Bassett, Jonathan F.
The author attempts to integrate Terror Management Theory (TMT) and R. W. Firestone's Separation Theory (1984, 1994). Both theories emphasize defense against death anxiety as a key human motive. Whereas TMT focuses extensively on self-esteem and cultural worldview, Firestone posited additional defenses such as gene survival, self-nourishing…
Full Text Available Since 9/11, the state of the art in counter-terrorism research, counter-terorism measures and counter-terrorism impacts has taken off. Nevertheless, countering terrorism as a branch of fear management is still a discipline to be developed. In this Research Paper, authors Prof. Dr. Edwin Bakker and Prof. Dr. Beatrice de Graaf attempt to lessen this gap. The Paper identifies and analyses governmental approaches to managing fear in relation to terrorist incidents. It is a stocktaking approach, offering a preliminary oversight of some central aspects and pointers on the way forward when constructing and testing such a theory.
Taylor, Laramie D.
Based on terror management theory, it was hypothesized that media choices may be affected by the salience of death-related thoughts. Three experiments with samples of undergraduate students were conducted to investigate whether such a process would affect preferences for law and justice television programming. In the first experiment (n = 132),…
Arrowood, Robert B; Cox, Cathy R; Kersten, Michael; Routledge, Clay; Shelton, Jill Talley; Hood, Ralph W
According to terror management theory, individuals defend their cultural beliefs following mortality salience. The current research examined whether naturally occurring instances of death (i.e., Ebola) correspond to results found in laboratory studies. The results of two experiments demonstrated that participants experienced a greater accessibility of death-related thoughts in response to an Ebola prime during a regional outbreak. Study 2 also showed that increased mortality awareness following an Ebola manipulation was associated with greater worldview defense (i.e., religious fundamentalism). Together, these results suggest that reminders of death in the form of a disease threat operate similarly to a mortality salience manipulation.
Leary, Mark R
By applying different standards of evidence to sociometer theory than to terror management theory (TMT), T. Pyszczynski, J. Greenberg, S. Solomon, J. Arndt, and J. Schimel's (2004) review offers an imbalanced appraisal of the theories' merits. Many of Pyszczynski et al.'s (2004) criticisms of sociometer theory apply equally to TMT. and others are based on misconstruals of the theory or misunderstandings regarding how people respond when rejected. Furthermore, much of their review is only indirectly relevant to TMT's position on the function of self-esteem, and the review fails to acknowledge logical and empirical challenges to TMT. A more balanced review suggests that each theory trumps the other in certain respects, both have difficulty explaining all of the evidence regarding self-esteem, and the propositions of each theory can be roughly translated into the concepts of the other. For these reasons, declaring a theoretical winner at this time is premature. ((c) 2004 APA, all rights reserved)
Taubman-Ben-Ari, Orit; Eherenfreund-Hager, Ahinoam; Findler, Liora
Attitudes toward teenagers with and without physical disabilities, and their social acceptance, were examined from the perspective of terror management theory and the broaden and build theory. Participants (n = 390, aged 13-17) were divided into 3 experimental conditions: positive emotions, mortality salience, and control. Then, they were shown…
Although women's wailing at death rites in various cultures typically amplifies mortality salience, this ritual phenomenon is absent in the research literature on terror management theory (TMT). This study explored Yemenite-Jewish wailing in Israel as an example of how a traditional performance manages death anxiety in a community context. Observations of wailing events and interviews with Yemenite-Jewish wailers and mourners in Israel were analyzed to understand respondents' perceptions of the experience of wailing as well as the anxiety-oriented psychotherapeutic expertise involved. The findings are discussed to propose an alternative outlook on the intersubjective adaptive value of death anxiety. After describing TMT's view on the role of culture in coping with death anxiety, I consider the extent to which Yemenite-Jewish wailing is consistent with the premises of TMT.
Lewis, Adam M
Existential psychotherapy and Terror Management Theory (TMT) offer explanations for the potential psychological effects of death awareness, although their respective literatures bases differ in clarity, research, and implications for treating psychopathology. Existential therapy is often opaque to many therapists, in part due to the lack of consensus on what constitutes its practice, limited published practical examples, and few empirical studies examining its efficacy. By contrast, TMT has an extensive empirical literature base, both within social psychology and spanning multiple disciplines, although previously unexplored within clinical and counseling psychology. This article explores the implications of a proposed TMT integrated existential therapy (TIE), bridging the gap between disciplines in order to meet the needs of the aging population and current challenges facing existential therapists.
Das, E.; Bushman, B.J.; Bezemer, M.D.; Kerkhof, P.; Vermeulen, I.E.
Three studies tested predictions derived from terror management theory (TMT) about the effects of terrorism news on prejudice. Exposure to terrorism news should confront receivers with thoughts about their own death, which, in turn, should increase prejudice toward outgroup members. Non-Muslim
Chonody, Jill M; Teater, Barbra
Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.
Full Text Available Introduction:The paper concerns definition of the level of posttraumatic growth (PTG, the psychological adaptation mechanism occurring after extreme experiences in life, such as being informed of having HIV infection.Aim:The study is experimental, aiming to assess whether correlations between exposure to thoughts of stressful experiences and their psychological consequences are mediated by an efficient mechanism of buffering anxiety.Material/Methods:Fifty-four men and 26 women infected with HIV who underwent manipulated exposure to mortality according to the hypotheses of the terror management theory (TMT were included. Subjects were randomly assigned to the control group (dental anxiety or the experimental group (fear of dying.Results:The results confirmed the assumptions of the terror management theory. The subjects had an efficient mechanism of alleviating the fear of dying, the so-called “anxiety buffer.” The analysis revealed a high level of posttraumatic growth and advantages derived from the disease. The paper additionally characterizes the specific group of HIV-positive people, their functioning in society and the family. It touches on such issues as professional work, relations with relatives and friends, social life, and adherence.Conclusions:The study has shown that the specific group of people infected with HIV managed very well to adapt to the circumstances. One may say that as a consequence of acquiring the infection, the subjects have experienced significant changes of personality, which have ultimately led to an improvement of their lives and offered new possibilities for personal and social development to them. All the recorded changes fit into the TMT paradigm.
Dunne, Simon; Gallagher, Pamela; Matthews, Anne
Using a terror management theory framework, this study investigated if providing mortality reminders or self-esteem threats would lead participants to exhibit avoidant responses toward a point-of-care testing device for cardiovascular disease risk and if the nature of the device served to diminish the existential threat of cardiovascular disease. One hundred and twelve participants aged 40-55 years completed an experimental questionnaire. Findings indicated that participants were not existentially threatened by established terror management methodologies, potentially because of cross-cultural variability toward such methodologies. Highly positive appraisals of the device also suggest that similar technologies may beneficially affect the uptake of screening behaviors.
Carlos David Navarrete
Full Text Available Adherence to ingroup ideology increases after exposure to death-related stimuli, a reaction that proponents of terror management theory (TMT explain as a psychological defense against the uniquely human existential fear of death. We argue that existential concerns are not the relevant issue; rather, such concepts can be subsumed under a larger category of adaptive challenges that prime coalitional thinking. We suggest that increases in adherence to ingroup ideology in response to adaptive challenges are manifestations of normative mental representations emanating from psychological systems designed to enhance coordination and membership in social groups. In providing an alternative to TMT, we (1 explain why the theory is inconsistent with contemporary evolutionary biology, (2 demonstrate that mortality-salience does not have the unique evocative powers ascribed to it by TMT advocates, and (3 discuss our approach to coalitional psychology, a framework consistent with modern evolutionary theory and informed by a broad understanding of cultural variation, can be employed to help account for both the corpus of results in TMT research and the growing body of findings inconsistent with TMT's predictions.
Cind Du Bois
Full Text Available This paper presents a new approach for the study of terrorist behaviour and argues that a framework based on Prospect Theory can provide novel, useful insights into the understanding of the terrorist mind-set. Such a framework allows different pathways to become a terrorist and although individual decisions are studied, the model also takes into account environmental factors. By changing these environmental factors and/or framing the choice differently, PT provides insights as to how the terrorist group and/or a charismatic leader can influence the individual’s whether or not to turn to terrorism.
Schmeichel, Brandon J; Gailliot, Matthew T; Filardo, Emily-Ana; McGregor, Ian; Gitter, Seth; Baumeister, Roy F
Three studies tested the roles of implicit and/or explicit self-esteem in reactions to mortality salience. In Study 1, writing about death versus a control topic increased worldview defense among participants low in implicit self-esteem but not among those high in implicit self-esteem. In Study 2, a manipulation to boost implicit self-esteem reduced the effect of mortality salience on worldview defense. In Study 3, mortality salience increased the endorsement of positive personality descriptions but only among participants with the combination of low implicit and high explicit self-esteem. These findings indicate that high implicit self-esteem confers resilience against the psychological threat of death, and therefore the findings provide direct support for a fundamental tenet of terror management theory regarding the anxiety-buffering role of self-esteem. Copyright (c) 2009 APA, all rights reserved.
Dechesne, Mark; Bandt-Law, Bryn
Building on Google's efforts to scan millions of books, this article introduces methodology using a database of annual word frequencies of the 40,000 most frequently occurring words in the American literature between 1800 and 2009. The current paper uses this methodology to replicate and identify terror management processes in historical context. Variation in frequencies of word usage of constructs relevant to terror management theory (e.g. death, worldview, self-esteem, relationships) are investigated over a time period of 209 years. Study 1 corroborated previous TMT findings and demonstrated that word use of constructs related to death and of constructs related to patriotism and romantic relationships significantly co-vary over time. Study 2 showed that the use of the word "death" most strongly co-varies over time with the use of medical constructs, but also co-varies with the use of constructs related to violence, relationships, religion, positive sentiment, and negative sentiment. Study 3 found that a change in the use of death related words is associated with an increase in the use of fear related words, but not in anxiety related words. Results indicate that the described methodology generates valuable insights regarding terror management theory and provide new perspectives for theoretical advances.
... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Litigation Management Submissions... U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program Office is seeking comments... or by mail (if hard copy, preferably an original and two copies) to: Terrorism Risk Insurance Program...
Kenneth E. Vail, III; Jacob Juhl
Physical death is an inevitable part of life. From the perspective of terror management theory (TMT), people’s efforts to manage the awareness of death can sometimes have harmful social consequences. However, those negative consequences are merely one side of the existential coin. In considering the other side of the coin, the present article highlights the more beneficial trajectories of the terror management process. For example, the awareness of mortality can motivate people to prioritize ...
Full Text Available Spreading fear is the essence of terrorism. Terrorists exploit fear by terrorising the target audience into concessions. Understanding how feelings of fear influence the way people feel, think and act is therefore an important starting point to explore how individuals and societies can learn how to cope with fear of terrorism. In this Policy Brief, Research Fellows Prof. Dr. Edwin Bakker and Dr. Tinka Veldhuis explore the dynamics of fear in response to terrorism, and emphasise the importance of integrating initiatives to manage fear of terrorism and reduce its negative consequences into overarching counter-terrorism strategies. It argues that societies can benefit greatly from promoting resilience and a fear management approach to counter-terrorism.
Pyszczynski, T; Greenberg, J; Solomon, S
Distinct defensive processes are activated by conscious and nonconscious but accessible thoughts of death. Proximal defenses, which entail suppressing death-related thoughts or pushing the problem of death into the distant future by denying one's vulnerability, are rational, threat-focused, and activated when thoughts of death are in current focal attention. Distal terror management defenses, which entail maintaining self-esteem and faith in one's cultural worldview, function to control the potential for anxiety that results from knowing that death is inevitable. These defenses are experiential, are not related to the problem of death in any semantic or logical way, and are increasingly activated as the accessibility of death-related thoughts increases, up to the point at which such thoughts enter consciousness and proximal threat-focused defenses are initiated. Experimental evidence for this analysis is presented.
Das, H.H.J.; Duiven, R.; Arendsen, J.L.; Vermeulen, I.E.
Building on terror management theory, three experiments tested whether advertisements with a mortality reminder increase purchase intentions for products that provide an (un)important source of self-esteem. Study 1 tested the effects of mortality salience in advertisements (mortality reminder: yes
O'Connor, Melissa L.; McFadden, Susan H.
According to Terror Management Theory as applied to ageism, older adults may be associated with mortality, thereby generating death-thought accessibility, stereotypes, and mixed emotions among younger adults. However, it is unclear how older adults' health conditions, such as dementia, affect ageist attitudes and mortality salience. In the current…
The NPT should prevent the proliferation of nuclear weapons, as a contribution to the worldpeace. This aim is also threatened today by the nuclear actions of states and subnational groups. Such actions have occured in the past and are expected in the future. States and specific terrorist groups are able to acquire specific nuclear material by theft and to assault nuclear plants and transport. The main constraint, the deficit of motivation, could be dropped in the future for many reasons. Therefore nuclear terrorism is a 'real threat to civilization' and its probability is increasing. (orig.) [de
Tom van Bommel; Cormac Oâ€™Dwyer; Tim W. M. Zuidgeest; Fenna H. Poletiek
The present research investigates how consumer choice is affected by Terror Management Theoryâ€™s proposition of Mortality Salience increasing oneâ€™s cultural worldview defense and self-esteem striving. The study builds empirically upon prior theorizing by Arndt, Solomon, Kasser and Sheldon (2004). During an experiment, we manipulated Mortality Salience and measured product preferences for conspicuousness and familiarity. Participants primed with death were more likely to choose conspicuous ...
Mafimisebi, Oluwasoye Patrick; Thorne, Sara
The controversial issues of terrorism and militancy have generated contemporary interests and different interpretations have emerged on how to combat and manage these dangerous events. This study widens understanding of moral disengagement mechanism application in the perpetuation of inhumanities within the context of oil terrorist and militant behaviors. The research findings and model are explicit on how people form moral evaluations of agents who are forced to make morally relevant decisions over times in context of crisis situations. Quite crucially, understanding the context of terrorism and militancy provides policymakers, emergency and crisis managers better analysis and response to such events. The research fundamental purpose was to investigate the mediating role of moral disengagement on delinquency of oil terrorism and militancy; and considered implications for emergency and crisis management practices. The study found that situational-induced crises such as oil terrorism and militancy were sufficient to account for an individual's misdeeds and unethical or inhumane decisions made under frustration and agitation may be perceived as less indicative of one's fundamental character. Findings suggest that more repugnant delinquencies could have been committed in the name of justice than in the name of injustice, avenues for future research. In context, the result of the moral disengagement scale shows that morality of delinquency (oil terrorism and militancy) is accomplished by cognitively redefining the morality of such acts. The main finding is that people in resistance movements are rational actors making rational choices. The authors argue that theorists, policymakers, and practitioners must give meaningful attention to understanding the multidimensional nature of emergency, crisis and disaster management for better strength of synthesis between theory and practice. The research is concluded by thorough examination of the implication and limitations for
Full Text Available Despite the urgency and growing interest in a subject, there is no unifying definition of terrorism. A large number of studies could be seen as integral part of ‘counter-terrorism’ strategies- as set of practices to prevent and defeat terrorism. Lisa Stampnitzky’s research looked into the discourse of terrorism experts and argued that the concept of terrorism is a social construct, thus revealing further structure that facilitated it. Aim of this paper is to compare the concept of terrorism as media discourse- a form of legitimate expert interpretation, with conspiracy theory as a form of illegitimate, para-institutional form of interpretation. Noting the commonplaces of the two: defined as an afterthought, both being designated and not self-described notions, featuring a plot that precedes the event- this paper will look at these discourses, the way they relate to (and intersect each other, and try to trace their manifestations.
Kenneth E. Vail, III
Full Text Available Physical death is an inevitable part of life. From the perspective of terror management theory (TMT, people’s efforts to manage the awareness of death can sometimes have harmful social consequences. However, those negative consequences are merely one side of the existential coin. In considering the other side of the coin, the present article highlights the more beneficial trajectories of the terror management process. For example, the awareness of mortality can motivate people to prioritize their physical health; uphold prosocial values; build loving relationships and peaceful, charitable communities; and foster open-mindedness. Further, the article explores the possible balance between defense and growth motivations, including the motivations toward integrative self-expansion, creativity, and well-being. And finally, we tentatively consider the potential positive impacts of direct confrontations with mortality on terror management processes. In sum, the present analysis suggests that although death awareness can sometimes produce some harmful outcomes, at least under certain conditions it can also motivate attitudes and behaviors that have positive personal and social consequences.
Sergey N. Enikolopov
Full Text Available Suicide is a controversial phenomenon that people of different cultures and evenof different epochs have had difficulty naming. It used to be an enduring themeof many medical, psychological, philosophical, and moralistic discussions. It is aparadoxical act of ultimate self-destruction, a flight from life to death. To commitsuicide is to overcome the fear of personal death and to make a step into nothingness.Such a desperately brave deed requires an abandonment of one’s sense ofimmortality, which we all have, a change of values and worldviews. But if one’ssuicide attempt proves unsuccessful, the question becomes how to explain to oneselfand others one’s recent act of self-violence. To discover these explanations, weconducted a study of 319 people, ranging in age from 18 to 25; they were all eitherstudents (n = 156 or patients in an emergency toxicology ward (people who hadattempted to poison themselves, n = 163. This article summarizes theories of suicidalbehavior and of the fear of death together with the ideas of cultural anthropologistE. Becker on these matters and puts suicide into the terror-managementperspective. The suicidal act is viewed as a mortality salience, and the hypothesisis that people who deny their recent suicide attempt (n = 33 and who have one (n= 95 or several (n = 35 suicide attempts in their personal history exhibit differentterror-management patterns in comparison with each other and with the controlgroup. They fall back on different resources with various degrees of effectiveness.Implications of these results for understanding suicidal and postsuicidal behaviorare discussed and suggestions for rehabilitation are made.
The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)
DeVito, D.A.; Suiter, L.
Counterterrorism is not the province of the emergency manager. Generally law enforcement has that role. Instead, the emergency manager's role is crisis management; the responsibility is to be the focal point for the chief executive officer (mayor, governor, or national executive) regarding the protection of the population. Managers must be able to gather and synthesize sufficient information, rapidly and accurately, on which to base sound decisions. To do so, they must have a highly efficient, coordinated emergency management organization in place at the state and local levels of government, and there must be a workable plan for emergency operations that integrates all public safety forces into an effective response to all types of emergencies. A major goal of emergency management is to ensure that government is in control and that the public perceives that the system is working. All states have an emergency management organization at the state level, as do most counties and large cities. However, some states and local governments, particularly those that have nuclear power plants within their borders, are better staffed, equipped, and trained than others to deal with nuclear incidents. States with nuclear facilities have an emergency management organization, an emergency plan, and adequate communications, equipment, and trained personnel to handle a nuclear accident or incident at a plant. 21 references
Full Text Available David Rapoport’s Wave theory of terrorism is one of the most oftencited theories in the literature on terrorist violence. Rapoport is praised for having provided researchers with a universal instrument which allows them to explain the origin and transformation of various historical types of terrorism by applying to them the concept of global waves of terrorist violence driven by universal political impulses. This article, testing the Wave theory against the recent phenomenon of homegrown jihadism in Europe, uncovers this theory’s fundamental weaknesses and questions its real academic and practical value.
Hart, Joshua; Shaver, Phillip R; Goldenberg, Jamie L
On the basis of prior work integrating attachment theory and terror management theory, the authors propose a model of a tripartite security system consisting of dynamically interrelated attachment, self-esteem, and worldview processes. Four studies are presented that, combined with existing evidence, support the prediction derived from the model that threats to one component of the security system result in compensatory defensive activation of other components. Further, the authors predicted and found that individual differences in attachment style moderate the defenses. In Studies 1 and 2, attachment threats motivated worldview defense among anxiously attached participants and motivated self-enhancement (especially among avoidant participants), effects similar to those caused by mortality salience. In Studies 3 and 4, a worldview threat and a self-esteem threat caused attachment-related proximity seeking among fearful participants and avoidance of proximity among dismissing participants. The authors' model provides an overarching framework within which to study attachment, self-esteem, and worldviews.
Dr. Cristian Barna
Full Text Available After the terrorism attacks of September 11, 2001, there is recognition by both the public and private sectors that one needs to rethink our strategy for dealing with these low probability but extreme consequence events. September 11, 2001 attacks against the United States raised numerous questions related to counter-terrorism, foreign policy, as well as national security in the United States and abroad. They also raised the fundamental question of who should pay for losses due to terrorism.The question of who should pay for terrorism risk prevention and sustainable coverage within a country is likely to be seen first as a matter of collective responsibility that each country has to consider – a societal choice
Somer, Eli; Maguen, Shira; Or-Chen, Keren; Litz, Brett T
Using telephone surveys, we examined exposure to terror, coping, and mental health response in randomly selected Jewish-Israelis (n = 100) and Arab-Israelis (n = 100) living in five Israeli cities affected by terrorism. Jewish-Israelis and Arab-Israelis were randomly selected for study participation and completed telephone surveys in May 2002, following an extended string of terror attacks and hostilities. Although terrorism is designed to target Jewish-Israelis, the rates of exposure were similar in the two groups. Arab-Israelis reported using a wider array of coping strategies, yet also endorsed more frequent PTSD and more severe depression symptoms than Jewish-Israelis. We examined a variety of demographic, ethnic, and religious predictors of different coping styles and found varying results. For example, acceptance coping was best predicted by Arab-Israeli ethnicity, being female, greater religiosity, and lower education. Predictors of mental health response to terror were also examined, with Arab-Israeli ethnicity, being female, adaptation coping and collaborative coping best predicting PTSD and depression symptoms. Arab-Israelis may not have the same access to overarching sources of patriotic support that are readily available to their Jewish compatriots, and civilian and economic inequity experienced by the Arab minority may add to a sense of diminished resources. Our findings justify outreach efforts to overlooked minorities at risk for posttraumatic distress. Women seem to be at particular risk for the development of mental health symptoms following terrorism, which should also be noted for outreach purposes.
theory orients command leadership for the enormous task of managing organizations in our environment fraught with volatility, uncertainty...performance and organizational ethics. A THEORY OF MANAGEMENT BACKGROUND BASIC MANAGEMENT BEHAVIORAL Definitions FUNCTIONS ASPECTS History Planning Leadership ...the best way to manage in their theory of managerial leadership . To them, the 9,9 position on their model, "is acknowledged by managers as the
Coufal, Kathy L.
This introductory article to a forum on contemporary issues discusses the importance of communication in the transmission of social values and attitudes and applies mediation theory to the role of parents and teachers in assisting children to understand the images and rhetoric they encounter. (Contains 3 references.) (Author/DB)
Full Text Available Terrorism is one of the war methods that has been used individuals, groups, and even by some states for centuries. Those who used terrorism as a method might get some short term results, but in the long term they certainly harm themselves, their nations and sometimes the whole world. The PKK, which is a brutal and an international terrorist organization, has started its activities in the southeast of Turkey 35 years ago, and today it became a well-known terrorist organization around the world. Policies and strategies applied by Turkey against the PKK for years did not help to finish the PKK and its activities. Today, experts, researchers and politicians believe that it is time to find different but more effective counterterrorism policies. Systems theory offers efficient, comprehensive and unique counterterrorism methods against the PKK terrorism. In order to unearth PKK’s recruitment tactics, some conferences for high school students were organized and conducted during the last two years in Diyarbakir. The conference series made it clear that there are some different ways such as enlightening young people to fight against the PKK in the lights of systems perspective. This research shows that security agencies which are responsible of dealing with terrorist organizations need to pay attention to youth and students in the region
Nakatani, Eri; Tanaka, Satoru; Choi, Jor-Shan
While considerable attention and resources have been directed towards improving nuclear security in Japan in response to the threat of nuclear terrorism, the transport of nuclear material raises concern by the public as indicated in the recent return of MOX fuel from Europe. This concern cannot be adequately addressed by the government through communications with the public because of the confidential nature of such transport. Also, it remains a challenge for adequately assessing the nuclear terrorism risk because many key parameters associated with such assessment cannot be derived from statistical data and reflect actors' intentions unlike assessment on natural disasters. This study proposes an assessment methodology which introduces game theory to deduce the correlations between those key parameters and can be used to analyze the nuclear terrorism risk, both quantitatively and qualitatively for the civilian use of nuclear power. Risk will be calculated by Monte Carlo methods based on probability distributions set for actors' utilities. A case-study of transporting the MOX fuel by sea is also included. (author)
If recent years have witnessed the rise of a worldwide phenomenon of reconciliation and apology, so also in the past few decades, and with increasing force since September 11, 2001, the global forum has seen the increased mediatization of spectacles of terror. The present moment is thus characterized by two seemingly contradictory rubrics: the…
Hayes, Joseph; Schimel, Jeff; Arndt, Jamie; Faucher, Erik H
Terror management theory (TMT) highlights the motivational impact of thoughts of death in various aspects of everyday life. Since its inception in 1986, research on TMT has undergone a slight but significant shift from an almost exclusive focus on the manipulation of thoughts of death to a marked increase in studies that measure the accessibility of death-related cognition. Indeed, the number of death-thought accessibility (DTA) studies in the published literature has grown substantially in recent years. In light of this increasing reliance on the DTA concept, the present article is meant to provide a comprehensive theoretical and empirical review of the literature employing this concept. After discussing the roots of DTA, the authors outline the theoretical refinements to TMT that have accompanied significant research findings associated with the DTA concept. Four distinct categories (mortality salience, death association, anxiety-buffer threat, and dispositional) are derived to organize the reviewed DTA studies, and the theoretical implications of each category are discussed. Finally, a number of lingering empirical and theoretical issues in the DTA literature are discussed with the aim of stimulating and focusing future research on DTA specifically and TMT in general.
... terrors or other family members Lead to safety concerns or injury Result in daytime symptoms of excessive sleepiness or problems functioning Continue beyond the teen years or start in adulthood Causes Sleep terrors ...
Wang, Soon Joo; Choi, Jin Tae; Arnold, Jeffrey
South Korea has experienced > 30 suspected terrorism-related events since 1958, including attacks against South Korean citizens in foreign countries. The most common types of terrorism used have included bombings, shootings, hijackings, and kidnappings. Prior to 1990, North Korea was responsible for almost all terrorism-related events inside of South Korea, including multiple assassination attempts on its presidents, regular kidnappings of South Korean fisherman, and several high-profile bombings. Since 1990, most of the terrorist attacks against South Korean citizens have occurred abroad and have been related to the emerging worldwide pattern of terrorism by international terrorist organizations or deranged individuals. The 1988 Seoul Olympic Games provided a major stimulus for South Korea to develop a national emergency response system for terrorism-related events based on the participation of multiple ministries. The 11 September 2001 World Trade Center and Pentagon attacks and the 2001 United States of America (US) anthrax letter attacks prompted South Korea to organize a new national system of emergency response for terrorism-related events. The system is based on five divisions for the response to specific types of terrorist events, involving conventional terrorism, bioterrorism, chemical terrorism, radiological terrorism, and cyber-terrorism. No terrorism-related events occurred during the 2002 World Cup and Asian Games held in South Korea. The emergency management of terrorism-related events in South Korea is adapting to the changing risk of terrorism in the new century.
Full Text Available A growing body of scholarly literature suggests confluence or even convergence of organized crime and terrorism in various parts of the world. However, links remain somewhat nebulous at this stage and vary considerably, based on region and context. Africa has come under the spotlight due to perceived weaknesses in the criminal justice sector, limited law enforcement capacity, political and systemic corruption, poor border patrol and weak anti-terror and organized crime laws which are believed to provide an ideal environment for the terror-crime nexus to flourish. This article provides an African perspective on the links between organized crime and terror networks in Sub-Saharan Africa, with a particular focus on Southern Africa. The discussion begins with an overview of the theoretical discourse on the subject – relying on African definitions of the contested concepts of ‘terrorism’ and ‘organized crime’ – and will then narrow the analysis on the sub-Saharan case. It relies on an extensive literature review and concludes with empirical findings of a research project on organized crime in Southern Africa, which found no strong empirical links between criminal and terrorist organizations.
Globalisation and development in technology have advanced terrorism to reach a broader target audience. Especially focussing at the international co-operation strategies and combined social networks, terrorist activities have an direct- and indirect effect on private households, international commerce and local governments. Security institutions and state organisations use various combinations of counter- terrorism measures, that are mostly social-, political-, or financial in nature. Neverth...
Arena, Michael P; Arrigo, Bruce A
This article relies upon structural symbolic interactionism and five of its organizing concepts (i.e. symbols, the definition of the situation, roles, socialization and role-taking, and the self) to put forth a novel conceptual framework for understanding the terrorist identity. In order to demonstrate the practical utility of the framework, applications to various terrorist groups around the globe are incorporated into the analysis. Overall, both the theoretical and application work help reorient the academic and practitioner behavioral science communities to the importance of culture, self, and society when investigating one's membership in and identity through militant extremist organizations. Given the unique approach taken by this article, several provisional implications are delineated. In particular, future research on terrorism, strategies linked to counter-terrorism, legal and public policy reform, and the relevance of utilizing a sociologically animated social psychology in the assessment of other forms of criminal behavior are all very tentatively explored.
Stephens, Ronald D; Feinberg, Ted
When terrorism and natural disasters strike it is extremely important to be able to effectively manage America's schools. From the crises of Columbine, to Red Lake Minnesota, the World Trade Center and Katrina, we are reminded that schools are not immune from such disasters. It is essential that schools and communities review and augment their safe school plans and partnerships so that they can respond effectively in times of crisis. It is critically important to assess local preparedness, to update, train and practice crisis response. School officials should have specific plans in place that focus on crisis prevention, crisis preparation, crisis response and crisis recovery. This article addresses those key concerns that every school system should place on their educational agenda. Additional resources and strategies are also suggested that will promote safe and welcoming schools for all ofAmerica's children.
Gerard de Valence
Full Text Available The links between theory and construction management (CM, and for that matter construction economics (CE, are not strong (see de Valence 2011. This may be one of the reasons why they have not gained complete acceptance as academic disciplines and are not seen as distinct branches of economics and management respectively. Another reason may be that products and production (the focus of management and economic theories respectively are not the same as projects and project management in general, and construction projects and CM in particular.
Theory : Recommendations For The National Strategy To Defeat Terrorism.” Student Issue Paper, Center for Strategic Leadership , US Army War College, July...Lens of Complexity Theory : Recommendations For The National Strategy To Defeat Terrorism.” (Student Issue Paper, Center for Strategic Leadership , US...planners managed to cause confusion in the enemy’s internal model by operating in an unexpected manner. 140 Glenn E. James, “Chaos Theory : The
Tjew-A-Sin, Mandy; Koole, Sander Leon
Terror Management Theory (TMT; Greenberg et al., 1997) proposes that mortality concerns may lead people to reject other cultures than their own. Although highly relevant to multiculturalism, TMT has been rarely tested in a European multicultural society. To fill this void, two studies examined the effects of mortality salience (MS) among native Dutch people with varying levels of national identification and self-esteem. Consistent with TMT, MS led to less favorable attitudes about Muslims and multiculturalism among participants with high (rather than low) national identification and low (rather than high) self-esteem (Study 1). Likewise, MS led participants with high national identification and low self-esteem to increase their support of Sinterklaas, a traditional Dutch festivity with purported racist elements (Study 2). Together, these findings indicate that existential concerns may fuel resistance against multiculturalism, especially among people with low self-esteem who strongly identify with their nationality.
tradition continues unabated in mosques today (Joseph & Najmabadi, 2005). To note this fact is by no means to suggest that gender segregation is unique...Raja Dahir because there came to him news of a Muslim women who was raped!!! and today our beloved Prophet (Katimun Nabieen Mohammad al-Ameen) PBUH... Feminism meets queer theory. Bloomington, IN: Indiana University Press. White, J. R. (2011). Terrorism and homeland security. New York: Cengage
Notes the lack of a concise meaning for the word terrorism. Develops a working definition which states that terrorism is the deliberate creation and exploitation of fear through violence or the threat of violence in the attainment of political objectives. (JDH)
Angeler, David G.; Allen, Craig R.; Barichievy, Chris; Eason, Tarsha; Garmestani, Ahjond S.; Graham, Nicholas A.J.; Granholm, Dean; Gunderson, Lance H.; Knutson, Melinda; Nash, Kirsty L.; Nelson, R. John; Nystrom, Magnus; Spanbauer, Trisha; Stow, Craig A.; Sundstrom, Shana M.
