization

    Science.gov (United States)

    Garwin, Richard L.

    2014-07-01

    In the Seminars on Planetary Emergencies, we have for more than a decade had a strong focus on terrorism, and, indeed, on megaterrorism. We realized early that there was much that could be achieved to mitigate the consequences of terrorists' acts, and so our original PMP, ably chaired by Kamal, was split into PMP-MTA (Mitigation of Terrorists Acts) and PMP-Motivation of Terrorism. Clearly, terrorism doesn't just happen, but is performed by people, either relatively spontaneously or in an organized fashion. I will not presume to report on the considerations and accomplishments of our colleagues, chaired by John Alderdice, who have studied terrorist motivations and worked hard to eliminate such motivations...

  14. TOURISM AND TERRORISM: A WORLDWIDE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Cristina Elena ALBU

    2016-03-01

    Full Text Available We live in a society marked by major changes in the tourism field. Tourist destinations make all possible efforts to best promote their tourist offer and attract as different tourist categories as there might be. However, these tourist destinations are sometimes associated with terrorist attacks that can turn a famous tourist area into a highly avoided one. Terrorism may be permanently detrimental to a tourist destination on both social and economic levels. The purpose of this paper is to highlight the impact that terrorist attacks have on tourism around the globe. The research method used for the achievement of this article is documentary research. Through the proportions and forms that it has taken, terrorism has become one of the more and more active and threatening calamities that affect the international community. For some organizations, terrorism has become a means of solving their political, cultural and religious problems, taking tourism as a niche through which they can carry out their targets.

  15. Jihadi terrorism in the Netherlands : a description based on closed criminal investigations

    NARCIS (Netherlands)

    Poot, C.J. de; Sonnenschein, A.; Soudijn, M.R.J.; Bijen, J.G.M.; Verkuylen, M.W.

    2011-01-01

    This report describes the way in which jihadi terrorism manifested itself in the Netherlands at the outset of the 21st century, and focuses specifically on a few jihadi cooperations that were active on Dutch territory in the period between 2001 and 2005. What kind of groups were they? How were these

  16. A false dichotomy? Mental illness and lone-actor terrorism.

    Science.gov (United States)

    Corner, Emily; Gill, Paul

    2015-02-01

    We test whether significant differences in mental illness exist in a matched sample of lone- and group-based terrorists. We then test whether there are distinct behavioral differences between lone-actor terrorists with and without mental illness. We then stratify our sample across a range of diagnoses and again test whether significant differences exist. We conduct a series of bivariate, multivariate, and multinomial statistical tests using a unique dataset of 119 lone-actor terrorists and a matched sample of group-based terrorists. The odds of a lone-actor terrorist having a mental illness is 13.49 times higher than the odds of a group actor having a mental illness. Lone actors who were mentally ill were 18.07 times more likely to have a spouse or partner who was involved in a wider movement than those without a history of mental illness. Those with a mental illness were more likely to have a proximate upcoming life change, more likely to have been a recent victim of prejudice, and experienced proximate and chronic stress. The results identify behaviors and traits that security agencies can utilize to monitor and prevent lone-actor terrorism events. The correlated behaviors provide an image of how risk can crystalize within the individual offender and that our understanding of lone-actor terrorism should be multivariate in nature.

  17. [Terrorism, public health and health services].

    Science.gov (United States)

    Arcos González, Pedro; Castro Delgado, Rafael; Cuartas Alvarez, Tatiana; Pérez-Berrocal Alonso, Jorge

    2009-01-01

    Today the terrorism is a problem of global distribution and increasing interest for the international public health. The terrorism related violence affects the public health and the health care services in an important way and in different scopes, among them, increase mortality, morbidity and disability, generates a context of fear and anxiety that makes the psychopathological diseases very frequent, seriously alters the operation of the health care services and produces important social, political and economic damages. These effects are, in addition, especially intense when the phenomenon takes place on a chronic way in a community. The objective of this paper is to examine the relation between terrorism and public health, focusing on its effects on public health and the health care services, as well as to examine the possible frames to face the terrorism as a public health concern, with special reference to the situation in Spain. To face this problem, both the public health systems and the health care services, would have to especially adapt their approaches and operational methods in six high-priority areas related to: (1) the coordination between the different health and non health emergency response agencies; (2) the reinforcement of the epidemiological surveillance systems; (3) the improvement of the capacities of the public health laboratories and response emergency care systems to specific types of terrorism as the chemical or biological terrorism; (3) the mental health services; (4) the planning and coordination of the emergency response of the health services; (5) the relations with the population and mass media and, finally; (6) a greater transparency in the diffusion of the information and a greater degree of analysis of the carried out health actions in the scope of the emergency response.

  18. State health policy for terrorism preparedness.

    Science.gov (United States)

    Ziskin, Leah Z; Harris, Drew A

    2007-09-01

    State health policy for terrorism preparedness began before the terrorist attacks on September 11, 2001, but was accelerated after that day. In a crisis atmosphere after September 11, the states found their policies changing rapidly, greatly influenced by federal policies and federal dollars. In the 5 years since September 11, these state health policies have been refined. This refinement has included a restatement of the goals and objectives of state programs, the modernization of emergency powers statutes, the education and training of the public health workforce, and a preparation of the health care system to better care for victims of disasters, including acts of terrorism.

  19. Talking about terrorism: Q and A with Jessica Stern

    International Nuclear Information System (INIS)

    Stern, J.

    2006-01-01

    Nuclear terrorism remains a potent threat. We have known for some time that terrorist groups have been seeking weapons of mass destruction. There are various ways that terrorists could use nuclear and other radioactive materials: they could acquire a nuclear weapon from a nuclear State; they could acquire the necessary fissile material and produce a weapon on their own, creating an improvised nuclear device; they could attack a nuclear power plant; or they could create a radiation dispersal device, a so-called dirty bomb. The first possibility would be the most devastating, but it is also probably the least likely. Stealing a bomb would be difficult because of the generally high security of facilities where nuclear weapons are stored. And a State that gave nuclear weapons to terrorists would have to seriously consider the probability that the source of the bomb could be identified, so retaliation against the State would be likely. In this regard, the revelation that terrorist groups were carrying out reconnaissance missions at Russian nuclear-weapon storage sites in 2001 was troubling; but the terrorists' efforts quickly became known to security personnel. The second possibility-the risk that terrorists will acquire nuclear-weapons usable materials-must be taken extremely seriously, especially in light of revelations about meetings between Pakistani nuclear scientists and al Qaeda, and about a clandestine effort to export nuclear technology run by the Khan network. Terrorists' dispersal of radioactive materials - either by attacking a nuclear plant or disseminating those materials with a home-made device-is the most likely scenario. Still, it is important to keep the threat in perspective. Dirty bombs are far more frightening than lethal. The article provides responses of Jessica Stern on questions about how big a threat nuclear terrorism is, how to minimize the risks of nuclear terrorism, the behaviour of states to combat the roots and reach of nuclear terrorism

  20. Air quality assessment by contingent valuation in Ji'nan, China.

    Science.gov (United States)

    Wang, Yan; Zhang, Yi-Sheng

    2009-02-01

    Along with urbanization and environmental deterioration within China, many residents' desire for improved air quality has increased. To address this topic, this study focuses on the relationship between poor air quality and residents' willingness to pay for improved air quality in the city of Ji'nan. As a means of quantifying an individual's willingness to pay (WTP) for improved air quality, a contingent valuation method (CVM) was employed. A sample of 1500 residents was chosen, based on the stratified sampling method. The respondents' WTP was then elicited through a series of face-to-face interviews, conducted using a range of hypothetical, open-ended scenario questions. The results showed that 59.7% of respondents were able to express a positive WTP, and that the average WTP was 100 Chinese Yuan (CNY) per person, per year. In order to establish the relationship between endogenous variables and WTP, both a Probit model on the probability of a positive WTP, and a stepwise regression model were constructed. Most parameters in the econometric analysis demonstrated the expected results. It was found that annual household income, expenditure on the treatment of respiratory diseases and workers in the family significantly influenced WTP. The rates of positive WTP and the monetary amount were also larger for men than for women. Unlike developed countries, most respondents regard air quality improvement as a government responsibility in that more than 40% of respondents had no incentive to bear the costs of attempting to achieve better air quality, indicating a relatively low environmental consciousness.

  1. Just-in-time tomography (JiTT): a new concept for image-guided radiation therapy

    Energy Technology Data Exchange (ETDEWEB)

    Pang, G; Rowlands, J A [Toronto-Sunnybrook Regional Cancer Centre, 2075 Bayview Avenue, Toronto M4N 3M5 (Canada); Imaging Research, Sunnybrook and Women' s College Health Sciences Centre, Departments of Radiation Oncology and Medical Biophysics, University of Toronto, Toronto (Canada)

    2005-11-07

    Soft-tissue target motion is one of the main concerns in high-precision radiation therapy. Cone beam computed tomography (CBCT) has been developed recently to image soft-tissue targets in the treatment room and guide the radiation therapy treatment. However, due to its relatively long image acquisition time the CBCT approach cannot provide images of the target at the instant of the treatment and thus it is not adequate for imaging targets with intrafraction motion. In this note, a new approach for image-guided radiation therapy-just-in-time tomography (JiTT)-is proposed. Differing from CBCT, JiTT takes much less time to generate the needed tomographical, beam's-eye-view images of the treatment target at the right moment to guide the radiation therapy treatment. (note)

  2. Just-in-time tomography (JiTT): a new concept for image-guided radiation therapy

    International Nuclear Information System (INIS)

    Pang, G; Rowlands, J A

    2005-01-01

    Soft-tissue target motion is one of the main concerns in high-precision radiation therapy. Cone beam computed tomography (CBCT) has been developed recently to image soft-tissue targets in the treatment room and guide the radiation therapy treatment. However, due to its relatively long image acquisition time the CBCT approach cannot provide images of the target at the instant of the treatment and thus it is not adequate for imaging targets with intrafraction motion. In this note, a new approach for image-guided radiation therapy-just-in-time tomography (JiTT)-is proposed. Differing from CBCT, JiTT takes much less time to generate the needed tomographical, beam's-eye-view images of the treatment target at the right moment to guide the radiation therapy treatment. (note)

  3. Confronting the risks of terrorism: making the right decisions

    International Nuclear Information System (INIS)

    John Garrick, B.; Hall, James E.; Kilger, Max; McDonald, John C.; O'Toole, Tara; Probst, Peter S.; Rindskopf Parker, Elizabeth; Rosenthal, Robert; Trivelpiece, Alvin W.; Van Arsdale, Lee A.; Zebroski, Edwin L.

    2004-01-01

    This report offers a methodology for assessing, quantitatively, the risks of terrorism. The purpose of the methodology is to support effective decision making to combat terrorism. The emphasis is on terrorist attacks that could have catastrophic consequences. The perspective taken is that in order to make the right decisions about combating terrorism, their needs to be a systematic means of assessing the likelihood of such attacks. A process of implementation of the decisions resulting from risk assessment is essential. That process includes (1) an understanding of the nature of the threat, (2) an information system linked directly to 'intelligence' on terrorism, and (3) organizational structures that can take timely, coordinated, and effective actions. There must also be sound evidence that the methodology can be successfully applied. A description of the nature of terrorism, a terrorism risk assessment methodology, information requirements to fight terrorism, and recommendations for successful implementation is what this report is about

  4. The Changing Nonlinear Relationship between Income and Terrorism

    Science.gov (United States)

    Enders, Walter; Hoover, Gary A.

    2014-01-01

    This article reinvestigates the relationship between real per capita gross domestic product (GDP) and terrorism. We devise a terrorism Lorenz curve to show that domestic and transnational terrorist attacks are each more concentrated in middle-income countries, thereby suggesting a nonlinear income–terrorism relationship. Moreover, this point of concentration shifted to lower income countries after the rising influence of the religious fundamentalist and nationalist/separatist terrorists in the early 1990s. For transnational terrorist attacks, this shift characterized not only the attack venue but also the perpetrators’ nationality. The article then uses nonlinear smooth transition regressions to establish the relationship between real per capita GDP and terrorism for eight alternative terrorism samples, accounting for venue, perpetrators’ nationality, terrorism type, and the period. Our nonlinear estimates are shown to be favored over estimates using linear or quadratic income determinants of terrorism. These nonlinear estimates are robust to additional controls. PMID:28579636

  5. The Dilution of Terrorism - Internship report at the International Center for Terrorism Studies

    OpenAIRE

    Bærentzen, Marc Theis

    2012-01-01

    The focus of this report will be how theory and methodology is a necessary mean for an academic understanding of terrorism, using different theories and examples to substantiate my argument. Terrorism has become a diluted concept that is used in a variety of ways to define violence against civilians. But is this enough to claim that we are dealing with a terrorist threat? In academic work these kind of reflections are important to the drawn conclusion. The problematic issue of an absent metho...

  6. Effect of YangZheng XiaoJi Extract, DME-25, on endothelial cells and their response to Avastin.

    OpenAIRE

    Owen, Sioned; Gao, Y.; Zhi, X.; Wei, C.; Wu, Y.; Jiang, Wen Guo

    2016-01-01

    ackground: Angiogenesis is a cellular process that has been identified as a key target for therapy in solid cancer. However, over the course of anti-angiogenic therapies, cancer cells acquire resistance to these therapies after an initial period of success. DME-25 is an extract from Yang Zheng Xiao Ji, a traditional Chinese medicine that has been reported to benefit patients with cancer by alleviating chemotherapy-associated symptoms and possibly inhibiting key cancer cell traits. This study ...

  7. The Measurement of Urbanization Level Based on Entity Space: A Case Study of JingJinJi Region, China

    Directory of Open Access Journals (Sweden)

    Wen Fenghua

    2017-01-01

    Full Text Available On the basis of analyzing the pros and cons of different urbanization level measurement methods, this paper puts forward urbanization level measurement method based on entity space and then uses entity space data to describe the urbanization rate of various districts and counties of JingJinJi Region in 2005 and 2009. According to the analysis of time and space differences on such basis, JingJinJi may be divided from high to low order according to the urbanization rate of the entity space: central urban area, urban development area and suburb, which respectively bear different functions. According to the comparison of entity space urbanization rate and population urbanization rate in the aspects of sequence, primacy ratio, zipf index, etc., we find the non-intensive land use status quo of urban development area of JingJinJi and the feature that the distribution of entity space urbanization scale is much uniform than distribution of population urbanization scale. Accordingly, the paper puts forward the following suggestions : (1 The space construction should depend upon function division; (2 The urban development area should pay attention to the construction of the supporting facilities and meanwhile enhance land use rate; (3 The urban construction should be enhanced in small and middle regions and counties surrounding Beijing and Tianjin.

  8. On complex adaptive systems and terrorism

    International Nuclear Information System (INIS)

    Ahmed, E.; Elgazzar, A.S.; Hegazi, A.S.

    2005-01-01

    Complex adaptive systems (CAS) are ubiquitous in nature. They are basic in social sciences. An overview of CAS is given with emphasize on the occurrence of bad side effects to seemingly 'wise' decisions. Hence application to terrorism is given. Some conclusions on how to deal with this phenomena are proposed

  9. IAEA Nuclear Security Programme Combating Nuclear Terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    IAEA Plans of activities include, General Conference in September 2001 which reviewed activities relevant to preventing nuclear terrorism and proposed master plan. The Board of Governors approved new Nuclear Security Plan for the next four years. Three activity areas are; - needs assessment, analysis and coordination, prevention and detection and response.

  10. Probabilistic risk analysis and terrorism risk.

    Science.gov (United States)

    Ezell, Barry Charles; Bennett, Steven P; von Winterfeldt, Detlof; Sokolowski, John; Collins, Andrew J

    2010-04-01

    Since the terrorist attacks of September 11, 2001, and the subsequent establishment of the U.S. Department of Homeland Security (DHS), considerable efforts have been made to estimate the risks of terrorism and the cost effectiveness of security policies to reduce these risks. DHS, industry, and the academic risk analysis communities have all invested heavily in the development of tools and approaches that can assist decisionmakers in effectively allocating limited resources across the vast array of potential investments that could mitigate risks from terrorism and other threats to the homeland. Decisionmakers demand models, analyses, and decision support that are useful for this task and based on the state of the art. Since terrorism risk analysis is new, no single method is likely to meet this challenge. In this article we explore a number of existing and potential approaches for terrorism risk analysis, focusing particularly on recent discussions regarding the applicability of probabilistic and decision analytic approaches to bioterrorism risks and the Bioterrorism Risk Assessment methodology used by the DHS and criticized by the National Academies and others.

  11. Cyber terrorism prevention and counteraction workshop review

    NARCIS (Netherlands)

    Pastukhov, O.M.