Human impacts on the environment are multifaceted and can occur across distinct spatiotemporal scales. Ecological responses to environmental change are therefore difficult to predict, and entail large degrees of uncertainty. Such uncertainty requires robust tools for management to sustain ecosystem goods and services and maintain resilient ecosystems.We propose an approach based on discontinuity theory that accounts for patterns and processes at distinct spatial and temporal scales, an inherent property of ecological systems. Discontinuity theory has not been applied in natural resource management and could therefore improve ecosystem management because it explicitly accounts for ecological complexity.Synthesis and applications. We highlight the application of discontinuity approaches for meeting management goals. Specifically, discontinuity approaches have significant potential to measure and thus understand the resilience of ecosystems, to objectively identify critical scales of space and time in ecological systems at which human impact might be most severe, to provide warning indicators of regime change, to help predict and understand biological invasions and extinctions and to focus monitoring efforts. Discontinuity theory can complement current approaches, providing a broader paradigm for ecological management and conservation.
Craig, J. Robert; Hindmarsh, Wayne A.
Today's contemporary management and motivation theories, as applied to the business of broadcasting, are the focus of the first section of this paper. It deals with the kinds and reactions of employees in broadcasting stations in relation to 11 motivational theories: (1) Theories X and Y, (2) Immaturity-Maturity Theory, (3) V Theory, (4) Z Theory,…
Contemporary theories of management tend to account for and help interpret the rapidly changing nature of today’s organizational environment. This paper deals with several important modern theories in management. Among them we can mention: the Scientific Management School, the Classical Organizational Theory School, the Behavioural School, the Management Science School, as well as recent developments in management theory comprising works such as: Systems approach, Situational or Contingency t...
This paper examines the problems of life management theory and shows the directions of researches in this field. I examine the directions of research in home management theory, which is antecedents of life management theory. There are three directions of research in home management theory. The first direction is to make clear the problems of people's family lives in terms of time use, money expenditure, family relations and so on. The second direction is to examine the home management itself....
Full Text Available The present article deals with the ontological problem of applying the rational choice frameworks to the study of terrorism. It testing the application of the rational choice to the “old” (before the end of the Cold War and the “new” (after the end of the Cold War terrorisms. It starts with analyzing the fundamentals of rationality and applies it at two levels: the individual (actors and group (collective via two outlooks: tactical (short-term and strategic (long-term. The main argument of the article is that while the “old” terrorism can be explained by the rational choice theory its “new” version represents a substantial departure from rationality.
Full Text Available My essay begins by analyzing how Hegel and Honneth’s theory of recognition would seem to lend support to insurgent terrorists’ struggle for the right to self-determination. Insurgent terrorism often looks like a concretization of what Honneth calls the moral protest of the oppressed launched against the dominating powers. Insurgent terrorism also bears affinity to the politics of recognition in the sense that it challenges the legitimacy and authority of the forces owned by the state, and seeks to gain public recognition instead for the legitimacy of their own cause. Precisely because what matters uppermost to terrorists is the gaining of recognition for their cause as just, terrorists are eager to seize the mass media as a means of spreading their ideas. My essay will end, however, by pointing out major differences between insurgent terrorism on the one hand, and Hegel and Honneth on the other.
Tallen, Jr, George W
Fixation upon WMD terrorism, reinforced by the recurring need to manage the consequences of other manmade or natural disasters, has conditioned the homeland security community to focus upon prevention...
Martin, L. L.; Van den Bos, Kees
In this article we review the basic assumptions and findings of terror management theory. Then we discuss some problems with those assumptions and findings. We note, for example, that the theory is not falsifiable, that theorists have not done a good job of integrating conflicting empirical
Full Text Available As a whole, this PhD thesis follows three research lines, namely: (1 the conceptual line - concerns the definition of the money laundering and terrorism financing phenomenon, the processes, mechanisms, stages and instruments of the laundering of illegally obtained fund; (2 the estimative line aimed at measuring the size of money laundering phenomenon, the economic, social and security effects and consequences; (3 the line of an awareness of the need to prevent and fight against the effects arising from money laundering processes, the national and international efforts taken until present nation- and worldwide and the future measures required to diminish the consequences of this scourge.
Niederman, Fred; March, Salvatore T.; Mueller, Benjamin
This paper describes how the general notion of process theory can provide a foundational component in a portfolio of project management theories. The paper begins by outlining a variety of views pertaining to the nature of theory and theory development. This forms a basis for understanding how
Leistedt, S J
Theories of religion are essential for understanding current trends in terrorist activities. The aim of this work is to clarify religion's role in facilitating terror and outline in parallel with recent theoretical developments on terrorism and human behaviour. Several databases were used such as PubCentral, Scopus, Medline and Science Direct. The search terms "terrorism", "social psychology", "religion", "evolution", and "cognition" were used to identify relevant studies in the databases. This work examines, in a multidimensional way, how terrorists employ these features of religion to achieve their goals. In the same way, it describes how terrorists use rituals to conditionally associate emotions with sanctified symbols that are emotionally evocative and motivationally powerful, fostering group solidarity, trust, and cooperation. Religious beliefs, including promised rewards in the afterlife, further serve to facilitate cooperation by altering the perceived payoffs of costly actions, including suicide bombing. The adolescent pattern of brain development is unique, and young adulthood presents an ideal developmental stage to attract recruits and enlist them in high-risk behaviors. This work offers insights, based on this translational analysis, concerning the links between religion, terrorism and human behavior. Copyright © 2017 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.
Terrorism, Outraged World Seeks an Answer." U. News and World Report, September 18, 1972, p. 16. Arendt , Hannah . Crisis of the Republic. N. Y., Harcourt...Brace Jovanovich, 1972. Arendt , Hannah , On Violence. N. Y. Harcourt, Brace and World, 1970. Arendt , Hannah . On Revolutions. N. Y., Viking Press, 1965... Arendt , Hannah . "Reflections on Violence." Journal of International Affairs, 23:1, 1969. "Are the Skies Really Friendly?" Proposed Theories of Relief for
Recent reports of alleged terrorist plans to build a 'dirty bomb' have heightened longstanding concerns about nuclear terrorism. This briefing outlines possible forms of attack, such as: detonation of a nuclear weapon; attacks involving radioactive materials; attacks on nuclear facilities. Legislation addressing these risks and the UK's strategy for coping with them are also considered
Halldorsson, Arni; Hsuan, Juliana; Kotzab, Herbert
Borrowing from complementary theories has become an important part of theorizing SCM. We build upon principal-agent theory (PAT), transaction cost analysis (TCA), network theory (NT), and resource-based view (RBV) to provide insights on how to structure a supply chain and manage it. Through...
Carroll, Archie B.
Instructors of management in higher education have not been cautious in explaining the relation between practice and theory in their basic courses. The author distinguished between the two in suggesting that management theory is based on observed practices and may or may not have broader application. (AG)
Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts
Full Text Available The article tries first to analyse the different use of the concept of war made by George W. Bush with reference to the terrorist attack of 09/11 and to the invasion of Afghanistan. In order to do this, the paper will start from an analysis of the concept of terrorism itself and from the question whether terrorist acts can be designed as acts of war. It turns secondly to the more philosophical aspects of the question of terrorism, war and peace, starting from questions about the applicability of just war theories to the so called “war on terrorism” and discussing finally what is called “The Kantian Project”, that is the Kantian arguments for the establishment of “eternal peace” among the states of the world.
Sanchez, Ron; Heene, Aimé
In this paper we examine some fundamental epistemological issues in building theory for applied management science, by which we mean theory that can be usefully applied in a scientific approach to management research and practice. We first define and distinguish “grand theory” from “mid......-range theory” in the social and management sciences. We then elaborate and contrast epistemologies for (i) building “grand theory” intended to be applicable to all cases and contexts, and (ii) building “mid-range theory” intended to apply to specific kinds of contexts. We illustrate the epistemological...... challenges in building grand theory in management science by considering important differences in the abilities of two “grand theories” in strategic management – industry structure theory and firm resources theory – to support development of conceptually consistent models and propositions for empirical...
Ursano, Robert J
Comprehensive workplace preparedness for terrorism must address and integrate the psychological and behavioral aspects of terrorism preparedness and response in order to address issues of human continuity...
Scientific and reasonable operator management is the basis of nuclear security. It was paid more attention after the three-mile island accident. The prediction of operators' basic behavior parameters is the premise and foundation of scientific and reasonable operator management. Grey theory happens to solve the dilemma encountered in prediction and decision-making of operator behavior in operator management of NPP. The procedure is divided into two steps: according to the history record of operators' behavior parameter, a differential equation model using grey theory is set up to predict the future behavior of operators and use grey theory to make decision for operator management. The calculation result is helpful for operator management and also useful for operators to find their shortcoming. Grey theory using in the study provides a new idea and method for future operator management in NPP
Scientific and reasonable operator management is the basis of nuclear safety. It is paid more attention after the three-mile island accident. The prediction of operators' basic behavior parameters is the premise and foundation of scientific and reasonable operator management. Grey theory happened to solve the dilemma encountered in prediction and decision-making of operator behavior in operator management of nuclear power plant. The procedure was divided into two steps: 1) According to the historical record of operators' behavior parameters, a differential equation model using grey theory was set up to predict the future behavior of operators; 2) operator management decision-making was made based on grey theory. The calculation result is not only helpful for operator management but also useful for operators to find their shortcomings. Grey theory used in the study provides a new idea and method for future operator management in nuclear power plant. (author)
The scholars increasingly pay at ention to the internal rules in knowledge development and innovation of construction engineering management,as wel as the framework for engineering management body of knowledge. Considering the one-of-a-kind characteristic of construction project s and highly dependence from projects on management knowledge and its innovation,this paper analyzed the knowledge body of engineering management and its development dimension ,such as thinking and knowledge structure dimensions. The engineering management knowledge innovation model and structural model were put forward. The paper reviewed and proposed the engineering management knowledge system framework under engineering thinking mode,including the basic knowledge system framework which is used in engineering management research ,and a framework for body of knowledge which is applicable for engineering management practice. Based on a brief analysis of engineering management practice,this paper analyzed the development progres of engineering management from engineering thinking to ethical thinking and philosophical thinking. A dynamic model formed from the modern engineering management theory was put forward. The construction of projects are divided into two stages:an investment decision-making stage, and project implementation stage. According to the fact that project owners obtain the project products by transaction,the management during project implementation stage are divided into two aspects:project transaction management for the owner, and construction project management for the contractor. Thus, the three theoretical modules of modern engineering management were established:project investment decision-making management theory,engineering transaction management theory, and engineering project management theory. This paper further analyzed the content and basic theoretical issues of each theoretical module.
Blakely, Thomas J; Dziadosz, Gregory M
This article describes a model for care managers that is based on attachment theory supplemented by knowledge from neuroscience. Together, attachment theory and basic knowledge from neuroscience provide for both an organizing conceptual framework and a scientific, measureable approach to assessment and planning interventions in a care plan.
Rendtorff, Jacob Dahl
This chapter presents the problem of legitimacy as the central question of the philosophy of management and corporations. This problem is then presented with the economic theory of Adam Smith and with the concept of legitimacy from Max Weber. Further on, the contributions of recent theories...
Shahram Mirzaie Daryani; Samad Aali; Ahmad Asli-zadeh
Organizational theory offers effective ways of thinking to researchers and practitioners who are interested in this field of study. This knowledge helps managers make organizational behavior more efficient through analyzing complex situations and developing effective tools to resolve them. In other words, it opens human’s mind to different aspects of life both inside and outside of the organization. Therefore, the value of organizational theory is in changing managers' thinking ways, thought ...
Charles Anderton; John Carter
The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, while basic game theory helps characterize the strategic interdependencies among terrorists and governments.
Anderton, Charles H.; Carter, John R.
The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, and basic game theory helps characterize the strategic interdependencies among terrorists and governments.…
Matthew D. Phillips
Full Text Available 'Cooperation and imitation among crime and terror groups in recent years has given rise to a crime-terror nexus. A linear conceptualisation of a crime-terror spectrum, suggests that complete convergence of crime and terror in a failed state can give rise to a ‘black hole.’ Theoretical models of the crime-terror nexus, however, do not specify the means by which a crime-terror group enters this black hole state, yet others do not. Using the Taliban movement as a case study, this article presents a theoretical extension of black hole theory, using organisation-level characteristics to merge black hole theory with the crime-terror continuum.'
Israelsen, Poul; Andersen, Michael; Rohde, Carsten
The article describes the present state of cost and management accounting in Denmark within “mainstream accounting”, both as regards theory and practice. In the case of theory, there has been a gradual convergence of views. The essence of these views is briefly described. Concerning practice......, the main results of two new empirical studies are presented one on product costing and the other on identifying the adoption of “modern cost management techniques” in Denmark. The article places both current theory and practice in their historical context. In the former, this is done through an outline...
1.Human impacts on the environment are multifaceted and can occur across distinct spatiotemporal scales. Ecological responses to environmental change are therefore difficult to predict, and entail large degrees of uncertainty. Such uncertainty requires robust tools for management...
The Republic of South Africa lies at the southern tip of the African continent. The population encompasses a variety of races, ethnic groups, religions, and cultural identities. The country has had a turbulent history from early tribal conflicts, colonialisation, the apartheid period, and post-apartheid readjustment. Modern terrorism developed mainly during the apartheid period, both by activities of the state and by the liberation movements that continued to the time of the first democratic elections in 1994, which saw South Africa evolve into a fully representative democratic state with equal rights for all. Since 1994, terrorist acts have been criminal-based, evolving in the Cape Town area to political acts, largely laid at the feet of a predominantly Muslim organisation, People against Gangsterism and Drugs, a vigilant organisation allegedly infiltrated by Muslim fundamentalists. Along with this, has been terrorist activities, mainly bombings by disaffected members of white, right-wing groups. In the apartheid era, a Draconian series of laws was enacted to suppress liberation activities. After 1994, most of these were repealed and new legislation was enacted, particularly after the events of 11 September 2001; this legislation allows the government to act against terrorism within the constraints of a democratic system. Disaster management in South Africa has been largely local authority-based, with input from provincial authorities and Civil Defence. After 1994, attempts were made to improve this situation, and national direction was provided. After 11 September 2001, activity was increased and the Disaster Management Act 2002 was brought into effect. This standardized disaster management system at national, provincial, and local levels, also facilites risk assessment and limitation as well as disaster mitigation. The potential still exists for terrorism, mainly from right-wing and Muslim fundamentalist groups, but the new legislation should stimulate disaster
Quigley, Jon M
Configuration Management: Theory, Practice, and Application details a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts of the organization. It supplies an overview of configuration management and its process elements to provide readers with a contextual understanding of the theory, practice, and application of CM. Explaining what a configuration item is and what it implies, the book illustrates the interplay of configuration and data management with all enterprise resources during each phase of a product lifecycle. It also demonstrates the interrelationship of CM to functional resources. Shedding light on current practice, the book describes CM baselines, configuration identification, management baseline changes, and acceptance criteria ...
@@ 1.Introduction Many new businesses are opened in the whole world every day.Unfortunately,only a minor part of them has success and continues its activity.There is a variety of reasons which determine the hankruptcy of companies.Most of them are included in running a business,and more and more people come to realize the significance of management,especially personnel management,as personnel represents the relationship between people in the company,which is a key point for the development of enterprise.
Handel, Michael J
Debates within organization theory traditionally argued the relative merits of bureaucracy but today there is broad agreement across different perspectives that bureaucratic organization is inefficient and outmoded. Despite their differences, post-bureaucratic and neo-liberal theories argue that organizations with relatively flat hierarchies and low management overhead are better adapted to current market requirements. Post-bureaucratic theory also argues that employees, as well as firms, benefit from leaner management structures. This paper investigates trends in managerial leanness, proposed explanations for such trends, and the consequences of leanness for firms and employees. Although there is a trend toward flatter management hierarchies, there is only weak support for current claims regarding both the causes and consequences of lean management. Copyright © 2013 Elsevier Inc. All rights reserved.
This article is aimed at those professional scientists and engineers who believe that issues of international peace and security are too important to be left to the politicians. Nuclear Terrorism is a hostile act (or a threat of such an act) involving nuclear materials (fissile or radioactive) performed by a terrorist, a term which covers a wide range of individuals. What they all have in common is that, for some reason they have become motivated to hurt or destroy sections of society which they have come to regard as the enemy; their motivation varies enormously. They also vary enormously in the extent and nature of their technical/scientific education. There are 'PhD terrorists' and 'Peasant terrorists', and they differ greatly in the threat that they represent, and the steps which can appropriately be taken to counter it. The most serious threat comes from the potential ability of terrorists to steal or manufacture nuclear weapons of mass destruction (e.g. capable of causing thousands of deaths). Unless the underlying causes of terrorism can be quickly removed, we have a duty to mankind to make terrorist access to such weapons, and to the nuclear materials which are their essential ingredients, as difficult as possible. Improvements in the arrangements for denying unauthorised access to radioactive material should be made such that the protective measures made are proportionate to the number of Curies at risk and the likelihood of a terrorist initiative. The preventative measures, sadly, need to take account of the possibility that the terrorist will use lethal force to access the material. (author)
Madsen, Mona Toft
The goal of the paper is to revisit and analyze key contributions to the understanding of leadership and management. As a part of the discussion a role perspective that allows for additional and/or integrated leader dimensions, including a change-centered, will be outlined. Seemingly, a major...
George H. Stankey; Roger N. Clark; Bernard T. Bormann
This report reviews the extensive and growing literature on the concept and application of adaptive management. Adaptive management is a central element of the Northwest Forest Plan and there is a need for an informed understanding of the key theories, concepts, and frameworks upon which it is founded. Literature from a diverse range of fields including social learning...
1.Human impacts on the environment are multifaceted and can occur across distinct spatiotemporal scales. Ecological responses to environmental change are therefore difficult to predict, and entail large degrees of uncertainty. Such uncertainty requires robust tools for management to sustain ecosystem goods and services and maintain resilient ecosystems. 2.We propose an approach based on discontinuity theory that accounts for patterns and processes at distinct spatial and temporal scales, an inherent property of ecological systems. Discontinuity theory has not been applied in natural resource management and could therefore improve ecosystem management because it explicitly accounts for ecological complexity. 3.Synthesis and applications. We highlight the application of discontinuity approaches for meeting management goals. Specifically, discontinuity approaches have significant potential to measure and thus understand the resilience of ecosystems, to objectively identify critical scales of space and time in ecological systems at which human impact might be most severe, to provide warning indicators of regime change, to help predict and understand biological invasions and extinctions and to focus monitoring efforts. Discontinuity theory can complement current approaches, providing a broader paradigm for ecological management and conservation This manuscript provides insight on using discontinuity approaches to aid in managing complex ecological systems. In part
Jacobs, Lenworth M; Burns, Karyl J
The bombings of London on July 7, 2005 highlight the need for continued vigilance and readiness to respond to terrorist attacks. Trauma centers need to be at the core of preparedness activities. The State of Connecticut has taken a lead in preparedness and was selected as a site for the US Department of Homeland Security's Top Officials Three Exercise (TOPOFF 3), the largest and most extensive antiterrorism drill ever conducted. All 32 acute care hospitals in Connecticut took part in the drill. The simulated attacks were designed to test all aspects of emergency preparedness including the ability of hospitals to treat large numbers of victims and effectively monitor and implement mechanisms for surge capacity. In Connecticut, TOPOFF 3 tested the Bioterrorism Preparedness Web Application that was designed to be the primary communication and resource management tool during a terrorist event or public health emergency. This paper describes: 1) the impetus for the State of Connecticut Department of Public Health's Bioterrorism Preparedness Web Application; 2) the strategies used to ensure its readiness and appropriate utilization during a public health emergency; and 3) its use for communication and resource management by the Department of Public Health and the acute care hospitals during TOPOFF 3. The Bioterrorism Preparedness Web Application was successfully implemented and used during TOPOFF 3 to assess surge capacity and other resources. Careful development and implementation of the Web application, or any communication system, as well as training and regular practice are required to ensure effective use during a public health emergency.
Bærentzen, Marc Theis
The focus of this report will be how theory and methodology is a necessary mean for an academic understanding of terrorism, using different theories and examples to substantiate my argument. Terrorism has become a diluted concept that is used in a variety of ways to define violence against civilians. But is this enough to claim that we are dealing with a terrorist threat? In academic work these kind of reflections are important to the drawn conclusion. The problematic issue of an absent metho...
This paper discussed that, for successful implementation of the strategies in investigating terrorism, besides requiring professional skilled investigators, there are some additional requirements that need to be fulfilled. Effective and long term prevention of terrorism should be directed towards producing good social welfare and to minimize every condition that may be conducive to the emergence of terrorism, such as discrimination and marginalization.
Mitchell, Thomas H.
Discusses the issue of terrorism as it exists today and examines progress that has been made toward understanding its dimensions. Suggests how this subject can be explored in the classroom. Dispels misconceptions about terrorism by defining the term, and examines some causes of terrorism and strategies employed by terrorists. (KO)
Decker, Warren; Rainey, Daniel
Terrorism has become not merely a political act, but a carefully designed and rhetorically sophisticated attempt at communication. What role should the communication scholar play in the investigation of terrorism? Specifically, there are six areas within which the communication scholar may actively contribute to an understanding of terrorism as…
Morton, Donald J.
Participative management is not the most fruitful way to use Theory Y; much greater benefits can be obtained by stressing job characteristics that cultivate individual psychological desires. (Available from Office of Publications, Graduate School of Business Administration, University of Michigan, Ann Arbor, MI 48104, $2.50, single issue)…
J. Paauwe (Jaap); J.P.P.E.F. Boselie (Paul)
textabstractTo fully understand the relationship between human resource management and performance in different contexts, we are in need of a synthesis between resource-based theory and new institutionalism. We argue that differences in institutional settings (between for example countries or
Friedman, George J
Packed with new material and research, this second edition of George Friedman’s bestselling Constraint Theory remains an invaluable reference for all engineers, mathematicians, and managers concerned with modeling. As in the first edition, this text analyzes the way Constraint Theory employs bipartite graphs and presents the process of locating the “kernel of constraint” trillions of times faster than brute-force approaches, determining model consistency and computational allowability. Unique in its abundance of topological pictures of the material, this book balances left- and right-brain perceptions to provide a thorough explanation of multidimensional mathematical models. Much of the extended material in this new edition also comes from Phan Phan’s PhD dissertation in 2011, titled “Expanding Constraint Theory to Determine Well-Posedness of Large Mathematical Models.” Praise for the first edition: "Dr. George Friedman is indisputably the father of the very powerful methods of constraint theory...
Laufer, Avital; Solomon, Zahava; Levine, Stephen Z
This study aims to examine competing explanations of the relationship between religious and political ideology commitment with posttraumatic growth. Subjects were Israeli youth who were exposed to terror (n = 2,999) aged 13-15. Measures included: posttraumatic growth inventory, religious orientation, ideological commitment, objective and subjective exposure to terror. Both religiosity and political ideology mediated the effects of exposure and fear on growth. Political ideology but not religiosity, had a moderating effect, such that subjective fear was positively associated with growth only among those with stronger ideologies. Results support the contention of Terror Management Theory that cultural beliefs have beneficial effects on well being in the face of adversity and emphasize the role of cultural world as effecting growth, beyond trauma.
Lygre, Ragnhild B; Eid, Jarle; Larsson, Gerry; Ranstorp, Magnus
This study reviews empirical evidence for Moghaddam's model "Staircase to Terrorism," which portrays terrorism as a process of six consecutive steps culminating in terrorism. An extensive literature search, where 2,564 publications on terrorism were screened, resulted in 38 articles which were subject to further analysis. The results showed that while most of the theories and processes linked to Moghaddam's model are supported by empirical evidence, the proposed transitions between the different steps are not. These results may question the validity of a linear stepwise model and may suggest that a combination of mechanisms/factors could combine in different ways to produce terrorism. © 2011 The Authors. Scandinavian Journal of Psychology © 2011 The Scandinavian Psychological Associations.
Business Process Management (BPM) has been in existence for decades. It uses, complements, integrates and extends theories, methods and tools from other scientific disciplines like: strategic management, information technology, managerial accounting, operations management etc. During this period the main focus themes of researchers and professionals in BPM were: business process modeling, business process analysis, activity based costing, business process simulation, performance measurement, workflow management, the link between information technology and BPM for process automation etc. More recently the focus moved to subjects like Knowledge Management, Enterprise Resource Planning (ERP) Systems, Service Oriented Architectures (SOAs), Process Intelligence (PI) and even Social Networks. In this collection of papers we present a review of the work and the outcomes achieved in the classic BPM fields as well as a deeper insight on recent advances in BPM. We present a review of business process modeling a...
Madsen, Erik Kloppenborg; Pedersen, Kurt
Historical School, an essential precondition for the Copenhagen approach was the second wave of microeconomic theory of the 1930s. The article argues that it was a marketing management school, and that it offered early contributions to the development of marketing theory. Originality/value – Relatively......Purpose – The purpose of this article is to show how a particular marketing paradigm developed in Denmark from the 1920s through the 1960s. It peaked in the mid-1950s and faded out with one major publication in the early 1970s. The article provides a relatively detailed study of the initial phases...... of the school and its key ideas. Design/methodology/approach – The study is based on primary sources, i.e. the writings of the scholars who shaped and developed the school. A significant part of the sources are available in Danish only. Findings – While American marketing theory developed from the German...
Kamylla Santos da Cunha
Full Text Available ABSTRACT Objective: to understand the meaning of the university management performed by nurses managers of the nursing undergraduate course of a public university. Method: this is a qualitative research, based on the grounded theory. Data collection took place between May and September 2016, with open interviews, in the scenario of a federal public university. The technique of constant comparative analysis of the data was followed, obtaining a theoretical sample with 19 nurses, in two sample groups. Results: there were three categories emerged that shaped the phenomenon: Articulating complex collectives through university management for the qualified training of new nurses. The categories included: a conditions, defined by perceiving the commitment to the collective, previous experiences, and training for health management, as motivations to be a teacher manager; b actions/interactions, delimited by Knowing and recognizing, in practice, the university management process, limits and possibilities in the coordination of complex collective subjects; and, c consequences, such as Improving teaching work and taking responsibility for university education. Conclusion: the nurses teaching managers to explain university management as a set of individual and collective actions that, articulated in a complex social environment, promote conditions for the training of critical and reflexive nurses with the demands of society.
In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order
Full Text Available This paper develops a dynamical model of terrorism. We consider the population in a given region as being made up of three primary components: terrorists, those susceptible to both terrorist and pacifist propaganda, and nonsusceptibles, or pacifists. The dynamical behavior of these three populations is studied using a model that incorporates the effects of both direct military/police intervention to reduce the terrorist population, and nonviolent, persuasive intervention to influence the susceptibles to become pacifists. The paper proposes a new paradigm for studying terrorism, and looks at the long-term dynamical evolution in time of these three population components when such interventions are carried out. Many important features—some intuitive, others not nearly so—of the nature of terrorism emerge from the dynamical model proposed, and they lead to several important policy implications for the management of terrorism. The different circumstances in which nonviolent intervention and/or military/police intervention may be beneficial, and the specific conditions under which each mode of intervention, or a combination of both, may be useful, are obtained. The novelty of the model presented herein is that it deals with the time evolution of terrorist activity. It appears to be one of the few models that can be tested, evaluated, and improved upon, through the use of actual field data.
McCabe, Simon; Vail, Kenneth E; Arndt, Jamie; Goldenberg, Jamie L
Interfacing the terror management health model with the meaning transfer model, we offer novel hypotheses concerning the effectiveness of celebrity and medical endorsements for consumer products and health behavior decisions. Studies 1 and 2 revealed that, compared with control topic primes, death thoughts in focal attention increased the effectiveness of health-oriented (doctor) endorsers but not culture-oriented (celebrity) endorsers, whereas death thoughts outside of focal attention increased the effectiveness of culture-oriented endorsers but not health-oriented endorsers. Studies 3 and 4 then focus more specifically on the valence and specificity of culture-oriented endorsements, revealing that death thoughts outside focal attention increase the effectiveness of culture-oriented endorsers only on the behaviors specifically endorsed and only when the endorser is characterized as possessing cultural value. Discussion focuses on everyday management of existential concerns and implications for persuasive communications in the health domain.
addition to outlining definitions, data sources, choice theory , game theory , and the economic consequences of terrorism, this study identifies how...stratégiques. Les auteurs sont le Maj Alain Rollin, le Maj Meaghan Setter et Mme Rachel Lea Heide, Ph.D., sous la direction du Lcol William Yee...18 7 Choice Theory and its Applications 7.1
.... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...
Full Text Available Watershed development is an important component of rural development and natural resource management strategies in many countries. A watershed is a special kind of common pool resource: an area defined by hydrological linkages where optimal management requires coordinated use of natural resources by all users. Management is difficult because natural resources comprising the watershed system have multiple, conflicting uses, so any given management approach will spread benefits and costs unevenly among users. To address these challenges, watershed approaches have evolved from more technocratic to a greater focus on social organization and participation. However, the latter cannot necessarily be widely replicated. In addition, participatory approaches have worked better at a small scale, but hydrological relationships cover a larger scale and some projects have faced tradeoffs in choosing between the two. Optimal approaches for future efforts are not clear, and theories from common property research do not support the idea that complex watershed management can succeed everywhere. Solutions may include simplifying watershed projects, pursuing watershed projects where conditions are favorable, and making other investments elsewhere, including building the organizational capacity that can facilitate watershed management.
Homegrown terrorism has attracted significant attention following the 2004 Madrid and 2005 London bombings. Homegrown terrorism is usually thought to be a new phenomenon, with few observed events, and inherently distinct from transnational terrorism or the old domestic terrorism in Europe. However, little research has so far examined the alleged distinctiveness of homegrown terrorism empirically. I argue that homegrown terrorism shares many similarities with domestic and international terrori...
Ho, L.W.; Rohach, A.F.
Perturbation theory along with a binary fuel shuffling technique is applied to predict the effects of various core configurations and, hence, the optimization of in-core fuel management. The computer code FULMNT has been developed to shuffle the fuel assemblies in search of the lowest possible power peaking factor. An iteration approach is used in the search routine. A two-group diffusion theory method is used to obtain the power distribution for the iterations. A comparison of the results of this method with other methods shows that this approach can save computer time and obtain better power peaking factors. The code also has a burnup capability that can be used to check power peaking throughout the core life
Provides an historical and conceptual framework for understanding contemporary terrorism. Includes quotations from government officials, syndicated columnists, and scholars regarding terrorism and its effects on society. (JDH)
Nizami, Asad Tamizuddin; Rana, Mowadat Hussain; Hassan, Tariq Mahmood; Minhas, Fareed Aslam
This article reviews the behavioral science perspectives of terrorism in Pakistan. It can be argued that Pakistan has gained worldwide attention for "terrorism" and its role in the "war against terrorism". The region is well placed geopolitically for economic successes but has been plagued by terrorism in various shapes and forms. A behavioral sciences perspective of terrorism is an attempt to explain it in this part of the world as a complex interplay of historical, geopolitical, anthropological and psychosocial factors and forces. Drawing from theories by Western scholars to explain the behavioral and cognitive underpinnings of a terrorist mind, the authors highlight the peculiarities of similar operatives at individual and group levels. Thorny issues related to the ethical and human right dimensions of the topic are visited from the unique perspective of a society challenged by schisms and divergence of opinions at individual, family, and community levels. The authors have attempted to minimize the political descriptions, although this cannot be avoided entirely, because of the nature of terrorism. Copyright © 2014 John Wiley & Sons, Ltd.
Describe, discuss and critically appraise human error theory and consider its relevance for nurse managers. Healthcare errors are a persistent threat to patient safety. Effective risk management and clinical governance depends on understanding the nature of error. This paper draws upon a wide literature from published works, largely from the field of cognitive psychology and human factors. Although the content of this paper is pertinent to any healthcare professional; it is written primarily for nurse managers. Error is inevitable. Causation is often attributed to individuals, yet causation in complex environments such as healthcare is predominantly multi-factorial. Individual performance is affected by the tendency to develop prepacked solutions and attention deficits, which can in turn be related to local conditions and systems or latent failures. Blame is often inappropriate. Defences should be constructed in the light of these considerations and to promote error wisdom and organizational resilience. Managing and learning from error is seen as a priority in the British National Health Service (NHS), this can be better achieved with an understanding of the roots, nature and consequences of error. Such an understanding can provide a helpful framework for a range of risk management activities.
Halldorsson, Arni; Hsuan, Juliana; Kotzab, Herbert
Purpose – The aim of this paper is to identify ways by which the theorizing of supply chain management (SCM) takes place, with particular attention to complementary theories. SCM suffers as well as benefits from a “conceptual slack”. Design/methodology/approach – The nature of SCM is discussed...... as organizational units that act or consummate an action that delivers a particular performance. Originality/value – This paper portrays SCM sensitivity to managerial challenges by moving from borrowing to a more bilateral view on theorizing of SCM, reflecting the nature of SCM....
a turn towards rational approaches difficult, and, on the other hand, that the rational approaches in their ignorance of collective emotional arousal present an inadequate picture of crowds and consequently have limited scope as guidelines for crowd management strategies....... suggest, rational conceptions of crowds should inform contemporary crowd management. This article questions this plea on two grounds. First, it demonstrates that there is no unidirectional connection between sociological crowd theory (whatever its content) and practical strategies for governing crowds...... that, in spite of its current scholarly popularity, there is no guarantee that the call for a practical employment of the rational notion of crowds will necessarily be successful. This is demonstrated by stressing, on the one hand, that irrational notions of crowds continue to thrive, thereby rendering...
Katsanevaki, Styliani Maria; Varouchakis, Emmanouil; Karatzas, George
Rural water management is a basic requirement for the development of the primary sector and involves the exploitation of surface/ground-water resources. Rational management requires the study of parameters that determine their exploitation mainly environmental, economic and social. These parameters reflect the influence of irrigation on the aquifer behaviour and on the level-streamflow of nearby rivers as well as on the profit from the farming activity for the farmers' welfare. The question of rural water management belongs to the socio-political problems, since the factors involved are closely related to user behaviour and state position. By applying Game Theory one seeks to simulate the behaviour of the system 'surface/ground-water resources to water-users' with a model based on a well-known game, "The Prisoner's Dilemma" for economic development of the farmers without overexploitation of the water resources. This is a game of two players that have been extensively studied in Game Theory, economy and politics because it can describe real-world cases. The present proposal aims to investigate the rural water management issue that is referred to two competitive small partnerships organised to manage their agricultural production and to achieve a better profit. For the farmers' activities water is required and ground-water is generally preferable because consists a more stable recourse than river-water which in most of the cases in Greece are of intermittent flow. If the two farmer groups cooperate and exploit the agreed water quantities they will gain equal profits and benefit from the sustainable availability of the water recourses (p). If both groups overexploitate the resource to maximize profit, then in the medium-term they will incur a loss (g), due to the water resources reduction and the increase of the pumping costs. If one overexploit the resource while the other use the necessary required, then the first will gain great benefit (P), and the second will
Nuclear in-core fuel management involves all the physical aspects which allow optimal operation of the nuclear fuel within the reactor core. In most nuclear power reactors, fuel loading patterns which have a minimum power peak are economically desirable to allow the reactors to operate at the highest power density and to minimize the possibility of fuel failure. In this study, perturbation theory along with a binary fuel shuffling technique is applied to predict the effects of various core configurations, and hence, the optimization of in-core fuel management. The computer code FULMNT has been developed to shuffle the fuel assemblies in search of the lowest possible power peaking factor. An iteration approach is used in the search routine. A two-group diffusion theory method is used to obtain the power distribution for the iterations. A comparison of the results of this method with other methods shows that this approach can save computer time. The code also has a burnup capability which can be used to check power peaking throughout the core life
The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an
Jacques, Karen; Taylor, Paul J.
The sharp growth in the number of publications examining female involvement in terrorism has produced a valuable but un-integrated body of knowledge spread across many disciplines. In this paper, we bring together 54 publications on female terrorism and use qualitative and quantitative analyses to
Sullivan, Mark P
.... In its annual report on worldwide terrorism, the State Department highlights threats in Colombia, Peru, and the tri-border region of Argentina, Brazil, and Paraguay. The State Department also has designated four terrorist groups (three in Colombia and one in Peru) as Foreign Terrorist Organizations, and Cuba has been listed as a state sponsor of terrorism since 1982.
Krans, Anatoli van der
This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective,
J Gordon Millichap
Full Text Available In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.
J Gordon Millichap
In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.
Pickett, Stephanie; Peters, Rosalind M; Jarosz, Patricia A
The authors of this paper present the middle-range theory of weight management that focuses on cultural, environmental, and psychosocial factors that influence behaviors needed for weight control. The theory of weight management was developed deductively from Orem's theory of self-care, a constituent theory within the broader self-care deficit nursing theory and from research literature. Linkages between the conceptual and middle-range theory concepts are illustrated using a substruction model. The development of the theory of weight management serves to build nursing science by integrating extant nursing theory and empirical knowledge. This theory may help predict weight management in populations at risk for obesity-related disorders. © The Author(s) 2014.
Leistedt, Samuel J
Behavioural and social sciences are useful in collecting and analysing intelligence data, understanding terrorism, and developing strategies to combat terrorism. This article aims to examine the psychopathological concepts of terrorism and discusses the developing roles for behavioural scientists. A systematic review was conducted of studies investigating behavioural aspects of terrorism. These studies were identified by a systematic search of databases, textbooks, and a supplementary manual search of references. Several fundamental concepts were identified that continue to influence the motives and the majority of the behaviours of those who support or engage in this kind of specific violence. Regardless of the psychological aspects and new roles for psychiatrists, the behavioural sciences will continue to be called upon to assist in developing better methods to gather and analyse intelligence, to understand terrorism, and perhaps to stem the radicalisation process. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Full Text Available Proving that terrorism should be seen as a media event (as defined by Dayan and Katzafter 9/11 and treated accordingly. We have turned to the work of Dayan and Katz and GeorgeGerbner’s for a definition of media events and of violence in the mass media. This paper is ahermeneutical interpretation of the concept of terrorism and its relation to communication. We haveput forward a better understanding of the complex concept of terrorism and its definitions in the massmedia context. Terrorism nowadays should always be defined within its inherent relation with themedia. The article is the first to define terrorism as media evenit in Dayan and Katz’s terms.
... deterring future acts of violence or terrorism; (ii) That communications between the inmate and attorneys or... terrorism. 501.3 Section 501.3 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION SCOPE OF RULES § 501.3 Prevention of acts of violence and terrorism. (a) Upon...
Full Text Available The strategic interplay between counterterror measures and terror activity is complex. Herein, we propose a dynamic model to depict this interaction. The model generates stylized prognoses: (i under conditions of inefficient counterterror measures, terror groups enjoy longer period of activity but only if recruitment into terror groups remains low; high recruitment shortens the period of terror activity (ii highly efficient counterterror measures effectively contain terror activity, but only if recruitment remains low. Thus, highly efficient counterterror measures can effectively contain terrorism if recruitment remains restrained. We conclude that the trajectory of the dynamics between counterterror measures and terror activity is heavily altered by recruitment.
Weizman, Tal; Yagil, Yaron; Schreiber, Shaul
Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…
Cockpit task management (CTM) involves the initiation, monitoring, prioritizing, and allocation of resources to concurrent tasks as well as termination of multiple concurrent tasks. As aircrews have more tasks to attend to due to reduced crew sizes and the increased complexity of aircraft and the air transportation system, CTM will become a more critical factor in aviation safety. It is clear that many aviation accidents and incidents can be satisfactorily explained in terms of CTM errors, and it is likely that more accidents induced by poor CTM practice will occur in the future unless the issue is properly addressed. The first step in understanding and facilitating CTM behavior was the development of a preliminary, normative theory of CTM which identifies several important CTM functions. From this theory, some requirements for pilot-vehicle interfaces were developed which are believed to facilitate CTM. A prototype PVI was developed which improves CTM performance and currently, a research program is under way that is aimed at developing a better understanding of CTM and facilitating CTM performance through better equipment and procedures.
... you tried. A night terror is a sleep disruption that seems similar to a nightmare , but is ... to: reduce your child's stress create a bedtime routine that's simple and relaxing make sure your child ...
Stoddard, Frederick J; Gold, Joel; Henderson, Schuyler W; Merlino, Joseph P; Norwood, Ann; Post, Jerrold M; Shanfield, Stephen; Weine, Stevan; Katz, Craig L
Terrorism has dominated the domestic and international landscape since 9/11. Like other fields, psychiatry was not well prepared. With the 10th anniversary of the 9/11 attack approaching, it is timely to consider what can be done to prepare before the next event. Much has been learned to provide knowledge and resources. The roles of psychiatrists are challenged by what is known of the causes of, consequences of, and responses to terrorism. Reflecting on knowledge from before and since 9/11 introduces concepts, how individuals become terrorists, how to evaluate the psychiatric and behavioral effects of terrorism, and how to expand treatments, behavioral health interventions, public policy initiatives, and other responses for its victims. New research, clinical approaches, and policy perspectives inform strategies to reduce fear and cope with the aftermath. This article identifies the psychiatric training, skills and services, and ethical considerations necessary to prevent or reduce terrorism and its tragic consequences and to enhance resilience.
... able to tell you what happened in the dream and why it was scary. Your child may have trouble going back to sleep. Your child might have the same dream again on other nights. What are night terrors? ...
This section of the book, Part III, has two chapters (9 and 10). Chapter 9, Nuclear Power and Proliferation of Nuclear Weapons, is disucssed under these subjects: nuclear nonproliferation: origins and status; requirements for nuclear weapons manufacture; current nuclear programs and proliferation capabilities; encouraging decisions to forego weapons; arms control; safeguards; attitudes and expectations. Chapter 10, Nuclear Terrorism, discusses these areas: theft of nuclear materials; attacks on nuclear reactors; responding to nuclear terrorism; security and civil liberties
Night terrors are a bizarre sleep disorder that affects young children. The child partially awakes during the night agitated, afraid and terrified, and cannot be consoled. These events, which may be related to emotional turmoil, are self-limiting. Psychiatric evaluation is indicated in certain cases, and drug therapy is almost never necessary. Parents should be reassured that night terrors are not dangerous and do not reflect any serious pathology.
St Sauver, J.E.
Unlike conventional terrorist violence, bona-fide nuclear terrorism is a self-publicizing phenomenon. It is a public event by the very scope of its impact. Apocalyptic and catastrophically destructive, a nuclear explosion is the ideal instrument of mass terror. Rational nuclear insurgents would not inform authorities that a nuclear device is about to be detonated. Advance warning of an impending nuclear explosion would reduce the maximum potential effectiveness of any response to such an event
Spagat, M; Johnson, N. F; Restrepo, J. A; Becerra, O; Bohórquez, J. C; Restrepo, E. M; Zarama, R
we report a remarkable universality in the patterns of violence in three high profile ongoing wars, and in global terrorism. Our results suggest that these quite different conflict arenas currently feature a common type of enemy, i.e. the various insurgent forces are beginning to operate in a similar way regardles of their underlying idealogies, motivations and the terrain in which they operate. We provide a microscopic theory to explain our main observations. This theory treats the insurgent...
Niederman, Fred; March, Salvatore T.; Mueller, Benjamin
Process theory has become an important mechanism for the accumulation of knowledge in a number of disciplines. In contrast with variance theory, which focuses on co-variation of dependent and independent variables, process theory focuses on sequences of activities, their duration and the intervals
Full Text Available With a strong commercial incentive driving the increase in game ranching in Southern Africa the need has come for more advanced management tools. In this paper the potential of Portfolio Selection Theory to determine the optimal mix of species on game ranches is explored. Land, or the food it produces, is a resource available to invest. We consider species as investment choices. Each species has its own return and risk profile. The question arises as to what proportion of the resource available should be invested in each species. We show that if the objective is to minimise risk for a given return, then the problem is analogous to the Portfolio Selection Problem. The method is then implemented for a typical game ranch. We show that besides risk and return objectives, it is necessary to include an additional objective so as to ensure sufficient species to maintain the character of a game ranch. Some other points of difference from the classical Portfolio Selection problem are also highlighted and discussed.
Full Text Available The present work takes into account the consistency of five reference points considered as highly significant for the current strategic management: the strategy, the competitive advantage, the five forces model, the VRIO framework and the generic strategies. They have been selected by taking into account both the frequency of their use in the textbooks, and also the consequences they have generated in the field theory and research. The study starts by considering the main reference points which assume the role of defining the selected concepts, in order to develop an analysis by highlighting their debatable features. The relation between concepts and virtual implications of the current stage in their development represents an implicit aim of this work. The methodological framework approached considers, as preliminary elements, the works referring the concepts in question and the significant milestones related to their approval. The next step is to take into account some critical references, assuming positions that contradict those promoted by the previous works. They enjoy a fairly limited popularity, which makes them more interesting for the development of an approach which counterbalances the standardized textbooks, characterized by a lush amount of bibliography that complies with the official trend. The methodology used is of qualitative type. At the first stage, an analysis of concept definitions and proximate elements is developed. Afterwards the results of certain empirical studies validating the concepts discussed are taken into account. Their results relate to the critical positions assumed by studies which raise an amount of relevant points of discussion. A logical filter has been used in order to mitigate the groupthink oriented effect caused by the appraisal of concepts in the American textbooks. In an absolutely predictable manner, the analysis results are able to temper the academic conformism involved in the dissemination of
Uses chaos theory to model public relations situations in which the salient feature is volatility of public perceptions. Discusses the premises of chaos theory and applies them to issues management, the evolution of interest groups, crises, and rumors. Concludes that chaos theory is useful as an analogy to structure image problems and to raise…
Weber, Wolfgang; Kabst, Rüdiger
Human Resource Management as an academic discipline needs to be theoretically grounded, i.e. it requires support through theories, theory-driven empirical research and critiques. In doing so, different theoretical perspectives are addressed suggesting a problem-orientated theory selection which leads inevitably to theoretical diversity.
crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...
Valeriy Petrovich Chichkanov
Full Text Available In the article, the theoretical and methodological foundations of investigation of the socioeconomic nature of terrorism are considered. Hypothesis of research is the existence of methodological criteria of territory classification on the basis of external and internal terrorism. On the basis of the analysis of theoretical works of national and foreign authors, normative documents of state and international level the genesis of approaches to the understanding of the essence of modern terrorism, its contents, the subject-object relations and manifestation forms is received. As the result, according to the authors’ definition “terrorism” is understood as an ideology connected with deliberate violence or threats against the civilian population or property to influence on the government or the interstate organizations. In the work, the factors of development and spreading of terrorism in the Russian Federation’s regions are allocated and quantitatively proved. Weight parameters of the specified factors are determined. The methodological differentiation of the specified factors on factors of terrorism external (attacks from the outside and an internal form (distribution and realization of radical ideas within the region in the territory is the distinctive feature of the conducted research. During the research, the cluster analysis of a region is carried out to distribute of Russia’s regions according to the typological characteristic of the region of internal and external terrorism. The obtained data are verified in accordance with empirical data, the hypothesis of the existence of methodological criteria of the region classification on the basis of external and internal terrorism is proved.
.... Addressing this problem, Congress enacted the Terrorism Risk Insurance Act of 2002 (TRIA) to create a temporary program to share future insured terrorism losses with the property-casualty insurance industry and policyholders...
The focus of this book is on establishing theories and methods of both decision and game analysis in management using intuitionistic fuzzy sets. It proposes a series of innovative theories, models and methods such as the representation theorem and extension principle of intuitionistic fuzzy sets, ranking methods of intuitionistic fuzzy numbers, non-linear and linear programming methods for intuitionistic fuzzy multi-attribute decision making and (interval-valued) intuitionistic fuzzy matrix games. These theories and methods form the theory system of intuitionistic fuzzy decision making and games, which is not only remarkably different from those of the traditional, Bayes and/or fuzzy decision theory but can also provide an effective and efficient tool for solving complex management problems. Since there is a certain degree of inherent hesitancy in real-life management, which cannot always be described by the traditional mathematical methods and/or fuzzy set theory, this book offers an effective approach to us...
Although CBRN (Chemical, Biological, Radiological, Nuclear) terrorism has seldom happened in recent terrorist attacks, a large number of victims would appear leading to disastrous situation if it arises. This paper discussed what CBRN terrorism is, why terrorists are interested in these weapons, and how to deal with these cases, with reference to the lessons learnt from the Tokyo subway sarin event, which occurred in Japan. It also outlined the features of CBRN terrorism and protective measures against it. CBRN terrorism is the terror activity using unusual weapons and agents such as chemicals, biological agents, radioactive substances, and nuclear weapons. As the reasons why terrorists are interested in CBRN weapons, there are such factors that raw materials are easy to obtain, manufacturing is not difficult, weapons are easy to transport, and indiscriminate and mass slaughter is possible when used. From the lessons from the Tokyo subway sarin event, the Tokyo Fire Department has been engaging in the following items: (1) strengthening knowledge and skills, (2) introduction of detection equipment, (3) construction and strengthening of decontamination system, (4) collaboration among firefighting - police - SDF - medical institutions, and (5) enhancing and strengthening organizational structure. Although protective measures vary depending on the type of chemical agent, biological agent, etc., it is important to prepare in daily life for detoxification, decontamination, evacuation, etc. (A.O.)
that an increase in anti-terrorism makes it more likely that cells will plan small rather than large attacks. Furthermore, we see that an increase in anti-terrorism can make a terrorist attack more likely. Analyzing the problem of optimal anti-terrorism we see that the introduction of a copycat effect rationalizes...... an increase in the level of anti-terrorism after a large attack. Using this result we show how the copycat effect changes the dynamic pattern of terrorism attacks and what the long run consequences are...
Foss, Nicolai Juul
Arguments derived from the theory of science have been present in strategic management discourse since at least the beginning of the 1970s. The field's topjournal,the Strategic Management Journal, has printed several theory of sciencebased papers. Most positions in the theory of science...... (falsificationism, instrumentalism, realism, constructivism, etc.) have been present in the methodological discourse in the field. This chapter briefly reviews theory science applications to strategic management, before a distinctive perspective on the evolution of the strategic management field is developed....... According to this perspective, science progresses when deeper level mechanisms are identified and theorized. Theoretical reduction may therefore be an independent criterion of scientific progress. Application to the strategic management field of this perspective, which in the social sciences is closely...
Portfolio selection theory and wildlife management. ... Abstract. With a strong commercial incentive driving the increase in game ranching in Southern Africa the need has come for more advanced management tools. ... Keywords: Portfolio selection, multi-objective optimisation, game ranching, wildlife management.
Full Text Available On July 2, 2008, Steven Muegge from Carleton University delivered a presentation entitled "Theory, Evidence and the Pragmatic Manager". This section provides the key messages from the lecture. The scope of this lecture spanned several topics, including management decision making, forecasting and its limitations, the psychology of expertise, and the management of innovation.
Anatoli van der Krans
Full Text Available This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective, proportional and mutually harmonious. Now that many regulations in this field have been established by intra-national bodies, it is important to examine how these regulations are further elaborated in the respective national systems. This article gives a broad overview of legislative initiatives of the UN, USA, FATF, EU and Council of Europe. The Netherlands for numerous reasons serves as a legal example. It is concluded that measures taken or proposed to avoid or at least reduce the financing of terrorism are quite effective to prevent abuse of the financial system. On the other hand, these measures increase the risk of underground or illegal financing, which is even more difficult to control.
Jensen, Susanne; Svendsen, Gert Tinggaard
How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...
With growing world population, diminishing resources, and realization of the harmful effects of various pollutants, research focus in environmental management has shifted towards sustainability. The goal of a sustainable management strategy is to promote the structure and operati...
John J. Klein
Full Text Available While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack. In such a scenario, some strategists think a terrorist organization's leadership may prove "undeterrable" by traditional military means. Nevertheless, deterrence is still a critical element in U.S. national strategy to prevent a nuclear attack. Furthermore, deterrence combined with dissuasion works to reduce the likelihood of nuclear terrorism being used against the United States, while also mitigating the consequences should such an act actually occur.
Radiological and nuclear terrorism is widely considered as a major if not ultimate terrorist threat for modern societies. Highly industrialized countries could be extremely sensitive to terrorist aggressions of this kind. Nuclear terrorism is often associated with nuclear proliferation. Strictly speaking, nuclear proliferation deals with the spread of nuclear weapons into states which doesn't posses them. But proliferation can also be understood as the spread of radioactive material or even nuclear explosives into the hands of non-state organizations, such as sub national terrorist or criminal organizations as well as any kind of extreme groups for sabotage, blackmail or any other destabilization or destruction purposes. New driving factors for nuclear terrorism which 'help' terrorists are: the consequence of the break down of the Soviet Union and 'easy' radioactive smuggling and black market. What is 'New terrorism'? In analyzing the treat, one has to start by posing several crucial questions such as 'do such groups or individuals have the skill to complete their aim'? 'Who are these groups and individuals', 'how they can be categorized', 'what is their motivation'? If analysis of the 'new terrorism' is one side of the coin, the other is just as daunting. Who, what, when, where and how would be targeted by 'new terrorism'? Although there are existing different reasons (religious and political/social), mainly the target is civilian population. In many instances the aim is to exert either political or economic pressure on authorities or both. Police, ambulance - first call response teams - local, regional and national authorities have a hard task still ahead of them. The upside is that industrialized nations have acknowledged the need to reassess where we are and what the risk is. The bottom line has to be 'who is likely to want to resort to such methods and what the likelihood of them succeeding would be. (author)
Currently, terrorism provokes a widespread feeling of insecurity and global reactions to the terrorist attacks. This is not simply because it poses a substantial threat to society and to the lives of individual citizens. The relatively rare incidents of terrorism cause emotional overreaction...... because they challenge and intensify the contract that supersaturates today's society.In the welfare society one can observe the existence of a diffuse but widespread social contract, which has become the single most cohesive element in the social fabric. According the terms of this contract, we agree...
Complexity theory (CT) has had a meteoric rise in management literature and the social sciences. Its fledgling importation into school leadership and management raises several questions and concerns. This article takes one view of CT and argues that, though its key elements have much to offer school leadership and management, caution has to be…
Voznyuk Eugenia Vasylivna
Full Text Available The features of informational terrorism in African countries, especially in SADC countries, are analyzed as well as the ways to combat information terrorism in this region. The major issues related to information terrorism are highlighted, which include data exfiltration, social engineering, insider threats, database breaches as well as poor identity and access management. The essence of Computer Security (Cyber Security is revealed and its main tasks are characterized: accessibility, integrity, including authenticity and confidentiality. The main threats for cyberspace are distinguished.
Building a strong, cohesive, and talented managerial team is a critical endeavor for imaging administrators, as the job will be enhanced if supported by a group of high-performing, well-developed managers. For the purposes of this article, leadership and management are discussed as two separate, yet equally important, components of an imaging administrator's role. The difference between the two is defined as: leadership relates to people, management relates to process. There are abundant leadership and management theories that can help imaging administrators develop managers and ultimately build a better team. Administrators who apply these theories in practical and meaningful ways will improve their teams' leadership and management aptitude. Imaging administrators will find it rewarding to coach and develop managers and witness transformations that result from improved leadership and management abilities.
Nadezhda Sergeevna Piontkevich
Effective management of financial activity of commercial organization promotes achievement of the main objective of its activity – receiving profit. Both external and internal factors causing specifics of financial management of organization in the field of management of profit have impact on this process. In modern conditions of economic development this problem gains the greatest relevance, and new approaches for its decision are required. In the present article the author’s theoretical and...
Cheo, Seok Sik
This book introduces summary of basic theory of research and development, strategy plan and research and development vision, choice of research and development project, management of man resources for research and development, management of material resources for research and development, performance of research and development, activity, management of evaluation on outcome of research and development, management for failure and success of research and development. Each chapter has the explanations of condition, train, system, monitoring, and support system.
Slavin, Adam M.
This study characterizes theoretical and industry approaches to organizational capabilities management and ascertains whether there is a distinct ''best practice'' in this regard. We consider both physical capabilities, such as technical disciplines and infrastructure, and non-physical capabilities such as corporate culture and organizational procedures. We examine Resource-Based Theory (RBT), which is the predominant organizational management theory focused on capabilities. RBT seeks to explain the effect of capabilities on competitiveness, and thus provide a basis for investment/divestment decisions. We then analyze industry approaches described to us in interviews with representatives from Goodyear, 3M, Intel, Ford, NASA, Lockheed Martin, and Boeing. We found diversity amongst the industry capability management approaches. Although all organizations manage capabilities and consider them to some degree in their strategies, no two approaches that we observed were identical. Furthermore, we observed that theory is not a strong driver in this regard. No organization used the term ''Resource-Based Theory'', nor did any organization mention any other guiding theory or practice from the organizational management literature when explaining their capabilities management approaches. As such, we concluded that there is no single best practice for capabilities management. Nevertheless, we believe that RBT and the diverse industry experiences described herein can provide useful insights to support development of capabilities management approaches.
R.F. Speklé (Roland)
textabstractIn this paper, I present and discuss a theory of management control based on Transaction Cost Economics. This theory specifies the composition of various archetypal control structures, and links these to their respective habitat. These are: (1) arm's length control; (2) machine control;
Pham Do, K.H.
This thesis presents a collection of essays in game theory with applications to environmental resource problems and their management. A major focus of these essays is related to coalitional games in which several classes of games, their properties and solution concepts are studied. Game theory is
George W England
This article analyzes studies comparing Japanese and American managers, workers, and societies in order to consider questions raised by William Ouchi's book, Theory Z: How American Business Can Meet the Japanese Challenge. The analysis results in 2 general observations: 1) Theory Z management is not likely to become the accepted norm in American companies to the extent that it has in Japan, and 2) the major conceptual or theoretical lesson we can learn from the Japanese is the potential value...
Shangjie; JI; Qunzhen; QU
With the development of marine economy in coastal provinces and cities,there comes a series of environmental problems. Marine regional management,as a completely new marine management mode,transforms traditional management mode and can protect marine ecosystem. Thus,the marine regional management is feasible and applicable in China. This paper firstly discussed connotation and development of the marine regional management in China and pointed that the marine regional management is integrated management of a certain marine region. Next,it summarized characteristics of the marine regional management at current stage,for example,land-based pollution of trans-geographic system and marine management under regional government cooperative mechanism. Finally,it came up with recommendations including combining theory and practice of the marine regional management,and establishing marine regional management system as soon as possible,to realize benign interaction and sustainable development of marine economy and ecological environment.
ethnicity, religion, class, gender , language, accent, dress, political ideology or any combination of these factors may serve to delineate the sub...against another. Lack of parity in resourcing compounds the issue of a community that is securitize in nature. Complex adaptive systems theory... Parity in emphasis would not only garnish a greater level of community trust for all forms of terrorism, but it would deemphasize the need of the current
H. Ning (Haikun)
textabstractUnder his own preference, how should an investor coordinate the asset managers such that his aggregated portfolio is optimized? The efficiency of each managed sub portfolio and the aggregation of all the sub portfolios are the 2 main underlying problems considered in this dissertation.
Bozeman, Barry; Bretschneider, Stuart
The existing theoretical framework for research in management information systems (MIS) is criticized for its lack of attention to the external environment of organizations, and a new framework is developed which better accommodates MIS in public organizations: public management information systems. Four models of publicness that reflect external…
George, Patricia, Ed.; Potter, Eugenia Cooper, Ed.
School-based management (SBM), sometimes called site-based management, is fast becoming the hottest restructuring item in the arsenal of reformers, teachers' unions, governors, and legislators who want to change the traditional ways in which schools and school districts do business. This document comprises three main sections with contributions…
Bourque, Linda B.; Mileti, Dennis S.; Kano, Megumi; Wood, Michele M.
The National Survey of Disaster Experiences and Preparedness (NSDEP) examined whether households in the United States have engaged in proactive preparedness and avoidance activities since September 11, 2001, and whether the activities reported were done because of terrorism, natural disasters, other reasons, or any combination of reasons. Reported…
striking the heart of the Indian tourism market and creating a siege in the Taj Mahal, it was certain to create a theater of terror. A drama played out... sport facilities, malls, movie theaters, and more. Grossman argues that American society has put forth enormous effort preparing and preventing harm to
Malečková, Jitka; Stanišić, Dragana
Roč. 5, č. 1 (2014), s. 40-65 ISSN 1759-5673 R&D Projects: GA ČR(CZ) GAP402/12/0510; GA MŠk(CZ) 7E08090 Institutional support: RVO:67985998 Keywords : international terrorism * women's education * public opinion Subject RIV: AH - Economics
This paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses. Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.
A shortage of community college executives due to the number of retirements occurring among current leaders is predicted. An examination of three leadership theories--servant-leadership, business leadership and transformational leadership--suggests techniques for potential community college leaders. Servant-leaders focus on the needs of their…
In addressing the General Assembly at the opening of its debate on international terrorism (1 to 5 October 2001), the Secretary-General warned that a single attack involving a nuclear or biological weapon could kill millions. While the world was unable to prevent the II September attacks, there is much we can do to help prevent future terrorist acts carried out with weapons of mass destruction, he emphasized, calling for redoubled efforts to implement key treaties relating to those arms, closer cooperation among international organizations dealing with them, and tighter national legislation covering the exports of goods and technologies used in their production. Many representatives from all countries and all regions echoed the Secretary-General's sentiment during the debate. The general conclusion was that all countries could be affected in some form or another by such a fearful proposition, and all countries must work together to prevent it. To gain a greater understanding of the increased threat of international terrorism today, the Department for Disarmament Affairs sponsored a panel of high-level experts to discuss terrorism and its relationship to disarmament. Two leading experts from the Centre for the Study of Terrorism and Political Violence at the University of St. Andrews in Scotland, Professor Wilkinson and Dr. Gunaratna, put the attacks on the United States in an historical perspective, present some of the repercussions of the unprecedented scope of the attacks and give their views on how international institutions and agreements can assist in combating future acts of this kind. Mr Vladimir P Salov of the Russian Federation addresses the suppression of financing of terrorism and how Russia works towards that end. The IAEA has been trying for almost 50 years to safeguard nuclear materials from diversions to nuclear-weapon users and, in recent years, working more intensively on physical protection of nuclear material. Dr Nilsson's presentation
Brown, Joel S; Staňková, Kateřina
For over 100 years it has been recognized that insect pests evolve resistance to chemical pesticides. More recently, managers have advocated restrained use of pesticides, crop rotation, the use of multiple pesticides, and pesticide-free sanctuaries as resistance management practices. Game theory provides a conceptual framework for combining the resistance strategies of the insects and the control strategies of the pest manager into a unified conceptual and modelling framework. Game theory can contrast an ecologically enlightened application of pesticides with an evolutionarily enlightened one. In the former case the manager only considers ecological consequences whereas the latter anticipates the evolutionary response of the pests. Broader applications of this game theory approach include anti-biotic resistance, fisheries management and therapy resistance in cancer. Copyright © 2017 Elsevier Inc. All rights reserved.
AlMusaileem, Muhammad Y.
This study argues for a new theory in school management based on the notion of positive containment which benefited from the integration of the main two patterns of leadership, i.e., the democratic and the authoritarian. In this theory, the school principal has to deal with one external and five internal circles of positive containments. The…
This book presents recently developed intelligent techniques with applications and theory in the area of engineering management. The involved applications of intelligent techniques such as neural networks, fuzzy sets, Tabu search, genetic algorithms, etc. will be useful for engineering managers, postgraduate students, researchers, and lecturers. The book has been written considering the contents of a classical engineering management book but intelligent techniques are used for handling the engineering management problem areas. This comprehensive characteristics of the book makes it an excellent reference for the solution of complex problems of engineering management. The authors of the chapters are well-known researchers with their previous works in the area of engineering management.
Guo, Wenyue; Liu, Haiyan; Yu, Anzhu; Li, Jing
Under the situation that terrorism events occur more and more frequency throughout the world, improving the response capability of social security incidents has become an important aspect to test governments govern ability. Visual analysis has become an important method of event analysing for its advantage of intuitive and effective. To analyse events' spatio-temporal distribution characteristics, correlations among event items and the development trend, terrorism event's spatio-temporal characteristics are discussed. Suitable event data table structure based on "5W" theory is designed. Then, six types of visual analysis are purposed, and how to use thematic map and statistical charts to realize visual analysis on terrorism events is studied. Finally, experiments have been carried out by using the data provided by Global Terrorism Database, and the results of experiments proves the availability of the methods.