    2011-01-01

    A NATO Advanced Training Course (ATC ) on Cyber Terrorism Prevention and Counteraction workshop, held in Kiev on September 27-29, 2010, allowed the participants to share their experiences with experts from Ukraine, a Partnership for Peace country. The participants exchanged their ideas on the ways

  12. The human rights and the terrorism

    Directory of Open Access Journals (Sweden)

    Hamidreza Rafiei Fanood

    2016-12-01

    Full Text Available Regarding Human rights has been emphasized by governments through universal declaration human rights and its violations faced the global reaction in any case. From this perspective; the necessity of observing human rights against terrorism has been emphasized by many resolutions of the General Assembly, the Security Council and many regional resolutions. But, today especially after the September 11 events and America unilateral attacks by resorting to human rights and of course by considering the lack of international agreement on the norms, strategies and principles of human rights, the campaign against terrorism has started on the basis of its obligations, regardless to existing norms. So it would be said that today; the war against terrorism more than any other terrorist attacks threatens the security and human rights. However, human rights framework has never prevented effective and legitimate actions to the terrorist attacks. In other words; in the human right framework, there is no conflict with the campaign against terrorism, it emphasizes on identifying and fighting and even it guarantees the effectiveness of such a fight. As a result, Human rights violations at the expense of security, certainly associated with the destruction of both.

  13. News Framing in a Time of Terror

    DEFF Research Database (Denmark)

    Jørndrup, Hanne

    2016-01-01

    the attacks at the Charlie Hebdo office in Paris in January 2015. This article analyses how the Danish television channel DR1 framed the attacks in the newscast from the first shot at Krudttønden and for the following week. Furthermore, the analysis will discuss how the framing of the shooting as a “terror...

  14. EU’s Role in Fighting Terrorism

    Directory of Open Access Journals (Sweden)

    Jana Maftei

    2009-06-01

    Full Text Available International terrorism, a phenomenon with constant development, is today acertainty and has dramatically marked the beginning of this century and millennium. Thisproblem has reached a global dimension and it represents a concern to the entire internationalcommunity. Over the time, numerous international and regional regulations have been framed, inorder to prevent and combat terrorism. The European Union condemns terrorist acts andrecognizes the central role of the United Nations, in fighting against terrorism and promotingsecurity, as well as the contribution of the new NATO in what concerns the defense and securitypromotion. Europe has to act more firmly in order to consolidate the defense against terrorismand the European Union’s borders. At the same time, the European Union considers that only aconcerted and firm action from all the states and the major actors on the international scenewould lead to the identification of the solutions which can contribute to the efficient fight againstterrorism and, by these means, provide for the international peace and security. The proportion ofthe danger terrorism represents has turned the fight against this phenomenon in an internationalcommunity’s desideratum.

  15. Teaching about Terrorism: Lessons Learned at SWOTT

    Science.gov (United States)

    Miller, Gregory D.

    2009-01-01

    This article discusses some of the challenges and lessons for teaching undergraduate-level courses related to terrorism. The author outlines some of the primary issues that instructors can expect to face, and provides strategies for dealing with several of these challenges. The goal is to relay useful information to those teaching, or planning to…

  16. Indicators of Terrorism Vulnerability in Africa

    Science.gov (United States)

    2015-03-26

    security. The relation, if any, to terrorism is explored. The data comes from the World Bank database. Gender Equality. How a country treats women and the...55 Gender Equality...method to evaluate poverty is based upon income inequality . This ap- proach is based upon the belief that poverty is relative, individuals only feel

  17. Nazi terror system and its practical use

    Directory of Open Access Journals (Sweden)

    Anvar M. Mamadaliev

    2011-02-01

    Full Text Available The article tells about reasons and consequences of Adolf Hitler’s terror. Special attention is attached to mechanism of Nazi dictatorship and its ideological bases, set in Hitler’s work ‘My Struggle’, the 25 Point Program.

  18. Political Ideology and Psychological Symptoms Following Terror

    Science.gov (United States)

    Laufer, Avital; Solomon, Zahava

    2010-01-01

    The article examines the associations between political ideology and level of psychological symptoms in youth exposed to terror attacks. The study included 2,999 7th to 10th graders from various parts of Israel. Political ideology was examined in two ways: (a) as a content dimension: "political stand"--holding right, centrist, or left…

  19. Updates in the War against Terrorism.

    Science.gov (United States)

    Strickland, Lee S.

    2002-01-01

    Provides an update of new court cases related to Part IV of the series on Information and the War Against Terrorism. Discusses civil liberties versus security involving the legality of mandatory commercial use of biometrics as identification; and communication of privileged information between a person and his or her attorney. (LRW)

  20. Detecting Terrorism Incidence Type from News Summary

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2012-01-01

    The paper presents the experiments to detect terrorism incidence type from news summary data. We have applied classification techniques on news summary data to analyze the incidence and detect the type of incidence. A number of experiments are conducted using various classification algorithms...... and results show that a simple decision tree classifier can learn incidence type with satisfactory results from news data....

  1. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  2. The Cost of Biological Terrorism.

    Science.gov (United States)

    Coffey

    1997-01-01

    Most Americans are or will be facing a threat more real than crimes or terrorism-it is the threat of cancer. Indeed, one-fourth of all Americans alive today will ultimately die from cancer. Yet the level of funding for cancer research in 1998 and beyond remains in doubt. The Senate Appropriations Committee has proposed a higher funding figure than the House and the difference will be resolved in negotiations this September. President Clinton has recommended a meager 2.5% increase in spending on cancer. This sum is simply not enough. Although Americans may fool themselves into thinking the government has been at war against cancer, the current funding ceiling for the National Institutes of Health (NIH) budget demonstrates that this so-called offensive is little more than a skirmish. Careful scrutiny of this budget reveals that every time a citizen pays ten dollars in taxes, only one penny goes to cancer research. What the government is spending in cancer research would not buy or maintain two stealth bombers-hardly evidence of a major military strike. For those of us fighting the deadly scourge of cancer, the 1,550 Americans killed each day by this disease are painful and enduring casualties. Imagine five fully loaded jumbo jets crashing with no survivors on the same day. These headlines would generate fast and effective calls for funding for improved safety regulations, and yet cancer takes this number of lives daily-and in one year more lives than all the U.S. combat fatalities in this century. And yet there is a virtual silence as Congress meets to determine the level of monies to direct to cancer research efforts which might halt this carnage. In the past, medical research stopped the horrors of pain associated with amputations and operations conducted without anesthesia, and research stopped the epidemic of polio and the massive deaths from typhoid fever. Soon research will stop the deaths from AIDS. Will cancer be prevented or cured within your lifetime? It

  3. Personal experience in professional narratives: the role of helpers' families in their work with terror victims.

    Science.gov (United States)

    Shamai, Michal

    2005-06-01

    This article describes research on the narratives of social workers who help terror victims, focusing on the relationship between the helpers' families and their work. Qualitative analysis of three training groups of social workers who are responsible for helping in the event of terror attacks in different parts of Israel, and of three debriefing groups for social workers after terror attacks, reveals that the helpers' families play a role in the narratives constructed by the helpers. Two main themes were identified. The first centers on the interaction between work and the family, and shows that in the situation of a terror attack, the conflict between the two disappears and the family often serves as a support system for the helpers. The second theme refers to the family dimension alone, and focuses on the dichotomy between vitality and loss. The way that family life events affect helpers'professional intervention is described. The findings are discussed in light of Conservation of Resources Theory, the fight-flight response to threat, and the concept of the family as a source of safety and risk taking.

  4. Terrorism--a (self) love story: redirecting the significance quest can end violence.

    Science.gov (United States)

    Kruglanski, Arie W; Bélanger, Jocelyn J; Gelfand, Michele; Gunaratna, Rohan; Hettiarachchi, Malkanthi; Reinares, Fernando; Orehek, Edward; Sasota, Jo; Sharvit, Keren

    2013-10-01

    Jean-Jacques Rousseau's concepts of self-love (amour propre) and love of self (amour de soi même) are applied to the psychology of terrorism. Self-love is concern with one's image in the eyes of respected others, members of one's group. It denotes one's feeling of personal significance, the sense that one's life has meaning in accordance with the values of one's society. Love of self, in contrast, is individualistic concern with self-preservation, comfort, safety, and the survival of self and loved ones. We suggest that self-love defines a motivational force that when awakened arouses the goal of a significance quest. When a group perceives itself in conflict with dangerous detractors, its ideology may prescribe violence and terrorism against the enemy as a means of significance gain that gratifies self-love concerns. This may involve sacrificing one's self-preservation goals, encapsulated in Rousseau's concept of love of self. The foregoing notions afford the integration of diverse quantitative and qualitative findings on individuals' road to terrorism and back. Understanding the significance quest and the conditions of its constructive fulfillment may be crucial to reversing the current tide of global terrorism. PsycINFO Database Record (c) 2013 APA, all rights reserved

  5. Alert but less alarmed: a pooled analysis of terrorism threat perception in Australia

    Directory of Open Access Journals (Sweden)

    Barr Margo

    2011-10-01

    Full Text Available Abstract Background Previous Australian research has highlighted disparities in community perceptions of the threat posed by terrorism. A study with a large sample size is needed to examine reported concerns and anticipated responses of community sub-groups and to determine their consistency with existing Australian and international findings. Methods Representative samples of New South Wales (NSW adults completed terrorism perception questions as part of computer assisted telephone interviews (CATI in 2007 (N = 2081 and 2010 (N = 2038. Responses were weighted against the NSW population. Data sets from the two surveys were pooled and multivariate multilevel analyses conducted to identify health and socio-demographic factors associated with higher perceived risk of terrorism and evacuation response intentions, and to examine changes over time. Results In comparison with 2007, Australians in 2010 were significantly more likely to believe that a terrorist attack would occur in Australia (Adjusted Odd Ratios (AOR = 1.24, 95%CI:1.06-1.45 but felt less concerned that they would be directly affected by such an incident (AOR = 0.65, 95%CI:0.55-0.75. Higher perceived risk of terrorism and related changes in living were associated with middle age, female gender, lower education and higher reported psychological distress. Australians of migrant background reported significantly lower likelihood of terrorism (AOR = 0.52, 95%CI:0.39-0.70 but significantly higher concern that they would be personally affected by such an incident (AOR = 1.57, 95%CI:1.21-2.04 and having made changes in the way they live due to this threat (AOR = 2.47, 95%CI:1.88-3.25. Willingness to evacuate homes and public places in response to potential incidents increased significantly between 2007 and 2010 (AOR = 1.53, 95%CI:1.33-1.76. Conclusion While an increased proportion of Australians believe that the national threat of terrorism remains high, concern about being personally affected

  6. Review and expectations of terror attack emergency rescue

    Directory of Open Access Journals (Sweden)

    De-wen WANG

    2012-03-01

    Full Text Available Ten years of anti-terror struggle since the 9/11 event has indicated adequately that terrorism is a global problem and international danger. Likewise, anti-terror emergency rescue is also an important task which will influence the safety and benefit of every country all over the world. This paper reviews the main progress and result of international anti-terror struggle in the last ten years, and also introduces the new characteristic of the international anti-terror activity. Besides that, this paper also brings forward the further consideration about the anti-terror emergency medical rescue and the researches remaining to be carried out. The latter includes: (1 to further perfect the high-efficient medical rescue command organization; (2 to further perfect the emergency medical rescue prearranged scheme; (3 to further perfect the construction of rescue system and rescue base after various types of terror attack; (4 to further promote the anti-terror consciousness in the public, and pay more attention to the prevention and investigation of the psychological disaster; (5 to further carry out the basic investigation on emergency medical rescue after various terror attack injuries (for example the types and characteristics of new injuries, pathophysiology and prevention and treatment of stress-psychological effect induced by terror attack, new high-efficient medical rescue measure and equipments, and so on.

  7. Revisiting the Contagion Hypothesis: Terrorism, News Coverage, and Copycat Attacks

    Directory of Open Access Journals (Sweden)

    Brigitte L. Nacos

    2010-11-01

    Full Text Available Contagion refers here to a form of copycat crime, whereby violence-prone individuals and groups imitate forms of (political violence attractive to them, based on examples usually popularized by mass media. In the late 1960s and early 1970s, for instance, Palestinian terrorists staged a number of spectacular hijackings of commercial airliners, exploited the often prolonged hostage situations to win massive news coverage for their political grievances, and appeared to inspire other groups to follow their example. Although terrorism scholars, government officials, and journalists have pondered the question of mass-mediated contagion for decades, they have arrived at different conclusions. Because of significant advances in communication and information technology, and changes in the global media landscape during the last decade or so, this article reconsiders arguments surrounding contagion theories and contends that various types of media are indeed important carriers of the virus of hate and political violence. 

  8. 75 FR 18850 - National Protection and Programs Directorate; Chemical Facility Anti-Terrorism Standards...

    Science.gov (United States)

    2010-04-13

    ... Directorate; Chemical Facility Anti-Terrorism Standards Personnel Surety Program AGENCY: National Protection...-terrorism Vulnerability Information (CVI), Sensitive Security Information (SSI), or Protected Critical... . SUPPLEMENTARY INFORMATION: Program Description The Chemical Facility Anti-Terrorism Standards (CFATS), 6 CFR...

  9. 75 FR 30106 - Terrorism Risk Insurance Program; Recordkeeping Requirements for Insurers Compensated Under the...

    Science.gov (United States)

    2010-05-28

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Recordkeeping Requirements for... Budget. The Terrorism Risk Insurance Program Office within the Department of the Treasury is soliciting... original and two copies) to: Terrorism Risk Insurance Program, Public Comment Record, Suite 2100...

  10. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  11. Terrorism as Genocide: Killing with “Intent”

    Directory of Open Access Journals (Sweden)

    Ashlie Perry

    2012-07-01

    Full Text Available It is plausible that terrorism can manifest itself as a form of genocide. Using Raphael Lemkin’s definition of genocide and the UN Genocide Convention’s definition of genocide, non-state and state terrorism are assessed as a form of genocide. Commonalities found in the definitions of both genocide and terrorism supports the argument. The psychology of terrorism and Lemkin’s psychology of genocide describe similar motivations of perpetrators. The September 11th attacks and the U.S. invasion of Iraq are used as case studies to illustrate that terrorism can result in genocide or genocidal acts. Framing acts of terrorism as genocide allows for prosecution in international courts and brings a new perspective to the concept of killing with intent.

  12. A Fear Management Approach to Counter-Terrorism

    Directory of Open Access Journals (Sweden)

    Tinka Veldhuis

    2012-02-01

    Full Text Available Spreading fear is the essence of terrorism. Terrorists exploit fear by terrorising the target audience into concessions. Understanding how feelings of fear influence the way people feel, think and act is therefore an important starting point to explore how individuals and societies can learn how to cope with fear of terrorism. In this Policy Brief, Research Fellows Prof. Dr. Edwin Bakker and Dr. Tinka Veldhuis explore the dynamics of fear in response to terrorism, and emphasise the importance of integrating initiatives to manage fear of terrorism and reduce its negative consequences into overarching counter-terrorism strategies. It argues that societies can benefit greatly from promoting resilience and a fear management approach to counter-terrorism.

  13. Terrorism Research Centres: 100 Institutes, Programs and Organisations in the Field of Terrorism, Counter-Terrorism, Radicalisation and Asymmetric Warfare Studies

    Directory of Open Access Journals (Sweden)

    Benjamin Freedman

    2010-12-01

    Full Text Available Who is doing research – academic and otherwise – on terrorism? The field of terrorism research is broad and ever-expanding. Governments sponsor intelligence-driven analytical research agencies. Commercial intelligence firms like Jane’s, sell their research to corporate and governmental clients. There are think tanks likeRAND, which work closely with government agencies. An increasing number of universities house terrorism research centres, the oldest one being the Centre for the Study of Terrorism and Political Violence at the University of St. Andrews. Then there are virtual networks, such as the Terrorism Research Initiative (TRI, that try to create synergies between a wide array of researchers and topics.

  14. 15 CFR 742.10 - Anti-terrorism: Sudan.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Sudan. 742.10 Section...-CCL BASED CONTROLS § 742.10 Anti-terrorism: Sudan. (a) License requirements. (1) If AT column 1 or AT... ECCN, a license is required for export to Sudan for anti-terrorism purposes. 1 AT column 1 refers to...

  15. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  16. On the origin of domestic and international terrorism

    OpenAIRE

    Kis-Katos, Krisztina; Liebert, Helge; Schulze, Günther G.