Yehuda, Rachel; Bryant, Richard; Marmar, Charles; Zohar, Joseph
Many important gains have been made in understanding PTSD and other responses to trauma as a result of neuroscience-based observations. Yet there are many gaps in our knowledge that currently impede our ability to predict those who will develop pathologic responses. Such knowledge is essential for developing appropriate strategies for mounting a mental health response in the aftermath of terrorism and for facilitating the recovery of individuals and society. This paper reviews clinical and biological studies that have led to an identification of pathologic responses following psychological trauma, including terrorism, and highlights areas of future-research. It is important to not only determine risk factors for the development of short- and long-term mental health responses to terrorism, but also apply these risk factors to the prediction of such responses on an individual level. It is also critical to consider the full spectrum of responses to terrorism, as well as the interplay between biological and psychological variables that contribute to these responses. Finally, it is essential to remove the barriers to collecting data in the aftermath of trauma by creating a culture of education in which the academic community can communicate to the public what is and is not known so that survivors of trauma and terrorism will understand the value of their participation in research to the generation of useful knowledge, and by maintaining the acquisition of knowledge as a priority for the government and those involved in the immediate delivery of services in the aftermath of large-scale disaster or trauma.
Paredes Zapata, Gabriel Darío
Colombia is a poor country that has been plagued by ongoing violence for more than 120 years. During the 1940s, subversive terrorist groups emerged in rural areas of the country when criminal groups came under the influence of Communism, and were later transformed into contemporary groups, such as the Ejercito de Liberacion Nacional (ELN) or National Liberation Army and Fuerzas Armadas Revolucionares de Colombia (FARC) or Revolutionary Armed Forces of Colombia). Paramilitary terrorist groups emerged in response to subversive groups and were later transformed into contemporary groups, such as the Autodefensas Unidas de Colombia (AUC) or United Self-Defense Forces of Colombia. Terrorism has placed an enormous burden on modern Colombia. From 1995 to 2002, 9,435 people were killed by terrorism-related events, of which 5,864 were killed by subversive terrorist activities and 3,571 were killed by paramilitary terrorist activities. In 2002, at least nineteen attacks produced 10 or more casualties, of which 18 were bombings. In 2002, terrorists killed at least 12 mayors, 71 legislators, and internally displaced 300,000 persons from their homes. Since terrorist groups in Colombia are typically supported by drug manufacturing and trafficking, it has been difficult at times to distinguish violence due to terrorism from violence due to illicit drug trafficking. Terrorism has also had a major adverse effect on the economy, with restricted travel, loss of economic resources, and lack of economic investment. In addition to political, military, and commercial targets, terrorists have specifically targeted healthcare infrastructure and personnel. At the national and local levels, much emergency planning and preparedness has taken place for terrorism-related events. The Centro Regulador de Urgencias (CRU) or Emergency Regulation Center in Bogota plays a major role in coordinating local prehospital and hospital emergency response in the capital city and the national level where
Some Contributions of General Systems Theory, Cybernetics Theory and Management Control Theory to Evaluation Theory and Practice. Research on Evaluation Program Paper and Report Series. Interim Draft.
Cook, Desmond L.
This document, one of a series of reports examining the possible contribution of other disciplines to evaluation methodology, describes the major elements of general systems theory (GST), cybernetics theory (CT) and management control theory (MCT). The author suggests that MCT encapsulates major concerns of evaluation since it reveals that…
Nadezhda Sergeevna Piontkevich
Full Text Available Effective management of financial activity of commercial organization promotes achievement of the main objective of its activity – receiving profit. Both external and internal factors causing specifics of financial management of organization in the field of management of profit have impact on this process. In modern conditions of economic development this problem gains the greatest relevance, and new approaches for its decision are required. In the present article the author’s theoretical and methodological approach to profit management of organization is offered: its application is connected with revision of acting control system of enterprise profit on the basis of assessing the initial condition of profit, planning the demanded profit level, periodical monitoring condition of planned values on profit, and also adoption of flexible administrative decisions on reduction of deviations and increasing the efficiency of organization activity. The system of profit formation including corresponding income and expenses of organization is presented. Methods of revenue planning are characterized. The characteristics of income and expenses connected with non-operating operations and transactions is given. The essence of the main directions of using enterprise profit is revealed. Need of application of author’s technique of management of profit of organization taking into account influence of external and internal factors is proved. The universal purpose of management of profit of organization and a task providing achievement of the goal are formulated . Tools of assessment efficiency of the system of formation and use of profit which is actually created in organization are offered. The methodical approach to planning of profit allowing to increase efficiency of activity of organization is presented. The mechanism of an assessment deviations of planned indicators of effective management of profit from actual and adoptions of correcting decisions on
Sachin Ratan Gedam; Pradeep S. Patil; Imran Ali Shivji
Night terrors and sleepwalking are arousal disorders that occur during the first third of night. Combined existence of sleep disorders are rare phenomenon and found to be associated with behavioural and emotional problems. It becomes difficult to diagnose among sleep disorders and epilepsy is an important differential diagnosis. Management with combined approach of pharmacotherapy and psychological counselling is safe and effective. Here, we present a case of night terrors and sleepwalking to...
Elsukova Tatiana Vasilevna
This article analyzes the techniques and methods of inventory management company with the information of a management accounting system based on the principles of the theory of constraints, both financial and non-financial.
Elsukova Tatiana Vasilevna
Full Text Available This article analyzes the techniques and methods of inventory management company with the information of a management accounting system based on the principles of the theory of constraints, both financial and non-financial.
McDonald, Frederick J.
A fresh approach to classroom management, which responds both to the present body of knowledge in this area and extends to beginning teachers a practical, flexible, and simple method of maintaining classroom control, is presented. Shortcomings of previous management theories (in particular, the Direct Instruction Model) are discussed, and the need…
Al Barody, M.M.
The whole world first knew nuclear terrorism during the second world war through the use of excessive violence that to terror exercised by one country against another, as was carried out by USA when it exploded two nuclear bombs over Hiroshima and Nagasaki t the end of the war. there are numerous types of nuclear terrorism that can be performed by individuals or organized groups for achieving political or social objectives. the definition of the term t errorism i s correlated with u sing means capable of creating a case of public dnger . that property exists in all types of direct or indirect nuclear terrorism . the present study is divided into two chapters. Chapter one deals with nuclear terrorism and consists of two sections , the first deals with the identification of the nature of nuclear terrorism an the second deals with organize nuclear terrorism on the international level. Chapter two deals with the confrontation of nuclear terrorism in two sections. the first deals with the role of the state in combating against nuclear terrorism nd the second deals with combating against nuclear terrorism on the international level. while internally it is confronted through promulgation of legislations that deal with the protection against nuclear terrorism as well as the national legal instruments for protection of nuclear materials and installation and combating illicit trafficking of nuclear materials, confrontation of nuclear terrorism on the international level is carried out through the promulgation of international convention such as that on suppression of actions of nuclear terrorism which shall be opened for signature on sept.14 -2005 according to the recommendation the general assembly of the united nations in its 59 t h session
Mace, J D
Managing capital-intensive imaging environments continues to be a challenge for nearly all administrators. Asset management, the strategic management of equipment inventory, must include planning, assessment, procurement, utilization review, maintenance, repair and disposal of equipment to reduce costs and improve efficiency. It must involve some shared risk between the facility and the provider, whether an original equipment manufacturer (OEM) or independent service organization (ISO). An absence of risk in the arrangement implies the provider is offering service management or consulting. A case study reports on three hospitals in the OhioHealth system. Their immediate goal, as they began to investigate asset management: cut costs immediately. A cross-functional team from the three hospitals began its investigation of various options, including working with ISOs, OEMs and development of inhouse clinical engineering. After developing a process to evaluate vendors, the team was able to score each against their cost-reduction potential, quality and implementation skills. The team narrowed its selection quickly to two multivendor service providers. An initial contract guaranteed savings of 20 percent of the annual budget, with a projected two to five percent additional savings. OEM relationships were moved to a time-and-materials basis, and ISOs were used in selected areas. In addition, the internal inhouse clinical engineering services group was moved into a "first call" approach in some areas. That expanded role resulted in savings and improved response time. The process, although not without its problems, was viewed favorably overall.
Khorasani, Sasan Torabzadeh; Almasifard, Maryam
Significant progress in civilization of human being has been made over 20century. Advance technology; globalization and revolution of communication are the main outcomes of this development. However, it is obvious that these achievements have been significantly influenced by evolution of management theories. The paradigm shift from classical management to modern management can be clustered into several phases. This paper presents an overview of evolution of management theory within 20 century...
Gjerding, Allan Næs; Rasmussen, Jørgen Gulddahl
. Developing a concept of organisational innovation, the paper suggests that organisational innovation can be analysed in terms of how individual and organisational learning combine with the reorientation of management perceptions, and it suggests that organisational innovation is about redirecting, speeding...... up and slowing down new forms of organisational activities. Subsequently, the paper provides an overview of management theory, proposing that the present state of management theory is one where the traditional dichotomy between a rational and a natural approach to organisations has been bridged...
Mehrotra, Anuj; Ray, Saibal
One of the most critical issues facing supply chain managers in today’s globalized and highly uncertain business environments is how to deal proactively with disruptions that might affect the complicated supply networks characterizing modern enterprises. Supply Chain Disruptions: Theory and Practice of Managing Risk presents a state-of the-art perspective on this particular issue. Supply Chain Disruptions: Theory and Practice of Managing Risk demonstrates that effective management of supply disruptions necessitates both strategic and tactical measures – the former involving optimal design of supply networks; the latter involving inventory, finance and demand management. It shows that managers ought to use all available levers at their disposal throughout the supply network – like sourcing and pricing strategies, providing financial subsidies, encouraging information sharing and incentive alignment between supply chain partners – in order to tackle supply disruptions. The editors combine up-to-date aca...
P. H. Longstaff
Full Text Available In times of public danger such as natural disasters and health emergencies, a country's communication systems will be some of its most important assets because access to information will make individuals and groups more resilient. Communication by those charged with dealing with the situation is often critical. We analyzed reports from a wide variety of crisis incidents and found a direct correlation between trust and an organization's preparedness and internal coordination of crisis communication and the effectiveness of its leadership. Thus, trust is one of the most important variables in effective communication management in times of "surprise."
Jagersma, P.K.; Gorp, D.
The structure of a firm, an important element of the business model, plays a key role in building an innovative and market-driven organization. Due to failures in the structure of companies, growth opportunities are sometimes not fully realized. Spin-out management is a process by which a new or
Melvin, Charles A., III
Four school districts adopted a school restructuring project using Deming's business management method. Deming offered alternative views of organizations based on psychology, systems, perceptual framework, and causes of variance. He listed 14 points for quality improvement. Evaluation indicated that key staff members willingly engaged in…
This book presents recently developed intelligent techniques with applications and theory in the area of quality management. The involved applications of intelligence include techniques such as fuzzy sets, neural networks, genetic algorithms, etc. The book consists of classical quality management topics dealing with intelligent techniques for solving the complex quality management problems. The book will serve as an excellent reference for quality managers, researchers, lecturers and postgraduate students in this area. The authors of the chapters are well-known researchers in the area of quality management. .
Haynes Writer, Jeanette
Draws on critical race theory to examine the concept and practice of terrorism on Native Americans by the U.S. government, providing two examples of terrorism (the Sand Creek Massacre and the murder of Anna Mae Aquash). Asserts that educators and educational anthropologists must critically analyze issues of power and media portrayals of terrorism…
Vartiainen, Tero; Aramo-Immonen, Heli; Jussila, Jari; Pirhonen, Maritta; Liikamaa, Kirsi
Replacement of the project manager (RPM) is a known phenomenon in information systems (IS) projects, but scant attention is given to it in the project management or IS literature. Given its critical effects on the project business, the organization, the project team, and the project manager, it should be studied in more depth. We identified factors which make RPM occurrences inherently different and we show that work-system theory and activity theory give comprehensive lenses to advance research on RPM. For the future research on RPM we identified three objectives: experiences on RPM, process model for RPM, and organizational culture's influence on RPM occurrences.
Shefali V. Mehta; Robert G. Haight; Frances R. Homans
Invasive species management is closely entwined with the assessment and management of risk that arises from the inherently random nature of the invasion process. The theory and application of risk management for invasive species with an economic perspective is reviewed in this synthesis. Invasive species management can be delineated into three general categories:...
Deegan, William L.; And Others
Japanese management theory was studied to identify specific models for consideration by student personnel administrators. The report is organized into three sections: major components of Japanese management theory, potential implications for student personnel administration, and three models, based on components of Japanese management theory, for…
A general working procedure of risk management, some example of other countries, topics and problems in the future are described. A definition of risk, risk assessment, risk management process, setting of aim and definite policy are explained. As a fundamental way of thinking, risk is controlled by ALARP (As Low As Reasonably Practicable). The upper and lower limit of risk level is called as Quantitative Safety Goal and Target Level of Safety, respectively. These limits in the atomic power and airplane are decided. Evaluation of risk, countermeasure and practice are explained. For example, a permissible range of risk and practical use in England, U.S.A, Holland and Japan are stated. Recently, accountability risk, missing demand risk and control risk are important. (S.Y.)
Weaver, Samuel C.; Weston, J. Fred
We identify four alternative performance metrics used in value based management (VBM). (1) Basic is an intrinsic value analysis (IVA), the discounted cash flow (DCF) methodology. (2) We show that this framework will be consistent with returns to shareholder (RTS, capital gains plus dividends) measured over appropriate time horizons. (3) Economic profit (EP) [also called economic value added (EVAÂ®)] takes from the DCF free cash flow valuation, net operating profits after taxes (NOPAT), divide...
Nissen, Thomas Elkjer
En stor del af terrorens formål er at skabe frygt. Frygt for gentagelse af terror handlinger og dermed opnåelsen af en psykologisk effekt på mennesker eller grupper af mennesker med henblik på at ændre deres holdninger eller adfærd. Et af de primære midler til at opnå denne psykologiske effekt er......, udover terror handlingerne selv, propaganda som opfølgning på terrorhandlinger for at forøge effekten af disse. Eller propaganda som slet og ret har til formål at skabe frygt og usikkerhed. Traditionelt set har meget af spredningen af terrorpropaganda beroet på, at medierne omtalte terrorhandlingerne og...
Farhana Ali describes terrorism against an occupier as an attempt to achieve freedom from tyranny.66 Recruiters encourage women to resist for a...fringe phenomenon and insurgents are all around you.’”71 O’Rourke also acknowledges the freedom and relaxed inspection women are afforded.72 Bloom and...lives as Moscow controlled the land and people. Suspicious of Islam and of religion in general, the Soviets forbade its practice, fearing expansion.110
regulations regarding terrorism and related activities (e.g., the 2006 Anti- Money iv Laundering Law), most notably the 2015 Counterterrorism... Money Laundering ASEAN Association for Southeast Asian Nations CASS Chinese Academy of Social Sciences CCP Chinese Communist Party CICIR China...the Financing of Terrorism” in 2006, and passed a new law governing money laundering in an effort to restrict access to funds available to terrorists
and logistic support. 160. Kfir, N. (2002). Understanding suicidal terror through humanistic and existential psychology. C. E. Stout (Ed), The...anomie or for an existential vacuum, which may drive other individuals to drifting or to entering the drug culture. - To understand the differences...any group of prisoners is by definition ‘survivalist’, yet that of the Red Brigades has evolved through three phases ‘social’, ‘ existential ’ and
Jeffrey S. Harrison
Full Text Available Objective – This article provides a brief overview of stakeholder theory, clears up some widely held misconceptions, explains the importance of examining stakeholder theory from a variety of international perspectives and how this type of research will advance management theory, and introduces the other articles in the special issue. Design/methodology/approach – Some of the foundational ideas of stakeholder theory are discussed, leading to arguments about the importance of the theory to management research, especially in an international context. Findings – Stakeholder theory is found to be a particularly useful perspective for addressing some of the important issues in business from an international perspective. It offers an opportunity to reinterpret a variety of concepts, models and phenomena across may different disciplines. Practical implications – The concepts explored in this article may be applied in many contexts, domestically and internationally, and across business disciplines as diverse as economics, public administration, finance, philosophy, marketing, law, and management. Originality/value – Research on stakeholder theory in an international context is both lacking and sorely needed. This article and the others in this special issue aim to help fill that void.
Ganjali, N.; Guney, C.
In this study, aspects of Game theory and its application on water resources management combined with GIS techniques are detailed. First, each term is explained and the advantages and limitations of its aspect is discussed. Then, the nature of combinations between each pair and literature on the previous studies are given. Several cases were investigated and results were magnified in order to conclude with the applicability and combination of GIS- Game Theory- Water Resources Management. It is concluded that the game theory is used relatively in limited studies of water management fields such as cost/benefit allocation among users, water allocation among trans-boundary users in water resources, water quality management, groundwater management, analysis of water policies, fair allocation of water resources development cost and some other narrow fields. Also, Decision-making in environmental projects requires consideration of trade-offs between socio-political, environmental, and economic impacts and is often complicated by various stakeholder views. Most of the literature on water allocation and conflict problems uses traditional optimization models to identify the most efficient scheme while the Game Theory, as an optimization method, combined GIS are beneficial platforms for agent based models to be used in solving Water Resources Management problems in the further studies.
Mayor accidents caused by hazardous substances are great threat to public. The consequences are often very severe with great number of injured people or even deaths and a great material damage. Statistic data shows that the main cause of accidents in hazardous installations is 'human factor', including the possibility of terrorist attack, or classic military operations. In order to ensure effective chemical safety, the actions should be taken by industry, public authorities, communities and other stake holders to prevent industrial accidents. Safety should be an integral part of the business activities of an enterprise, and all hazardous installations should strive to reach the ultimate goal of zero incidents. Safety management systems (SMS) should include appropriate technology and processes, as well as establishing an effective organisational structure. To mitigate consequences of accidents, emergency planning, land-use planning and risk communication is necessary. Adequate response in the event of accident should limit adverse consequences to health, environment and property. Follow-up actions are needed to learn from the accidents and other unexpected events, in order to reduce future incidents. In this paper the author will discus the implementing of SEVESO II directive in obtaining two main goals: major accident prevention and mitigation of consequences for men and environment in case of possible terrorist actions or military activities. Some Croatian experiences in implementing of UNEP APELL Programme, and its connection with SEVESO II directive will be shown.(author)
Barrientos Hernandez, Dora H; Church, Adam L
Two major domestic terrorist groups have plagued Peru over the past 20 years, the Sendero Luminoso or "Shining Path" (SL) and the Revolutionary Movement Túpac Amaru (MRTA). On 28 August 2003, the Peruvian Truth and Reconciliation Commission reported that an estimated 69,280 persons were killed in the internal conflict in Peru from 1980 to 2000. Most of the victims were farmers (56%), most attacks occurred in rural settings (79%), and the SL was responsible for most of the deaths (54%). Aggressive anti-terrorism efforts by police and military during this period, often at the expense of basic human rights, also contributed to this large burden of terrorism on Peru. During the 1990s, terrorist attacks in Peru had spread to its urban areas. On 17 December 1996, 22 members of MRTA took over the Japanese ambassador's residence in Lima, holding 72 hostages until the grounds were stormed by Peruvian special forces on 23 April 1997. Until recently, emergency planning and preparedness for terrorism-related events in Peru were largely underdeveloped. In the last five years, Peru has taken two key steps towards developing a mature emergency response system, with the establishment of the country's first emergency medicine residency training program and the construction of the first dedicated trauma center in Lima.
Full Text Available Arriving at a consensual definition of the phenomenon of terrorism has been a particularly difficult undertaking. Some definitions are either too specific or too vague, concentrating on some essential terrorist aspect of the actions, strategies, or types of non-state organizations that engage in terrorism. In this paper I draw on global approaches from international relations and world systems theories to propose a definition of terrorism that skirts these issues by concentrating on terrorist actors rather than terrorist behavior. I argue that this approach has several advantages, including the dissolution of several empirical and analytical problems produced by more essentialist definitions, and the location of terrorism within a two dimensional continuum of collective-violence phenomena in the international system which discloses important theoretical insights. I proceed to examine the characteristics of terrorism by comparing it with other forms of violence in the international system. I propose that terrorism may be part of the cycles and trends of unrest in the world system, responding to the same broad families of global dynamics as other forms of system-level conflict.
Wolff, Katharina; Larsen, Svein
Terrorism is an increasing problem; still, research systematically investigating the impact of varying kinds of terrorism is scarce. The present investigation uses hypothetical scenarios to look at effects of diverging sorts of terrorism on risk perceptions in a student- and a tourist sample. Two characteristics of terrorism were varied systematically: frequency (whether terrorism hits a destination where terrorism is frequent or infrequent) and degree of organization (whether terrorism is co...
Madsen, Dag Øivind; Stenheim, Tonny
Big Data (BD) is currently one of the most talked about management ideas in the business community. Many call it the “buzzword of the day.” In books and media articles, BD has been referred to as a “revolution” and “new era.” There is lots of optimistic and upbeat rhetoric surrounding BD. This has led some to question whether BD is a hyped-up management fashion. In this paper, the BD phenomenon is viewed through the lens of management fashion theory. Management fashion provides an analytical ...
Full Text Available Today, it is clear that environmental accidents and processes represent, not only potential but also real causes of crises on which states must be aware of. The formation of the ecological crisis is growing exponentially, along with their consequences. The problem with the environmental crisisis lies not in the fact that they exist, but how we treat them. Exploring the causes of the crisis requires an interdisciplinary approach. At the micro level, this approach focuses on the role of individuals. At the middle level of research, focus is on organizational factors and processes that may play important role in causing the crisis. Macro level of approach lists possible causes that seem to make the crisis more or less inevitable and unavoidable features of the modern world. The crisis is also characterized by negative effects (perturbations, deregulation, conflict, confused action, intense stress, which leads to reckless actions and positive effects (mobilization, solidarity, cooperation, improved adaptation to the environment, experiential learning. Furthermore, ecological crisis represents an emergency situation whose beginning and duration are not predetermined. Anti-crisis measures have failed mainly because of the numerous factors influencing on one hand, on a complexity of the crisis and, on the other hand, because of its continuously changing factors throughout the duration of the crisis. Managing ecological crisis occurs, therefore, as a permanently professional inventive and complicated process which aims to prevent the escalation of the crisis, as well as the elimination of the expected and actual negative consequences of the crisis. Mismanagement of such crisis drains system resources, interferes with its function and organization, impacts on the financial opportunities while achieving positive goals. Extreme mismanagement can lead to the entropy of the system itself. The purpose of this paper is to elaborate basic facts of managing
McClure, M L
How do employment organizations outside the hospital field deal with issues such as staff productivity, motivation, burnout, and high turnover? In Part I of this two-part article, the author presents an overview of modern management theory and practice, drawn from the literature on organizational behavior. She shows how nursing administrators can use this scholarly foundation to better understand the organizing principles and problems of their departments. In Part II (to be published in March 1984), the author applies these classic and relevant theories to the specific challenges that face the manager of professional nurses.
Full Text Available Investment risk is the principal threat to the assets side of the balance sheets of financial institutions. It is evident that investors who concentrate their wealth on one type of securities can rarely be found. Instead, they tend to invest diversified portfolio of securities. This reduces the degree of risk of the expected return, which depends both on the absolute risk of each investment in the portfolio, and the relationship that exists between individual investments within the portfolio. The paper analyzes the investment risk management by using modern portfolio theory in both national and global financial f lows. At the same time, the paper considers the risk management models that ensures efficient portfolio diversification, aiming at investment risk reduction. It is pointed out that the investment risk management in modern financial f lows is a complex process, and that the development of financial theory goes towards improving, soft risk management method.
Haigh, Carol A
The purpose of this study was to evaluate the part simplified chaos theory could play in the management of nursing services. As nursing care becomes more complex, practitioners need to become familiar with business planning and objective time management. There are many time-limited methods that facilitate this type of planning but few that can help practitioners to forecast the end-point outcome of the service they deliver. A growth model was applied to a specialist service to plot service trajectory. Components of chaos theory can play a role in forecasting service outcomes and consequently the impact upon the management of such services. The ability to (1) track the trajectory of a service and (2) manipulate that trajectory by introducing new variables can allow managers to forward plan for service development and to evaluate the effectiveness of a service by plotting its end-point state.
Richard A. Couto
Full Text Available This paper examines and juxtaposes discourses about terrorism, violence, and political leadership. It presents generalizations about terrorism—a form of political violence by, for, and against the state—and politics and violence based on the theories of Max Weber and Hannah Arendt. The stark contrasts drawn from these theories include power as non-violent strength (Arendt versus power as violence-dependent (Weber and the struggle for legitimacy between different agents (states and individuals as well as terrorism by, for, and against the state. This reframing of power leads to judging a lack of power where there is violence, and the presence of power where one observes non-violence. An examination of political and criminal violence leads to questions about deliberate and purposeful violence, indirect and structural violence that has political consequences, and their relationship to terrorism. It expands the application of terrorism to include indirect structural violence by indicating its relationship to direct violence, not only in traditionally-viewed terrorist action but in the ignored terror of, for example, inner cities. Terrorism has many forms by many actors. To synthesize the results of these lines of reasoning leads to a conclusion with considerable implications for politics and for political leadership. The politics of terrorism suggest a central counter-terrorist approach: de-politicizing the violence of terrorists whenever possible and using the authority and power of the state to institutionalize it as criminal violence. This, in turn, also means politicizing other forms of violence, such as capital punishment, and their indirect and structural forms, such as the inner city.
Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society.......Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society....
This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly
Full Text Available Research into the effectiveness of customer complaint management has attracted researchers, yet there has been little discussion on customer complaint management in the context of systematic knowledge management approach particularly in the domain of hotel industry. This paper aims to address such gap through the application of object-oriented theory for which the notation of unified modelling language has been adopted for the representation of the concepts, objects, relationships and vocabularies in the domain. The paper used data from forty seven hotel management staff and academics in hospitalitymanagement to investigate lessons learned and best practices in customer complaint management and knowledge management. By providing insights into the potential of a knowledge management approach using object oriented theory, this study advances our understanding on how a knowledge management approach can systematically support the management of hotel customer complaints.
Furlan Matos Alves, Marcelo Wilson; Lopes de Sousa Jabbour, Ana Beatriz; Kannan, Devika
of sustainability managers on the adoption of low-carbon operations management practices and their related benefits. Design/methodology/approach: To achieve this goal, this research uses NVivo software to gather evidence from interviews conducted with ten high-level managers in sustainability and related areas from...... seven leading companies located in Brazil. Findings: The authors present four primary results: a proposal of an original framework to understand the relationship between contingency theory, changes in organisational structure to embrace low-carbon management, adoption of low-carbon operations practices......-change contingencies at the supply chain level, organisational structure for low-carbon management and low-carbon operations management practices and benefits. This research also highlights evidence from an emerging economy and registers future research propositions....
Bridoux, F.; Stoelhorst, J.W.
Instrumental stakeholder theory proposes a positive relationship between fairness toward stakeholders and firm performance. Yet, some firms are successful with an arms-length approach to stakeholder management, based on bargaining power rather than fairness. We address this puzzle by relaxing the
Gattiker, Urs E.
Technological innovation affects the structure and content of jobs. Research indicates that there is a need for a theory of technological innovation and strategic human resource management considering several factors, such as an employee's beliefs about the effect of technological innovations on the quality of work life and work content.…
Niaz, Nausheen; Foss, Nicolai; Ramsøy, Thomas Zöega
Conventionally practical aspects of work motivation alongside management theory have long focused on the conscious elements pertaining decision-making. We show that decision neuroscience introduces new mediator and moderator variables that influence the decision-making process that arises during...
This thesis deals with stochastic models in two fields: risk theory and management accounting. Firstly, two extensions of the classical risk process are analyzed. A method is developed that computes bounds of the probability of ruin for the classical risk rocess extended with a constant interest
Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)
Hansen, Jesper Rosenberg; Ewan, Ferlie
This article discusses the utility of two different strategic management theories in different types of public organizations including contemporary New Public Management-based public organizations, namely Porter's strategic positioning model and the resource-based view of strategy. We argue...... conditions: the degree of administrative autonomy, performance-based budgeting and market-like competition. We give empirical examples drawn from public servives in the UK and Denmark. We call for more exploration of these (and other) strategic management approaches within contemporary public services...
Until 2001 losses caused by terrorist attacks have been covered under fire policies worldwide with two exceptions: Spain and UK where major and multiple losses caused by ETA and IRA had led to specific insurance solutions. The September 11, 2001 attacks on the World Trade Centre have changed the world in many aspects. This includes the insurance industry, which was compelled to exclude terrorism from coverage and to offer special solutions for extra premium. Nuclear power plants have been repeatedly called targets for terrorists as their destruction could cause a large catastrophe and more victims than the September 2001 attacks. How does the insurance industry respond? (author)
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism. 594.311 Section 594.311... ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.311 Terrorism. The term terrorism means an activity that: (a) Involves a violent act or an act...
CHAIKA ALEXANDER VIKTOROVICH
The problem of modern terrorism as an image of counterculture environment is considered. The analysis of concepts and approaches of foreign and native authors, specialists of terrorism problem research was conducted. Separate features of the modern terrorism are considered and emphasized. The author drew conceptual conclusions on the basis of dialectical approach to modern terrorism counterculture phenomenon research.
Farrahi, Amir H.; Goldberg, Alan T.; Bagasol, Leonard N.; Jung, Jaewoo
Graph theory is used to investigate three different problems arising in air traffic management. First, using a polynomial reduction from a graph partitioning problem, it isshown that both the airspace sectorization problem and its incremental counterpart, the sector combination problem are NP-hard, in general, under several simple workload models. Second, using a polynomial time reduction from maximum independent set in graphs, it is shown that for any fixed e, the problem of finding a solution to the minimum delay scheduling problem in traffic flow management that is guaranteed to be within n1-e of the optimal, where n is the number of aircraft in the problem instance, is NP-hard. Finally, a problem arising in precision arrival scheduling is formulated and solved using graph reachability. These results demonstrate that graph theory provides a powerful framework for modeling, reasoning about, and devising algorithmic solutions to diverse problems arising in air traffic management.
Full Text Available The intensity of the attacks, the level of violence, the scale of destruction in the maritime areas forces creation of certain security conditions. Recognizing the enemy - piracy and maritime terrorism - by identifying their resources, skills and competences is necessary action in building the safety of vessels and maritime infrastructure. Building competence of terrorist organization and maritime piracy requires the involvement of many interrelated resources and their proper coordination. It seems that, as in a business model, in these criminal organizations there are similar resources, skills and competences that determine the advantage and strategic value of the organization. However, the weight of each factor is different. The same assumption can be related to piracy and the activities of the terrorist organization at sea. The results of the study suggest that the main sources of success of analyzed criminal organizations generate harm for national security. In the case of piracy, they result from the following spheres: human capital, attributable to the skills capital; structural capital, belonging to innovation capital; relational capital, depending on customers' capital. As for terrorist activities, they stem from the spheres of: human capital, belonging to social capital; structural capital, attributable to the process capital; relational capital and determined by capital of standing out. In summary, this article is intended to show a terrorist organization and maritime piracy through the prism of resources theory, skills and competences of strategic management. As one of the first, it places many questions, formulate some theses in the area of competences of organizations. Answering the questions, verification of posed theses, requires also in-depth research that will be published in subsequent works.
Managers of multidisciplinary teams face difficult dilemmas in managing competing interests, diverse perspectives and interpersonal conflicts. This paper illustrates the potential of the theory of action methodology of Argyris and Schön (1974, 1996) to illuminate these problems and contribute to their resolution. An empirical example of a depth-investigation with one multidisciplinary community health care team leader in Australia demonstrates that the theory of action offers a more accurate account of the causal dimensions of her dilemmas and provides more scope for effective intervention than her lay explanation will allow. It also provides a more satisfactory analysis of her difficulties with two common problems identified in the literature: defining the appropriate level of autonomy for team members and developing constructive dialogue across perceived discipline-based differences of opinion. Consequently the theory of action appears to offer enormous promise to managers of multidisciplinary teams wanting to understand and resolve their problems and develop a rigorous reflective practice. Further research on the viability of the theory to facilitate a self-correcting system that can promote learning even under conditions of stress and conflict is suggested and implications for learning and teaching for the multidisciplinary environment are briefly discussed.
Callaghan, Chris William
Knowledge management as a field is concerned with the management of knowledge, including the management of knowledge in research processes. Knowledge management theory has the potential to support research into problems such as HIV, antibiotic resistance and others, particularly in terms of aspects of scientific research related to the contribution of social science. To date, however, these challenges remain with us, and theoretical contributions that can complement natural science efforts to eradicate these problems are needed. This paper seeks to offer a theoretical contribution grounded in Kuhn's paradigm theory of innovation, and in the argument by Lakatos that scientific research can be fundamentally non-innovative, which suggests that social science aspects of knowledge creation may hold the key to more effective biomedical innovation. Given the consequences of ongoing and emerging global crises, and the failure of knowledge systems of scientific research to solve such problems outright, this paper provides a review of theory and literature arguing for a new paradigm in scientific research, based on the development of global systems to maximise research collaborations. A global systems approach effectively includes social science theory development as an important complement to the natural sciences research process. Arguably, information technology and social media technology have developed to the point at which solutions to knowledge aggregation challenges can enable solutions to knowledge problems on a scale hitherto unimaginable. Expert and non-expert crowdsourced inputs can enable problem-solving through exponentially increasing problem-solving inputs, using the 'crowd,' thereby increasing collaborations dramatically. It is argued that these developments herald a new era of participatory research, or a democratisation of research, which offers new hope for solving global social problems. This paper seeks to contribute to this end, and to the recognition
LL.B. No one definition of terrorism has gained universal acceptance. The lack of agreement on a definition of terrorism has been a major obstacle to meaningful international countermeasures to combat terrorism. There are 12 International Conventions related to terrorism and an explicit definition is still missing. Many states have tried to define terrorism and none of these definitions has been implemented, either by the United Nations or these states. There are many International Convent...
Full Text Available Contemporary terrorism is not an ancestral, irrational, oriental, phenomenon. Nor is it a fanatical reaction of the religions that vindicate a backward society as against the developed societies of the first world. The terrorism of today is a thoroughly modern phenomenon: one of the worst monstrosities of modern society, supplied with rational planning of objectives. A captious interpretation of the Islamic religion endows terrorism with a universal projection among the multitudinous audience of the discontented with the might of that diffuse power that we know as the developed Western world. Al Qaeda does not hesitate to present its war against the West as «a war without quarter» lasting until the infidel Christians are eliminated and the world is subjugated to Islam In the meantime, in a similar conflictive sense, the theoretical campaign of Samuel Huntington across the entire planet responds with a paradigmatic post-cold war, capable of inflaming the international conflict, in a sense no less belligerent with the Anti-Occident than that employed by the radical Imams. As has been pointed out by Amartya Sen, to give priority in this way to the religious identity, the response of the West to international terrorism in calling it «islamic terrorism» is very clumsy, as it magnifies the importance of the religious authorities in detriment to governmental ways and means in the solving of problems.
El terrorismo contemporáneo no es un fenómeno ancestral, irracional y oriental. Tampoco es una reacción fanática de las religiones que reivindican una sociedad atrasada frente a las sociedades desarrolladas del primer mundo. El terrorismo actual es un fenómeno plenamente moderno: uno de los peores engendros de la sociedad moderna, dotado de una planificación racional de objetivos. Una interpretación capciosa de la religión islámica dota al terrorismo de una proyección universal entre la numerosa audiencia de descontentos con el poder
Olden, Peter C
Organization theory (OT) provides a way of seeing, describing, analyzing, understanding, and improving organizations based on patterns of organizational design and behavior (Daft 2004). It gives managers models, principles, and methods with which to diagnose and fix organization structure, design, and process problems. Health care organizations (HCOs) face serious problems such as fatal medical errors, harmful treatment delays, misuse of scarce nurses, costly inefficiency, and service failures. Some of health care managers' most critical work involves designing and structuring their organizations so their missions, visions, and goals can be achieved-and in some cases so their organizations can survive. Thus, it is imperative that graduate healthcare management programs develop effective approaches for teaching OT to students who will manage HCOs. Guided by principles of education, three applied teaching/learning activities/assignments were created to teach OT in a graduate healthcare management program. These educationalmethods develop students' competency with OT applied to HCOs. The teaching techniques in this article may be useful to faculty teaching graduate courses in organization theory and related subjects such as leadership, quality, and operation management.
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and...: Comments that include trade secrets, confidential commercial or financial information, Chemical-terrorism...
The so-called "war on terror" has renewed the interest in torture in practice as well as in theory. The philosophical debate about possible justifications for torture has to a large extent revolved about the ticking bomb scenario: would it be justified to torture a terrorist in order to prevent...... a catastrophe? I criticize arguments based on ticking bomb scenarios in two steps. First, I show that exceptional resort to torture will not be possible in the situations where it is most needed. Second, I state several pragmatic as well as principled objections against a state sanctioned or tolerated practice...
Chrisman, Allan K; Dougherty, Joseph G
Disasters, war, and terrorism expose millions of children globally to mass trauma with increasing frequency and severity. The clinical impact of such exposure is influenced by a child's social ecology, which is understood in a risk and resilience framework. Research findings informed by developmental systems theory and the related core principles of contemporary developmental psychopathology are reviewed. Their application to the recent recommendations for interventions based on evolving public health models of community resilience are discussed along with practical clinical tools for individual response. Published by Elsevier Inc.
Chen Huarong; Wang Xiaoming
Based on the stakeholders management theory, this pa- per provides a new strategic management method for the National Sustainable Development Strategy. By taking China＇s National Sustainable Development Strategy Management as an example, this paper identifies all the stakeholders involved and then as- sesses stakeholders from two dimensions, namely ＂Importance＂ and ＂Attitude＂, by which all of the stakeholders are divided into six categories. On this basis, further analysis is made to work out strategic management programme by scheduling the strate- gic emphases, steps and management countermeasures for dif- ferent types of stakeholders so as to provide theortical evidence for the practice of National Sustainable Developnent Strategy management.
Maguen, Shira; Papa, Anthony; Litz, Brett T
Terrorism creates a ripple of fear and uncertainty. Although most individuals are resilient and recover over time, a minority remains functionally and psychologically impaired. In this paper, we examine research on coping strategies employed in the aftermath of terrorist events, theories and empirical findings related to appraisal processes that influence individuals' primary attributions of risk, and normative processes that shape secondary appraisals, which predict specific coping behaviors. We also describe individual diatheses and factors promoting resilience that may influence coping and functioning in the face of terrorism. Finally, we offer suggestions for future research.
Zhu, Wenmin; Jia, Yuanhua
Based on the risk management theory and the PDCA cycle model, requirements of the railway passenger transport safety production is analyzed, and the establishment of the security risk assessment team is proposed to manage risk by FTA with Delphi from both qualitative and quantitative aspects. The safety production committee is also established to accomplish performance appraisal, which is for further ensuring the correctness of risk management results, optimizing the safety management business processes and improving risk management capabilities. The basic framework and risk information database of risk management information system of railway passenger transport safety are designed by Ajax, Web Services and SQL technologies. The system realizes functions about risk management, performance appraisal and data management, and provides an efficient and convenient information management platform for railway passenger safety manager.
Terrorism has existed for millennia and is a phenomenon well-known to many parts of the world. Americans were forced to recognize this phenomenon, and our vulnerability to it, by two sets of events in 2001: the attacks on New York City and Washington, DC, and the anthrax mailings that followed shortly thereafter. Psychiatry, psychology, and other behavioral and social sciences have been looked to for assistance in collecting and analyzing intelligence data, understanding terrorism, and developing strategies to combat terrorism. In addition to reviewing areas in which the behavioral sciences have made contributions in addressing this problem, this article discusses the developing roles for behavioral scientists in this field.
Full Text Available Many paradigmatic forms of animal rights and environmental activism have been classed as terrorism both in popular discourse and in law. This paper argues that the labelling of many violent forms of direct action carried out in the name of animal rights or environmentalism as ‘terrorism’ is incorrect. Furthermore, the claim is also made that even those acts which are correctly termed as terrorism are not necessarily wrongful acts. The result of this analysis is to call into question the terms of public debate and the legitimacy of anti-terrorism laws targeting and punishing radical activism.
Krishnamurthy, Vikram; Vo, Ba-Ngu
A unique guide to the state of the art of tracking, classification, and sensor management. This book addresses the tremendous progress made over the last few decades in algorithm development and mathematical analysis for filtering, multi-target multi-sensor tracking, sensor management and control, and target classification. It provides for the first time an integrated treatment of these advanced topics, complete with careful mathematical formulation, clear description of the theory, and real-world applications. Written by experts in the field, Integrated Tracking, Classification, and Sensor Management provides readers with easy access to key Bayesian modeling and filtering methods, multi-target tracking approaches, target classification procedures, and large scale sensor management problem-solving techniques.
William, Reshmina; Garg, Jugal; Stillwell, Ashlynn S.
Green stormwater infrastructure has been demonstrated as an innovative water resources management approach that addresses multiple challenges facing urban environments. However, there is little consensus on what policy strategies can be used to best incentivize green infrastructure adoption by private landowners. Game theory, an analysis framework that has historically been under-utilized within the context of stormwater management, is uniquely suited to address this policy question. We used a cooperative game theory framework to investigate the potential impacts of different policy strategies used to incentivize green infrastructure installation. The results indicate that municipal regulation leads to the greatest reduction in pollutant loading. However, the choice of the "best" regulatory approach will depend on a variety of different factors including politics and financial considerations. Large, downstream agents have a disproportionate share of bargaining power. Results also reveal that policy impacts are highly dependent on agents' spatial position within the stormwater network, leading to important questions of social equity and environmental justice.
Dillon, Robin L; Liebe, Robert M; Bestafka, Thomas
This article describes the anti-terrorism risk-based decision aid (ARDA), a risk-based decision-making approach for prioritizing anti-terrorism measures. The ARDA model was developed as part of a larger effort to assess investments for protecting U.S. Navy assets at risk and determine whether the most effective anti-terrorism alternatives are being used to reduce the risk to the facilities and war-fighting assets. With ARDA and some support from subject matter experts, we examine thousands of scenarios composed of 15 attack modes against 160 facility types on two installations and hundreds of portfolios of 22 mitigation alternatives. ARDA uses multiattribute utility theory to solve some of the commonly identified challenges in security risk analysis. This article describes the process and documents lessons learned from applying the ARDA model for this application.
This paper uses the emergent theories of chaos and complexity to explore the self-management supportive care of chronic obstructive pulmonary disease (COPD) patients within the evolving primary care setting. It discusses the concept of self-management support, the complexity of the primary care context and consultations, smoking cessation, and the impact of acute exacerbations and action planning. The author hopes that this paper will enable the acquisition of new insight and better understanding in this clinical area, as well as support meaningful learning and facilitate more thoughtful, effective and high quality patient-centred care within the context of primary care.
Simatupang, Togar Mangihut; Sandroto, Indah Victoria
Supply chain management among independent firms often provide larger benefits form effectively satisfying customer needs and wants than working in isolation. However, many improvement initiatives often end up with devastating effects on supply chain performance. Part of the reason is sub-optimisation among the chain members resulting form a lack of awareness about the importance of the perspective of the supply chain as a whole and the existence of constraint(s). This paper applies the Theory...
Washington, DC: U.S. Department of Defense, Aug. 15, 2009), 5. 31 Ibid. 32 Ibid., 6. 33 Ibid. 34 Severin Peters, Strategic Communication for Crisis ...Relations, ed. Robert L. Heath (Thousand Oaks, CA: Sage Publications, 2001), 128. 76 W. Timothy Coombs , “Interpersonal Communication and Public Relations...Toward a Theory of Strategic Communication : A Relationship Management Approach by Lieutenant Colonel Cheryl D. Phillips
The question of whether or not terrorists will ''go nuclear'' is discussed. It is possible, although there is no historical evidence that any criminal or terrorist group ever made any attempt to acquire nuclear material for use in an explosive or dispersal device. In terms of intentions, psychotics are potential nuclear terrorists, but in terms of capabilities, they are the farthest away from being able to acquire a nuclear weapon. The history of nuclear incidents in the U.S. and abroad is reviewed. As the nuclear industry expands, the number of low-level incidents (bomb threats, pilferage, etc.) will increase also, but not necessarily escalate to more serious incidents. Terrorists may ''go nuclear'' solely for the publicity value; nuclear hoaxes may be attenpted. Nuclear terrorism seems more attractive as a threat than as an action. But the nature of the threat may change in the future, and the danger of imitation of a successful nuclear terrorist act is pointed out
Weimann, Gabriel; Brosius, Hans-Bernd
Investigates the newsworthiness of international terrorism. Relates the concept of deviance as a predictor of newsworthiness to the specific attributes of terrorist events and their impact on media selection (coverage or no coverage) and prominence of coverage. (SR)
.... The arrival of the information age has created a new menace cyber terrorism. This threat recognizes no boundaries, requires minimal resources to mount an attack, and leaves no human footprint at ground zero...
Chandana Rathnasiri Hewege
Full Text Available This article critiques the mainstream management control theory with a view to highlighting its gaps and to suggesting a direction for its future development. Management control theory has undergone lopsided development due to the dominance of accounting-based approaches to the study of management controls. Thus, management control theory has failed to explain complex issues that are interwoven with deep-rooted, sociocultural context within which these issues emanate. Although the influence of organizational theory, particularly systems theory, cybernetics, and contingency theory, resulted in a marginal outward shift of the boundaries of the mainstream management control theory, the main drawbacks of the theory remained unresolved. Alternative theoretical perspectives rooted in disciplines such as political economy, sociology, and anthropology can enrich the mainstream management control theory. Management control issues emanating from non-Western contexts would remain largely unexplained or poorly explained, unless alternative theoretical perspectives were used.
Budiarto, S.; Putro, H. P.; Pradono, P.; Yudoko, G.
This study examines the air cargo service by comparing existing theories from previous research with the conditions on the ground. The object of the study is focused on the freight forwarder and the airport management. This study reviews the models and results of previous research that will be summarized and used to identify any issues related to the characteristics of air cargo operational services, as well as observing and monitoring literature with airlines, shipping companies, and airport management to explore and see the gap between prior research and implementation of its process in the air cargo service. The first phase in this study is to provide an overview of the air cargo industry. The second phase analyzes the characteristic differences between air cargo services and air passenger operating services. And the third phase is a literary bibliography study of air cargo operations, where the focus is on the studies using quantitative models from the perspective of the object of the study, which is the optimization of revenue management on air cargo services. From the results of the study, which is based on the gap between theory and practice, new research opportunities which are related to management of air cargo service revenue in the form of model development are found by adding booking timelines aspects of cargo that can affect the revenue of cargo airline companies and airports.
Canetti-Nisim, Daphna; Halperin, Eran; Sharvit, Keren; Hobfoll, Stevan E.
Does exposure to terrorism lead to hostility toward minorities? Drawing on theories from clinical and social psychology, we propose a stress-based model of political extremism in which psychological distress--which is largely overlooked in political scholarship--and threat perceptions mediate the relationship between exposure to terrorism and…
This paper aims to answer the question: 1. The contingency theory can be a source of improvement in management accounting research ,in terms of global economic crisis?’’ 2. Can be Contingency factors a bridge between organizational theories and management accounting? Research purpose: -The contingency theory can be a source of improvement in management accounting research, in terms of global economic crises; -Contingency factors can be a bridge between organizational theories and management a...
Manager-physician relationships are a critical determinant of the success of health care organizations. As the health care industry is moving toward a situation characterized by higher scarcity of resources, fiercer competition, more corporitization, and strict cost-containment approaches, managers and physicians should, more than ever, work together under conjoint or shared authority. Thus, their relationship can be described as one of high rewards, but also of high risk because of the wide range of differences that exist between them: different socializations and trainings resulting in different worldviews, value orientation and expectations and different cultures. In brief, managers and physicians represent different "tribes," each with its language, values, culture, thought patterns, and rules of the game. This article's main objective is to determine the underlying factors in the manager-physician relationship and to suggest ways that make this relationship more effective. Four different organizational perspectives will be used. The occupational perspective will give insights on the internal characteristics of the occupational communities of managers and physicians. The theory of deprofessionalization of physicians will also be discussed. The structuring perspective will look at the manager-physician relationship as a structure in the organization and will determine the effects of contextual factors (size, task uncertainty, strategy, and environment) on this relationship and the resulting effect on performance and effectiveness of the organization. The culture and control perspective will help detect the cultural differences between managers and physicians and how these interact to affect control over the decision-making areas in the hospital. The power, conflict, and dialectics perspective will shed the light on the conflicting interests of managers and physicians and how these shape the "power game" in the organization. Consequently, a theoretical model of
Alfa-Wali, Maryam; Sritharan, Kaji; Mehes, Mira; Abdullah, Fizan; Rasheed, Shahnawaz
Global terrorist activities have increased significantly over the past decade. The impact of terrorism-related trauma on the health of individuals in low- and middle-income countries is under-reported. Trauma management in African countries in particular is uncoordinated, with little or no infrastructure to cater for emergency surgical needs. This article highlights the need for education, training and research to mitigate the problems related to terrorism and surgical public health. Copyright © 2014 Ministry of Health, Saudi Arabia. Published by Elsevier Ltd. All rights reserved.
Sachin Ratan Gedam
Full Text Available Night terrors and sleepwalking are arousal disorders that occur during the first third of night. Combined existence of sleep disorders are rare phenomenon and found to be associated with behavioural and emotional problems. It becomes difficult to diagnose among sleep disorders and epilepsy is an important differential diagnosis. Management with combined approach of pharmacotherapy and psychological counselling is safe and effective. Here, we present a case of night terrors and sleepwalking to highlight the importance of diagnosis and treatment in this condition. To conclude, all medical professionals need to be aware of different parasomnias and its treatment options.
International terrorism remains a significant threat to the peace of the world. Weapons using various materials and delivery systems have been directed against cities and infrastructure, and other materials are postulated to be usable within the near future. Some of these materials are unusual or exotic, while some are modifications of materials used daily for other purposes: biological, chemical, radiological, nuclear and explosive. These materials pose a safety challenge for first responders, slowing the response and potentially killing scarce trained personnel. This book provides information about how leading agencies across the NATO membership are preparing to confront and respond to terrorists deploying Weapons of Mass Destruction (WMD), Weapons of Mass Killing (WMK) and Weapons of Mass Disruption (WMDi). Based on contributions by experts from NATO member states, Israel and the Russian Federation, this book offers information on fourth generation warfare as a new challenge to first responders. It also pr...
Azar, Kristen M J; Lesser, Lenard I; Laing, Brian Y; Stephens, Janna; Aurora, Magi S; Burke, Lora E; Palaniappan, Latha P
The use of smartphone applications (apps) to assist with weight management is increasingly prevalent, but the quality of these apps is not well characterized. The goal of the study was to evaluate diet/nutrition and anthropometric tracking apps based on incorporation of features consistent with theories of behavior change. A comparative, descriptive assessment was conducted of the top-rated free apps in the Health and Fitness category available in the iTunes App Store. Health and Fitness apps (N=200) were evaluated using predetermined inclusion/exclusion criteria and categorized based on commonality in functionality, features, and developer description. Four researchers then evaluated the two most popular apps in each category using two instruments: one based on traditional behavioral theory (score range: 0-100) and the other on the Fogg Behavioral Model (score range: 0-6). Data collection and analysis occurred in November 2012. Eligible apps (n=23) were divided into five categories: (1) diet tracking; (2) healthy cooking; (3) weight/anthropometric tracking; (4) grocery decision making; and (5) restaurant decision making. The mean behavioral theory score was 8.1 (SD=4.2); the mean persuasive technology score was 1.9 (SD=1.7). The top-rated app on both scales was Lose It! by Fitnow Inc. All apps received low overall scores for inclusion of behavioral theory-based strategies. © 2013 American Journal of Preventive Medicine.
Hema Sharma Datta
Full Text Available Aging is a complex phenomenon, a sum total of changes that occur in a living organism with the passage of time and lead to decreasing ability to survive stress, increasing functional impairment and growing probability of death. There are many theories of aging and skin remains the largest organ of the study. Skin aging is described as a consequence of intrinsic and extrinsic factors. The most common amongst visible signs of skin aging are wrinkles and there are various therapies including antiaging cosmeceuticals, sunscreens, chemical peeling, injectable agents, such as botox, fibrel, autologous fat grafting as also few surgical procedures have been used. Ayurveda, the Indian traditional medicine, describes aging with great details. This review provides modern and Ayurvedic perspectives on theories and management of aging.
Full Text Available Terrorism continues to be viewed conventionally in Pakistan. However, the phenomenon has assumed a structured formation driven by rational choice perspectives. This article attempts to identify distinct trends and patterns of terrorism within prevailing environments of Pakistan. In doing so, it also examines the validity of seasonality dimensions of routine activity theory (use of summer months and earlier days of week for terrorist acts. Eight trends are identified tentatively. Using empirical data and analytical discourse, the findings confirm the assumed trends in terms of their typology, structure, operational system and rallying themes. In addition, the article finds support for the hypothesis of terrorism being a strategic approach rather than an ordinary form of violence. It is further found that changed patterns of violence warrant a revisiting of earlier assumptions regarding the applicability of routine activity theory within the Pakistani context. By implication, the study also suggests a variation of terrorism under different regime types, i.e. military or democratic.
Meeting a day before the summit, Bush and Putin announced a new Global Initiative to Combat Nuclear Terrorism; a plan for multiple, multilateral guaranteed suppliers of nuclear fuel to States that forgo building their own enrichment plants; and a Civil Nuclear Agreement that will lift restrictions on cooperation between the two countries in developing peaceful nuclear power. Each of these initiatives provides a framework for dozens of specific actions that can measurably reduce the risk of terrorists acquiring a nuclear weapon. The significance of the Global Initiative against Nuclear Terrorism lies not only in its substance but in Russia's visible joint ownership of the Initiative. After years in which Washington lectured Moscow about this threat, Putin's joint leadership in securing nuclear material worldwide should give added impetus to this undertaking inside Russia as well. Globally, this initiative calls for work plans in five arenas: prevention, detection, disruption, mitigation of consequences after an attack, and strengthening domestic laws and export controls against future A.Q. Khans. The guaranteed nuclear fuel supply tightens the noose around Iran as it seeks to exploit a loophole in the global Nuclear Non-Proliferation Treaty. By guaranteeing States that six separate international suppliers will provide backup guarantees against interruption of supply for any reason other that breech of commitments under the NPT, this proposal eliminates Iran's excuse for Natanz-the enrichment plant it is rushing to finish today. This system for supply will be subject to the supervision by the IAEA, which will also have nuclear fuel reserves that allow it to be a supplier of last resort. The Civil Nuclear Agreement will allow joint research on next-generation, proliferation-proof reactors, including technologies where Russian science is the best in the world. It will permit sale to Russia of US technologies that can improve the safety and efficiency of Russian nuclear
Johnson, Michael P; Leone, Janel M; Xu, Yili
In this article, we argue that past efforts to distinguish among types of intimate partner violence in general survey data have committed a critical error--using data on current spouses to develop operationalizations of intimate terrorism and situational couple violence. We use ex-spouse data from the National Violence Against Women Survey (NVAWS) to develop new operationalizations. We then demonstrate that NVAWS current spouse data contain little intimate terrorism; we argue that this is likely to be the case for all general surveys. In addition, the ex-spouse data confirm past findings regarding a variety of differences between intimate terrorism and situational couple violence, including those predicted by feminist theories.
... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...
There are millions of police, fire, public health, emergency medical, emergency management, and public sector homeland security professionals ready and willing to assist in the global war on terror (GWOT...
Jaffe, Dena H; Peleg, Kobi
We sought to characterize injuries and outcomes from terror explosions with specific attention to children (0-10 years) and adolescents (11-15 years) compared to adults (16-45 years). Terror explosions target vulnerable populations and result in multidimensional injuries that may vary according to age group. The relative dearth of information regarding terror-related injuries among children inhibits proper preparedness and optimum management during such an event. A retrospective study was performed using data from the national Israel Trauma Registry (October 2000 to December 2005). Included were civilians and nonactive military personnel hospitalized as a result of a terror explosion. During the 5.3-year study period, 49 children (0-10 years), 65 adolescents (11-15 years), and 723 adults (16-45 years) were hospitalized from terror explosions. Children were more likely than adults to sustain severe injuries (27% vs. 12%) and traumatic brain injury (35% vs. 20%) and less likely to sustain injuries to their extremities (35% vs. 57%) or open wounds (39% vs. 59%) (P profile was similar to that of adults, however, adolescents presented with less internal injuries, more contusions, and superficial wounds to extremities and were more likely to require surgery for mild to moderate wounds. Differences in hospital utilization and outcomes by age groups were observed when data were stratified by injury severity. Compared to adults, children, and adolescents exposed to terror explosions present with different injuries and hospital utilization and outcomes. These results further confirm that preparedness of a pediatric healthcare system is essential for effective management in the event of a future mass casualty incident.
In the first part, Dr Sugarman reviewed several recent theories of management and their relevance to NPP management. These theories encompass basic aspects like bureaucracy, un-bureaucracy, quality and excellence, re-engineering, knowledge management, emotional intelligence and learning organisation. Dr Sugarman discussed evolution from the Old Paradigm (Bureaucracy) to the New One (Learning Organization), defining the main aspects of both models, that can be summarises primarily in regards to strategy and structure. In terms of strategy, the new paradigm moves away from being largely inflexible to a much more dynamic environment whereby innovation is encouraged as opposed to performing in the prescribed manner whether suitable or not. The structural changes in the new model are also evident. There has been a marked move away from a hierarchical 'top down' approach to a much flatter structure that encourages less empire building and more openness between teams of various. This ensures a much greater understanding by the whole organisation of what is happening. Dr Sugarman centred his talk on the new model and how this has affected the development of the current situation. The Learning Organisation, according to the definition of Peter Senge in The Fifth Discipline (1990), is an organisation where people continually expand their capacity to create results they truly desire, and where the people are continually learning how to learn together. The movements behind increasing quality introduced a new model into industry based on Production, where workers became responsible for quality assurance instead of quality controls being reviewed by inspectors. All the employees share responsibility for learning how to improve continuously. That means, complete involvement of all staff. Following on from this, the Quality Revolution made appearance and was driven by extra attention to the customer. Out-sourcing became common and the 'Internal customer' became more common. All
A two-step procedure is developed for the optimization of in-core nuclear fuel management using perturbation theory to predict the effects of various core configurations. The first procedure is a cycle cost minimization using linear programming with a zoned core and discrete burnup groups. The second program utilizes an individual fuel assembly shuffling sequence to minimize the maldistribution of power generation. This latter quantity is represented by a figure of merit or by an assembly power peaking factor. A pressurized water reactor example calculation is utilized. 24 references
Sethi, Suresh P
Optimal control methods are used to determine the best ways to control a dynamic system. This book applies theoretical work to business management problems developed from the authors' research and classroom instruction. The thoroughly revised new edition has been refined with careful attention to the text and graphic material presentation. Chapters cover a range of topics including finance, production and inventory problems, marketing problems, machine maintenance and replacement, problems of optimal consumption of natural resources, and applications of control theory to economics. The book in
Stevens, W.; Michalske, T.; Trewhella, J.; Makowski, L.; Swanson, B.; Colson, S.; Hazen, T.; Roberto, F.; Franz, D.; Resnick, G.; Jacobson, S.; Valdez, J.; Gourley, P.; Tadros, M.; Sigman, M.; Sailor, M.; Ramsey, M.; Smith, B.; Shea, K.; Hrbek, J.; Rodacy, P.; Tevault, D.; Edelstein, N.; Beitz, J.; Burns, C.; Choppin, G.; Clark, S.; Dietz, M.; Rogers, R.; Traina, S.; Baldwin, D.; Thurnauer, M.; Hall, G.; Newman, L.; Miller, D.; Kung, H.; Parkin, D.; Shuh, D.; Shaw, H.; Terminello, L.; Meisel, D.; Blake, D.; Buchanan, M.; Roberto, J.; Colson, S.; Carling, R.; Samara, G.; Sasaki, D.; Pianetta, P.; Faison, B.; Thomassen, D.; Fryberger, T.; Kiernan, G.; Kreisler, M.; Morgan, L.; Hicks, J.; Dehmer, J.; Kerr, L.; Smith, B.; Mays, J.; Clark, S.
To identify connections between technology needs for countering terrorism and underlying science issues and to recommend investment strategies to increase the impact of basic research on efforts to counter terrorism.
Full Text Available The International Association of Chiefs of Police (IACP document, ‘Training Keys #581: Suicide (Homicide Bombers: Part 1,’ is designed to assist law enforcement authorities in the pre-emptive capture of prospective suicide bombers. In this essay, Pugliese focuses on the training key to examine the manner in which essentialised biotypologies are mobilised and reproduced within the context of the so-called ‘war on terror.’ The use of biotypologies by both the military and law enforcement agencies reproduces a disciplinary biopolitical regime premised on normative conceptualisations of race, gender and bodily behaviour. Pugliese discusses these regimes in the context of the US Department of Defense and its advocacy of ‘identity dominance’ through the development of new technologies such as gait signature biometrics. Situated in this context, he shows how biotypologies of targeted subjects are instrumental in fomenting cultural panics concerning the Arab and/or Muslim and/or figure ‘of Middle Eastern appearance’.
The fight against nuclear and radiological terrorism - someone to blow up a nuclear weapon or spread radioactive material as a 'dirty bomb' that act of terrorism - is one of the most serious threats to international security. The Global Initiative to prevent nuclear terrorism is a Norwegian-sponsored initiative that is aimed directly at combating terrorism by non-state actors. NRPA follow up Norwegian measures, including in Kazakhstan, and verifies that they are implemented and functioning as intended. (AG)
Orthodox terrorism studies tend to focus on the activities of illiberal nonstate actors against the liberal democratic states in the North. It thus excludes state terrorism, which is one of a number of repressive tools that great powers from the North have used extensively in the global South in\\ud the service of foreign policy objectives. I establish the reasons for the absence of state terrorism from orthodox accounts of terrorism and argue that critical–normative approaches could help to o...
Terrorism has emerged as a major threat to the contemporary society. Nation States are reliant on their counter-terrorism laws for checking terrorism and deterring terrorists. To understand the effectiveness of these counter terrorism laws, it is important to first understand the behaviour of terrorists, so as to comprehend what actions can dissuade terrorist’s behaviour and decision to propagate violence. This paper will first look at behaviour of terrorist in decision making from an economi...
Gregg, Heather S.
The article of record may be found at: http://dx.doi.org/10.1080/23296151.2016.1239978 thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from tr...
Issue of terrorism came to surface in this early twenty first century through a number ofacts violence that have killed hundreds and injured thousands of people. At the same time, theseevents have been dominated the mass media contents. Principally, mass media and issue ofterrorism are inseparable. This paper examines the relationship between mass media and terrorism.It is done through the deconstruction of the concept of terrorism and how terrorism isunderstood as a communicational process. ...
The study tries to assess the risk of nuclear terrorism in the light of recent developments in the area of nuclear weapons proliferation, and to develop suggestions of how to cope with existing challenges. First of all the term of ''nuclear terrorism'' is defined and differentiated from other forms of nuclear crimes. In a second step the attempt is made to compile the findings and assessments of the past on the problem of nuclear terrorism. Since, as a rule, a threat potential is composed of 'intentions' and 'capabilities', a third part is dedicated to terrorist intentions and studies the degree of probability of terrorists considering nuclear weapons an appropriate means for their aims. In connection with 'capabilities' it is scrutinized whether terrorist groups will be able at all to procure, design or initiate nuclear warheads. This leads to the question as to which consequences result from nuclear safety shortcomings - in particular in Russia - with a view to nuclear terrorism. Based on the preceding considerations, several proposals for coping with the danger of nuclear terrorism are made. (orig./HP) [de
Full Text Available Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terrorism preparedness exists. I argue that protecting tourism destinations is only possible if consideration is given the effectiveness of security guards and understanding that their well-being will impact upon their ability to deliver security. I want to draw attention to the often ignored social role of security guards. On 9/11, 42 security guards died whilst helping save the lives of thousands. They performed their jobs admirably, despite being low-paid, under-appreciated workers. In this paper I explore the social role of security guards in the context of tourism security. By drawing on representations of security guards in popular culture and reports on the state of the security guard industry. I argue that the lack of attention on the quality and well-being of guards is a significant black-spot in tourism security and terrorism preparedness.
This contributed volume contains fourteen papers based on selected presentations from the European Conference on Game Theory SING11-GTM 2015, held at Saint Petersburg State University in July 2015, and the Networking Games and Management workshop, held at the Karelian Research Centre of the Russian Academy of Sciences in Petrozvavodsk, Russia, also in July 2015. These papers cover a wide range of topics in game theory, including recent advances in areas with high potential for future work, as well as new developments on classical results. Some of these include A new approach to journal ranking using methods from social choice theory; A differential game of a duopoly in which two firms are competing for market share in an industry with network externalities; The impact of information propagation in the model of tax audits; A voting model in which the results of previous votes can affect the process of coalition formation in a decision-making body; The Selten-Szidarovsky technique for the analysis of Nash equil...