    2010-01-01

    We analyze the determinants of the origin of domestic and international terrorism in a large panel data set of 159 countries spanning from 1970 to 2007. We show that terror increases with GDP per capita, a higher POLITY score measuring a more open and competitive political system and experiences of domestic conflict, anarchy and regime transitions. Our evidence thus contradicts the notion that terrorism is rooted in economic deprivation or that strongly autocratic regimes breed more terrorist...

  17. Systems Approach to Terrorism: Countering the Terrorist Training Subsystem

    Science.gov (United States)

    2006-12-01

    37 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich, (Washington D.C.: Woodrow...52 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich (Washington D.C.: Woodrow Wilson Center...Hitler?” in Mass Hate: the Global Rise of Genocide and Terror (New York , London: Plennium Press), p.165 55 Albert Bandura p.45 56 Ibid. 32 As

  18. Lone-actor Terrorism and Impulsivity.

    Science.gov (United States)

    Meloy, J Reid; Pollard, Jeffrey W

    2017-11-01

    In some recent cases of lone-actor terrorism, there is evidence the subject acted impulsively, often in response to a triggering event which contained a loss and humiliation. Evidence suggests the subjects acted precipitously, despite planning and preparation carried out in the preceding weeks or months, and their attacks failed to include the often considerable preparation that had been done. The pathway became a runway. The authors recommend the traditional assessment of impulsivity in persons of concern for lone acts of terrorism, as well as other proximal warning behaviors for targeted violence. Both indirect and direct assessment guidelines are proposed, with an emphasis upon self-report, psychological testing, collateral data gathering, and historical records. © 2017 American Academy of Forensic Sciences.

  19. Mortise terrorism on the main pipelines

    Science.gov (United States)

    Komarov, V. A.; Nigrey, N. N.; Bronnikov, D. A.; Nigrey, A. A.

    2018-01-01

    The research aim of the work is to analyze the effectiveness of the methods of physical protection of main pipelines proposed in the article from the "mortise terrorism" A mathematical model has been developed that made it possible to predict the dynamics of "mortise terrorism" in the short term. An analysis of the effectiveness of physical protection methods proposed in the article to prevent unauthorized impacts on the objects under investigation is given. A variant of a video analytics system has been developed that allows detecting violators with recognition of the types of work they perform at a distance of 150 meters in conditions of complex natural backgrounds and precipitation. Probability of detection is 0.959.

  20. Psychological consequences caused by nuclear terrorism

    International Nuclear Information System (INIS)

    Peyankov, I.

    2009-01-01

    The psychological consequences caused by eventual nuclear terrorist act are believed to be some of the most: serious. in this article are presented the issues concerning psychological effects as psychological suffering, alteration of risk estimation, changes of individual and social behavior, etc. The most common psychological consequences as a result of the most popular large-scale nuclear accidents in Chernobyl, TMI (USA), Goiania (Brazil) are described. Some of the main factors, such as sex, age, health status, social status and etc, are analyzed. These factors determine the expression of psychological reactions provoked by nuclear accidents or eventual act of nuclear terrorism. In addition, the main precautions to cope with psychological consequences caused by nuclear terrorism are listed

  1. Children exposed to war/terrorism.

    Science.gov (United States)

    Shaw, Jon A

    2003-12-01

    This paper reviews the prevalence of psychological morbidities in children who have been exposed to war-related traumas or terrorism as well as the diversity of war-related casualties and their associated psychological responses. The psychological responses to war-related stressors are categorized as (1) little or no reaction, (2) acute emotional and behavioral effects, and (3) long-term effects. Specific categories of war-related casualties discussed include refugee status, traumatic bereavement, effects of parental absence, and child soldiers. Psychological responses associated with terrorism and bioterrorism are presented. Lastly, mediators of the psychological response to war-related stressors are discussed, to include exposure effects, gender effects, parental, family and social factors, and child-specific factors. Children exposed to war-related stressors experience a spectrum of psychological morbidities including posttraumatic stress symptomatology, mood disorders, externalizing and disruptive behaviors, and somatic symptoms determined by exposure dose effect. Specific questions for future research are identified.

  2. The psychological effects of cyber terrorism

    OpenAIRE

    Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

  3. Reconceptualizing the Global War on Terror

    Science.gov (United States)

    2009-03-26

    when the label war is assigned, the population logically applies, either consciously or subconsciously , the fundamental assumptions of warfare in a...the Nation.” 26 42 Pace, National Military Strategic Plan for the War on Terrorism, 7. 43 Robert Gates, “A Balanced Strategy: Reprogramming the...Balanced Strategy: Reprogramming the Pentagon for a New Age.” 48 Clark A. Murdock et al., Beyond Goldwater-Nichols: Defense Reform for a New Strategic

  4. Terror? Tilkald pædagogikken!

    DEFF Research Database (Denmark)

    Holm, Claus

    2016-01-01

    Har vi at gøre med terror, radikalisering og voldelig ekstremisme, så tilkalder vi politiet. Men politiets metoder er ikke nok. Pædagogikken må i brug. Hvilken pædagogik? Diskontinuitetens pædagogik! Det er navnet på den type af pædagogik, der kan skabe modstandskraft mod radikalisering. Men har vi...

  5. The psychological effects of cyber terrorism

    Science.gov (United States)

    Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism. PMID:28366962

  6. Prevent: A Fragmented Counter-Terrorism Strategy

    Science.gov (United States)

    2015-05-21

    ethnicity, religion, class, gender , language, accent, dress, political ideology or any combination of these factors may serve to delineate the sub...against another. Lack of parity in resourcing compounds the issue of a community that is securitize in nature. Complex adaptive systems theory... Parity in emphasis would not only garnish a greater level of community trust for all forms of terrorism, but it would deemphasize the need of the current

  7. Nurturer, Victim, Seductress: Gendered Roles in Terrorism

    Science.gov (United States)

    2018-04-20

    Becomes Her: The Changing Roles of Women’s Role in Terror." Georgetown Journal of International Affairs, Winter/Spring 2010: 91-98. ———. Dying to Kill...ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION . REPORT NUMBER Joint Forces Staff College Joint Advanced Warflghting School 7800 Hampton Blvd...STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL Nurturer, Victim, Seductress: Gendered Roles in

  8. The psychological effects of cyber terrorism.

    Science.gov (United States)

    Gross, Michael L; Canetti, Daphna; Vashdi, Dana R

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

  9. Airpower versus Terrorism: Three Case Studies

    Science.gov (United States)

    2007-03-01

    Equipment includes 45 armoured personnel carriers (APC) one Lockheed Jetstar, two Mi-8s, two Mi-17s, and roughly 40,000 small arms. These include automatic...President George Bush is acting against terrorism. We will act the same way.”127 Sensing his ability to play the underdog , Arafat claimed early...tinians as the weak and downtrodden underdog . Thus, the image of the powerful IDF being used against poorly armed Palestinians is a powerful

  10. Universal patterns underlying ongoing wars and terrorism

    OpenAIRE

    Spagat, M; Johnson, N. F; Restrepo, J. A; Becerra, O; Bohórquez, J. C; Restrepo, E. M; Zarama, R

    2006-01-01

    we report a remarkable universality in the patterns of violence in three high profile ongoing wars, and in global terrorism. Our results suggest that these quite different conflict arenas currently feature a common type of enemy, i.e. the various insurgent forces are beginning to operate in a similar way regardles of their underlying idealogies, motivations and the terrain in which they operate. We provide a microscopic theory to explain our main observations. This theory treats the insurgent...

  11. Designating Domestic Terrorist Individuals or Groups

    Science.gov (United States)

    2010-09-01

    These individuals and groups include the Black Panther Party, Weather Underground, Covenant Sword and the Arm of the Lord, Ku Klux Klan, Earth...based and left wing and right wing groups such as the Covenant Sword and the Arm of the Lord, Ku Klux Klan, Black Panther Party, and the Weather...TERMS Watch list, domestic terrorism, validation, designation, domestic terrorism organization, material support, domestic surveillance, SHAC, animal

  12. Estimation of Radiological Terrorism Risk by Administrative Districts

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Suk Hoon; Kim, Ju Youl [Seoul National Univ., Seoul (Korea, Republic of); Yoo, Ho Sik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2008-10-15

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks.

  13. How to fight terrorism? Political and strategic aspects.

    Science.gov (United States)

    Vad, Erich

    2018-04-01

    "Fighting terrorism is like eating soup with a fork" (Shimon Peres). Peres's quote symbolically captures the key problem of countering terrorism. 9/11 proved to be a hallmark in the global perception of modern terrorism. The following questions form the framework of the present essay: What is the essence of modern terrorism? How did it develop during the past two decades? Who are the key players within the terror framework? What are the root causes for global terrorism? How are we to deal appropriately with the global phenomenon of terrorism? Are there any solutions (short-, medium-, long-term) to terrorism? If yes, where do we have to look for them? The underlying essay provides a strategic overview of antiterrorism policy that is based on the author's years-long experience as a high-level expert and advisor within the security policy framework. For this reason, citations are expressly not included. The key target audience comprises laypersons interested in the phenomenon of global terrorism and its social interplay.

  14. Estimation of Radiological Terrorism Risk by Administrative Districts

    International Nuclear Information System (INIS)

    Kim, Suk Hoon; Kim, Ju Youl; Yoo, Ho Sik

    2008-01-01

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks

  15. Future Roles of Air and Space Power in Combatting Terrorism

    National Research Council Canada - National Science Library

    McAlpine, Mark

    1997-01-01

    .... The political, economic, and informational instruments of power play primary roles in addressing and eliminating the root causes behind terrorism attacks, but the military instrument will prevent...

  16. The Recruitment and Radicalisation of Western Citizens: Does Ostracism Have a Role in Homegrown Terrorism?

    Directory of Open Access Journals (Sweden)

    Holly Mellisa Knapton

    2014-03-01

    Full Text Available Humans have a consuming desire for social interaction. Consequently, if a member is ostracised from a group, this can have huge implications for their well-being. Once ostracised, individuals may try to fortify their social needs by seeking out accepting groups. Research suggests that this makes individuals prone to social influence and joining negative groups. This paper evaluates current ostracism research, and discusses its implications with regard to identity and the radicalisation process. The aim was to highlight the risk factors that arose from the societal exclusion of Muslims through Islamophobia following 9/11, and the increase in homegrown terrorism with regards to ostracism research. It concludes that future research and counter-terrorism strategies must consider ostracism as a factor in the radicalisation process.

  17. Responding to nuclear terrorism. Chapter 3. Combating radiological terrorism - A multi-faceted challenge

    International Nuclear Information System (INIS)

    Wolf, A.; Yaar, I.

    2006-01-01

    In the twentieth century, radioactive sources have become extensively used in everyday life. These sources, in the hand of terror organizations, can become a threat to the security of civilized nations, causing severe disruption to normal life. On of the main challenges of the civilized world is to keep ahead of the terrorist organizations and take appropriate preventive measures in order to prevent and reduce to minimum the impact of their actions. In order to succeed, a joint and comprehensive effort has to be undertaken to address the scientific, technological, organizational, sociological, psychological and educational aspects of the radiological terrorism threat. In this paper, some of the main activities required for preventing radiological terror events, and the way in which a modular response plan can be prepared are discussed

  18. Body and Terror: Women’s Bodies as Victims and Perpetrators of Terror

    Directory of Open Access Journals (Sweden)

    Parvin Sultana

    2014-07-01

    Full Text Available Bodies are vulnerable because they are intrinsically linked to death. Bodies are social and they are embedded with meaning. They cannot be extracted from their specific contexts. The nation is also often equated with body politic. As a result individual bodies become the site of security/ insecurity depending on the social location of bodies. Within this discourse, this article tries to locate the bodies of women. It will look at the bodies of women as victims of terror as well as perpetrators of terror. It will try to understand if in these differentiated roles, women are able to break away from stereotypes or are still caught in heteronormative narratives. Keywords: Body, Suicide Bombers, Victims, Ethnic Conflict, Terrorism.

  19. The Revised Academic Consensus Definition of Terrorism

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2012-05-01

    Full Text Available Terrorism is a contested concept. While there are many national and regional definitions, there is no universal legal definition approved by the General Assembly of the United Nations (the one proposed by the Security Council in Res. 1566 (2004 is non-binding, lacking legal authority in international law. The Ad Hoc Committee on Terrorism of the 6th (legal Committee of the General Assembly has, with some interruptions, been trying to reach a legal definition since 1972 - but in vain. In the absence of a legal definition, attempts have been made since the 1980s to reach agreement on an academic consensus definition. The latest outcome is the revised definition reprinted below. It is the result of three rounds of consultations among academics and other professionals. A description how it was arrived at can be found on pp. 39 - 98 of Alex P. Schmid (Ed.. The Routledge Handbook of Terrorism Research. London and New York: Routledge, 2011. The same volume also contains 260 other definitions compiled by Joseph J. Easson and Alex P. Schmid on pp. 99 -200.

  20. Integration of Social Sciences in Terrorism Modelling: Issues, Problems and Recommendations

    National Research Council Canada - National Science Library

    Resnyansky, L

    2007-01-01

    ...; terrorists behaviour; the structure of terrorist organisations and networks; terrorism threat; and influence strategies and actions directed towards terrorism threat anticipation and minimisation.

  1. Combatting Domestic Terrorism: A Strategic Approach for the Twenty-First Century

    National Research Council Canada - National Science Library

    Sienrukos, John

    1999-01-01

    .... In order to reach sound, strategic recommendations for combating terrorism, the author will begin with some background on terrorism, review the various definitions as defined by the Department...

  2. Terrorism as a slap in the face of the civilized world

    Directory of Open Access Journals (Sweden)

    I Šubrt

    2016-12-01

    Full Text Available The article summarizes the key scientific approaches to the study of terror in the contemporary world focusing on the concepts of (demodernization, (decivilization, and the revival of religious movements with rational economic aims under the slogans of “just war” or “cosmic war” with the forces of evil. The author starts from Norbert Elias’ work on the civilization process and the formation of the modern state as a pacified society to underline that the problem of violence lies outside Elias’ scope, and demonstrate the existing approaches to supplementing his theory with (a the definition of decivilization trends and the criteria for the identification of decivilization processes; (b the description of the role and place of brutal violence in modern society; (c a comprehensive but also heterogeneous picture of terrorism, especially suicide terrorism, i.e. its causes, manifestations and consequences. The author agrees with S.P. Huntington, that we live in a world with an increased risk of conflicts between civilizations and cultural strains rooting in the religious tradition (the re-politicization of religion and religious nationalism are considered attempts to fuse traditional religion with modern politics. Thus, the author concludes that the contemporary terrorism and especially its suicidal form is not only a specific form of (political struggle, but also - metaphorically speaking - a “slap in the face” of the civilized Western world, an effort to challenge, shake and undermine the stability and the patterns of life in modern society. However, terrorism wants to influence not only the power system of society, but also the collective psyche of large groups and parts of the population to create a sort of theatre of horror with the rationally designed, staged and performed means of violence.

  3. Terrorism in the Maritime Domain

    Science.gov (United States)

    2013-03-01

    system of systems model is then presented. Terrorist groups are characterized by their hierarchical pyramid structure. There are certain terrorist...Terrorist groups are typically characterized by their hierarchical pyramid structure and utilized a centralized command system. However, there are notable...hijacked the Italian cruise ship near Egypt . The terrorists ordered the ship to sail to the port of Tartus in Syria. In return for the 97 passengers

  4. European nuclear safeguards and terrorism: a personal perspective

    International Nuclear Information System (INIS)

    Jacchia, E.

    1987-01-01

    This analysis is divided into two parts that, in the authors view, deal with two fundamentally different types of terrorism: national and state sponsored. The information is drawn from his experience and recollections of data and events. In terms of potential access to nuclear and chemical materials, the most dangerous possibility is the state-sponsored terrorist group, and it poses a difficult situation. The sponsor state may or may not be a member of the NPT and may or may not have accepted IAEA safeguards. Even if it had accepted them, given the technical and political limitations on the agency's activities, it is almost impossible for the IAEA to guarantee that illegal transfers do not occur

  5. Investigation of incidents of terrorism involving commercial aircraft.

    Science.gov (United States)

    Clark, M A; Wagner, G N; Wright, D G; Ruehle, C J; McDonnell, E W

    1989-07-01

    Deaths resulting from terrorism involving aircraft have occurred incident to hijackings as well as bombings. Passengers or groups of passengers have been chosen by terrorists as the recipients of violence based on citizenship, religion, and political beliefs. They have usually been segregated from other passengers and subsequently mistreated and/or murdered. Thorough documentation of the injuries of victims is essential to the investigation of such atrocities; a medicolegal autopsy correlated with a scene investigation is of paramount importance. Aircraft bombings can create extremely sensitive political situations and public demands for quick resolution. The autopsy of victims in such circumstances, if properly conducted, can yield invaluable trace evidence leading to the identification of the explosive device. The examination of any surviving victims as well as the aircraft is also critical in reconstructing the event. Deaths occurring as the result of in-flight aircraft bombings can produce injuries by five different mechanisms, viz. blast, shrapnel, decompression, impact with the aircraft, and ground impact.

  6. FINANCING TERRORISM: FROM OFFSHORE COMPANIES TO THE CHARITY PARADOX

    Directory of Open Access Journals (Sweden)

    Irina IONESCU

    2015-06-01

    Full Text Available The world is currently living to its edges, menaced at each corner by environmental changes, terrorist attacks, civil wars or biological weapons let loose. With the emerging of the Islamic State and other terrorist cells the entire world under the peaceful globalization sphere questions its security. The paper aims to focus on detailing the most modern ways of financing terrorism, including through tax haven offshore companies, and the charity paradox. Charity institutions, several banks and even Non-Profit Organizations go hand in hand with a full range of felonies, from money laundering to narcotic traffic, humans trafficking, organized crime, arms dealing and terrorist attacks. The paper aims to offer pertinent solutions to tax havens and light legislation in order to prevent terrorist groups and cells from becoming an extensively rich and potent menace to global and state security.

  7. Review of decontamination technologies for chemical counter-terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Volchek, K.; Boudreau, L.; Hornof, M. [SAIC Canada, Ottawa, ON (Canada); Fingas, M.F.; Gamble, R.L. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Div]|[Environment Canada, Ottawa, ON (Canada). River Road Environmental Technology Centre

    2004-07-01

    The two categories of chemical agents that could be used in acts of chemical terrorism are conventional chemical warfare agents and commercial toxic chemicals. Industrial chemicals are easier to access than warfare agents, and must therefore be considered when evaluating decontamination techniques. This study involved a search of public-domain documents to identify decontamination technologies including: physical/mechanical treatment or removal; chemical treatment; and, biological methods including natural degradation and attenuation. The technologies were analyzed with reference to their effectiveness for specific groups of chemical agents, state of development, availability and costs. Results indicate that there are many decontamination methods available, both developed and under development, that work effectively for most agents. The two most common decontamination methods are oxidation and alkali hydrolysis followed by dehalogenation. Technology limitations and gaps were also identified, suggesting a need for more research to further the development of promising processes. 31 refs., 2 tabs.

  8. Study on embodied CO2 transfer between the Jing-Jin-Ji region and other regions in China: a quantification using an interregional input-output model.

    Science.gov (United States)

    Chen, Mengmeng; Wu, Sanmang; Lei, Yalin; Li, Shantong

    2018-03-08

    Jing-Jin-Ji region (i.e., Beijing, Tianjin, and Hebei) is China's key development region, but it is also the leading and most serious air pollution region in China. High fossil fuel consumption is the major source of both carbon dioxide (CO 2 ) emissions and air pollutants. Therefore, it is important to reveal the source of CO 2 emissions to control the air pollution in the Jing-Jin-Ji region. In this study, an interregional input-output model was applied to quantitatively estimate the embodied CO 2 transfer between Jing-Jin-Ji region and other region in China using China's interregional input-output data in 2010. The results indicated that there was a significant difference in the production-based CO 2 emissions in China, and furthermore, the Jing-Jin-Ji region and its surrounding regions were the main regions of the production-based CO 2 emissions in China. Hebei Province exported a large amount of embodied CO 2 to meet the investment, consumption, and export demands of Beijing and Tianjin. The Jing-Jin-Ji regions exported a great deal of embodied CO 2 to the coastal provinces of southeast China and imported it from neighboring provinces.

  9. Terrorism in Indo-Pak nuclear energy sector

    International Nuclear Information System (INIS)

    Varma, R.

    2005-01-01

    Full text: Issue of terrorism, militancy and nuclear security of South Asia evokes a lot of concern not only to South-Asians but also to the larger world. The most difficult problem in relations between India and Pakistan since partition in August 1947 has been their dispute over Kashmir. A summary of root cause analysis has been presented in the paper. Nuclear terrorism, should it emerge, could prove the final destruction of sanity in South Asia. Widespread availability of radioactive materials worldwide makes threat of radiological terrorism plausible. Terrorist groups are trying to strangulate and talibanize Pakistan, sucking it into vortex of failed states, nuclear banana republics with their praetorian culture, and a whole new category of 'North Koreas' in the central Asian region. This would be highly unstable, as these rabid adventurous states would pose extreme risks to the neighboring states in the future. Two case studies have been presented in the paper, estimating horrifying future of the unfolding story, with visions of a nuclear attack on energy sectors at Mumbai in India, and Karachi in Pakistan; may be a crude bomb or a radiological dispersal devices. The statistical consequences of the strike are horrifying to say the least. Methodology of preventing such a happening has been worked out with deep analysis of society and bringing out remedial measures. Methodology of conflict management has been discussed at length. With suggestive organization, its relevance modus operandi, role and limitations. There is a great need to think rationally, indeed, compassionately and charitably. The resumption of serious, high-level dialogue provides an opening for Indian and Pakistani leaders to depart from scripts that reduce room for diplomatic manoeuvre. Given the multiplicity of targets and terrorist scenarios, India and Pakistan need to be persuaded that nuclear weapons make the world a more dangerous, not a safer, place and to take a step back and realize that

  10. Country Reports on Terrorism 2009

    Science.gov (United States)

    2010-08-01

    by stronger government responses. Ecuador and Panama have responded with a mix of containment and non-confrontation with Colombian narco-terrorist...Spanish government officials, security and military forces, politicians, and judicial figures, but the group also targeted journalists and tourist areas...Dominican Republic Ecuador El Salvador Guatemala Haiti Honduras Jamaica Mexico Nicaragua Panama Paraguay Peru Suriname Trinidad and

  11. Country Reports on Terrorism 2005

    Science.gov (United States)

    2006-04-01

    Purpose Islamic Regiment (SPIR) Tunisian Combatant Group (TCG) Tupac Amaru Revolutionary Movement (MRTA) Turkish Hizballah Ulster Defense...Francisco "Pacho" Cortez, to trial. Bolivian authorities nevertheless arrested Tupac Amaru Revolutionary Movement (MRTA) member Aida Ochoa in La Paz...Army. Authorities arrested 143 suspected SL and Tupac Amaru Revolutionary Movement (MRTA) members, including SL leader Toribio Castaneda Quijano

  12. Research on Park Ji-Won in China%朴趾源研究在中国

    Institute of Scientific and Technical Information of China (English)

    张丽娜

    2012-01-01

    朴趾源研究是韩国古典文学研究的一个热点和重点。总体上看,研究队伍中名家济济,以汉文形式发表的研究成果较多。学界对朴趾源的研究主要集中在其思想、小说创作上,《热河日记》是研究的一个焦点。对于朴趾源诗歌、散文和《燕岩集》的整体研究有所欠缺,全面、系统、客观地研究评价朴趾源在韩国文学史、思想史上的地位的专著尚未出现。%Research on Park Ji-Won is a key and hit of Korean classical literature. On the whole, there are many famous experts in the field and lots of research achievements in Chinese. Academic studies focus on his ideas and novels, of which ReHe Diary is a focus. However, an overall study of his poetries, proses and YanYan Collection is not enough. Comprehensive, systematic and objective works have not yet appeared, which study and assess Park Ji -Won's position in the history of Korean literature and intellectual

  13. [Thoughts and methods of study on acupuncture medical history: an example of Mr. MA Ji-Xing].

    Science.gov (United States)

    Yang, Feng; Zhu, Ling

    2014-03-01

    Mr. MA Ji-xing has devoted himself into the study of acupuncture medical history for more than 70 years. As a result, a great work of Zhenjiuxue Tongshi (see text), History of Acupuncture-Moxibustion) has been completed. The author has expensively studied for history of acupuncture medicine in time and space. Base on abundant historical materials, deliberate textual research as well as strategically situated academic view, it is considered as a masterpiece of acupuncture on real significance. It is worthwhile to note that the book has a systematic and profound explanation on Bian-stone therapy, unearthed literature relics of acupuncture, the bronze figure or illustration of acupoint as well as special topics of Japan and Korea acupuncture history. Filled several gaps of the field, and explored some significant new paths of study, it laid the groundwork for the profound study and unscramble of traditional acupuncture theory as well as the investigation of the academic history, which is considered to have a profound and persistent influence. The careful sorting and profound digging of many distinguish thoughts and methods of Mr. MA Ji-xing in the study of acupuncture medical history has significant meaning in references and enlightenment of the future research on acupuncture medical history.

  14. International Terrorism in East Africa: The Case of Kenya 1 ...

    African Journals Online (AJOL)

    International terrorism is a significant threat to world peace and security, and as such remains high on the agenda within policy and intelligence circles. In Africa, the notion of terrorism itself can be traced back to anti-colonial struggles whilst the more recent terrorist attacks in Kenya and Tanzania give some indication of the ...

  15. Education, Globalization, and the State in the Age of Terrorism

    Science.gov (United States)

    Peters, Michael A.

    2004-01-01

    Education plays an important role in challenging, combating and in understanding terrorism in its different forms, whether as counter-terrorism or as a form of human rights education. Just as education has played a significant role in the process of nation-building, so education also plays a strong role in the process of empire, globalization and…

  16. Conceptualising Terrorism: International Offence or Domestic Governance Tool?

    DEFF Research Database (Denmark)

    Aksenova, Marina

    2015-01-01

    This article argues that terrorism does not belong within the realm of international criminal law. On the surface, it is the lack of internationally agreed definition of terrorism and its domestic law origins that set it apart from the notions of crimes against humanity, war crimes and genocide...

  17. The Study of Terrorism: An Interdisciplinary Approach for the Classroom.

    Science.gov (United States)

    Kumamoto, Bob

    1993-01-01

    Asserts that terrorism, in its domestic and international forms, is a subject worthy of attention in social studies. Provides a list of causes of terrorism, a list of reasons why the United States is often a terrorist target, and three application lesson ideas. (CFR)

  18. The threat of nuclear terrorism: from analysis to precautionary measures

    International Nuclear Information System (INIS)

    Schneider, M.

    2003-01-01

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  19. The threat of nuclear terrorism: from analysis to precautionary measures

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, M

    2003-07-01

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  20. El cine de terror español

    OpenAIRE

    Gómez Llorente, Tatiana

    2015-01-01

    La autora comienza haciendo un estudio del cine de terror desde sus inicios, sus subgéneros, mecanimos utilizados para provocar el miedo en el espectador para finalmente centrarse en el cine de terror español a través de cinco películas representativas del género.

  1. Terrorism: Supplement to the Second Edition. A Selected Bibliography.

    Science.gov (United States)

    Boston, Guy D.

    The annotated bibliography describes 85 materials related to terrorism which were collected by the National Criminal Reference Service. Although no consensus exists on the definition of terrorism, the term is interpreted in this document to include both illegal and destructive acts against society and governments and violent means undertaken to…

  2. Teaching Guide on International Terrorism: Definitions, Causes, and Responses.

    Science.gov (United States)

    United States Inst. of Peace, Washington, DC.

    Dealing with terrorism has become the centerpiece of United States foreign policy today. Yet terrorism--its definition, causes, and methods of dealing with it--has rarely been dealt with in high school courses. The United States Institute of Peace has developed this 3-lesson plan (for 45-minute class periods) teaching guide, aimed at grades 11 and…

  3. A proposed universal medical and public health definition of terrorism.

    Science.gov (United States)

    Arnold, Jeffrey L; Ortenwall, Per; Birnbaum, Marvin L; Sundnes, Knut Ole; Aggrawal, Anil; Anantharaman, V; Al Musleh, Abdul Wahab; Asai, Yasufumi; Burkle, Frederick M; Chung, Jae Myung; Cruz-Vega, Felipe; Debacker, Michel; Della Corte, Francesco; Delooz, Herman; Dickinson, Garth; Hodgetts, Timothy; Holliman, C James; MacFarlane, Campbell; Rodoplu, Ulkumen; Stok, Edita; Tsai, Ming-Che

    2003-01-01

    The lack of a universally applicable definition of terrorism has confounded the understanding of terrorism since the term was first coined in 18th Century France. Although a myriad of definitions of terrorism have been advanced over the years, virtually all of these definitions have been crisis-centered, frequently reflecting the political perspectives of those who seek to define it. In this article, we deconstruct these previously used definitions of terrorism in order to reconstruct a definition of terrorism that is consequence-centered, medically relevant, and universally harmonized. A universal medical and public health definition of terrorism will facilitate clinical and scientific research, education, and communication about terrorism-related events or disasters. We propose the following universal medical and public definition of terrorism: The intentional use of violence--real or threatened--against one or more non-combatants and/or those services essential for or protective of their health, resulting in adverse health effects in those immediately affected and their community, ranging from a loss of well-being or security to injury, illness, or death.

  4. Lessons from History for Counter- Terrorism Strategic Communications

    NARCIS (Netherlands)

    Ingram, H.J.; Reed, A.G.

    2016-01-01

    Drawing on the Counter-terrorism Strategic Communication (CTSC) Project’s research paper “A Brief History of Propaganda during Conflict“, this Policy Brief lays out the key policy-relevant lessons for developing effective counter-terrorism strategic communications. It presents a framework of

  5. Freedom of expression and the Ethiopian anti-terrorism proclamation

    African Journals Online (AJOL)

    Freedom of expression and the Ethiopian anti-terrorism proclamation: a comparative analysis. ... Though surveillance and interception undermine democracy, a mere suspicion of terrorism gives the National Intelligence and Security Service a power to conduct surveillance or intercept any type of communications.

  6. The Role Of Education In Combating Terrorism | Oni | Journal of ...

    African Journals Online (AJOL)

    2005-06-07

    The world is witnessing series of repeated political, religious conflict and terrorism, particularly worrisome is the acts of terrorism, which is now prevalent across the world. The phenomenon of 9/11/2001 on U.S and the recent attack on June 7, 2005 in London and some other parts of the world revealed the devastation, pains ...

  7. On Terrorism: An Analysis of Terrorism as a Form of Warfare

    Science.gov (United States)

    1987-09-01

    unwitting political terrorists subconsciously reacting to their political and social environment. Given this, it is necessary to subject the...overt political rationale, there are some who would argue that it was, at least subconsciously , a product of sincere political motivations. For example...Isolate 3) Expansion Guerrilla War Physically Isolate 4) Victorious Conventional Physically Destroy 5) Consolidation Terrorism Reprogram Populace 6

  8. Correlation of Concepts "Extremism" and "Terrorism" in Countering the Financing of Terrorism and Extremism

    Science.gov (United States)

    Baisagatova, Diana B.; Kemelbekov, Saken T.; Smagulova, Diana A.; Kozhamberdiyeva, Aigul S.

    2016-01-01

    The main threats to world order are terrorist and extremist activities. On the world stage, countries unite into a coalition with the aim to increase the efficiency of the fight against terrorism. At the local level, the terrorist threat is fought by the security services. In order to prevent global human victims, which may arise as a result of…

  9. “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects

    Directory of Open Access Journals (Sweden)

    Joshua Sinai

    2014-02-01

    Full Text Available This column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by significant publishers (listed in alphabetical order - capsule reviews of 13 important books published by CRC Press. 

  10. The Economics of Terrorism: Economics Methods of Analysis in the Study of Terrorism and Counterterrorism

    Science.gov (United States)

    2010-12-01

    addition to outlining definitions, data sources, choice theory , game theory , and the economic consequences of terrorism, this study identifies how...stratégiques. Les auteurs sont le Maj Alain Rollin, le Maj Meaghan Setter et Mme Rachel Lea Heide, Ph.D., sous la direction du Lcol William Yee...18 7 Choice Theory and its Applications 7.1

  11. Historical Lessons for Our Time : Italy’s Response to the Challenge of Terrorism

    OpenAIRE

    Drake, Richard

    2016-01-01

    During the so-called years of lead, Italy had the highest rate of terrorist violence in the industrialized world. Terrorist groups, descending ideologically from the country’s Marxist-Leninist and neo-fascist traditions, sought to destroy its democratic institutions. They failed. The success of the Italian government in ending this scourge merits careful study, for the lessons that might be gained in learning how we might cope with terrorism today.