Asongu, Simplice A.; Tchamyou, Vanessa S.; Minkoua N., Jules R.; Asongu, Ndemaze; Tchamyou, Nina P.
This study assesses the feasibility of policy harmonization in the fight against terrorism in 53 African countries with data for the period 1980-2012. Four terrorism variables are used, namely: domestic, transnational, unclear and total terrorism dynamics. The empirical evidence is based on absolute beta catch-up and sigma convergence estimation techniques. There is substantial absence of catch-up. The lowest rate of convergence in terrorism is in landlocked countries for regressions pertaining to unclear terrorism (3.43% per annum for 174.9 years) while the highest rate of convergence is in upper-middle-income countries in domestic terrorism regressions (15.33% per annum for 39.13 years). After comparing results from the two estimation techniques, it is apparent that in the contemporary era, countries with low levels of terrorism are not catching-up their counterparts with high levels of terrorism. As a policy implication, whereas some common policies may be feasibly adopted for the fight against terrorism, the findings based on the last periodic phase (2004-2012) are indicative that country-specific policies would better pay-off in the fight against terrorism than blanket common policies. Some suggestions of measures in fighting transnational terrorism have been discussed in the light of an anticipated surge in cross-national terrorism incidences in the coming years.
Gary E. Belovsky
Full Text Available Optimal foraging theory is useful to wildlife managers, because it helps explain the nutritional value of different habitats for wildlife species. Based upon nutritional value, the use of different habitats can be predicted, including how factors such as insect harassment, predation and migration might modify habitat selection. If habitat value and use can be understood, then changes in habitat availability which are of concern to wildlife managers can be assessed. The theory is used to address diet choice and habitat use of caribou/reindeer. Diet choice is examined in terms of lichen composition of the diet and is demonstrated to be a function of daily feeding time, food abundance and digestive capacity. The diet choice model is then used to assess the nutritional profitability of different habitats and which habitat should be preferred based upon nutritional profitability. Caribou/reindeer use of habitats is demonstrated to be easily modified by insect harassment and predation which change the nutritional profitability of habitats differentially. The same type of approach could be used to explain migratory behaviour; however, the needed parameter values are unavailable. The results of this analysis lead one to question some common conceptions about caribou/reindeer ecology.
Graham J.J. Kenealy, Ph.D.
Full Text Available Grounded theory is a systematic methodology for the collection and analysis of data which was discovered by Glaser and Strauss in the 1960’s. The discovery of this method was first presented to the academic community in their book ‘The Discovery of Grounded Theory’ (1967 which still remains a primary point of reference for those undertaking qualitative research and grounded theory in particular. This powerful research method has become very popular in some research domains; whilst increasing in popularity it is still less prevalent in the field of organisational and management research particularly in its original form. This self reflexive paper sets out to explore the possibilities for this imbalance which takes the discussion onto the areas of methodological adaptation and training. It also enters the debate about access to research subjects and provides a succinct argument supporting the notion that grounded theory should simply be viewed as a method that develops empirically grounded conceptual theory.
Adamczyk, Amy; LaFree, Gary
Although many of the world's most serious outbreaks of conflict and violence center on religion, social science research has had relatively little to say about religion's unique role in shaping individuals' attitudes about these events. In this paper we investigate whether Americans' religious beliefs play a central role in shaping attitudes toward the continuing threat of terrorism and their willingness to assist officials in countering these perceived threats. Our analysis of an original data collection of almost 1600 Americans shows that more religious respondents are more likely to express concerns about terrorism. However, this relationship is mediated by their level of conservatism. We also find that more religious respondents are more likely to claim that they will assist government officials in countering terrorism. This relationship remained even after accounting for conservatism, and people's general willingness to help police solve crimes like breaking and entering. Copyright © 2014 Elsevier Inc. All rights reserved.
Horbach, N. L. J. T.; Brown, O. F.; Vanden Borre, T.
This paper deals with nuclear terrorism and the manner in which nuclear operators can insure themselves against it, based on the international nuclear liability conventions. It concludes that terrorism is currently not covered under the treaty exoneration provisions on 'war-like events' based on an analysis of the concept on 'terrorism' and travaux preparatoires. Consequently, operators remain liable for nuclear damage resulting from terrorist acts, for which mandatory insurance is applicable. Since nuclear insurance industry looks at excluding such insurance coverage from their policies in the near future, this article aims to suggest alternative means for insurance, in order to ensure adequate compensation for innocent victims. The September 11, 2001 attacks at the World Trade Center in New York City and the Pentagon in Washington, DC resulted in the largest loss in the history of insurance, inevitably leading to concerns about nuclear damage coverage, should future such assaults target a nuclear power plant or other nuclear installation. Since the attacks, some insurers have signalled their intentions to exclude coverage for terrorism from their nuclear liability and property insurance policies. Other insurers are maintaining coverage for terrorism, but are establishing aggregate limits or sublimits and are increasing premiums. Additional changes by insurers are likely to occur. Highlighted by the September 11th events, and most recently by those in Madrid on 11 March 2004, are questions about how to define acts of terrorism and the extent to which such are covered under the international nuclear liability conventions and various domestic nuclear liability laws. Of particular concern to insurers is the possibility of coordinated simultaneous attacks on multiple nuclear facilities. This paper provides a survey of the issues, and recommendations for future clarifications and coverage options.(author)
Mumpower, Jeryl L; Shi, Liu; Stoutenborough, James W; Vedlitz, Arnold
A 2009 national telephone survey of 924 U.S. adults assessed perceptions of terrorism and homeland security issues. Respondents rated severity of effects, level of understanding, number affected, and likelihood of four terrorist threats: poisoned water supply; explosion of a small nuclear device in a major U.S. city; an airplane attack similar to 9/11; and explosion of a bomb in a building, train, subway, or highway. Respondents rated perceived risk and willingness to pay (WTP) for dealing with each threat. Demographic, attitudinal, and party affiliation data were collected. Respondents rated bomb as highest in perceived risk but gave the highest WTP ratings to nuclear device. For both perceived risk and WTP, psychometric variables were far stronger predictors than were demographic ones. OLS regression analyses using both types of variables to predict perceived risk found only two significant demographic predictors for any threat--Democrat (a negative predictor for bomb) and white male (a significant positive predictor for airline attack). In contrast, among psychometric variables, severity, number affected, and likelihood were predictors of all four threats and level of understanding was a predictor for one. For WTP, education was a negative predictor for three threats; no other demographic variables were significant predictors for any threat. Among psychometric variables, perceived risk and number affected were positive predictors of WTP for all four threats; severity and likelihood were predictors for three; level of understanding was a significant predictor for two. © 2013 Society for Risk Analysis.
The bibliography contains citations concerning political, psychological, and sociological studies of international and domestic terrorism, including activities in the Middle East, Europe, and North and South America. Terrorism and counter measures with respect to diplomacy, intelligence, law enforcement, military operations, and security systems are considered. Nuclear materials management regarding terrorist activities is also included. (Contains 196 citations with title list and subject index.)
Gooding, Aeneas R
... credibility terrorist groups must demonstrate a continued ability to conduct operations and inflict significant numbers of casualties on their enemy, maintaining a consistent, if not escalating, level of violence. This thesis uses E...
Casebeer, William D
.... In particular, this thesis explores the narrative and storytelling dimensions of culture, offering a theory of story that can be used to drive innovative counter-terrorism strategies and structure...
Hagan, Ross F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature.
Hill, Terry R.
Implementing guidance, navigation, and control (GN&C) theory principles and applying them to the human element of project management and control is not a new concept. As both the literature on the subject and the real-world applications are neither readily available nor comprehensive with regard to how such principles might be applied, this paper has been written to educate the project manager on the "laws of physics" of his or her project (not to teach a GN&C engineer how to become a project manager) and to provide an intuitive, mathematical explanation as to the control and behavior of projects. This paper will also address how the fundamental principles of modern GN&C were applied to the National Aeronautics and Space Administration's (NASA) Constellation Program (CxP) space suit project, ensuring the project was managed within cost, schedule, and budget. A project that is akin to a physical system can be modeled and managed using the same over arching principles of GN&C that would be used if that project were a complex vehicle, a complex system(s), or complex software with time-varying processes (at times nonlinear) containing multiple data inputs of varying accuracy and a range of operating points. The classic GN&C theory approach could thus be applied to small, well-defined projects; yet when working with larger, multiyear projects necessitating multiple organizational structures, numerous external influences, and a multitude of diverse resources, modern GN&C principles are required to model and manage the project. The fundamental principles of a GN&C system incorporate these basic concepts: State, Behavior, Feedback Control, Navigation, Guidance and Planning Logic systems. The State of a system defines the aspects of the system that can change over time; e.g., position, velocity, acceleration, coordinate-based attitude, and temperature, etc. The Behavior of the system focuses more on what changes are possible within the system; this is denoted in the state
Heather S. Gregg
Full Text Available Religious terrorism is typically characterised as acts of unrestrained, irrational and indiscriminant violence, thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from traditional terrorism; investigate three goals of religious terrorism (fomenting the apocalypse, creating a religious government, and establishing a religiously pure state; consider the role of leadership and target selection of religious terrorists; and, finally, suggest a range of counterterrorism strategies based on these observations.
This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results. PMID:28232755
Younas, Javed; Sandler, Todd
This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results.
Biswas, Anjan; Edwards, Matthew
"Mathematical Theory of Dispersion-Managed Optical Solitons" discusses recent advances covering optical solitons, soliton perturbation, optical cross-talk, Gabitov-Turitsyn Equations, quasi-linear pulses, and higher order Gabitov-Turitsyn Equations. Focusing on a mathematical perspective, the book bridges the gap between concepts in engineering and mathematics, and gives an outlook to many new topics for further research. The book is intended for researchers and graduate students in applied mathematics, physics and engineering and also it will be of interest to those who are conducting research in nonlinear fiber optics. Dr. Anjan Biswas is an Associate Professor at the Department of Applied Mathematics & Theoretical Physics, Delaware State University, Dover, DE, USA; Dr. Daniela Milovic is an Associate Professor at the Department of Telecommunications, Faculty of Electronic Engineering, University of Nis, Serbia; Dr. Matthew Edwards is the Dean of the School of Arts and Sciences at Alabama A & M Univ...
Jørgensen, Kenneth Mølbjerg; Strand, Anete Mikkala Camille; Boje, David
A contribution to management philosophy is made here by the development of a postcolonial-storytelling theory, created by drawing together parallel developments in quantum physics and tribal peoples’ storytelling. We argue that these developments resituate the hegemonic relationship of discursive...... representationalism over material storytelling practices. Implications are two-fold. First, this dissolves inherent dualisms presumed in the concept of interaction among entities like actor–structure, subject–object and discursive–nondiscursive in favour of a profound ontology of entanglement and intra......-action of materiality and discourse, where storytelling is a domain of this discourse. Second, postcolonial phenomena are understood as results of entangled genealogies in which plural voices are present. This implies an understanding and awareness of the intra-action of imperial narratives and material storytelling...
Full Text Available I say: “Oh, what a beautiful surrealist picture!” With quite precise awareness: this páthos, these emotions of mine do not stem from our common sense. An aesthetic judgment is founded on an immediate subjective intuition: an emotion or a free feeling of a single subject towards an object. A universal sense, possibly. Some judgments of ours in ethics and in law are no different from our perceptions in front of art. It would be the same for a hypothetical sentence of the judge that concluded with these words: “I acquit Arsenio Lupin because of his magnificent handlebar moustache like that of Guy de Maupassant”. Everyone would think intuitively that it is an unfair sentence. Is there aesthetics of terror? The case that the article intends to examine is that of the famous kidnapping and murder of the Italian statesman Aldo Moro by the “Brigate Rosse” [Red Brigades] (1978. The method used here consists in studying the image of the kidnapping as iconic documentation of reality, and, above all, as an ethical-legal judgment about the terrorist crime. Moro was photographed during his kidnapping. There are at least two pictures. Both constitute an extraordinary source for a judgment on the basis of an image. In both of them, Aldo Moro is pictured in front of a Red Brigades banner during the captivity. In what sense do these pictures document an aesthetic judgment concerning the “case Moro”? The answer can be found in a remarkable iconic coincidence of these pictures with a masterpiece by Georges Rouault (Paris 1871-1958 devoted to the theme of the “Ecce Homo”. The Gospel in the “Ecce Homo” scene (John: 19, 4-5 narrates how Pontius Pilate wanted to arouse the compassion of the people with a scourging and the exposure of Jesus to the crowd. The plate under consideration is entitled “Qui ne se grime pas?” [Who does not have a painted face?] and is a key work in Rouault’s suite of prints Miserere, dated for 1923.
Full Text Available The goal of this article is to portray how to better understand the epistemic differences of terminology used for terrorism and how people’s lives have been and are still affected by this undefined violence. By collecting some diary information from 20people about their perception about terrorism attaches we will analyze some of overall countries and Saudi Arabia’s commitment in fighting this century’s challenge. Fighting radical religious beliefs in the Kingdom is an immense challenge. The true Islamic faith is in large contrast to those individuals and entities whose actions are centered on the intentional misrepresentation or the degradation of the teachings of Islam. The base of this data will indicate the progress within Saudi Arabia, its position in the world prospect and its impact in society since it remains a robust construction even now days, even thought, a lot has been done. The first signs provided in this analysis start with the beginning of the new century, when a strong attack happened just days before it began. Some important indicators such as terrorism founding, or money charities caused many changes in Saudi Arabia as a leading power, in the war against terrorism in Middle East.
Full Text Available This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on terrorism and face the danger from it.
Coad, Alan; Jack, Lisa; Kholeif, Ahmed Othman Rashwan
Purpose – This paper aims to examine the potential of strong structuration theory in management accounting research. Design/methodology/approach – The paper explains how the ontological perspective of strong structuration theory extends the work of Giddens and explores how the perspective overcomes a number of the limitations of existing management accounting research based on structuration theory. Findings – Strong structuration theory develops and extends the work of Giddens, providing grea...
Bjerg, Ole; Presskorn-Thygesen, Thomas
The paper is a contribution to current debates about conspiracy theories within philosophy and cultural studies. Wittgenstein’s understanding of language is invoked to analyse the epistemological effects of designating particular questions and explanations as a ‘conspiracy theory......’. It is demonstrated how such a designation relegates these questions and explanations beyond the realm of meaningful discourse. In addition, Agamben’s concept of sovereignty is applied to explore the political effects of using the concept of conspiracy theory. The exceptional epistemological status assigned...... to alleged conspiracy theories within our prevalent paradigms of knowledge and truth is compared to the exceptional legal status assigned to individuals accused of terrorism under the War on Terror. The paper concludes by discussing the relation between conspiracy theory and ‘the paranoid style...
Full Text Available At the beginning of April 2009 the second largest city of Estonia was host to the 4th international conference Management Theory and Practice. The thematic emphasis of this year’s conference was Synergy in Organisations. The conference is biannually organised by the Institute of Business Administration of the University of Tartu, Faculty of Economics and Business Administration. In a year of innovation, special attention was given to creativity and innovation in management. Altogether, 40 papers were presented and more than 50 participants participated in the conference. The next, 5th conference, will take place in 2011.
Full Text Available Reputation is a complex and multidimensional concept that may be organized in downside and upside reputational risk. In this article, we present a formal modelling for the management capabilities of environmental management and reporting over reputational risk, considering that reputational risk is becoming increasingly important for organizations and it directly depends on the information available about companies’ environmental performances. As long as the effectiveness of communication and disclosure plays a key role in the process, the usefulness of environmental management and reporting as a hedging instrument for reputational risk is addressed through different levels of information transparency. When considering a scenario of voluntary reporting, we show that environmentally concerned companies can reduce the cost of environmental management as a reputational risk strategy, as well as reducing the potential loss of reputational value from reputational threats and increasing the potential profit from reputational opportunities. In the context of mandatory reporting, we highlight the role of assurance companies as bearers of the risk of bad reputations for non-concerned companies. As a result, this novel approach applies theoretical oriented research from options theory to reputational risk management literature, so that it benefits from the option’s well known theory, robustness, and conclusions.
Full Text Available The case for a high level United Nations (UN Counter-Terrorism Coordinator position within the UN system has become increasingly urgent in 2013. This need has diluted some Member State reticence to creating a new Assistant Secretary-General position that would supervise and manage the existing counter-terrorism structures in the UN system. A Coordinator would have a basic responsibility to keep track of all of the activities of many formal inter-governmental organisations operating at the international, regional and sub-regional level and would also work closely with national counter-terrorism focal points. In this Policy Brief, Dr. Howard Stoffer reviews the debate among Security Council and Fifth Committee members about the efficacy of establishing a senior UN Global Counter-Terrorism Coordinator. He argues that the creation of such a position could lead to a restructuring of the UN counter-terrorism architecture as well as its funding within the UN budget and among donors. The position would eventually make the UN overall counter-terrorism effort, under the UN Global Counter-Terrorism Strategy, a stronger, more effective and more efficient process with measurable impact on the ground among Member States.
Longworth, John W.; Menz, Kenneth M.
This paper is addressed to the traditional problem of demonstrating the relevance of production theory to management-oriented people. Activity analysis, it is argued, is the most appropriate pedagogic framework within which to commence either a production economics or a farm management course. Production economics theory has not been widely accepted as a useful method for the analysis of practical management problems. The theory has been traditionally presented in terms of continuous function...
Wu, Ya-Ke; Chu, Nain-Feng
Overweight and obesity are serious public health and medical problems among children and adults worldwide. Behavioural change has been demonstrably contributory to weight management programs. Behavioural change-based weight loss programs require a theoretical framework. We will review the transtheoretical model and the organisational development theory in weight management. The transtheoretical model is a behaviour theory of individual level frequently used for weight management programs. The organisational development theory is a more complicated behaviour theory that applies to behavioural change on the system level. Both of these two theories have their respective strengths and weaknesses. In this manuscript, we try to introduce the transtheoretical model and the organisational development theory in the context of weight loss programs among population that are overweight or obese. Ultimately, we wish to present a new framework/strategy of weight management by integrating these two theories together. Copyright © 2015 Asian Oceanian Association for the Study of Obesity. Published by Elsevier Ltd. All rights reserved.
The idea of control theory and its application to project management is not new, however literature on the topic and real-world applications is not as readily available and comprehensive in how all the principals of Guidance, Navigation and Control (GN&C) apply. This paper will address how the fundamental principals of modern GN&C Theory have been applied to NASA's Constellation Space Suit project and the results in the ability to manage the project within cost, schedule and budget. A s with physical systems, projects can be modeled and managed with the same guiding principles of GN&C as if it were a complex vehicle, system or software with time-varying processes, at times non-linear responses, multiple data inputs of varying accuracy and a range of operating points. With such systems the classic approach could be applied to small and well-defined projects; however with larger, multi-year projects involving multiple organizational structures, external influences and a multitude of diverse resources, then modern control theory is required to model and control the project. The fundamental principals of G N&C stated that a system is comprised of these basic core concepts: State, Behavior, Control system, Navigation system, Guidance and Planning Logic, Feedback systems. The state of a system is a definition of the aspects of the dynamics of the system that can change, such as position, velocity, acceleration, coordinate-based attitude, temperature, etc. The behavior of the system is more of what changes are possible rather than what can change, which is captured in the state of the system. The behavior of a system is captured in the system modeling and if properly done, will aid in accurate system performance prediction in the future. The Control system understands the state and behavior of the system and feedback systems to adjust the control inputs into the system. The Navigation system takes the multiple data inputs and based upon a priori knowledge of the input
Love, Peter E D; Smith, Jim; Teo, Pauline
Error management theory is drawn upon to examine how a project-based organization, which took the form of a program alliance, was able to change its established error prevention mindset to one that enacted a learning mindfulness that provided an avenue to curtail its action errors. The program alliance was required to unlearn its existing routines and beliefs to accommodate the practices required to embrace error management. As a result of establishing an error management culture the program alliance was able to create a collective mindfulness that nurtured learning and supported innovation. The findings provide a much-needed context to demonstrate the relevance of error management theory to effectively address rework and safety problems in construction projects. The robust theoretical underpinning that is grounded in practice and presented in this paper provides a mechanism to engender learning from errors, which can be utilized by construction organizations to improve the productivity and performance of their projects. Copyright © 2018 Elsevier Ltd. All rights reserved.
Team management in the 21 st century: A human relations theory angle. ... a team is about understanding human relation, that is, the manager understanding the ... The problem ranges from membership isolation to lack of communication and ...
A review of game theory approach to cyber security risk management. ... This paper presents a review of game theoretic-based model for cyber security risk management. Specifically, issues on ... AJOL African Journals Online. HOW TO USE ...
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and... notice is also soliciting comments concerning the Information Collection Request, Chemical Facility Anti...
Terrorism. New York: Columbia University Press, 1998. Laitin, David. Hegemony and Culture : Politics and Religious Change Among the Yoruba . Chicago...such improvements might take. Definitions Terrorism: Definitions of terrorism differ among nations and organizations, because the social and cultural
Discusses political violence and terrorism in Yugoslavia caused by ethnic nationalism in the 1990s. Kinds of political conflict; Comparison of political violence with war and terrorism in Yugoslavia; Concept of terrorism and its presence in Southeastern Europe.
Scott, Frances K
.... The bibliography is divided into the following sections: causes and origins of terrorism, geographical distribution of terrorist groups, terrorist financing, terrorist groups and networks, the psychology of terrorism, prevention of terrorism, remedies...
Nikulina, I.E.; Khomenko, I.V.
In the context of modern management cognitive management is considered as one of the innovative trends. Management activities in cognitive management are carried out through tools affecting human cognitive capabilities. The subject field of cognitive management is the process of managing organizational knowledge, which is possible in the information society and is most effective in a social environment.
... eye movement parasomnias: clinical spectrum, diagnostic features, and management. In: Kryger M, Roth T, Dement WC, eds. Principles and Practice of Sleep Medicine. 6th ed. Philadelphia, PA: Elsevier; ...
Ramirez, Jacobo; Madero, Sergio; Muñiz, Carlos
This paper presents a mixed-method study that explores the configuration of human resource management (HRM) systems in “narco-terrorism” environments. The quantitative analysis focuses on 204 news stories. In addition, 25 interviews were conducted with managers and HR professionals at 20 firms...... in Mexico to explore the direct and indirect impacts of narco-terrorism on firms. Our analysis of firms’ responses in terms of HRM systems indicate that trust of formal and informal institutions seems to shape HRM system in the focal firms. More specifically, a combination of strict employee control......, an emphasis on soft-skills training and development, and a flexible work schedule seems to facilitate the building of trust in narco-terrorism contexts. It seems that the role of firms as social institutions integrate strategies, which seems to aim at avoid and manipulate the institutional constraints. Our...
This article argues that social welfare policies may reduce international and domestic terrorism. Social policies likely affect terrorism in offsetting ways but, on balance, should diminish preferences for terrorism by reducing economic insecurity, inequality, poverty, and religious-political extremism. Thus, countries with more generous welfare…
Cataloged from PDF version of article. This thesis analyzes the concept of terrorism in the age of globalization. Terrorism, which has been motivated by ideological, religious and national reasons, has added to its concern issues like inequality, injustice, dissatisfaction and antiglobalist movements, due to development and technology in the world. In order to clarify this shift in the policy, the concepts of terrorism and globalization are first explained as distinct issues...
Full Text Available The range of the aesthetic has expanded to cover not only a wider range of objects and situations of daily life but also to encompass the negative. This includes terrorism, whose aesthetic impact is central to its use as a political tactic. The complex of positive and negative aesthetic values in terrorism are explored, introducing the concept of the sublime as a negative category to illuminate the analysis and the distinctive aesthetic of terrorism.
The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the ext...
James J.F. Forest
Full Text Available This article examines theories of practical and strategic constraints that collectively explain why so few terrorist groups in history have crossed (or attempted to cross the WMD threshold. From this analysis, it becomes clear that a terrorist group's deliberations about WMD can be influenced (positively or negatively by a variety of factors. Our projections of the future WMD terrorism threat must therefore account for changes in the kinds of practical and strategic constraints that could lead to an increased willingness and/or capability of a group to pursue these kinds of weapons. Further, there are ways in which governments can influence a terrorist group's decision-making and thus have a direct impact on the future evolution of the WMD terrorism threat.
A nuclear power plant is a large economic department that has an important bearing on the national economy and the people's livelihood as well as the science and technology progress, and it can lead to grave radioactive pollution for environment after being destroyed, thus it must be an important objective that terrorism hatches a raid. To combat and forestall terrorism well are new requirements to nuclear safety raised by the international and national situation progress. On the bases of internal and external whole relations, the severe damage to NPPs and the theory of grave radioactive pollution to environment can be caused by sabotage are discussed, and then put forward the proposals about the graded protective measures. (author)
Henningsen, David Dryden; Henningsen, Mary Lynn Miller
Research on error management theory indicates that men tend to overestimate women's sexual interest and women underestimate men's interest in committed relationships (Haselton & Buss, 2000). We test the assumptions of the theory in face-to-face, stranger interactions with 111 man-woman dyads. Support for the theory emerges, but potential boundary…
Adams, Sharrika D.; Hazelwood, Sherry; Hayden, Bruce
Case management is a functional area in higher education and student affairs that emerged after the mass shootings at Virginia Tech in 2007. Although new to higher education, case management emerged from established social work practice. This article compares social work theory and case management standards with a new case management model for…
De Cauwer, Harald; Somville, Francis; Sabbe, Marc; Mortelmans, Luc J
In recent years, the world has been rocked repeatedly by terrorist attacks. Arguably, the most remarkable were: the series of four coordinated suicide plane attacks on September 11, 2001 on buildings in New York, Virginia, and Pennsylvania, USA; and the recent series of two coordinated attacks in Brussels (Belgium), on March 22, 2016, involving two bombings at the departure hall of Brussels International Airport and a bombing at Maalbeek Metro Station located near the European Commission headquarters in the center of Brussels. This statement paper deals with different aspects of hospital policy and disaster response planning that interface with terrorism. Research shows that the availability of necessary equipment and facilities (eg, personal protective clothing, decontamination rooms, antidotes, and anti-viral drugs) in hospitals clearly is insufficient. Emergency teams are insufficiently prepared: adequate and repetitive training remain necessary. Unfortunately, there are many examples of health care workers and physicians or hospitals being targeted in both political or religious conflicts and wars. Many health workers were kidnapped and/or killed by insurgents of various ideology. Attacks on hospitals also could cause long-term effects: hospital units could be unavailable for a long time and replacing staff could take several months, further compounding hospital operations. Both physical and psychological (eg, posttraumatic stress disorder [PTSD]) after-effects of a terrorist attack can be detrimental to health care services. On the other hand, physicians and other hospital employees have shown to be involved in terrorism. As data show that some offenders had a previous history with the location of the terror incident, the possibility of hospitals or other health care services being targeted by insiders is discussed. The purpose of this report was to consider how past terrorist incidents can inform current hospital preparedness and disaster response planning
Ulrich, Philip Christian
Kronikken argumenterer for at den type overvågningsskandaler som er fulgt i kølvandet på Edward Snowdens afsløringer blot er et symptom på den nye fase af krigen mod terror som Obama administrationen har ønsket at føre USA ind i. Den nye fase vil være præget af mere efterretningsvirksomhed snarere...
nesses (e.g., Ford, Coca - Cola , American Airlines, " Destruction of Pan American Flight 103 over American Express, Holiday Inn, Citibank, ChaseDesruin...network, involving links between many clandestine, undeclared war. governments. Cases in which a consortium of gov- State sponsorship refers to the...Syria has setup centers constitutes concrete and convincing evidence of in Syria itself, in Lebanon’s Beka’a Valley (which is sponsorship of terrorism.
Fearon-Lynch, Jennifer A; Stover, Caitlin M
Diabetes mellitus is the seventh leading cause of death in America and affects 382 million people worldwide. Individuals with diabetes must manage the complexity of the disease, its treatment, and complications to avert deleterious consequences associated with the illness. However, not all patients with diabetes successfully gain mastery to positively impact self-management. A new middle-range theory is proposed that merges 2 extant theories, theory of mastery and organismic integration theory, to better understand this human response. The theories' philosophical, theoretical, and conceptual perspectives were examined and relational properties synthesized to provide a conceptual representation of the phenomenon of interest.
...." While NCTC keeps statistics on the annual number of incidents of "terrorism," its ability to track the specific groups responsible for each attack involving killings, kidnappings, and injuries...
Progress on the so-called 'War on Terrorism' is slow. There is no agreed definition of terrorism and no consistent government policy in respect of it. Consideration of terrorism ignores the role of some governments in what could be regarded as terrorist activity, often with the connivance of others for reasons of political expediency. The special case of suicide terrorism is discussed in detail. It is concluded that the world is now exposed to a new form of warfare, and that even with new military thinking this could continue for perhaps decades to come.
Stojanov, Trajce; Unsal, Zeynep
Philosophers weren`t thinking a lot about terrorism before the terrorist attacks in the United States on 11 September 2001. Or even when they were thinking the main concern was how to deal with terrorism. But after this attack terrorism was high on the philosophical agenda mainly manifested as an ethical problem. The key concern was: can terrorism be morally justified? That is the issue we are dealing in this paper too. But, the answer of this question largely depends on the treatment of t...
The Act on the International Convention of the United Nations of April 13, 2005 on Combating Acts of Nuclear Terrorism was promulgated in the German Federal Gazette and entered into force one day later. The Convention expresses the deep concern about the worldwide escalation of all kinds and manifestations of acts of terrorism. What was true in April 2005 (the year the UN convention was adopted) is even more true today. At the same time, however, the Convention recognizes the right of all nations to develop and use nuclear power for peaceful purposes, acknowledging their justified interest in the possible benefits of the peaceful uses of nuclear power. As the Convention was signed in German still during the term of office of the Red-Green government, this passage is a remarkable acceptance of the realities of the world and past peaceful uses of nuclear power in Germany. Whether or not the convention will become an effective instrument to be used against acts of nuclear terrorism and threats depends on its entering into force after deposition of 22 ratification documents, and on as many states as possible acceding to it. Irrespective of these aspects, action in the spirit of the Convention should be taken now, criminal law should be adapted, and international cooperation should be improved and strengthened. (orig.)
Nuclear terrorism is an evil application of nuclear energy, in the same way that chemical and biological terrorism could be considered as the evil side of chemistry and biology. This paper presents two effects of nuclear terrorism. First, dirty bombs or radioactive bombs or radiological dispersion devices (RDDs), and second, crude atom bombs or improvised nuclear devices (INDs). The paper analyses as well the probabilities of an attack, its biological effects and nuclear risk. Experiments carried out so far indicate that the lethal effects produced by RDDs are likely the same that the effects produced by the chemical explosive used in the bomb. These type of bombs are rather bounded to generate panic and have implicit a high cost of decontamination. It will be described the measures to be adopted. INDs will be also considered. Uranium INDs by gun-method are more feasible to be made. They can be disassembled and their components transported to the target place. Plutonium INDs by the implosion-method are complex and required high precision technology. Their disassembly is very difficult
Full Text Available Terrorism is an extreme form of political violence, that is inherently abhorrent in nature. Yet, it continues to attain enough support to continue and survive. The recent proliferation of Islamic State and its ever increasing domestic and international civilian support base urges immediate attention to this question. While most research holds that provision of public goods by terrorist groups is the primary cause for high levels of civilian support, I argue that, terrorist groups are more interested in resource extraction rather than resource provision. Additionally, these studies pay scant attention to existing resource structure, especially territorial and political control to explain terrorist-civilian interaction. This paper emphasizes the bi-directional nature of this interaction – a. perception of civilians by the terrorist group and b. terrorist group’s perception of the civilians. To analyze levels of civilian support for terrorism, I compare fifteen terrorist groups using qualitative comparative analysis and show how territory, political competition, ethnicity, target selection and organizational structure combine to explain conditions that lead terrorist groups to include or exclude civilian population for support. Based on the variance in support networks of terrorist groups, counter-terrorism policies should also differ. High civilian support indicates the need to use non-military methods to decrease the appeal of terrorist groups. However, terrorist groups with more diffused and multiple support structures need more collaborative and coercive measures to intercept all the possible links to the main group.
Full Text Available The following paper highlights the theories used to further project management (PM research spanning the 15 year time period of 1999-2013. The analysis examined 273 articles drawn from seven widely recognized PM journals with the aim of uncovering the most utilized theories in the discipline’s academic investigations. The review found these theories to be: Stakeholder Theory (ST, Fuzzy Sets Theory (FST, Utility Theory (UT, Theory of Constraints (TOC, and Actor-Network Theory (ANT. This collection of theories represents a diverse group of thought constituting a large portion of the PM literature’s theoretical foundations. Both UT and TOC have diminished in popularity while ANT and ST have improved in favor; FST has remained consistent in its use. The appendix to this manuscript includes a “ready reference” of all the theories utilized in PM research found within the reviewed journal outlets from the 15 year review period.