  12. Terrorism--A (Self) Love Story: Redirecting the Significance Quest Can End Violence

    Science.gov (United States)

    Kruglanski, Arie W.; Belanger, Jocelyn J.; Gelfand, Michele; Gunaratna, Rohan; Hettiarachchi, Malkanthi; Reinares, Fernando; Orehek, Edward; Sasota, Jo; Sharvit, Keren

    2013-01-01

    Jean-Jacques Rousseau's concepts of self-love ("amour propre") and love of self ("amour de soi meme") are applied to the psychology of terrorism. Self-love is concern with one's image in the eyes of respected others, members of one's group. It denotes one's feeling of personal significance, the sense that…

  13. An Assessment of the Global War on Terrorism, 2001-2010

    Science.gov (United States)

    2010-12-01

    60 Lianne Boudali, “The GSPC: Newest Franchise in Al-Qa’ida’s Global Jihad,” West Point: Combating Terrorism Center, 2007, 8, http...Zaitouni, liquidated the group. At their internal front, in July 1995 the LIFG had to prematurely leave the underground preparation phase and declare...their disputes with the liquidation of their rivals and rose to leadership positions through oppression, betrayal, and murder. Al-mukadam argues

  14. Small Arms Proliferation and Homegrown Terrorism in the Great Lakes Region: Uganda’s Experience

    Science.gov (United States)

    2016-12-01

    in Karamoja was also motivated by the low standard of living there, as the colonial administration and other entrepreneurs expropriated their land...facilitate homegrown terrorism. Because of porous borders that make it easier for potentially disruptive groups to cross into the country, the Act makes it...used by homegrown terrorists and conflicts in the region.209 Conflict entrepreneurs continue to profit from illegal small arms trade taking advantage

  15. Patterns of Global Terrorism 1999

    Science.gov (United States)

    2000-04-01

    subsidiary of Swiss-owned Nestle Multinational. The explosion caused major damage but no injuries. India Official sources reported that unidentified militants... Malaysia , a local Bishop, two UNICEF officials, two local journalists, and 16 Sierra Leonean nationals. No one was injured in the attack. The rebels...one German, one US citizen, and several citizens from Malaysia , Singapore, and Thailand. The group, calling itself the Vigorous Burmese Student

  16. Variance, Violence, and Democracy: A Basic Microeconomic Model of Terrorism

    Directory of Open Access Journals (Sweden)

    John A. Sautter

    2010-01-01

    Full Text Available Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this area have only focused on the relationship between terrorists and the government, or amongst terrorists themselves. Central to the interpretation of the terrorist conflict presented here is the idea that voters (or citizens are also one of the important determinants of how a government will respond to acts of terrorism.

  17. IAEA to hold special session on nuclear terrorism

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA this week for an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. The Special Session, which will bring together experts on nuclear terrorism from around the world, will deal with the following issues: The Psychology of terrorism; Intelligence, police and border protection; Guarding nuclear reactors and material from terrorists and thieves; The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices; The threat of nuclear terrorism: Intentional dispersal of radioactive material - Sabotage of fixed installations or transport systems; The Legal Framework: Treaties and Conventions, Laws; Regulations and Codes of Practice; IAEA Nuclear Security and Safety Programmes

  18. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    Directory of Open Access Journals (Sweden)

    Asadi NEJMAH

    2015-11-01

    Full Text Available The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the extensive publicity its activity gains in public, through electronic and printed media. In terrorism, a blow to the “soft stomach” of the state (civilians is performed, with the purpose of causing the state to give in to the demands of terrorism operators. In the basis of terrorism is also an objection to the basis of legitimacy of the ruling government, in that it is not capable of guarantying the safety of its citizens and maintain public order. This article presents the attitudes and ways of operation of terrorist organizations and how Western intelligence attempts to thwart, foil and prevent these organizations from casing for destruction and victims in human lives and state.COMBATEREA TERORISMULUI ISLAMIC PRIN WESTERN INTELLIGENCE Chiar de la înfiinţare, statul Israel s-a confruntat, în viaţa de zi cu zi, cu organizaţiile teroriste, care urmăresc să-l distrugă. Actele de terorism, aşa cum reiese din sensul originar al cuvântului – frică, anxietate, teroare, sunt menite să implanteze frica în rândul populaţiei, s-o demoralizeze şi să perturbeze viaţa cotidiană. Uneori teroarea se dovedeşte a fi un act de răzbunare. Prin acte de terorism se dă o lovitură la „stomacul moale” al statului, adică civililor. Actele de terorism sunt comise, de asemenea, pentru a „demonstra” lipsa de legitimitate a statului, incapacitatea lui de a asigura securitatea cetăţenilor săi. În articol sunt specificate modalităţile de func

  19. Interprovincial transfer of embodied energy between the Jing-Jin-Ji area and other provinces in China: A quantification using interprovincial input-output model.

    Science.gov (United States)

    Chen, Weiming; Wu, Sanmang; Lei, Yalin; Li, Shantong

    2017-04-15

    Commodity trade between regions implies a large amount of energy transfer. As an important economic growth pole of China, the Jing-Jin-Ji area (Beijing-Tianjin-Hebei) is also one of the areas with the largest energy consumption in China. Moreover, the primary energy consumer goods in this area are fossil fuels, such as coal. This has led to serious air pollution in the area. Therefore, the reduction of energy consumption under the premise of maintaining sustained economic growth is an important task of the Jing-Jin-Ji area. In this study, an interprovincial input-output model was applied to quantitatively estimate the embodied energy transfer between Jing-Jin-Ji area and other provinces in China. The results indicated that the Metal and nonmetal mineral processing industry and the Electrical, gas and water industry in the Jing-Jin-Ji area exported a large amount of embodied energy to the Yangtze River Delta and the Pearl River Delta. However, the embodied energy export of the Jing-Jin-Ji area mainly exported by Hebei province. Beijing and Tianjin even have some net import of embodied energy. The embodied energy transfer between Tianjin, Hebei and other provinces was mainly driven by investment, while the main media of embodied energy transfer between Beijing and other provinces was consumption. Therefore, we suggest that the Jing-Jin-Ji area should further increase the degree of dependence on other provinces' energy-intensive products and reduce the export of energy-intensive products. In addition, there should be difference in the energy and industrial policies among Beijing, Tianjin and Hebei, and the problems of high energy consumption and high proportion of heavy industry in Hebei should be first resolved. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. British torture in the 'war on terror'.

    Science.gov (United States)

    Blakeley, Ruth; Raphael, Sam

    2017-06-01

    Despite long-standing allegations of UK involvement in prisoner abuse during counterterrorism operations as part of the US-led 'war on terror', a consistent narrative emanating from British government officials is that Britain neither uses, condones nor facilitates torture or other cruel, inhuman or degrading treatment and punishment. We argue that such denials are untenable. We have established beyond reasonable doubt that Britain has been deeply involved in post-9/11 prisoner abuse, and we can now provide the most detailed account to date of the depth of this involvement. We argue that it is possible to identify a peculiarly British approach to torture in the 'war on terror', which is particularly well-suited to sustaining a narrative of denial. To explain the nature of UK involvement, we argue that it can be best understood within the context of how law and sovereign power have come to operate during the 'war on terror'. We turn here to the work of Judith Butler, and explore the role of Britain as a 'petty sovereign', operating under the state of exception established by the US executive. UK authorities have not themselves suspended the rule of law so overtly; indeed, they have repeatedly insisted on their commitment to it. Nevertheless, they have been able to construct a rhetorical, legal and policy 'scaffold' that has enabled them to demonstrate at least procedural adherence to human rights norms while, at the same time, allowing UK officials to acquiesce in the arbitrary exercise of sovereignty over individuals who are denied any access to appropriate representation or redress in compliance with the rule of law.

  1. A pilot study of JI-101, an inhibitor of VEGFR-2, PDGFR-β, and EphB4 receptors, in combination with everolimus and as a single agent in an ovarian cancer expansion cohort.

    Science.gov (United States)

    Werner, Theresa L; Wade, Mark L; Agarwal, Neeraj; Boucher, Kenneth; Patel, Jesal; Luebke, Aaron; Sharma, Sunil

    2015-12-01

    JI-101 is an oral multi-kinase inhibitor that targets vascular endothelial growth factor receptor type 2 (VEGFR-2), platelet derived growth factor receptor β (PDGFR-β), and ephrin type-B receptor 4 (EphB4). None of the currently approved angiogenesis inhibitors have been reported to inhibit EphB4, and therefore, JI-101 has a novel mechanism of action. We conducted a pilot trial to assess the pharmacokinetics (PK), tolerability, and efficacy of JI-101 in combination with everolimus in advanced cancers, and pharmacodynamics (PD), tolerability, and efficacy of JI-101 in ovarian cancer. This was the first clinical study assessing anti-tumor activity of JI-101 in a combinatorial regimen. In the PK cohort, four patients received single agent 10 mg everolimus on day 1, 10 mg everolimus and 200 mg JI-101 combination on day 8, and single agent 200 mg JI-101 on day 15. In the PD cohort, eleven patients received single agent JI-101 at 200 mg twice daily for 28 day treatment cycles. JI-101 was well tolerated as a single agent and in combination with everolimus. No serious adverse events were observed. Common adverse events were hypertension, nausea, and abdominal pain. JI-101 increased exposure of everolimus by approximately 22%, suggestive of drug-drug interaction. The majority of patients had stable disease at their first set of restaging scans (two months), although no patients demonstrated a response to the drug per RECIST criteria. The novel mechanism of action of JI-101 is promising in ovarian cancer treatment and further prospective studies of this agent may be pursued in a less refractory patient population or in combination with cytotoxic chemotherapy.

  2. Roots of terrorism: a reassessment after September 11th

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F.

    2002-01-01

    The brutal terrorist attacks of September 11th, the anthrax attacks that followed and growing knowledge of al Qaeda's pursuit of nuclear, biological and chemical weapons have not only intensified concerns about terrorism but also created doubts about our understanding of terrorism. These attacks were in many ways unprecedented, and ultimately raise the question of the roots or causes of terrorism. Historically and today, there have been divergent views on this question, which reflect philosophical, religious, political, sociological and other differences. These differences are not merely academic, as they can affect our understanding of both the threat and of responses to terrorism in the aftermath of September 11th, Terrorism is too complex and diverse a phenomenon to speak easily of causes. But we may be able to discern the causes of specific acts. Our response to 9/11 and other acts of terrorism will be affected by our understanding of their causes. If 9/11 was caused by US Middle East policies, the response must involve a review of these policies. If it is a backlash against globalization, the response must address the realities underlying anti-globalization sentiments. Addressing causes will not in any case end terrorism, and addressing the wrong causes will be counterproductive. Actions to reduce those conditions that create support for terrorism and aid its recruitment, which need to be clearly identified, are critical in any counterterrorism strategy. So we must understand the reasons for terrorism and, in particular, for the attacks of September 11th.T his paper will look at the question of the roots of terrorism and then look to the specific case of 911 and its aftermath, with a special view to the impact of globalization.

  3. IAEA outlines measures to enhance protection against nuclear terrorism

    International Nuclear Information System (INIS)

    2001-01-01

    Mr. ElBaradei, head of the IAEA presented a report today to the Agency's Board of Governors, outlining plans for substantially expanding and strengthening IAEA programmes relevant to improving nuclear security. The report addresses the IAEA's response to the following threats from acts of nuclear terrorism by a subnational group: acquisition of a nuclear weapon; acquisition of nuclear material to construct a nuclear weapon or to cause a radiological hazard; acquisition of other radioactive materials to cause a radiological hazard; and violent acts against nuclear facilities to cause a radiological hazard. The report puts a price tag on its proposed programme upgrades at $30-50 million per year, representing an initial 10-15% increase in the IAEA's overall resources. Additionally, Mr. ElBaradei said the IAEA's budget is currently underfeed by about $40 million due to a budgetary policy over many years of 'zero real growth', and called on Member States to provide the resources required to cope with the newly emerging threat. 'In addition to the resources required for urgent international assistance,' Mr. ElBaradei said, 'the necessary global upgrades to meet the full range of possible threats would be in the range of hundreds of millions of dollars and would have to be carried out by individual States and through bilateral and multilateral assistance'. The IAEA would play a coordinating role in delivering this assistance.If States provide adequate funding, Mr. ElBaradei predicts that the enhanced and additional activities proposed in his report should lead over time to a powerful national and international security framework for nuclear facilities and material. The Summary of Report on 'Protection Against Nuclear Terrorism' presented to the IAEA Board of Governors on 30.11.2001 is attached

  4. The chemical and biological weapon terrorism by the Aum Shnirikyo

    International Nuclear Information System (INIS)

    Furukawa, K.

    2009-01-01

    The Aum Shinrikyo, an obscure cult religious group, attacked the Tokyo subways employing sarin gas in March 1995, which was viewed as a mark of a new era in terrorism. The Aum Shinrikyo remains the one empirical example of a religiously motivated cult with an affluent amount of financial and human resources and motivations to use unconventional weapons. The Aum Shinrikyo's leaders included the scientific elite of a young generation as well as former Yakuza members who had close ties with organized crime networks. Aum succeeded in establishing an extensive network to procure weapons, material, and drug, primarily in Russia but also other countries including the United States and even North Korea. Despite the fact that the law enforcement authority had already obtained various pieces of information that reasonably indicated that Aum was producing sarin by late 1994, the law enforcement authority became too cautious to advance its investigation to arrest Aum members until it was too late. Japan's experience with the Aum Shinrikyo's threats provides valuable insights for democratic governments seeking to thwart the deadly plans of religiously motivated non-state actors. It reveals the tremendous difficulties for a democratic society to confront the terrorists who were willing to pursue their deadly 'divine' objectives, especially when the society had no experience to encounter such a threat. This presentation will explain the chemical and biological weapon programs of the Aum Shinrikyo, especially focusing on the following elements: Intention and capability of the Aum Shinrikyo; Weapon systems and mode of attacks, including their target selections; The lessons learned from this case for the prevention and crisis/consequence management n the event of CBW terrorism. The views expressed here are those of the author and do not represent those of the Research Institute for Science and Technology for Society or its research sponsors.(author)

  5. Terror Operations: Case Studies in Terrorism (U.S. Army TRADOC G2 Handbook No. 1.01)

    Science.gov (United States)

    2007-07-25

    terrorism topics. Unless stated otherwise, masculine nouns or pronouns do not refer exclusively to men. Proponent Statement. Headquarters, U.S. Army...Economic and political disruptions can have profound global consequences. Sources of instability within the region include hegemony , terrorism

  6. Discussing Terrorism: A Pupil-Inspired Guide to UK Counter-Terrorism Policy Implementation in Religious Education Classrooms in England

    Science.gov (United States)

    Quartermaine, Angela

    2016-01-01

    My research into pupils' perceptions of terrorism and current UK counter-terrorism policy highlights the need for more detailed and accurate discussions about the implementation of the educational aims, in particular those laid out by the Prevent Strategy. Religious education (RE) in England is affected by these aims, specifically the challenging…

  7. Terror, tortur og den tikkende bombe

    DEFF Research Database (Denmark)

    Dige, Morten

    2012-01-01

    The so-called "war on terror" has renewed the interest in torture in practice as well as in theory. The philosophical debate about possible justifications for torture has to a large extent revolved about the ticking bomb scenario: would it be justified to torture a terrorist in order to prevent...... a catastrophe? I criticize arguments based on ticking bomb scenarios in two steps. First, I show that exceptional resort to torture will not be possible in the situations where it is most needed. Second, I state several pragmatic as well as principled objections against a state sanctioned or tolerated practice...

  8. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  9. Mass trauma: disasters, terrorism, and war.

    Science.gov (United States)

    Chrisman, Allan K; Dougherty, Joseph G

    2014-04-01

    Disasters, war, and terrorism expose millions of children globally to mass trauma with increasing frequency and severity. The clinical impact of such exposure is influenced by a child's social ecology, which is understood in a risk and resilience framework. Research findings informed by developmental systems theory and the related core principles of contemporary developmental psychopathology are reviewed. Their application to the recent recommendations for interventions based on evolving public health models of community resilience are discussed along with practical clinical tools for individual response. Published by Elsevier Inc.

  10. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  11. Public health and terrorism preparedness: cross-border issues.

    Science.gov (United States)

    Olson, Debra; Leitheiser, Aggie; Atchison, Christopher; Larson, Susan; Homzik, Cassandra

    2005-01-01

    On December 15, 2003, the Centers for Public Health Preparedness at the University of Minnesota and the University of Iowa convened the "Public Health and Terrorism Preparedness: Cross-Border Issues Roundtable." The purpose of the roundtable was to gather public health professionals and government agency representatives at the state, provincial, and local levels to identify unmet cross-border emergency preparedness and response needs and develop strategies for addressing these needs. Representatives from six state and local public health departments and three provincial governments were invited to identify cross-border needs and issues using a nominal group process. The result of the roundtable was identification of the needs considered most important and most doable across all the focus groups. The need to collaborate on and exchange plans and protocols among agencies was identified as most important and most doable across all groups. Development of contact protocols and creation and maintenance of a contact database was also considered important and doable for a majority of groups. Other needs ranked important across the majority of groups included specific isolation and quarantine protocols for multi-state responses; a system for rapid and secure exchange of information; specific protocols for sharing human resources across borders, including emergency credentials for physicians and health care workers; and a specific protocol to coordinate Strategic National Stockpile mechanisms across border communities.

  12. Journals Supporting Terrorism Research: Identification and Investigation into Their Impact on the Social Sciences

    Science.gov (United States)

    Bullis, Daryl R.; Irving, Richard D.

    2013-01-01

    A citation analysis of two preeminent terrorism journals ("Terrorism and Political Violence" and "Studies in Conflict and Terrorism") was used to identify 37 additional social science journals of significant importance to terrorism research. Citation data extracted from the "Web of Science" database was used to…

  13. 31 CFR 50.72 - Establishment of Federal Terrorism Policy Surcharge.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Establishment of Federal Terrorism... TERRORISM RISK INSURANCE PROGRAM Recoupment and Surcharge Procedures § 50.72 Establishment of Federal Terrorism Policy Surcharge. (a) Treasury will establish the Federal Terrorism Policy Surcharge based on the...

  14. 6 CFR 25.4 - Designation of qualified anti-terrorism technologies.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Designation of qualified anti-terrorism... REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...

  15. Social networking-based simulations for nuclear security: Strategy assessment following nuclear cyber terror on South Korean nuclear power plants (NPPs)

    International Nuclear Information System (INIS)

    Woo, Tae Ho; Kwak, Sang Man

    2015-01-01

    Highlights: • The cyber terror modeling is made by the social networking algorithm. • This is applicable by the social networking service (SNS). • Security of nuclear industry could be controlled by the network theory. • Newly developed complex algorithm can be introduced. • Simplified graphics show the operator easily. - Abstract: Nuclear energy has been studied for the secure power productions, which is based on the simulation study following the incident of nuclear cyber terror attack on South Korean nuclear power plants (NPPs). The social networking is used for the terror incident modeling and its prevention strategies. The nuclear industry could be investigated in the aspect of minimizing the dangerous situations caused by possible terror attacks which are considered by the society oriented connectivity among the related people or groups. The social networking circle by system dynamics diagram (SNCSD) is constructed, where the configuration of a model social networking example by system dynamics (SD) is applied. From A to H regions, the values are obtained by the random numbers incorporated with the designed algorithms. The results show the comparative values of terror possibilities which are based on the proposed social networking algorithm. It is possible to prepare for potential terrorism in the nuclear industry

  16. Social psychology, terrorism, and identity: a preliminary re-examination of theory, culture, self, and society.

    Science.gov (United States)

    Arena, Michael P; Arrigo, Bruce A

    2005-01-01

    This article relies upon structural symbolic interactionism and five of its organizing concepts (i.e. symbols, the definition of the situation, roles, socialization and role-taking, and the self) to put forth a novel conceptual framework for understanding the terrorist identity. In order to demonstrate the practical utility of the framework, applications to various terrorist groups around the globe are incorporated into the analysis. Overall, both the theoretical and application work help reorient the academic and practitioner behavioral science communities to the importance of culture, self, and society when investigating one's membership in and identity through militant extremist organizations. Given the unique approach taken by this article, several provisional implications are delineated. In particular, future research on terrorism, strategies linked to counter-terrorism, legal and public policy reform, and the relevance of utilizing a sociologically animated social psychology in the assessment of other forms of criminal behavior are all very tentatively explored.

  17. Terrorism and anti-terror legislation - the terrorised legislator? A comparison of counter-terrorism legislation and its implications on human rights in the legal systems of the United Kingdom, Spain, Germany, and France

    NARCIS (Netherlands)

    Oehmichen, Anna

    2009-01-01

    The thesis deals with the history of terrorism and counter-terrorism legislation, focussing on the legislation in the UK, Spain, Germany and France, in the last 30 years, and analysing its compatibility with national and European human rights standards.

  18. Intelligence and the prevention of nuclear terrorism

    International Nuclear Information System (INIS)

    Despres, J.

    1987-01-01

    The paper first defines intelligence and nuclear terrorism and analyzes the nature of the problem from both a specifically US and a more generally Western viewpoint. As used here, intelligence refers broadly to the collection and reporting of information, the production of assessments, and the presentation of judgments by intelligence specialists who work for public and national security authorities. Intelligence encompasses the entire range of investigative and reporting activities at all levels of government - from local police units to allied military commands - that could contribute to the discovery and disarming of nuclear terrorists. Nuclear terrorism, in contrast, refers only to credible threats or acts of extreme violence by forces outside the direct control of any state through false threats or actual use of a nuclear bomb. This definition excludes other highly menacing or damaging activities involving nuclear materials, facilities, weapons, or phobias such as poisoning the air or water supplies with radioactive substances; stealing nuclear materials, sabotaging nuclear powerplants, occupying a facility or seizing a vehicle with nuclear weapons, or inflaming public fears in the event of a nuclear accident. These events can be extremely frightening, as in the case of public reactions throughout Europe to the nuclear accident at Chernobyl in the Ukraine. However, their potential destructiveness and exploitability by terrorists do not match the threat of nuclear explosion

  19. Nuclear and radiological terrorism: continuing education article.

    Science.gov (United States)

    Anderson, Peter D; Bokor, Gyula

    2013-06-01

    Terrorism involving radioactive materials includes improvised nuclear devices, radiation exposure devices, contamination of food sources, radiation dispersal devices, or an attack on a nuclear power plant or a facility/vehicle that houses radioactive materials. Ionizing radiation removes electrons from atoms and changes the valence of the electrons enabling chemical reactions with elements that normally do not occur. Ionizing radiation includes alpha rays, beta rays, gamma rays, and neutron radiation. The effects of radiation consist of stochastic and deterministic effects. Cancer is the typical example of a stochastic effect of radiation. Deterministic effects include acute radiation syndrome (ARS). The hallmarks of ARS are damage to the skin, gastrointestinal tract, hematopoietic tissue, and in severe cases the neurovascular structures. Radiation produces psychological effects in addition to physiological effects. Radioisotopes relevant to terrorism include titrium, americium 241, cesium 137, cobalt 60, iodine 131, plutonium 238, califormium 252, iridium 192, uranium 235, and strontium 90. Medications used for treating a radiation exposure include antiemetics, colony-stimulating factors, antibiotics, electrolytes, potassium iodine, and chelating agents.

  20. UK nuclear terrorism insurance arrangements: an overview

    International Nuclear Information System (INIS)

    Tetley, M. G.

    2004-01-01

    The risk of terrorism in the UK is not new, but since the New York World Trade Centre attacks in 2001, the potential scale of any terrorist attack has required a considerable reassessment. With UK foreign policy closely aligned to that of the USA, the UK security services now consider it is simply a matter of when and no longer if the UK is attacked. For insurers of any type this fact would cause concern; for insurers involved in high profile and potentially catastrophic loss targets such as nuclear power plants, any attack could have a severe impact on solvency and shareholder's funds. This paper's objective is to describe the terrorism insurance arrangements put in place in the U.K. both before and after the September 2001 attacks. These arrangements have been designed both to safeguard insurers' solvency and to ensure that the nuclear industry and general public can continue to be reassured by the availability of insurance should an attack ever occur.(author)

  1. New trends in terrorism : the use of social media, cyber-terrorism, the role of open-source intelligence and the cases of rightwing extremism and lone wolf terrorism

    OpenAIRE

    Καραδήμα, Σοφία

    2016-01-01

    Terrorism has existed almost as long as humanity, and has appeared in various forms, creating new and evolving trends, making the definition of terrorism even more difficult to define. The purpose of this thesis is to examine the new trends in terrorism after the terrorist attacks of 9/11, as well as attempting to find the factors that facilitate the emergence and/or recurrence of trends in terrorism, by examining the related Literature, creating case studies and providing supp...

  2. Legal Challenges of Combating Terrorism: International Humanitarian Law Implications of ‘Signature Strikes’ by Drones.

    OpenAIRE

    Ndi, George

    2015-01-01

    Terrorism has become the main international security challenge of the 21st century. From a historical perspective, terrorism has always been a serious concern for governments and nation states. The modern threat posed by terrorism has a much wider scope because of its international character. The much bigger threat posed by modern terrorism can also be explained by technological innovations and the reliance of terror networks on social networks both to propagate their message and as a recruit...

  3. The conservation treatment of a contemporary collaged sculpture by Jiří Kolář (1914-2002

    Directory of Open Access Journals (Sweden)

    Jessica Crann

    2010-11-01

    Full Text Available Une sculpture représentant une pomme réalisée par collage de l’artiste tchèque Jiří Kolář et datant de 1972, a été soumise à un traitement de conservation-restauration. La sculpture présentait des dommages structurels causés par des facteurs externes ainsi que des surfaces encrassées. Les interrogations déontologiques soulevées lors de la restauration d’une œuvre d’art contemporain ont représenté un aspect important de l’étude. Par conséquent, la majeure partie des recherches a été dévolue à  la compréhension du matériau et de la structure, celle des intentions de l’artiste,tout comme du concept et de la signification de l’œuvre. Ce travail a été étayé par une recherche scientifique ayant pour but d’évaluer l’efficacité du Triammonium citrate comme agent de nettoyage à base aqueuse, ainsi que par une analyse de la construction en trois dimensions de l’œuvre d’art.A collaged sculpture of an apple by the Czech artist Jiří Kolář, dated 1972 was presented for conservation. The sculpture suffered from structural damage caused by external factors and ingrained surface dirt. The ethical implications raised in conserving a contemporary artwork were an important aspect and subsequently an understanding of the materials and structure, the artist’s intentions, concept and meaning of the artwork formed a large part of the research. Combined with this was scientific research into the effectiveness of Tri-ammonium Citrate as an aqueous surface cleaning agent and analysing construction of 3-Dimensional artworks.

  4. Improbable Success: Risk Communication and the Terrorism Hazard

    Science.gov (United States)

    2010-03-01

    never aspired to be anything more than a bureaucratic construct partnered with the media. It has taken years to fully understand the unintended...terrorism plan. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP /(3273BD3F76A7A5DEDA E36942A54D7D90)~National+Counter-Terrorism+Plan+- +Alert+System...Australian Government National Security. (2009a). National Counter-Terrorism Alert System Fact Sheet. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP

  5. Why Communication and Performance are Key in Countering Terrorism

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-02-01

    Full Text Available In this Research Paper, Research Fellow Prof. Dr. Beatrice de Graaf emphasises the importance of effective communication and performance in the fight against terrorism and the fear it aims to induce. Essentially, terrorists and states are conducting “influence warfare”, a battle to convince and persuade the different target audiences to rally behind them. In this battle of perceptions, the different government agencies need to be aware of the often implicit and unwittingly produced “stories” they tell to counter those narrated by the terrorists. It is crucial to take in consideration the fact that combating terrorism is a form of communication, as much as terrorism is itself.

  6. Coping with Fear of and Exposure to Terrorism among Expatriates.

    Science.gov (United States)

    Beutell, Nicholas J; O'Hare, Marianne M; Schneer, Joy A; Alstete, Jeffrey W

    2017-07-19

    This paper examines existing research on the impact of terrorism on expatriate coping strategies. We consider pre-assignment fear of terrorism, in-country coping strategies, and anxiety and posttraumatic stress disorder (PTSD) associated with repatriation. The extant research is small but growing. Our model for expatriate coping at the pre-departure, in-country, and repatriation stages includes strategies specific to each stage. Preparation using proactive coping, systematic desensitization, problem and emotion focused coping, social support, and virtual reality explorations are recommended. Selecting expatriate candidates who are well-adjusted, emotionally intelligent, and possessing good coping skills is essential for successful assignments in terror-prone regions.

  7. Coping with Fear of and Exposure to Terrorism among Expatriates

    Directory of Open Access Journals (Sweden)

    Nicholas J. Beutell

    2017-07-01

    Full Text Available This paper examines existing research on the impact of terrorism on expatriate coping strategies. We consider pre-assignment fear of terrorism, in-country coping strategies, and anxiety and posttraumatic stress disorder (PTSD associated with repatriation. The extant research is small but growing. Our model for expatriate coping at the pre-departure, in-country, and repatriation stages includes strategies specific to each stage. Preparation using proactive coping, systematic desensitization, problem and emotion focused coping, social support, and virtual reality explorations are recommended. Selecting expatriate candidates who are well-adjusted, emotionally intelligent, and possessing good coping skills is essential for successful assignments in terror-prone regions.

  8. A Criminal Law Approach to Terrorism in Brazil

    Science.gov (United States)

    2014-12-01

    2 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram Como Age a Rede do Terror Islamico no Brasil” [Exclusive: Documents from CIA, FBI...exclusivo-documentos-da-cia-fbi-e-pf-mostram-como-age-a- rede - do-terror-islamico-no-brasil. 3 Ibid. 4 Brazilian Federal Government,” Legislacao/Lei 7170/83...60 Ibid. 61 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram como Age a Rede do Terror Islamico no Brasil.” April

  9. The problems of informational terrorism in African countries

    Directory of Open Access Journals (Sweden)

    Voznyuk Eugenia Vasylivna

    2017-12-01

    Full Text Available The features of informational terrorism in African countries, especially in SADC countries, are analyzed as well as the ways to combat information terrorism in this region. The major issues related to information terrorism are highlighted, which include data exfiltration, social engineering, insider threats, database breaches as well as poor identity and access management. The essence of Computer Security (Cyber Security is revealed and its main tasks are characterized: accessibility, integrity, including authenticity and confidentiality. The main threats for cyberspace are distinguished.

  10. 75 FR 62173 - In the Matter of the Review of the Designation of Jemaah Islamiya (JI and Other Aliases) as a...

    Science.gov (United States)

    2010-10-07

    ... DEPARTMENT OF STATE [Public Notice: 7196] In the Matter of the Review of the Designation of Jemaah Islamiya (JI and Other Aliases) as a Foreign Terrorist Organization Pursuant to Section 219 of the Immigration and Nationality Act, as Amended Based upon a review of the Administrative Record assembled in this...

  11. Jiří Vacek: Slovanská knihovna – můj osud. Mozaika vzpomínek. Národní knihovna\

    Czech Academy of Sciences Publication Activity Database

    Hašková, Dana

    2017-01-01

    Roč. 86, č. 4 (2017), s. 523-525 ISSN 0037-6736 Institutional support: RVO:68378017 Keywords : Vacek, Jiří * The Slavonic Library * Memories Subject RIV: AB - History OBOR OECD: History (history of science and technology to be 6.3, history of specific sciences to be under the respective headings)

  12. Jiří Procháska (1749-1820): Part 2: "De structura nervorum"-Studies on a Structure of the Nervous System.

    Czech Academy of Sciences Publication Activity Database

    Chvátal, Alexandr

    2015-01-01

    Roč. 24, č. 1 (2015), s. 1-25 ISSN 0964-704X Institutional support: RVO:68378041 Keywords : Jiří Procházka * neuroanatomy * nervous tissue Subject RIV: FH - Neurology Impact factor: 0.529, year: 2015

  13. Security Guards and Counter-terrorism: Tourism and Gaps in Terrorism Prevention

    Directory of Open Access Journals (Sweden)

    Luke Howie

    2014-11-01

    Full Text Available Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terrorism preparedness exists. I argue that protecting tourism destinations is only possible if consideration is given the effectiveness of security guards and understanding that their well-being will impact upon their ability to deliver security. I want to draw attention to the often ignored social role of security guards. On 9/11, 42 security guards died whilst helping save the lives of thousands. They performed their jobs admirably, despite being low-paid, under-appreciated workers. In this paper I explore the social role of security guards in the context of tourism security. By drawing on representations of security guards in popular culture and reports on the state of the security guard industry. I argue that the lack of attention on the quality and well-being of guards is a significant black-spot in tourism security and terrorism preparedness.

  14. Terror in time: extending culturomics to address basic terror management mechanisms.

    Science.gov (United States)

    Dechesne, Mark; Bandt-Law, Bryn

    2018-04-11

    Building on Google's efforts to scan millions of books, this article introduces methodology using a database of annual word frequencies of the 40,000 most frequently occurring words in the American literature between 1800 and 2009. The current paper uses this methodology to replicate and identify terror management processes in historical context. Variation in frequencies of word usage of constructs relevant to terror management theory (e.g. death, worldview, self-esteem, relationships) are investigated over a time period of 209 years. Study 1 corroborated previous TMT findings and demonstrated that word use of constructs related to death and of constructs related to patriotism and romantic relationships significantly co-vary over time. Study 2 showed that the use of the word "death" most strongly co-varies over time with the use of medical constructs, but also co-varies with the use of constructs related to violence, relationships, religion, positive sentiment, and negative sentiment. Study 3 found that a change in the use of death related words is associated with an increase in the use of fear related words, but not in anxiety related words. Results indicate that the described methodology generates valuable insights regarding terror management theory and provide new perspectives for theoretical advances.