Blakely, Thomas J; Dziadosz, Gregory M
This article proposes that social role theory (SRT) and social role valorization (SRV) be established as organizing theories for care managers. SRT is a recognized sociological theory that has a distinctive place in care management practice. SRV is an adjunct for SRT that focuses on people who are devalued by being in a negative social position and supports behavior change and movement to a valued social position.
This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on te...
, we have not yet won such hard-fought victories on the more prevalent forms of cancers such as breast, prostate, and lung. Whether it is by cure or prevention, cancers must also be controlled and it can only be accomplished through research. On December 23, 1971, President Richard Nixon signed the National Cancer Act that was to provide, ".a total commitment of Congress and the president. to provide the funds. for the conquest of cancer." Somewhere this contract with America got lost. We are now faced with more losses. The new upheaval in American medicine threatens clinical research in cancer investigation to test new therapies and to support the training of new research soldiers to join the battle. The bottom-line approach of insurance and managed care policies no longer cares about these essential components; they say it is no longer their responsibility. This loss of financial support, combined with the tepid endorsement of funding of research from the government, occurs just when there is an explosion of new discoveries and opportunities becoming available to attack cancer. It is time to dramatically increase our efforts and no time to retreat. If we really want to defend against the terrorism of cancer, we need to attack it with a real war effort. If we can go to Mars, we can go to war on cancer, but only if Americans can speak louder than their elected government leaders. They need to hear our opinion, now.
Dorazio, R.M.; Johnson, F.A.
Bayesian inference and decision theory may be used in the solution of relatively complex problems of natural resource management, owing to recent advances in statistical theory and computing. In particular, Markov chain Monte Carlo algorithms provide a computational framework for fitting models of adequate complexity and for evaluating the expected consequences of alternative management actions. We illustrate these features using an example based on management of waterfowl habitat.
Kraaijenbrink, Jeroen; Wijnhoven, Alphonsus B.J.M.
Knowledge integration has been theorised at the levels of organisations and inter-organisational dyads. However, no theory exists yet of the integration of knowledge from an organisation's environment. This paper addresses this void in the literature by presenting a theory of external knowledge
Strimel, Courtney B.
This article claims that J. K. Rowling's "Harry Potter" series, with its use of magic, frightening storylines, and character ambiguity is beneficial to children who are dealing with issues related to terror and terrorism. The author explains that the scenarios presented in Rowling's series teach children strategies for coping with both physical…
En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak......En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak...
Since the 7/7 bombings of July 2005, Britain has experienced a domestic terror threat posed by a small minority of young Muslims. In response, Britain has initiated "Prevent," a preventative counter-terrorism programme. Building on previous, general critiques of Prevent, this article outlines and critically discusses the ways in which…
Serebrennikova, Anna; Mashkova, Yekaterina
This article examines the concept of terrorism as a social and legal phenomenon, its international legal and criminal-legal characteristics. Highlighted are the main aspects of cooperation of the states and the international community to counter terrorist activities. Terrorism as a social phenomenon is determined by paragraph 1 of article 3 of the…
Existing research suggests that the use of harsh repression can exacerbate the incidence and duration of terrorism. Micro- and macro-level analyses have shown that coercive government responses to terrorism can radicalize sympathizers, increase recruitment, and undermine community support for
This article investigates poverty and terrorism as allies in hindering economic growth in African countries. This study uses data for 22 African countries from 1970 to 2013 i.e. 44 years. Data for terrorism, poverty and national income is taken from GTD and WDI. Panel cointegration techniques of dynamic fixed effect, mean ...
Tominaga, Takako; Akashi, Makoto
The probability of occurrence of radiological terrorism and disaster in Japan is not low. For this reason, preparations for coping with the occurrence of radiological terrorism should be an urgent issue. This paper describes the radiation medical system and the threat of radiological terrorism and disaster in Japan, and introduces the Radiation Emergency Medical Assistance Team (REMAT), one of the radiation accident/disaster response organizations at the National Institute of Radiological Sciences. Radiation exposure medical systems in Japan are constructed only in the location of nuclear facilities and adjacent prefectures. These medical systems have been developed only for the purpose of medical correspondence at the time of nuclear disaster, but preparations are not made by assuming measures against radiological terrorism. REMAT of the National Institute of Radiological Sciences is obligated to dispatch persons to the requesting prefecture to support radiation medical care in case of nuclear disaster or radiation accident. The designation of nuclear disaster orientated hospitals in each region, and the training of nuclear disaster medical staffing team were also started, but preparations are not enough. In addition to enhancing and strengthening experts, specialized agencies, and special forces dealing with radiological terrorism, it is essential to improve regional disaster management capacity and terrorism handling capacity. (A.O.)
Full Text Available This article analyzes terrorism against the Roma in Europe. It identifies acts of terrorism in violence that targets the largest stateless nation on the continent and categorizes this terrorism according to current research methods. Focusing on events in both Western and Eastern Europe, the article analyses and compares the most significant terrorist acts against the Roma of recent years. It concludes that anti-Romani terrorism is heterogeneous in terms of tactics, strategies, and ideological justification, yet can usually be subsumed into the broadly conceived category of far-right terrorism. The variety of attacks suggests that terrorist acts are an offshoot of the broad spectrum of anti-Romani activity, and are influenced by contemporary trends in inter-ethnic violence.
Full Text Available Given the complexity of terrorism, solutions based on single factors are destined to fail. Systems thinking offers various tools for helping researchers and policy makers comprehend terrorism in its entirety. We have developed a semi-quantitative systems thinking approach for characterising relationships between variables critical to terrorism and their impact on the system as a whole. For a better understanding of the mechanisms underlying terrorism, we present a 16-variable model characterising the critical components of terrorism and perform a series of highly focused analyses. We show how to determine which variables are best suited for government intervention, describing in detail their effects on the key variable—the political influence of a terrorist network. We also offer insights into how to elicit variables that destabilise and ultimately break down these networks. Because we clarify our novel approach with fictional data, the primary importance of this paper lies in the new framework for reasoning that it provides.
Sanden, Guro Refsum
The term "language management" has become a widely used expression in the sociolinguistic literature. Originally introduced by Jernudd and Neustupný in 1987, as a novel continuation of the language planning tradition stemming from the 1960/70s, language management along these lines has developed into the Language Management Theory (LMT).…
Swanson, Zane; Hepner, Michelle
This study proposes a knowledge management framework for developing and managing enterprise resource planning (ERP) curriculum within business schools. Both theory and a practical implementation are addressed. The knowledge management (KM) framework has two components which utilize ERP from a big picture curriculum overview and a ground level…
Mosadeghrad, Ali Mohammad
A model of quality management called Strategic Collaborative Quality Management (SCQM) model was developed based on the quality management literature review, the findings of a survey on quality management assessment in healthcare organisations, semi-structured interviews with healthcare stakeholders, and a Delphi study on healthcare quality management experts. The purpose of this study was to verify the SCQM model. The proposed model was further developed using feedback from thirty quality management experts using a Delphi method. Further, a guidebook for its implementation was prepared including a road map and performance measurement. The research led to the development of a context-specific model of quality management for healthcare organisations and a series of guidelines for its implementation. A proper model of quality management should be developed and implemented properly in healthcare organisations to achieve business excellence.
Ali Mohammad Mosadeghrad
Full Text Available BackgroundA model of quality management called Strategic Collaborative Quality Management (SCQM model was developed based on the quality management literature review, the findings of a survey on quality management assessment in healthcare organisations, semi-structured interviews with healthcare stakeholders, and a Delphi study on healthcare quality management experts. The purpose of this study was to verify the SCQM model. MethodsThe proposed model was further developed using feedback from thirty quality management experts using a Delphi method. Further, a guidebook for its implementation was prepared including a road map and performance measurement. ResultsThe research led to the development of a context-specific model of quality management for healthcare organisations and a series of guidelines for its implementation. ConclusionA proper model of quality management should be developed and implemented properly in healthcare organisations to achieve business excellence.
Archie Lockhamy III
Full Text Available This article provides methodology and guidelines for employing a 'constraint-based approach for effective supply chain management. The article explores the shortcomings of using a traditional supply chain management as well as an Activity Based Management (ABM approach in the managing of supply chains. In addition, the article introduces a supply chain management methodology based on achieving a global optimum for the entire chain. Examples are provided on how constraint-based techniques are currently being applied to the management of certain subsets of the supply chain. Guidelines are presented for managing supply chains using a constraint-based approach. Finally, the article ends with the discussion of the implications regarding the use of a constraint-based approach to the management of supply chains along with the need for future research in this area.
This report provides a critical review of the effectiveness of International Atomic Energy Agency (IAEA) safeguards against potential acts of nuclear terrorism. The author argues that IAEA safeguards should be made applicable to deterring diversions of nuclear materials from civil to weapons purposes by subnational groups as well as by nations. Both technical and institutional factors are considered, and suggestions for organizational restructuring and further technical development are made. Awareness of the necessity for effective preventive measures is emphasized, and possible directions for further effort are suggested
Pomper, Miles A.; Tarini, Gabrielle
A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.
Leventhal, P.; Alexander, Y.
The International Task Force on Prevention of Nuclear Terrorism, formed in 1985 under the Nuclear Control Institute, commissioned 26 studies and produced an extensive report on the problem and prevention of nuclear terrorism, Part I of this book is the full report, and part II contains the individual studies under two section: (A) Defining the Threat (8 studies); and (B) Strategies for Dealing with the Threat (18 studies). Detailed recommendations are made, in many of the studies, for better protection of nuclear weapons, materials, and facilities; greater cooperation among national intelligence agencies; tighter controls on nuclear transfers; more effective arms control initiatives; and emergency management programs. A separate abstract was prepared for the report and each of the 26 studies
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...
Lone wolf terrorism remains an ambiguous and enigmatic phenomenon. The boundaries of lone wolf terrorism are fuzzy and arbitrary. This article aims to define and analyze the main features and patterns of lone wolf terrorism in fifteen countries. Lone wolf terrorism is shown to be more prevalent in
... DEPARTMENT OF THE TREASURY 31 CFR Part 50 RIN 1505-AC24 Terrorism Risk Insurance Program; Final... Title I of the Terrorism Risk Insurance Act of 2002 (``TRIA'' or ``the Act''), as amended by the Terrorism Risk Insurance Extension Act of 2005 (``Extension Act'') and the Terrorism Risk Insurance Program...
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...
Aithal, Sreeramana; Kumar, Suresh
Theory X, Theory Y and Theory Z in organizational behaviour (OB) are related to human motivation and management. Theory X and Y were coined by Douglas McGregor in the late 1960s, says that the average human being is lazy and self-centred, lacks ambition, dislikes change, and longs to be told what to do. The corresponding managerial approach emphasizes total control. Theory Y maintains that human beings are active rather than passive shapers of themselves and of their environment. They long to...
In nature, apparently complex behavioural patterns are the result of repetitive simple rules. Complexity science studies the application of these rules and looks for applications in society. Complexity management opportunities have developed from this science and are providing a revolutionary approach in the constantly changing workplace. This article discusses how complexity management techniques have already been applied to communicable disease management in Wales and suggests further developments. A similar approach is recommended to others in the field, while complexity management probably has wider applications in the NHS, not least in relation to the developing managed clinical networks.
Bos-Nehles, Anna Christina; van Riemsdijk, Maarten; Looise, Jan C.
Line managers are today seen as increasingly important in effectively implementing HRM practices. Based on the Ability-Motivation-Opportunity (AMO) theory, we predict that line managers' performance in this regard will depend on their ability to apply HRM practices, and that their motivation and the
This research is a quasi-experimental study with pretest-posttest-fallow up test and experiment-control group to investigate the influence of Choice Theory-based Anger Management Psychoeducation Program (CTAMP) on the ability of students of Department of Psychological Counseling and Guidance (PCG) for anger management. The Trait Anger-Anger Style…
Fremont, Wanda P; Pataki, Caroly; Beresin, Eugene V
Terrorist attacks and their aftermath have had a powerful impact on children and their families. Media and television exposure of terrorist events throughout the world has increased during the past few years. There is increasing concern about the effects of this exposure on children who witness these violent images. To develop a proactive and strategic response to reactions of fear, clinicians, educators, and policy makers must understand the psychologic effects of media coverage of terrorism on children. Previous research has focused on media coverage of criminal violence and war. Recent studies have examined the effect of remote exposure of terrorist attacks and have shown a significant clinical impact on children and families.
The workers on radiation protection have been confronted with a new task-countering terrorism. The description and level of various threats threats, the potential consequences and occurrence probability of different nuclear and radiation attack events, and the responses to these threats (crisis and consequence) are introduced at two levels. At the level of crisis management, some approaches to mitigation, the works done by International Atomic Energy Agency and the tendency in United States are also presented. At the level of consequence management, the essential practices submitted by National Council on Radiation Protection and Measurements of America are listed. Finally the domest ic progress in this area is introduced too. (authors)
Keywords: Cyber Security, Risk Management, Game Theory, Model. 1. INTRODUCTION. Risk is ... behaviors. This implies they are triggered by self- motivated goal .... embrace diligence verification of the recipient of the email as well as lack of ...
The paper discusses how the principal-agent theory of economics may provide a suitable analytical framework and interesting lessons for the targeting of public expenditure management reforms in Pacific island economies Peer reviewed
performance will be recognized by promotion in the long run. (31;86, 103) Control Systems Theory Z suggests the use of a balanced implicit and explicit... worklife that was popular in the early 1970’s. Finally, the implementation of Theory Z principles would, he feels, work against the competitive advantages...Japanese management for use in the United States. Several American companies are now using Theory Z, and all seem to have prospered. On balance , critics
Kristina Slavikovna Melkumyan
Full Text Available The article examines the FATF specific approach to the problem of terrorism financing. The FATF essence, content of the activity and influence levers are also analyzed within the article. It is shown that the FATF has reviewed the problem of terrorism financing in the broadest perspective, having engaged simultaneously and consistently mechanisms for combating money laundering and terrorism financing. The Task Force has greatly contributed to building of the world counter-terrorism financing system through forming the legal and institutional basis as well as through interaction with all the possible participants and actors of world politics in this area. Moreover, the FATF has succeeded in geographical expansion of the FATF influence from the original 16 to187 jurisdictions by promotion of FATF-style regional bodies establishment. Particular attention is drawn to the unique features of the FATF Recommendations in comparison with the earlier issued sources of international law, which define the international counter-terrorism financing regime. The author believes that one of the advantages of the FATF as an institute within the counter-terrorism financing system among others is the informal status of the FATF, which provides its flexibility and high ability to respond quickly and in a timely manner to evolving nature of money laundering and terrorism financing as well as emerging threats.
Full Text Available This article focuses on the practical aspects of field research on terrorism. Firstly, it outlines some issues involved in the process of attaining a human research ethics/institutional review board clearance in order to be able to even begin the field research. It suggests some ways in which researchers can positively influence this review process in their favor. Secondly, the article focuses on the real and perceived dangers of field research, identifying practical steps and preparatory activities that can help researchers manage and reduce the risks involved. The article also covers the formalities and dilemmas involved in gaining access to the field. It then provides some insights into the topic of operating in conflict zones, followed by a section covering the ways of gaining access to sources, effective communication skills and influence techniques and addresses key issues involved in interviewing sources in the field. The final section focuses on identifying biases and interfering factors which researchers need to take into account when interpreting the data acquired through interviews. This article is a modest attempt to fill a gap in the literature on terrorism research by outlining some of the key issues involved in the process of doing field research. It incorporates insights from diverse disciplines as well as the author’s personal experiences of conducting field research on terrorism in places like Afghanistan, Pakistan, Chechnya, Ingushetia, Colombia, Mindanao, Uganda, Indonesia, Democratic Republic of Congo, Sudan, and India.
den Hond, F.; Boersma, F.K.; Heres, L.; Kroes, E.H.J.; van Oirschot, E.
There is an increasing interest in the application of Structuration Theory in the fields of management and organization studies. Based upon a thorough literature review, we have come up with a data-set to assess how Structuration Theory has been used in empirical research. We use three key concepts
Mabin, Victoria J.; Forgeson, Steve; Green, Lawrence
Applies the Theory of Constraints, which views resistance to change as a necessary, positive force, to a case study of a bank merger. For each resistance factor, the theory provides tools for using it and managing change successfully. (Contains 46 references.) (SK)
The aim of this study was to explore the relationships between the elements of the Expectancy theory and faculty motivation to use a course management system. Specifically it analyzed if the elements of the Expectancy theory (Valence, Instrumentality and Expectancy) were useful in predicting faculty motivation when using Blackboard tools in…
Shin, Minsoo; Holden, Tony; Schmidt, Ruth A.
Critically contrasts the three main schools of thought on knowledge and assesses the resulting implications for knowledge management. Presents a conceptual model to integrate theoretical and practical themes to serve as a framework for developing a future research agenda for the development of knowledge management business tools and applications.…
Wang, Victor C. X.; Bain, Bernice; Hope, John; Hansman, Catherine A.
This book is intended for students, leaders and managers who wish to explore the personal relevance and conceptual bases of educational leadership and organizational management and to develop their expertise in this field. It is a book written for both scholars and practitioners. The general public will also appreciate the accessible language in…
Lehman, Dwayne W.
The administration and management of sponsored projects spans many levels within an institution of higher education. Research administration professionals require an operational understanding of a complex and intertwined set of disciplines that include project management, finance, legal, ethics, communication, and business acumen. The explicit…
The cockpit resource management (CRM) and hypothetical cockpit situations are discussed. Four different conditions which influence pilot action are outlined: (1) wrong assumptions about a situation; (2) stress and workload; (3) frustration and delays to cause risk taking; and (4) ambigious incomplete or contradicting information. Human factors and behavior, and pilot communication and management in the simulator are outlined.
Frederick W. Bratten
A theoretical probability model has been developed for analyzing program alternatives in fire management. It includes submodels or modules for predicting probabilities of fire behavior, fire occurrence, fire suppression, effects of fire on land resources, and financial effects of fire. Generalized "fire management situations" are used to represent actual fire...
Abo, Alyssa; Zalsman, Gil
In recent years suicide bombings have became a part of life in Israel. Adolescents seem to be more vulnerable to the issues of life and death since they have to choose psychologically whether to live or die ("the fourth organizer"). The reaction to terrorism in this age group is unique. After September 11th, a great interest on the subject has arisen in the United States and some new data has been gathered. One of the important messages is that terrorism does not simply equal trauma. The aim of this article is to review current literature on emotional reaction, impact, and therapeutic strategies to terrorism in the adolescent population.
Goodnough, and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/2009/10/22/us...Abby Goodnough and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/ 2009/10/22/us...July 8, 2009); Tony Allen-Mills, “FBI ‘Lured Dimwits’ into Terror Plot,” The Sunday Times, London, May 24, 2009, http://www.timesonline.co.uk/tol/news
Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya
Terrorism presents a significant risk that is often approached at public policy, infrastructure, or emergency management level. Public perceptions of the likelihood of terrorist events, and how this may relate to individual preparedness, are not always extensively examined. The tendency to think that negative events are less likely to happen to oneself than to the average person is known as optimism bias. Optimism bias is relevant to perceptions of terrorism, because it is thought to be related to a reduction in precaution use. Using an online survey of 164 participants, this study aimed to determine whether Sydney residents thought they had a lower likelihood of experiencing terrorist events than other Australians. Significant optimism bias was observed for witnessing terrorist events, but not for personally experiencing terrorist events. In addition, Sydney residents tended to think that terrorist attacks were more likely to occur in Sydney than another major Australian city in the next five years. At the same time, household and workplace preparedness for terrorism was quite low, as was awareness of emergency strategies in the central business district. Perceptions of high likelihood of terrorism happening in one's own city, yet low preparedness present a challenge for risk communication and emergency management strategies. The diversity of possible terrorist targets, and the simple plans that can moderate the effects of a disaster may need to be emphasized in future anti-terrorism initiatives. © 2012 Society for Risk Analysis.
Lehman, Lynn A.; Krause, Lee S.
This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model
This bibliography contains citations concerning political, psychological, and sociological studies of international and domestic terrorism, including activities in the Middle East, Europe, and North and South America. Terrorism and countermeasures with respect to diplomacy, intelligence, law enforcement, military operations, and security systems are considered. Nuclear materials management regarding terrorist activities is also included. (This updated bibliography contains 188 citations, 21 of which are new entries to the previous edition.)
Using methods including questionnaire-based surveys and control analysis, we analyzed the improvements in the efficiency of ICU rescue, service quality, and patients' satisfaction, in Xuzhou Central Hospital after the implementation of fine management, with an attempt to further introduce the concept of fine management and implement the brand construction. Originating in Taylor's "Theory of Scientific Management" (1982), fine management uses programmed, standardized, digitalized, and informational approaches to ensure each unit of an organization is running with great accuracy, high efficiency, strong coordination, and at sustained duration (Wang et al., Fine Management, 2007). The nature of fine management is a process that breaks up the strategy and goal, and executes it. Strategic planning takes place at every part of the process. Fine management demonstrates that everybody has a role to play in the management process, every area must be examined through the management process, and everything has to be managed (Zhang et al., The Experience of Hospital Nursing Precise Management, 2006). In other words, this kind of management theory demands all people to be involved in the entire process (Liu and Chen, Med Inf, 2007). As public hospital reform is becoming more widespread, it becomes imperative to "build a unified and efficient public hospital management system" and "improve the quality of medical services" (Guidelines on the Pilot Reform of Public Hospitals, 2010). The execution of fine management is of importance in optimizing the medical process, improving medical services and building a prestigious hospital brand.
This book covers all the basic concepts of business intelligence and performance management including strategic support, business applications, methodologies and technologies from the field, and thoroughly explores the benefits, issues and challenges of each.
The implementation and deployment of the Internet of Things (IoT) brings with it management challenges around seamless integration, heterogeneity, scalability, mobility, security, and many other issues. This comprehensive book explores these challenges and looks at possible solutions.
Kendrick, Madeleine Iris; Bartram, Timothy; Cavanagh, Jillian; Burgess, John
Objective This study examined strategic human resource management (SHRM) activities in two case hospitals relative to their approach to greenfield site success. Methods A comparative case study analysis approach was used, with documents sourced from public, open-access sites. The theoretical framework of crisis management theory's (CMT) proactive management and open communication channels was used to examine the documents, which were annual reports addressing both hospitals' first year of performance, union publications and transcripts of relevant parliamentary inquiries. Results The hospital that effectively used CMT in its first 12 months was demonstratively more 'successful' than the hospital that reported to not have effectively used CMT. 'Success' in this project was articulated as the hospital's ability to consolidate operations, without ongoing negative media attention, after 12 months. Conclusion This study provided an identification of how the use of CMT in a hospital's greenfield stage can increase the hospital's chances of 'success'. What is known about the topic? Journal and media articles illustrated a gap in greenfield human resource management (HRM) regarding successful consolidation, especially the healthcare context. Although manufacturing firms are addressed in academic literature in a greenfield context, there is a lack of knowledge concerning successful greenfield HRM in a healthcare context. What does this paper add? This study is among the first to identify the role of CMT in successful greenfield site establishment by identifying its presence in management activities. What are the implications for practitioners? The findings of this study suggest a potential link between the implementation of CMT and greenfield site success. This could allow future greenfield healthcare sites to operate with less cost and risk. The lack of stakeholder participation in the present study limits the applicability of its findings. However, archival document
Costa, Maria Clélia Lustosa
Down through the nineteenth century, new medical theories on the origin of disease influenced the norms and regulations that controlled the population's behavior and the urban space. The present study discusses the ideas, medical practices , and administrative initiatives adopted during the 1877-79 drought in Fortaleza, capital of Ceará province. The drought was accompanied by a smallpox epidemic, along with the increased migration of sertão dwellers to the capitol. The city lacked a public service network capable of meeting the needs of this new population, which took up lodgings on the city and periphery. The municipal administration endeavored to implement the recommendations of physicians based on modern principles of hygienization. Through an analysis of reports by the provincial presidents and by public health inspectors, the study intends to show how these medical theories influenced the practices of urban reorganization at a moment of public emergency.
Wood, Rodger Ll; Alderman, Nick
For more than 3 decades, interventions derived from learning theory have been delivered within a neurobehavioral framework to manage challenging behavior after traumatic brain injury with the aim of promoting engagement in the rehabilitation process and ameliorating social handicap. Learning theory provides a conceptual structure that facilitates our ability to understand the relationship between challenging behavior and environmental contingencies, while accommodating the constraints upon learning imposed by impaired cognition. Interventions derived from operant learning theory have most frequently been described in the literature because this method of associational learning provides good evidence for the effectiveness of differential reinforcement methods. This article therefore examines the efficacy of applying operant learning theory to manage challenging behavior after TBI as well as some of the limitations of this approach. Future developments in the application of learning theory are also considered.
Marilia Ferrari Conchon
Full Text Available A theoretical study aimed to analyze the existing knowledge in the literature on the perioperative thirst symptom from the perspective of Symptom Management Theory, and supplemented with the experience of the study group and thirst research. Thirst is described as a very intense symptom occurring in the perioperative period, and for this reason it cannot be ignored. The Symptom Management Theory is adequate for understanding the thirst symptom and is a deductive theory, focused on the domains of the Person, Environment and Health / Illness Status, as well as on the dimensions of Experience, Management Strategies and Symptom Outcomes. Using the theory leads us to consider perioperative thirst in its multifactorial aspects, analyzing the interrelation of its domains and dimensions in order to draw attention to this symptom that has been insufficiently valued, recorded and treated in clinical practice.
Full Text Available This article presents a strategic, operational, and tactical analysis of information currently available on the state of bio-weapons development by non-state actors, primarily Islamist jihadists. It discusses the evidence supporting a practical assessment that non-state actors have begun to acquire, and in the near-term intend to employ, bio-weapons. A pathogen and method of attack specifically designed to achieve the strategic goals of jihadists are presented as functional examples of the problem of the emerging global bio-weapons threat.Is a terrorist attack utilizing biological weapons a real threat? If so, is there a way to predict the circumstances under which it might happen or how it might be conducted? This article explores what is known and cannot be known about these questions, and will examine the threat of biological terrorism in the context of the strategic goals, operational methods, and tactical intentions of Islamist terrorists.
Chemical Weapons are kind of Weapons of Mass Destruction (WMD). They were used large quantities in WWI. Historically, large quantities usage like WWI was not recorded, but small usage has appeared now and then. Chemical weapons are so called "Nuclear weapon for poor countrys" because it's very easy to produce/possession being possible. They are categorized (1) Nerve Agents, (2) Blister Agents, (3) Cyanide (blood) Agents, (4) Pulmonary Agents, (5) Incapacitating Agents (6) Tear Agents from the viewpoint of human body interaction. In 1997 the Chemical Weapons Convention has taken effect. It prohibits chemical weapons development/production, and Organization for the Prohibition of Chemical Weapons (OPCW) verification regime contributes to the chemical weapons disposal. But possibility of possession/use of weapons of mass destruction by terrorist group represented in one by Matsumoto and Tokyo Subway Sarin Attack, So new chemical terrorism countermeasures are necessary.
Full Text Available This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly public nature of terrorism, in which the attack on the direct victims is intended to influence a (far larger group of so-called vicarious victims. This means that the public is likely to experience terrorist attacks as attacks on themselves. As a consequence the public can feel entitled to processes of forgiveness which in turn can conflict with the direct victims’ own experience. To illuminate this issue the paper proposes a novel distinction in third party forgiveness processes: between public forgiveness, i.e. forgiveness relating to the public wrongfulness inherent in crime, and vicarious forgiveness, i.e. the public’s experience of forgiveness itself. The complexities for restorative justice after terrorism can be then be viewed in terms of the tensions between the direct victims’ private and the publics’ vicarious forgiveness processes. Este artículo pretende facilitar la comprensión de las complejidades de la justicia restaurativa en casos de terrorismo desde una perspectiva victimológica. Lo hace primero mediante el análisis de lo que separa el terrorismo de otras formas de delincuencia. El autor sostiene que la distinción principal se refiere a la naturaleza pública específica del terrorismo, ya que mediante el ataque a las víctimas directas se pretende influir en el grupo (mucho más grande de las llamadas víctimas vicarias. Esto significa que es probable que el público sienta los ataques terroristas como ataques contra ellos mismos. De esta forma, el público puede sentirse con derecho sobre los procesos de perdón, lo que, a su vez, puede entrar en conflicto con la propia experiencia de las víctimas directas. Para iluminar
Joseph, Oscar, III
The transformational management philosophy creates a culture that has purpose, moral standards, and high achievement outcomes (Yukl, 2006). The primary focus of transformational management theory is to be humane, while exhibiting behavioral characteristics of kindness, care, compassion, and principled centeredness (ethical disposition) designed to…
McGuire, David; Polla, Giovana; Heidl, Britta
Purpose: This paper seeks to unlock the career transitions of hospitality managers through applying Schein's career anchors theory. It seeks to understand how Schein's Career Anchors help explain the career transitions of managers in the Scottish hospitality industry. Design/methodology/approach: The paper adopts a non-sequential multi-method…
... the threat of international terrorism requires America to make a grand strategic choice, This paper examines those choices by presenting four post-Cold War strategy options neo-isolationism, selective...
.... Conducted by organized, highly trained, and technologically sophisticated paramilitary units, terrorism is in fact a form of warfare waged against the United States and its allies. But current U.S...
The September 11, 2001 terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...
The September 11, 2001, terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...
Recommends the use of conceptual mapping, case studies, and springboards to discussion and inquiry as viable approaches to the study of terrorism in secondary classrooms. Provides numerous examples of conceptual maps. (JDH)
Ramlani Lina Sinaulan
Full Text Available Jihād and terrorism are not the same. In the context of sharia that implementation of the jihād has parameters measured with a layer of ethics based on the commands Al Quran and the Hadith of Prophet and the explanation the Ulama. Muslims in Indonesia views that the essentially not much different from the views on jihād and terror in other Islamic countries, especially the Middle East. In the context of Islamic law, jihād has multi spectral studies, but none of these studies that equate the meaning of jihād with terrorism, or none of them agreed that acts of terror as has been demonstrated by radical groups that are part of the concept Islam.
Anvar M. Mamadaliev; Leon М. Bagdasaryan
The article tells about reasons and consequences of Adolf Hitler’s terror. Special attention is attached to mechanism of Nazi dictatorship and its ideological bases, set in Hitler’s work ‘My Struggle’, the 25 Point Program.
Möller-Leimkühler, Anne Maria
Terrorism, whether it is group-related or performed as lone actor terrorism, is a predominantly male phenomenon. Generally and throughout history, young males have been the main protagonists of criminal and political violence.This article aims to contribute, from different perspecives, to the question of what makes young men violent. These include neurobiological aspects, such as sex differences in the brain that predispose males to physical aggression and violence; gender role aspects, with regard to aggression and violence being basic components for demonstrating and reconstructing masculinity; demographic aspects of male youth bulges as potential breeding grounds for terrorism; aspects of group dynamics and identity fusion in the process of radicalization; and psychosocial characteristics of lone actor terrorists, which differ from group-related terrorists.It is concluded that in addition to ideological, political, economic, regional, demographic, or psychosocial causes, experiences of threatened masculinity may be an underlying factor and driving force for terrorism.
The Karen Women’s Organisation
Full Text Available Two reports researched and written by the Karen Women’sOrganisation – Shattering Silences in 2004 and State ofTerror in 20071 – document the wide range of humanrights abuses against Burmese women and girls.
The Karen Women’s Organisation
Two reports researched and written by the Karen Women’sOrganisation – Shattering Silences in 2004 and State ofTerror in 20071 – document the wide range of humanrights abuses against Burmese women and girls.
.... Another trend is toward terrorism that is religiously or ideologically motivated. Radical Islamic fundamentalist groups, or groups using religion as a pretext, pose terrorist threats of varying kinds to U.S...
.... Another trend is toward terrorism that is religiously or ideologically motivated. Radical Islamic fundamentalist groups, or groups using religion as a pretext, pose terrorist threats of varying kinds to U.S...