  15. The effect of terrorism on public confidence : an exploratory study.

    Energy Technology Data Exchange (ETDEWEB)

    Berry, M. S.; Baldwin, T. E.; Samsa, M. E.; Ramaprasad, A.; Decision and Information Sciences

    2008-10-31

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the metrics it uses to assess the consequences of terrorist attacks. Hence, several factors--including a detailed understanding of the variations in public confidence among individuals, by type of terrorist event, and as a function of time--are critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data were collected from the groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery bombing, and cyber intrusions on financial institutions that resulted in identity theft and financial losses. Our findings include the following: (a) the subjects can be classified into at least three distinct groups on the basis of their baseline outlook--optimistic, pessimistic, and unaffected; (b) the subjects make discriminations in their interpretations of an event on the basis of the nature of a terrorist attack, the time horizon, and its impact; (c) the recovery of confidence after a terrorist event has an incubation period and typically does not return to its initial level in the long-term; (d) the patterns of recovery of confidence differ between the optimists and the pessimists; and (e) individuals are able to associate a monetary value with a loss or gain in confidence, and the value associated with a loss is greater than the value associated with a gain. These findings illustrate the importance the public places in their confidence in government

  16. An Examination of How the Availability of State-backed Terrorism Insurance Programs and Commercial Terrorism Insurance Affects the Operational Decisions of Multinational Companies.

    OpenAIRE

    GREY, William / WJG

    2011-01-01

    This dissertation explores the extent to which the operational decisions of multinational companies (MNCs) are affected by the availability of State-backed terrorism insurance programs and commercial terrorism insurance. The initial hypothesis made is that MNCs will be reluctant to invest in zones or countries with high terrorism or political risks, especially when insurance for these risks may be limited or unavailable. This investigation finds that the availability of State-backed terrorism...

  17. The Development of a United Nations Counter-Terrorism Policy: A pragmatic approach to the problem of a definition of Terrorism

    OpenAIRE

    Turney-Harris, Latasha

    2014-01-01

    The primary object of this thesis is to propose a pragmatic solution to the legitimacy problems associated with the absence of a definition of Terrorism within United Nations Counter Terrorism Policy. It contends that the attempts to draft such a definition within the Ad Hoc Committee on Terrorism have now come to a political standstill and are unlikely to result in a strong legal definition of terrorism. Any outcome is likely to be a political compromise in nature. This thesis therefore ...

  18. Looking into the Fighting Against Terrorism from the System Theory Perspective

    Directory of Open Access Journals (Sweden)

    Murat Günbeyi

    2009-06-01

    Full Text Available Terrorism is one of the war methods that has been used individuals, groups, and even by some states for centuries. Those who used terrorism as a method might get some short term results, but in the long term they certainly harm themselves, their nations and sometimes the whole world. The PKK, which is a brutal and an international terrorist organization, has started its activities in the southeast of Turkey 35 years ago, and today it became a well-known terrorist organization around the world. Policies and strategies applied by Turkey against the PKK for years did not help to finish the PKK and its activities. Today, experts, researchers and politicians believe that it is time to find different but more effective counterterrorism policies. Systems theory offers efficient, comprehensive and unique counterterrorism methods against the PKK terrorism. In order to unearth PKK’s recruitment tactics, some conferences for high school students were organized and conducted during the last two years in Diyarbakir. The conference series made it clear that there are some different ways such as enlightening young people to fight against the PKK in the lights of systems perspective. This research shows that security agencies which are responsible of dealing with terrorist organizations need to pay attention to youth and students in the region

  19. Pre-emptive Defence against International Terrorism and Weapons of Mass Destruction: A Reasoned Critique

    Directory of Open Access Journals (Sweden)

    Yolanda Gamarra Chopo

    2007-06-01

    Full Text Available The 9-11 terrorist attacks had serious repercussions on the world stage, giving rise, among other effects, to a protracted debate on the conditions in which the use of force to fight against terrorism might be justified or not under international law. In the UnitedStates, there were those who advocated in favour of pre-emptive action against the terrorists, and those who were protecting and harbouring them, within the framework of a large scale ‘war’ against terrorism. This gave rise to the ‘Bush doctrine’ of the ‘pre-emptive attack’ to fight against international terrorism and those who possessed weapons of mass destruction that might be used against opponents or for terrorist purposes. Although some people feltthat this version of ‘pre-emption’ in the unilateral use of force strayed from the traditional parameters of self-defence, others considered it to be an adaptation of these parameters to the new needs arising from the threat posed by terrorist groups and outlaw states.

  20. Posttraumatic play in young children exposed to terrorism: An empirical study.

    Science.gov (United States)

    Cohen, Esther; Chazan, Saralea; Lerner, Moran; Maimon, Efrat

    2010-03-01

    The phenomenon of "posttraumatic play" (PTP) has received much clinical recognition and little empirical support. The objective of this study was to examine various aspects of PTP in young children exposed to terror events and their relation to posttraumatic stress disorder (PTSD). Individual play sessions, conducted with 29 young Israeli children directly exposed to terrorism (M age = 5.47, SD = 1.34) and 25 matched unexposed children (M age = 5.62, SD = 0.87), were coded using the Children's Play Therapy Instrument-Adaptation for Terror Research (CPTI-ATR; S.E. Chazan & E. Cohen, 2003). Analyses using these ratings showed (a) significant differences between the two groups, (b) significant associations with the caregiver's reports on child's exposure, and (c) significant associations with the caregiver's reports on the child's PTSD symptoms. Play activity ratings of predominant negative affects, frequent acting-out/morbid themes, lowered developmental level, and reduced awareness of the child of him- or herself as a player significantly predicted more PTSD symptoms. PTP which included more coping strategies classified as "overwhelmed reexperiencing" and less "reenactment with soothing" was associated with a higher level of PTSD. Play analysis with the CPTI-ATR may be helpful in identifying PTSD in children and also guide the selection of therapeutic techniques. Copyright © 2010 Michigan Association for Infant Mental Health.

  1. Preventing radiological terrorism - opportunities and challenges

    International Nuclear Information System (INIS)

    Barlow, Maegon E.

    2016-01-01

    The Office of Radiological Security (ORS), within the U.S. Department of Energy's National Nuclear Security Administration, enhances global security by preventing high activity radioactive materials from use in acts of terrorism. This is a challenging task considering that high activity radiological materials are ubiquitous, constantly moving and mostly found in operational civil facilities. The implementation of the ORS mission is based on a three pillar strategy - protect, remove and reduce. ORS works both domestically and internationally with government authorities, law enforcement, and businesses to protect radioactive sources used for vital medical, research, and commercial purposes, remove and dispose of disused radioactive sources, and reduce the global reliance on radioactive sources through the promotion of viable non-isotopic alternative technologies. ORS has active engagement in all 50 States and in over 80 countries. This presentation will provide an overview of ORS protect, remove, and reduce strategy, as well as security challenges and opportunities

  2. Children's Cognitive Functioning in Disasters and Terrorism.

    Science.gov (United States)

    Pfefferbaum, Betty; Noffsinger, Mary A; Jacobs, Anne K; Varma, Vandana

    2016-05-01

    A growing literature has begun to address the cognitions that influence children's disaster reactions as well as the effects of disasters on children's cognitions. These cognitions must be viewed in the context of developmental and cultural considerations as well as disaster-related factors such as exposure and secondary stressors. This review examines the extant literature on children's cognitions related to disasters and terrorism including threat appraisal, beliefs, attention and concentration, memory, academic achievement, and executive functioning. The review highlights areas where research is lacking such as the effect of disasters on children's attention, concentration, content of disaster memories, and executive functioning. It also notes findings that may advance post-disaster screening and intervention.

  3. Nuclear terrorism: after the Washington summit

    International Nuclear Information System (INIS)

    Hautecouverture, Benjamin

    2016-01-01

    In this note, the author comments the issues addressed by the 2016 Nuclear Safety Summit (NSS) of Washington, and the content of its final statement. He notices that the scope of addressed topics has evolved since the first summits (issues related to highly enriched uranium and to plutonium), that not only technological but also political and diplomatic issues are taken into account, and that GNOs are always more involved. The author briefly comments some aspects of the content of the final statement: threat of nuclear terrorism, improvement of nuclear safety since 2010, recall of the three main pillars of the non proliferation Treaty (non proliferation, disarmament, specific uses of nuclear energy), implementation of nuclear safety under at the own responsibility and duty of countries possessing nuclear materials. Finally, the author discusses how the NSS process will go on, and evokes remaining questions regarding the existence of an actual international constraining regime, and financial and functional issues

  4. THE NARRATIVE CHARACTERISTICS OF ISLAMIC TERRORISM DISCOURSES

    Directory of Open Access Journals (Sweden)

    Ridwan Rosdiawan

    2014-12-01

    Full Text Available While polemics is still shadowing the internationally accepted definition, the word “Terrorism” becomes more controversial when it is paralleled with “Islam”. The Islamic Terrorism discourse is more likely to be an elusive concept if not a Fata Morgana. Its very existence appears as a real entity but its form can hardly be described. It would be always be problematic to posterize such a terrible notion as “terrorism” and put it side by side with a noble concept as in “Islam”. The fact, however, shows that the two-word has been widely discussed in global arena. “Islamic Terrorism” has become a trending topic in global politics and academic discourses in the first decade of the millennium.

  5. CINE DE TERROR Y BIOLOGÍA

    Directory of Open Access Journals (Sweden)

    John Richard Jiménez Peñuela

    2014-05-01

    Full Text Available En esta presentación, se abordan los resultados del “Proyecto Transversal Ciencia Gráfica”, relacionados con la proyección de cine de terror, a educandos de ciclo III. Además de las proyecciones, el proyecto desarrollo la habilidad gráfica de los estudiantes en relación con la biología y el arte, a partir de lecciones sobre dibujo biológico, y la fabricación de juguetes con motivos biológicos por parte de los estudiantes. De esta manera, se emprenden acciones conjuntas desde arte y biología para la comprensión de los temas vistos en el área de ciencias naturales, aplicando los conocimientos de ambos campos en la comprensión estética de la relación humano-naturaleza.

  6. Combating Terrorism: How Prepared Are State and Local Response Organizations?

    National Research Council Canada - National Science Library

    Davis, Lois M; Mariano, Louis T; Pace, Jennifer E; Cotton, Sarah K; Steinberg, Paul

    2006-01-01

    Since the 9/11 attacks on the World Trade Center and the Pentagon, state and local governments and response organizations have focused attention on preparing for and responding to acts of domestic terrorism...

  7. The Role of Targeted Killing in the Campaign Against Terror

    National Research Council Canada - National Science Library

    Cullen, Peter M

    2007-01-01

    .... Some commentators view it as an indispensable tool in the fight against terrorism and argue for its expanded use, while others question its legality and claim that it is immoral and ultimately ineffective...

  8. Research on Visual Analysis Methods of Terrorism Events

    Science.gov (United States)

    Guo, Wenyue; Liu, Haiyan; Yu, Anzhu; Li, Jing

    2016-06-01

    Under the situation that terrorism events occur more and more frequency throughout the world, improving the response capability of social security incidents has become an important aspect to test governments govern ability. Visual analysis has become an important method of event analysing for its advantage of intuitive and effective. To analyse events' spatio-temporal distribution characteristics, correlations among event items and the development trend, terrorism event's spatio-temporal characteristics are discussed. Suitable event data table structure based on "5W" theory is designed. Then, six types of visual analysis are purposed, and how to use thematic map and statistical charts to realize visual analysis on terrorism events is studied. Finally, experiments have been carried out by using the data provided by Global Terrorism Database, and the results of experiments proves the availability of the methods.

  9. Terror Medicine As Part of the Medical School Curriculum

    Directory of Open Access Journals (Sweden)

    Leonard A Cole

    2014-09-01

    Full Text Available Terror medicine, a field related to emergency and disaster medicine, focuses on medical issues ranging from preparedness to psychological manifestations specifically associated with terrorist attacks. Calls to teach aspects of the subject in American medical schools surged after the 2001 jetliner and anthrax attacks. Although the threat of terrorism persists, terror medicine is still addressed erratically if at all in most medical schools. This paper suggests a template for incorporating the subject throughout a 4-year medical curriculum. The instructional framework culminates in a short course for fourth year students, such as one recently introduced at Rutgers New Jersey Medical School, Newark, NJ. The proposed 4-year Rutgers curriculum serves as a model that could assist other medical schools contemplating the inclusion of terror medicine in pre-clerkship and clerkship training.

  10. Resurrecting NSC-68 for the Global War on Terror

    National Research Council Canada - National Science Library

    Cabrey, Richard M

    2007-01-01

    Although the threat to today's U.S. national interests is a form of terrorism being waged by Radical Islam, there are distinct similarities to the threat of communism that was posed after World War II...

  11. Mitigating Key Intelligence Gaps In Colombian War On Terrorism

    National Research Council Canada - National Science Library

    Goebel, Jefferey

    2003-01-01

    Successfully transitioning from a war on drugs to a war on terrorism in Colombia is a national security concern for the United States and poses significant operational readiness challenges for USSOUTHCOM...

  12. Ocular Injuries: Another Example of the Heavy Prize of Terrorism

    African Journals Online (AJOL)

    2016-12-13

    Dec 13, 2016 ... A 25‑year‑old air force personnel (lance corporal) presented to our accident and emergency ... Ocular Injuries: Another Example of the Heavy Prize of. Terrorism ..... Singapore: World Scientific Publishing Co. Pte. Ltd.; 2011. p.

  13. Management of the Extreme Events: Countering International Terrorism

    Directory of Open Access Journals (Sweden)

    Dr. Cristian Barna

    2011-12-01

    Full Text Available After the terrorism attacks of September 11, 2001, there is recognition by both the public and private sectors that one needs to rethink our strategy for dealing with these low probability but extreme consequence events. September 11, 2001 attacks against the United States raised numerous questions related to counter-terrorism, foreign policy, as well as national security in the United States and abroad. They also raised the fundamental question of who should pay for losses due to terrorism.The question of who should pay for terrorism risk prevention and sustainable coverage within a country is likely to be seen first as a matter of collective responsibility that each country has to consider – a societal choice

  14. Systems analysis of past, present, and future chemical terrorism scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Hoette, Trisha Marie

    2012-03-01

    Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of the attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.

  15. Islam, Terrorism, and the Strategy of Enlightened Moderation

    National Research Council Canada - National Science Library

    Malik, Irfan A

    2005-01-01

    The study focuses on analyzing the ongoing acts of violence and radicalism by individuals associated with Islam, in the light of teachings and principles of this great religion of peace, which denounces terrorism...

  16. AL Qaeda, Trends in Terrorism and Future Potentialities: An Assessment

    National Research Council Canada - National Science Library

    Hoffman, Bruce

    2003-01-01

    This paper assesses current trends in terrorism and future potentialities. It examines first the presumed state of al Qaeda today with particular reference to its likely agenda in a post-Iraq war world...

  17. Review Article: Holy Terrors: Thinking about Religion after September 11

    OpenAIRE

    Campo, Juan E.

    2003-01-01

    The following is a review article by Juan E. Campo, Religious Studies Department at the University of California, Santa Barbara, on Bruce Lincoln's Holy Terrors: Thinking about Religion after September 11. Chicago: University of Chicago Press, 2003, Pp. 142.

  18. The Double-Edged Effects of Social Media Terror Communication

    DEFF Research Database (Denmark)

    Nickel, Sandro

    2014-01-01

    This paper connects the effects of social media on terror/anti-terror communication with dynamics and consequences of surveillance. Citizens become via social media more independent from mass media and more interconnected. This is also valid when citizens engage in terror/anti-terror communication...... that social media contribute to extending surveillance: by being a temptation for intelligence services, by not resisting state authorities and via constructing threat perceptions among populations which in effect deliver security politicians ‘windows of opportunity’ in order to implement ever more....... However, via social media citizens also become targets of the ‘collect-it-all’ surveillance, which was revealed to the global public in 2013. I argue that due to such surveillance some citizens might start to censor themselves and that surveillance inflicts with a number of human rights. I further argue...

  19. The Role of Intelligence Analysis in the War on Terrorism

    National Research Council Canada - National Science Library

    Ormond, Valerie

    2002-01-01

    The United States government must provide the intelligence community's analytical force with the necessary resources and capabilities in order to use intelligence analysis as an effective weapon in the War on Terrorism...

  20. The Fight for Legitimacy: Liberal Democracy versus Terrorism

    National Research Council Canada - National Science Library

    Jebb, Cindy

    2001-01-01

    .... However, terrorism must be analyzed in a political and strategic context. The forces of globalization and fragmentation and the increasing claims of irredentism and secession, require a reexamination of state legitimacy...

  1. Sub-Saharan Africa and the Global War on Terrorism

    National Research Council Canada - National Science Library

    Stewart, Napoleon W

    2008-01-01

    .... became involved in the Global War on Terrorism (GWOT). President Bush vowed that al Qaeda, the terrorist organization responsible for this act, could not be permitted safe havens in other countries and declared that nations would be with the...

  2. Conflict and complexity countering terrorism, insurgency, ethnic and regional violence

    CERN Document Server

    Bar-Yam, Yaneer; Minai, Ali

    2015-01-01

    Complexity science affords a number of novel tools for examining terrorism, particularly network analysis and NK-Boolean fitness landscapes as well as other tools drawn from non-linear dynamical systems modeling. This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.

  3. Assessing Strategic Effectiveness in the War on Terrorism

    National Research Council Canada - National Science Library

    Combs, II, Ray A

    2006-01-01

    The United States strategy for the war on terrorism encompasses four goals: defeating terrorist organizations, denying further sponsorship support, diminishing the underlying conditions that terrorists seek to exploit, and defending U.S...

  4. The radiobiology of nuclear and radiological terrorism

    International Nuclear Information System (INIS)

    Moulder, J.E.

    2003-01-01

    The events of the last several years have focused attention on the possibility of nuclear (radiological) terrorism, and on the implications of such terrorist threats for radiation biology and for radiation accident preparedness. This review will discuss the consequences of exposure to radiation doses in the 1-12 Sv range, as doses in this range pose a risk of acute effects, but are potentially survivable. The consequences of exposures of limited tissue volumes to doses above 12 Sv have been researched because of applicability to cancer therapy, while exposure to doses below 1 Sv has been researched because of nuclear fallout and space exploration issues. Except for research aimed at protection of members of the armed forces, the intervening dose range has received relatively little attention. Currently we have only a limited clinical ability to deal with the consequences of radiation exposures in this range, but focused research on radiation biodosimetry and pharmacological treatments for radiation injuries could rapidly expand such capabilities. This review will also discuss the potential weaknesses in most of the current programs for dealing with radiation accidents or nuclear terrorism. These weaknesses include: the absence of widespread radiation biodosimetry capabilities, lack of robust radiation detection equipment by many first responders, lack of clinical development of radiation protection and treatment strategies, and lack of training in radiation medicine by most health care and disaster response personnel. If a major radiation accident or terrorist event occurs, this lack of preparation will be compounded by widespread public fear of 'radiation'. Copyright (2003) Australasian Radiation Protection Society Inc

  5. What is terrorism and can psychology do anything to prevent it?

    Science.gov (United States)

    Stevens, Michael J

    2005-01-01

    Terrorism has a long history, which continues to unfold, and takes many forms. Notwithstanding these facts, there is no generally accepted definition of terrorism. I set forth the definitional issues that underlie the current debate about terrorism. By comparing terrorism with various forms of violence, I argue that it is plausible to construe terrorism as crime and, in support of this, I demonstrate why terrorism cannot be morally justified. Next, I cluster various immediate and long-term approaches intended to prevent terrorism, highlighting psychologically based strategies, such as behavioral profiling, teaching tolerance and citizenship, modifying media images of terrorism, and building peace. In order to understand and respond more effectively to 21st-century terrorism, I advocate adoption of a multidisciplinary, contextually sensitive approach.

  6. Catching Seriously Bad Dudes: US Counter-terrorism strategies

    Czech Academy of Sciences Publication Activity Database

    Bernardyová, Alžběta

    2008-01-01

    Roč. 6, č. 7-8 (2008), s. 34-38 ISSN 1214-1720 R&D Projects: GA ČR GA407/07/1395 Institutional research plan: CEZ:AV0Z70280505 Keywords : terrorism * counter- terrorism * US * 9/11 Subject RIV: AD - Politology ; Political Sciences http://www.socioweb.cz/upl/editorial/download/156_socioweb_7_08.pdf

  7. Information Sharing About International Terrorism in Latin America

    Science.gov (United States)

    2005-06-01

    articles/anmviewer.asp?a=464&print=yes. Somoza, L. (2001). Inteligencia: Su Utilidad para la Toma de Decisiones en un Mundo de Nuevos Conflictos...Terrorism Violence in Europe.” March 9-11, 2001, Minda de Gunzburg Center for European Studies, Harvard University, Cambridge, Massachusetts. 56...Taylor and Francis. Jane’s (2005). Terrorism and Insurgency Center. Fuerzas Armadas Revolucionarias de Colombia (FARC). Retrieved February 25, 2005

  8. THE PERCEIVED RISK OF TRAVELLING, WITH EMPHASIS ON TERRORISM

    OpenAIRE

    Stefanou, Areti

    2009-01-01

    Risk is an important factor when considering international tourism (Lepp and Gibson, 2003; Sonmez and Graefe, 1998b; 1998a; Sonmez, 1998), especially nowadays as a result of the increased magnitude and frequency of terrorism attacks when travelling. Such events have negatively affected individuals’ perceived risk in international travel, making terrorism risk a key element of the international travel scene. Perceived risk can influence a positive image, intention to travel to a particular des...

  9. Childhood night terrors and sleepwalking: diagnosis and treatment

    OpenAIRE

    Sachin Ratan Gedam; Pradeep S. Patil; Imran Ali Shivji

    2017-01-01

    Night terrors and sleepwalking are arousal disorders that occur during the first third of night. Combined existence of sleep disorders are rare phenomenon and found to be associated with behavioural and emotional problems. It becomes difficult to diagnose among sleep disorders and epilepsy is an important differential diagnosis. Management with combined approach of pharmacotherapy and psychological counselling is safe and effective. Here, we present a case of night terrors and sleepwalking to...

  10. Youth, terrorism and education: Britain’s Prevent programme

    OpenAIRE

    Thomas, Paul

    2016-01-01

    Since the 7/7 bombings of July 2005, Britain has experienced a domestic terror threat posed by a small minority of young Muslims. In response, Britain has initiated ‘Prevent’, a preventative counter-terrorism programme. Building on previous, general critiques of Prevent, this article outlines and critically discusses the ways in which Prevent has approached young Muslims and their educational institutions. The article argues that, rather than trust in broader and non-stigmatising processes of...

  11. The IAEA Nuclear Security Programme Combating Nuclear Terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    Discusses the four threats of nuclear terrorism,which are theft of a nuclear weapon, theft of material to make an improvised nuclear explosive device,theft of other radioactive material for an Radiological dispersal device and sabotage of a facility or transport. The IAEA Nuclear Security programme combating Nuclear Terrorism therefore adopts a comprehensive approach. The programme addresses the need to cover nuclear and other radioactive materials, nuclear facilities and transports, non-nuclear, medical and industrial applications of sources

  12. Acts of terrorism in Paris and Brussels: common and different

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    Full Text Available The article investigates the common and distinctive features of the terrorist attacks in Paris and Brussels in 2015 and 2016. The attacks have confirmed the weakness of European security system in the context of the protection of its citizens from the threat № 1 in the world. The high level of democracy and liberalism are not allowed to use power instruments effectively in the fight against terrorism, which was the result of the fact that the terrorists were able to freely access to the place of their acts and to implement them. It was determined that the common features are the following: in Paris and in Brussels, the attacks were carried out by terrorist militaristic group «The Islamic State of Iraq and the Levant» (ISIL; the places of commission of terrorist acts; guns of terrorists; military units of France and Belgium are parties of the armed conflict in Syria on the side of the Syrian opposition and struggle against ISIL; there were a few terrorist attacks. It is proved that the differences are as follows: in Paris, in addition to explosives, packed with nails, also were used automatic weapons and grenades, but only explosives in Brussels; France is more active in the fight against terrorism in the international arena and in every way opposed to violence against humanity, so there is a terrorist attack can be seen as a blow to the democratic and humanitarian values; Belgium is a «political heart» of the European Union that’s why the terrorist attack on it can be seen as a blow to the political system of the EU; in Paris, the attack was supposed to apply except for the population and for high officials in the name of F. Hollande and F. Steinmeier, and in Brussels – only civilians.conducting effective public diplomacy by means of virtual diplomacy. In the context of the establishment of the global information society the key target groups must be: Diasporas, foreign media (including bloggers, investors, influential foreign

  13. The effects of Albanian terrorism in Kosovo and Metohija

    Directory of Open Access Journals (Sweden)

    Stevanović Obrad M.

    2015-01-01

    Full Text Available The very first ideas about secession of Kosovo and Metohija of the Republic of Serbia and the use of violence in achieving them appeared immediately after the First Balkan War (1912. The key pillars of this, secessionist motivated violence in Kosovo during and after the wars of liberation of Serbia (1912 and 1918. And between the two world wars, were kachach, during and after World War II that were ballistic groups of Albanian extremists. Violence based on their tradition, with unforeseeable serious consequences for vital interests of the Republic of Serbia, escalated in the last decade of the twentieth century, violence Albanian extremist group called the Kosovo Liberation Army (KLÁ, supported by influential members of the international community. In many papers, the analysis of the specific objectives, the holders-active entities, resources, facilities attack - passive subjects and consequences, as constituent elements of that violence, confirmed his terrorist character of the KLÁ as a terrorist profile of its key holder. In this regard, the work is the result of research in which the author, as a consequence of the analysis of the constituent elements of Albanian terrorism in Kosovo and Metohija, the end of the last century and the beginning of this century, identified scientifically described and classified the effects, or levels of achievement of objectives internal and holders Foreign support­ers. In addition to the indisputable proven effects in achieving the goals of the operational and intermediate levels, the work is proven and partial achievement of strategic-political (ethno-separatistic internal target holders of Albanian terrorism in Kosovo and Metohija, defined as secession-the secession of Kosovo and Metohija from the Republic of Serbia. The deployment of international military, security and civilian forces in Kosovo and Metohija, with the tempo­rary transfer of jurisdiction of state authorities of the FRY and Serbia to the

  14. Clandestine nuclear trade and the threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Spector, L.S.

    1987-01-01

    The nuclear netherworld may ultimately contribute to the danger of nuclear terrorism in at least three ways. First, as national governments exploit this underground market and nuclear weapons spread to additional states, the possibility that terrorists will gain access to them will grow. Such weapons in nuclear threshold countries are likely to be more vulnerable to terrorist seizure than they are in today's more advanced nuclear weapons states. Second, terrorist groups might seek to exploit the nuclear gray market themselves, using the same subterfuges that national governments use. Although in today's nuclear netherworld, subnational groups cannot obtain nuclear arms or nuclear weapons material and cannot hope to build the complex installations needed to produce the latter, they might be able to engage in a form of barter with sympathetic emerging nuclear states (for example, offering raw materials or needed nuclear hardware in return for nuclear weapons material. Finally, there is always the risk that nuclear arms or nuclear weapon materials will someday become available on the nuclear black market. There is evidence indicating that terrorist organizations might well be interested in acquiring such items. Understanding underground nuclear commerce in its current form is essential to prevent such future dangers

  15. ADDRESSING THE SPECTRE OF CYBER TERRORISM: A COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2012-08-01

    Full Text Available This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.

  16. Defining and Theorizing Terrorism: A Global Actor-Centered Approach

    Directory of Open Access Journals (Sweden)

    Omar Lizardo

    2015-08-01

    Full Text Available Arriving at a consensual definition of the phenomenon of terrorism has been a particularly difficult undertaking. Some definitions are either too specific or too vague, concentrating on some essential “terrorist” aspect of the actions, strategies, or types of non-state organizations that engage in terrorism. In this paper I draw on global approaches from international relations and world systems theories to propose a definition of terrorism that skirts these issues by concentrating on terrorist actors rather than terrorist behavior. I argue that this approach has several advantages, including the dissolution of several empirical and analytical problems produced by more essentialist definitions, and the location of terrorism within a two dimensional continuum of collective-violence phenomena in the international system which discloses important theoretical insights. I proceed to examine the characteristics of terrorism by comparing it with other forms of violence in the international system. I propose that terrorism may be part of the cycles and trends of unrest in the world system, responding to the same broad families of global dynamics as other forms of system-level conflict.

  17. On the Concept and Definition of Terrorism Risk.

    Science.gov (United States)

    Aven, Terje; Guikema, Seth

    2015-12-01

    In this article, we provide some reflections on how to define and understand the concept of terrorism risk in a professional risk assessment context. As a basis for this discussion we introduce a set of criteria that we believe should apply to any conceptualization of terrorism risk. These criteria are based on both criteria used in other areas of risk analysis and our experience with terrorism risk analysis. That is, these criteria offer our perspective. We show that several of the suggested perspectives and definitions have weaknesses in relation to these criteria. A main problem identified is the idea that terrorism risk can be conceptualized as a function of probability and consequence, not as a function of the interactions between adaptive individuals and organizations. We argue that perspectives based solely on probability and consequence should be used cautiously or not at all because they fail to reflect the essential features of the concept of terrorism risk, the threats and attacks, their consequences, and the uncertainties, all in the context of adaptation by the adversaries. These three elements should in our view constitute the main pillars of the terrorism risk concept. From this concept we can develop methods for assessing the risk by identifying a set of threats, attacks, and consequence measures associated with the possible outcome scenarios together with a description of the uncertainties and interactions between the adversaries. © 2015 Society for Risk Analysis.

  18. Implications of the War On Terror for Khyber Pukhtunkhwa, Pakistan

    Directory of Open Access Journals (Sweden)

    Manzoor Ahmad

    2010-09-01

    Full Text Available The US-led War on Terror in Afghanistan conducted for the aim of eliminating Al- Qaeda and Osama-bin-Laden has brought about enormous economic, social and political changes in the region. Pakistan’s role as a front-line state in the War on Terror has had profound implications for its domestic politics and foreign policy. Pakistan not only took a U-turn on its Afghanistan policy, but also had to crack down on internal extremism and terrorism. Several military operations were carried out against the so- called terrorist factions in tribal areas and some other parts of the North West Frontier Province (NWFP, renamed as Khyber Pukhtunkhwa (KPK under the 18th Amendment to the Constitution of 1973 of Pakistan. With a majority Pashtun population, KPK has been a target of the War on Terror due to its social structure, cultural restraints and the religion of its inhabitants on the boundary with Afghanistan. The socio-cultural similarities and geographical proximity with Afghanistan have made it a sanctuary for Al-Qaeda members. The War on Terror in KPK has had negative political, economic and social repercussions for the region and thus has created hatred among the Pashtuns. This paper is an attempt to analyze the factors which made the Pashtuns of this area prone to militancy. It will analyze the political, economic and social implications of the War on Terror for KPK in general and its Pashtun population in particular.

  19. The age of terrorism: to the problem statement

    Directory of Open Access Journals (Sweden)

    I. V. Yevtyagina

    2014-04-01

    Full Text Available In the present article analyzes the problem of terrorism. Historical essay on the topic helps clarify the concept of the term «terrorism», as well as its causes. The existing classification of terrorism reveals the different types and ways of influencing people by terrorists to achieve their goals. The author suggests the age classification, namely, adult and adolescence terrorism. Discussed in detail adolescence terrorism. The possible reasons for solutions to the problems teenagers violently. On the example of the terrorist act in Moscow school number 263 attempts to analyze the causal relationships aggressive behavior among adolescents in relation to their peers and teachers. Author shows the factors influencing the formation of the propensity to aggression (the terrorist behavior: the crisis of spirituality and morality, reducing cultural awareness, conflict resolution based on adults imitation, striving for leadership, using aggression, the substitution of the present reality of the computer world, acceptance of immoral behavior for conventional norm, plenty of scenes of cruelty and violence in the media, national intolerance. Also in the article are recommendations to prevent teenage terrorism, emphasizes the need for joint activities of the school psychologist, teachers, children and their parents.

  20. Finding a National Approach to Combat the Terror-Crime Nexus: A Hezbollah & Transnational Organized Crime Case Study

    Science.gov (United States)

    2014-03-24

    state franchises , combining multiple nations acting in concert, and traditional TOCs and terrorist groups acting as proxies for the nation states that...traditional paradigms.”9 The anti-American intent and killing capacity of terror groups coupled with the advantageous location, transportation...casualties. “Hezbollah had mastered jujitsu information operations, turning its enemy’s strength into a disadvantage in the battle for global sympathy