Gao, Jianbo; Fang, Peng; Liu, Feiyan
Terrorism and counterterrorism have both been evolving rapidly. From time to time, there have been debates on whether the new terrorism is evolutionary or revolutionary. Such debate often becomes more heated after major terrorist activities, such as the terrorist attacks on September 11, 2001 and the November 13, 2015 coordinated Paris terror attack. Using country-wide terrorism data since 1970, we show that there exist scaling laws governing the continuity and persistence of world-wide terrorism, with the long-term scaling parameter for each country closely related to its yearly global terrorism index. This suggests that the new terrorism is more accurately considered evolutionary. It is further shown that the imbalance in the seesaw of terrorism and counterterrorism is not only responsible for the scaling behavior found here, but also provides new means of quantifying the severity of the global terrorism.
Castendyk, D.N.; Eary, L.E.; Balistrieri, L.S.
Highlights: • Review of pit lake literature in the context of pit lake predictions. • Review of approaches used to predict pit wall-rock runoff and leachate. • Review of approaches used to generate a pit lake water balance. • Review of approaches used to generate a hydrodynamic prediction. • Review of approaches used to generate a geochemical prediction of a future pit lake. - Abstract: Pit lakes are permanent hydrologic/landscape features that can result from open pit mining for metals, coal, uranium, diamonds, oil sands, and aggregates. Risks associated with pit lakes include local and regional impacts to water quality and related impacts to aquatic and terrestrial ecosystems. Stakeholders rely on predictive models of water chemistry to prepare for and manage these risks. This paper is the first of a two part series on the modeling and management of pit lakes. Herein, we review approaches that have been used to quantify wall-rock runoff geochemistry, wall-rock leachate geochemistry, pit lake water balance, pit lake limnology (i.e. extent of vertical mixing), and pit lake water quality, and conclude with guidance on the application of models within the mine life cycle. The purpose of this paper is to better prepare stakeholders, including future modelers, mine managers, consultants, permitting agencies, land management agencies, regulators, research scientists, academics, and other interested parties, for the challenges of predicting and managing future pit lakes in un-mined areas
Correspondence analysis is an explanatory data analytic technique and is used to identify systematic relations between categorical variables. It is related to principal component analysis and the results provide information on the structure of categorical variables similar to the results given by a principal component analysis in case of metric variables. Classical correspondence analysis is designed two-dimensional, whereas multiple correspondence analysis is an extension to more than two variables. After an introductory overview of the idea and the implementation in standard software packages (PASW, SAS, R) an example in recent research is presented, which deals with strategic management accounting in family and non-family enterprises in Austria, where 70% to 80% of all enterprises can be classified as family firms. Although there is a growing body of literature focusing on various management issues in family firms, so far the state of the art of strategic management accounting in family firms is an empirically under-researched subject. In relevant literature only the (empirically untested) hypothesis can be found, that family firms tend to have less formalized management accounting systems than non-family enterprises. Creating a correspondence analysis will help to identify the underlying structure, which is responsible for differences in strategic management accounting.
N. I. Strich
Full Text Available Management should be carried out with due account of the system theory and using tools and opportunities offered by such modern management components as business engineering and reengineering. Main points of this theory are given along with detailed determination of business engineering and reengineering particularly efficient while determining measures needed to reorganize an enterprise (or a group of enterprises through updating its organizational structure as well as economic, personnel or other system. Out-sourcing also described in detail is considered as modern enterprise management system’s most efficient instrument.
The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others) who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable mora...
Gentry, Caron Eileen
This article attempts to problematize the disparate level of attention paid to similar violences globally, whereby violence against women in the developing world is seen as a security concern to the West and yet violence against women in the West is minimized or ignored. It will do this first by demonstrating that everyday violences, better known as everyday terrorism, in the West are subjugated knowledges within Terrorism Studies. To demonstrate this, Half the Sky, Sex and World Peace, and T...
Maksimchuk Olga Viktorovna
Full Text Available The development can be seen as change any properties of the phenomenon over time. Preservation and modification of these properties are necessary for any development, but it must be observed them the necessary balance. Defining this balance in the system of public management as the basis of sustainability of socio-economic systems of different order - the problem is not completely solved by economics. The authors aim to justify the development of methodological approaches to public management, taking into account the specific socio-economic systems of various sizes; offer practical solutions and outline prospects along the way. Methodological basis of research was interdisciplinary and systemic approaches. Scientific results have theoretical and practical and can be applied in the process of scientific substantiation of decisions of public management in a variety of missions.
Devaraj, Anand; van Ginneken, Bram; Nair, Arjun; Baldwin, David
A consistent feature of many lung nodule management guidelines is the recommendation to evaluate nodule size by using diameter measurements and electronic calipers. Traditionally, the use of nodule volumetry applications has primarily been reserved for certain lung cancer screening trials rather than clinical practice. However, even before the first nodule management guidelines were published more than a decade ago, research has been ongoing into the use of nodule volumetry as a means of measuring nodule size, and this research has accelerated in recent years. This article aims to provide radiologists with an up-to-date review of the most recent literature on volumetry and volume doubling times in lung nodule management, outlining their benefits and drawbacks. A brief technical review of typical volumetry applications is also provided. © RSNA, 2017.
McLean, R A; Magiera, F T
Managed care contracts can be represented as bundles of options. In particular, the managed care provider is short a call option. To hedge the risk involved in such contracts, managed care contractors can construct several types of virtual put options, among them the ownership of facilities. Agency theory and options theory suggest that for-profit managed care plans, in the presence of debt, will engage in less hedging activity than will other managed care plans. Here, the authors test that hypothesis, using data for Florida HMOs in 1995, and they reject the null hypothesis. That managed care organizations act as if they are short a call option raises interesting regulatory issues, including the possibility of using a hedge-based regulatory scheme in place of a net-worth-based scheme.
Hunsucker, John L.
While all good managers have always considered risk in their decision making, only recently have formal programs to do so been introduced. This report covers the logical structure behind the formulation of an integrated risk management plan (IRM). Included in the report are factors forcing the development of a formal plan to consider risk, the basic objective or purpose of an IRM, and desirable traits of such a plan. The report moves on to a discussion of background issues, seeks to formalize some definitions, and then discusses required information on threats. The report concludes with the steps for an IRM.
White, J.R.; Chapman, D.M.; Biswas, D.
A general methodology for optimization of assembly shuffling and burnable poison (BP) loadings for LWR reload design has been developed. The uniqueness of this approach lies in the coupling of Generalized Perturbation Theory (GPT) methods and standard Integer Programming (IP) techniques. An IP algorithm can simulate the discrete nature of the fuel shuffling and BP loading problems, and the use of GPT sensitivity data provides an efficient means for modeling the behavior of the important core performance parameters. The method is extremely flexible since the choice of objective function and the number and mix of constraints depend only on the ability of GPT to determine the appropriate sensitivity functions
Because there has never been an incident of nuclear terrorism, the author is reduced to informed speculation. The past cannot be used to extrapolate into the future. For terrorists as for nations, the domain of nuclear attack represents are unprecedented quantum leap, one that groups think carefully about. Terrorists will consider many factors, including the public climate, because they are not psychotics operating in a vacuum (though groups may include psychotic individuals). Rather, they are people involved in a reciprocal political and psychological relationship with the rest of the world. In reaching some assessment of the potential for nuclear terrorism, there is an immense number of variables to deal with, beginning with the many types of terrorists and terrorism, including nuclear. They can, however, look at individual terrorist groups - a their compositions, capabilities, motivations, and modus operandi - and reach some conclusions. The author first looks at the possible forms nuclear terrorism might take and at the severity of the consequences. A strict distinction must be made between nuclear terrorism where nuclear things are the means (for example, a nuclear device) and nuclear terrorism where nuclear things are the target (for example, nuclear power stations), or where they are both such as a nuclear weapon thrown at a nuclear power station. 2 tables
Chatterjee, Samrat; Abkowitz, Mark D
Over the past decade, terrorism risk has become a prominent consideration in protecting the well-being of individuals and organizations. More recently, there has been interest in not only quantifying terrorism risk, but also placing it in the context of an all-hazards environment in which consideration is given to accidents and natural hazards, as well as intentional acts. This article discusses the development of a regional terrorism risk assessment model designed for this purpose. The approach taken is to model terrorism risk as a dependent variable, expressed in expected annual monetary terms, as a function of attributes of population concentration and critical infrastructure. This allows for an assessment of regional terrorism risk in and of itself, as well as in relation to man-made accident and natural hazard risks, so that mitigation resources can be allocated in an effective manner. The adopted methodology incorporates elements of two terrorism risk modeling approaches (event-based models and risk indicators), producing results that can be utilized at various jurisdictional levels. The validity, strengths, and limitations of the model are discussed in the context of a case study application within the United States. © 2011 Society for Risk Analysis.
The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism
Full text: As a result of the events of 11 September 2001, the International Atomic Energy Agency (IAEA) identified possible threats from acts of nuclear terrorism. A report to the Board of Governors in November 2001 summarized the IAEA's ongoing work in areas relevant to the prevention and mitigation of the consequences of such acts and outlined proposals for a number of new and/or enhanced activities. Four main threats were addressed: theft of a nuclear weapon; acquisition of nuclear material; acquisition of other radioactive material; and violent acts against nuclear facilities. These proposals have been further refined and the new plan was approved in principle at the March 2002 board meeting. In the beginning, implementation will be dependent on member state contributions to a voluntary fund. Proposed new or enhanced activities are grouped into eight areas: I. Physical protection of nuclear material and nuclear facilities; II. Detection of malicious activities involving nuclear and other radioactive materials; III. State systems for nuclear material accountancy and control; IV. Security of radioactive material other than nuclear material; V. Assessment of safety/security related vulnerability of nuclear facilities; VI. Response to malicious acts, or threats thereof; VII. Adherence to and implementation of international agreements, guidelines and recommendations; VIII. Nuclear security co-ordination and information management. After an overview, this paper focuses on activity area IV, which deals with the radiological terrorism issues involving radioactive sources. A strategy for evaluation of the IAEA's role is presented, covering an analysis of the likely threats and possible scenarios. This leads to an assessment of the most desirable sources from a terrorist's viewpoint. The strategy then examines how terrorists might acquire such sources and attempts to determine the best ways to prevent their acquisition. Further activities are proposed to prevent the use
D. Deichmann (Dirk)
textabstractIn this dissertation, we focus on how leadership styles, individual learning behaviors, and social network structures drive or inhibit organizational members to repeatedly generate and develop innovative ideas. Taking the idea management programs of three multinational companies as the
There is great interest in educational leadership in the early part of the 21st century because of the widespread belief that the quality of leadership makes a significant difference to school and student outcomes. There is also increasing recognition that schools require effective leaders and managers if they are to provide the best possible…
Devaraj, A.; Ginneken, B. van; Nair, A.; Baldwin, D.
A consistent feature of many lung nodule management guidelines is the recommendation to evaluate nodule size by using diameter measurements and electronic calipers. Traditionally, the use of nodule volumetry applications has primarily been reserved for certain lung cancer screening trials rather
Achten, H.H.; Otter, den A.F.H.J.; Achten, H.H.; Pels, H.J.
Most parties that an architectural design manager meets in daily practice are engaged to some degree with design. What these parties are actually doing in a project is contingent with the concrete design project. Additionally, each party has some stake, and may employ different strategies to solve
Al Ariss, A.; Cascio, W.F.; Paauwe, J.
Research on Talent Management (TM) has been lagging behind businesses in offering vision and leadership in this field. After sketching a comprehensive outline of knowledge about TM, theoretical as well as practical, we introduce the papers in this special issue and their important contributions.
Kahan, Jerome H
Private US companies face risks in connection with financial matters, but are not necessarily prepared to cope with risks that can seriously disrupt or even halt their operations, notably terrorist attacks and natural disasters. Enhancing the resilience of businesses when dealing with terrorism is especially challenging, as these groups or individuals can adapt tactics to exploit the vulnerabilities of companies they wish to target. Business managers need to formulate flexible preparedness plans that reduce risks from large-scale natural disasters as well as terrorist attacks. In doing so, they can take advantage of post-9/11 US government guidance for these endeavours as well as programmes that eliminate risks to private insurance entities so they can issue policies that cover terrorist strikes of high consequences. Just as business executives use hedging strategies in the world of finance, they also need operational hedging strategies as a means of exploiting as well as lowering the risks surrounding future uncertainties. Resources devoted to planning and hedging are investments that can increase the odds of businesses surviving and thriving, even if they experience high-impact terrorist attacks, threats or large-scale natural disasters, making suppliers, customers and stakeholders happy. The purpose of this paper is to give executives the incentive to take steps to do just that.
Sawin, Kathleen J; Weiss, Marianne E; Johnson, Norah; Gralton, Karen; Malin, Shelly; Klingbeil, Carol; Lerret, Stacee M; Thompson, Jamie J; Zimmanck, Kim; Kaul, Molly; Schiffman, Rachel F
Parents of hospitalized children, especially parents of children with complex and chronic health conditions, report not being adequately prepared for self-management of their child's care at home after discharge. No theory-based discharge intervention exists to guide pediatric nurses' preparation of parents for discharge. To develop a theory-based conversation guide to optimize nurses' preparation of parents for discharge and self-management of their child at home following hospitalization. Two frameworks and one method influenced the development of the intervention: the Individual and Family Self-Management Theory, Tanner's Model of Clinical Judgment, and the Teach-Back method. A team of nurse scientists, nursing leaders, nurse administrators, and clinical nurses developed and field tested the electronic version of a nine-domain conversation guide for use in acute care pediatric hospitals. The theory-based intervention operationalized self-management concepts, added components of nursing clinical judgment, and integrated the Teach-Back method. Development of a theory-based intervention, the translation of theoretical knowledge to clinical innovation, is an important step toward testing the effectiveness of the theory in guiding clinical practice. Clinical nurses will establish the practice relevance through future use and refinement of the intervention. © 2017 Sigma Theta Tau International.
Mullins, Christopher W.; Young, Joseph K.
Although uniquely positioned to provide insight into the nature and dynamics of terrorism, overall the field of criminology has seen few empirically focused analyses of this form of political violence. This article seeks to add to the understanding of terror through an exploration of how general levels of violence within a given society influence…
Tzeng Yih Lam
Full Text Available Forest ecosystem dynamics are driven by a complex array of simultaneous cause-and-effect relationships. Understanding this complex web requires specialized analytical techniques such as Structural Equation Modeling (SEM. The SEM framework and implementation steps are outlined in this study, and we then demonstrate the technique by application to overstory-understory relationships in mature Douglas-fir forests in the northwestern USA. A SEM model was formulated with (1 a path model representing the effects of successively higher layers of vegetation on late-seral herbs through processes such as light attenuation and (2 a measurement model accounting for measurement errors. The fitted SEM model suggested a direct negative effect of light attenuation on late-seral herbs cover but a direct positive effect of northern aspect. Moreover, many processes have indirect effects mediated through midstory vegetation. SEM is recommended as a forest management tool for designing silvicultural treatments and systems for attaining complex arrays of management objectives.
Mostafa Farah Bakhsh
Full Text Available Variation is part of everyday life and exists all the time. Variation is the product of differences. Difference in nature of processes results in different products during the time. Proper diagnosis of variation patterns in minimizing the loss is necessary. Continuous quality improvement is regarded as successive reduction of performance variation for delivering high quality products to the customers. In Deming viewpoint, quality deviation is classified to two groups of common and special causes. Variation is not a new word, but understanding and concerns about it are modern. First step in performance variation management is acceptance and belief of variation. For proper management of variations, appropriate tools should be used for detection and display of them. Control are useful tools in recognition, analysis and removing process performance variations.
Kunz, Nathan; Gold, Stefan
Disaster response operations aim at helping as many victims as possible in the shortest time, with limited consideration of the socio-economic context. During the disaster rehabilitation phase, the perspective needs to broaden and comprehensively take into account the local environment. We propose a framework of sustainable humanitarian supply chain management (SCM) that facilitates such comprehensive performance. We conceptualize the framework by combining literature from the fields of susta...
Kato, Takao; Kodama, Naomi
We review recent studies on management practices and their consequences for women in the workplace. First, the High Performance Work System (HPWS) is associated with greater gender diversity in the workplace while there is little evidence that the HPWS reduces the gender pay gap. Second, work-life balance practices with limited face-to-face interactions with coworkers may hamper women’s career advancement. Third, individual incentive linking pay to objective performance may enhance gender div...
Jonsson, Jon E.
The focus of this report is the consideration of one form of cognition, judgment and decision making, while examining some information management issues associated with the implementation of new forms of automation. As technology matures and more tasks become suitable to automation, human factors researchers will have to consider the effect that increasing automation will have on operator performance. Current technology allows flight deck designers the opportunity to automate activities involving substantially more cognitive processing.
Money, and Adventure (New York, NY: Dell publishing, ISBN 0-440-20014-8), 1988 Ian F.W. Beckett & John Pimlott (eds.), Armed Forces & Modern Counter...military arm of the MCP, or Malayan Communist Party. The United Kingdom opposed a communist takeover of Malaysia and conducted a successful...conflict the SCENARIO would be located in Malaysia , beginning in 1948, and running for 36 Seasons (four turns per player per year). Player
The types of objects scientifically researched and the types of sciences used for research. The crisis of contemporary science. Classical and holistic management. The knowledge pillar of management, the application pillar of management, social pillar of management. Holistic intelligence (HQ), knowledge intelligence (KQ), application intelligence (AQ), social intelligence (SQ). Holistic management and its role in solving the contemporary problems of mankind.
Fernandes, Marcia Simoni; Spagnol, Carla Aparecida; Trevizan, Maria Auxiliadora; Hayashida, Miyeko
The purpose of this study was to identify nurses managerial conduct in a private maternity hospital located in the interior of the São Paulo state, Brazil. In order to collect data, authors used a questionnaire with 20 propositions related to the work of nurses in the different units of the hospital. Following, authors performed a descriptive statistical analysis of the data. Results showed a tendency toward democratization in the conduct of the nurses investigated as the majority of the responses privileged questions on team work, workers' participation and group development. Also, authors evidenced that great part of the responses did not agree with the propositions about the principles of the Classical Administration Theory.
Peleg, Kobi; Regens, James L; Gunter, James T; Jaffe, Dena H
Man-made disasters such as acts of terrorism may affect a society's resiliency and sensitivity to prolonged physical and psychological stress. The Israeli Tel Aviv stock market TA-100 Index was used as an indicator of reactivity to suicide terror bombings. After accounting for factors such as world market changes and attack severity and intensity, the analysis reveals that although Israel's financial base remained sensitive to each act of terror across the entire period of the Second Intifada (2000-06), sustained psychological resilience was indicated with no apparent overall market shift. In other words, we saw a 'normalisation of terror' following an extended period of continued suicide bombings. The results suggest that investors responded to less transitory global market forces, indicating sustained resilience and long-term market confidence. Future studies directly measuring investor expectations and reactions to man-made disasters, such as terrorism, are warranted. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.
Nyagudi, Nyagudi Musandu
Conversation on Human Rights, Security and Counter-Terrorism Lecture byDr. Nyagudi Musandu Nyagudi – Forensic Criminologist and Security Analyst.Advanced Corporate Security Management Workshop by Fidelity Security Ltd, 17thAugust, 2011 at the Biblica Guest HouseConference Facility, Nairobi, Kenya.
Javadi, Mohammad Sadegh; Anvari-Moghaddam, Amjad; Guerrero, Josep M.
This paper proposes a robust optimization framework for energy hub management. It is well known that the operation of energy systems can be negatively affected by uncertain parameters, such as stochastic load demand or generation. In this regard, it is of high significance to propose efficient...... tools in order to deal with uncertainties and to provide reliable operating conditions. On a broader scale, an energy hub includes diverse energy sources for supplying both electrical load and heating/cooling demands with stochastic behaviors. Therefore, this paper utilizes the Information Decision Gap...
The programme has evolved from a project of a few experts drawing up the outline of what today is a comprehensive programme of research, development, demonstration, design, construction and operation of facilities for radioactive waste management. The Swedish programme was greatly influenced at an early stage by political actions, which included placing the responsibility with the reactor owners to demonstrate safe disposal of spent nuclear fuel and also to fund a disposal programme. The response of the reactor owners was to immediately start the KBS project. Its third report in 1983 described the KBS-3 concept, which is still the basis for SKB's deep geological repository system. Thus, this year is the 25th anniversary of the creation of the well-known KBS-3 concept. The SKB programme for nuclear waste management is today divided in two sub programmes; LILW Programme and the Nuclear Fuel Programme. The LILW Programme is entering into a new phase with the imminent site investigations for the expansion of the SFR LILW repository, which is in operation since 1988, to accept also decommissioning waste. The expansion of SFR is driven by a government decision urging SKB to investigate when a licensing of a repository for decommissioning waste can be made
Lithium-ion batteries are now extensively being used as the primary storage source. Capacity and power fade, and slow recharging times are key issues that restrict its use in many applications. Battery management systems are critical to address these issues, along with ensuring its safety. This dissertation focuses on exploring various control strategies using detailed physics-based electrochemical models developed previously for lithium-ion batteries, which could be used in advanced battery management systems. Optimal charging profiles for minimizing capacity fade based on SEI-layer formation are derived and the benefits of using such control strategies are shown by experimentally testing them on a 16 Ah NMC-based pouch cell. This dissertation also explores different time-discretization strategies for non-linear models, which gives an improved order of convergence for optimal control problems. Lastly, this dissertation also explores a physics-based model for predicting the linear impedance of a battery, and develops a freeware that is extremely robust and computationally fast. Such a code could be used for estimating transport, kinetic and material properties of the battery based on the linear impedance spectra.
Full Text Available The conception of sustainable development has been implemented into practice in numerous economic sectors, including forestry. Forest ecosystems are extremely important in the global ecological system, therefore maintenance and appropriate management of forest resources according to sustainable development principles have engaged a great deal of attention. The concept of sustainable forest management (SFM encompasses three dimensions: ecological, economic and social. A powerful tool to promote SFM are criteria and indicators. The aim of the article was evaluation of SFM in Poland, using one of the methods proposed by the Food and Agriculture Organization (FAO. According to data available, Polish forestry has a number of advantages: Poland has avoided the problem of deforestation, forest area has been permanently increasing, there has been observed improvement of forest health and vitality as well as a significant share of forests has carried out protective functions with no impact on timber production. Poland’s model of SFM is an adaptive process of balancing the ever-changing set of economic, environmental and social expectations. Such a complicated undertaking requires constant assessing and adjusting forest practices, in response to new circumstances, scientific advances and societal input
Full Text Available Opportunizing emerged as the core variable of this classic GT study on business and management. Opportunizing is the recurrent main concern that businesses have to continually resolve, and it explains how companies recurrently create, identify, seize or exploit situations to maintain their growth or survival. Opportunizing is the recurrent creation and re-creation of opportunities in business. Opportunizing is basically what business managers do and do all the time. The problematic nature of opportunizing is resolved by a core social process ofopportunizing and its attached sub-processes that account for change over time and for the variations of the problematic nature of its resolution.Opportunizing has five main facets. These are conditional befriending (confidence building & modifying behavior,prospecting (e.g. information gaining, weighing up (information appraisal & decision-making, moment capturing (quick intervention for seizing strategic opportunities, andconfiguration matching (adjusting the business organization to abet the other activities of opportunizing.On a more abstract level, opportunizing has three more organizational facets: the physically boundary-less, the valuehierarchical, and the physically bounded. The first of these called perpetual opportunizing. This emerges from the conjunction of conditional befriending and prospecting. The second facet is called triggering opportunizing. It arises from the coming together of weighing up and moment capturing. The final facet is called spasmodic opportunizing. This happens when moment capturing and configuration matching unite.
藤田, 東久夫; Tokuo, FUJITA; 株式会社サトー; Sato Corporation
The article clarifies the relationship between top-management decisions and strategies. Whereas prior theoretical treatments of top-management strategies are both logical and managerial, the author recognizes the ad hoc nature of top-management decisions, which rely upon intuition and inspiration, and proposes a theory of strategies that emerge through top-management leadership. This theory of leadership-initiated strategies sees a balance between leadership and management functions as essent...
.... This paper discusses a strategy for conducting the war on terrorism in terms of a system and how that strategy must be adjusted over the long-term to compensate for fluctuating components of the war on terrorism...
Smith, Jerry D
This thesis analyzes Israeli counter-terrorism strategy and its effectiveness. Because of ongoing suicide attacks from Palestinian and other terrorist organizations, Israel will continue to have an aggressive counter-terrorism strategy...
The Scientific Working Group on Forensic Analysis of Chemical Terrorism (SWGFACT) has developed the following guidelines for laboratories engaged in the forensic analysis of chemical evidence associated with terrorism. This document provides a baseline framework and guidance for...
philosophically consider the moral implication of suicide terrorism with particular .... define terrorism is political rather than theoretical. Brian Berkey (2010) is of ..... elements of relativism to the concept of morality because an. Islamic cleric who ...
José Ramón San Cristóbal
Full Text Available A typical construction project involves a wide range of disparate professionals, in many cases geographically distributed, working together for a relatively short period of time on the design and construction of a facility. Since organizations are becoming flatter, culturally rich, geographically diverse and intensely competitive, the possibilities for conflict in such environments are greater. Negotiation is an important aspect of a project and plays an important role in resolving claims, preventing disputes, and keeping a harmonious relationship between project participants. Part of any project manager’s role as a leader is to recognize conflict, understand the sources of conflict and manage it, and to do this a project manager must be able to understand the basics of negotiation theory and have sufficient competencies to lead in such situations. To address the complex technical and human issues in negotiation, different negotiation theories and models are available which mainly include game theory, economic theory, and behavior theory. Since Game Theory provides, by its very nature, the appropriate tools for the analysis and eventual solution of conflicts of any kind, this paper uses a model based on Game Theory in order to identify the activities that are responsible for the delays in a project and divide the costs among them.
This book offers a comprehensive reference guide to intelligence systems in environmental management. It provides readers with all the necessary tools for solving complex environmental problems, where classical techniques cannot be applied. The respective chapters, written by prominent researchers, explain a wealth of both basic and advanced concepts including ant colony, genetic algorithms, evolutionary algorithms, fuzzy multi-criteria decision making tools, particle swarm optimization, agent-based modelling, artificial neural networks, simulated annealing, Tabu search, fuzzy multi-objective optimization, fuzzy rules, support vector machines, fuzzy cognitive maps, cumulative belief degrees, and many others. To foster a better understanding, all the chapters include relevant numerical examples or case studies. Taken together, they form an excellent reference guide for researchers, lecturers and postgraduate students pursuing research on complex environmental problems. Moreover, by extending all the main aspec...
The management of information resources in libraries is of greater importance in the digital world. This book encompasses different areas of collection management and cover topics, such as: collection management in the organizational context; collection development policies; selection principles and resources; budget management; and more.
Violetta N. Volkova
Full Text Available The problem of a comprehension of the innovation management theory and an ability of its development on basis of system theory is set up. The authors consider features of management of socio-economic systems as open, self-organising systems with active components and give a classification of the systems’ regularities illustrating these features. The need to take into account the regularities of emergent, hierarchical order, equifinality, Ashby’s law of requisite variety, historicity and self-organization is shown.
Full Text Available A number of distinguished scholars believe that for theory development to occur within a field, qualitative research must precede quantitative research in order for the field to progress toward maturity. The purpose of this study was to investigate the international management literature from 1991-2007 to ascertain current levels of use of qualitative, quantitative, conceptual and joint (quantitative and qualitative research methods in the field. Results indicate scholars employ quantitative methods more than qualitative methods. The implications of these findings for future theory development and the generation of context relevant international management knowledge are discussed.
Lo, Yunnhon; Johnson, Stephen B.; Breckenridge, Jonathan T.
This paper describes the quantitative application of the theory of System Health Management and its operational subset, Fault Management, to the selection of Abort Triggers for a human-rated launch vehicle, the United States' National Aeronautics and Space Administration's (NASA) Space Launch System (SLS). The results demonstrate the efficacy of the theory to assess the effectiveness of candidate failure detection and response mechanisms to protect humans from time-critical and severe hazards. The quantitative method was successfully used on the SLS to aid selection of its suite of Abort Triggers.
Full Text Available The focus of the cost management literature is almost exclusively on technical issues, with scant attention to its social, political and organisational dimensions. In this paper the authors document research examining the design team as a temporary management structure, with emphasis on the efficacy of the cost management system as a vehicle for attaining client objectives with respect to time, cost and quality. Soft systems methodology is used to explore the perceptions of stakeholders to the cost management system, thus developing conceptual models of the theory and practice of cost management. Significant differences were found to exist between the perceptions of individual stakeholders concerning design team participants, participants’ roles, and the very purpose of the cost management system. Recommendations are made for structural, attitudinal and procedural changes to the cost management system in order to facilitate its effective functioning in the achievement of the client’s needs and objectives.
Full Text Available The emergence of nuclear terrorism, a threat that President Obama called "the gravest danger we face," has signaled a paradigm shift in international security. Since the collapse of the Soviet Union, sensitive nuclear technologies and materials have become increasingly available. Globalization and the inadequate enforcement of treaties and export controls have allowed the proliferation of nuclear weapons materials. Today, international terrorist organizations seek to employ weapons of mass destruction (WMD as a means to influence national policies around the world. AlQaida spokesman Suleiman Abu Gheith declared that in order to balance the injustices that have been inflicted on the Muslim population worldwide, al-Qaida's new objective is "to kill 4 million Americans–2 million of them children." As political scientist Graham Allison notes, this could be achieved with either 1,334 attacks similar in magnitude to those of 9/11, or one nuclear bomb.Building a nuclear program is an arduous task that requires tacit knowledge, the recruitment of nuclear scientists, engineers, and machinists, and the resources and time to obtain nuclear materials and components. While it is unlikely that terrorist organizations have the capacity to develop full-fledged programs in the near term, terrorist development and acquisition of nuclear weapons remains a long-term threat that requires international action.
The importance of preventing nuclear terrorism is so great that it is easy to believe that the usual concern with civil liberties must take a back seat. But it is precisely when emergencies are invoked that the authors must not forget the importance of freedoms. Emergency powers are easily abused, and, even in the absence of abuse, mistakes can be made. It is hard to understand why they care about civil liberties if every suspect is guilty, every wiretap is necessary, and every search is justified. But sometimes suspects are innocent, wiretaps are used for political ends, and searches disrupt lives to no end. Civil liberties do not exist in a vacuum. If society is destroyed, civil liberties are likely to be destroyed as well. Virtually every legal doctrine this study addresses involves a recognition that individual rights must be balanced against valid social needs. The civil liberties focus on here fall under the general headings of freedom of speech and association, privacy, due process rights for suspects, and freedom from unreasonable searches and seizures. One essential point applied to all these areas: although a counterterrorist activity is legal, that does not mean the activity has no impact on civil liberties. It may be legal, for example, to have a massive federal police force that provides hundreds of guards for every shipment of plutonium. Even so, that procedure still raises civil liberties concerns, since many Americans would feel less free in a society of that type
After the events of September 11, the United Nations Security Council adopted Resolution 1373 (2001) which has been called the 'Counter-Terrorism Code' of the world, because it creates legal obligations for all 192 Member States of the United Nations. UN Security Council Resolutions 1373 (2001), 1540 (2004) and 1735 (2006) as well as a defined set of 13 global treaties constitute the universal legal framework against terrorism which must be implemented in a manner consistent with international human rights obligations. Basically, these 13 treaties as well as Resolution 1373 are international criminal law instruments. Within this universal legal framework, the framework against nuclear terrorism is constituted by Resolution 1540, the Convention on the Physical Protection of Nuclear Material (CPPNM) which entered into force in 1987, and the International Convention for the Suppression of Terrorist Bombings which is in force since 2001. These three legal instruments will be supplemented by the International Convention for the Suppression of Acts of Nuclear Terrorism, an amendment to the CPPNM and two Protocols amending the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation and the Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms Located on the Continental Shelf, once these instruments, all of which were adopted in 2005, enter into force. The Terrorism Prevention Branch (TPB) of the United Nations Office on Drugs and Crime (UNODC) assists countries which are in need of legislative assistance for the drafting of appropriate counter-terrorism laws that duly take into account the obligations contained in Resolution 1373, the United Nations sanctions against Al-Qaida and the Taliban as well as in the 13 universal conventions for the prevention and the suppression of terrorism, including the CPPNM and the new International Convention for the Suppression of Acts of Nuclear Terrorism. UNODC/TPB has also
Full text: The March 2005 'International conference on nuclear security, global directions for the future' noted that nuclear terrorism is one of the greatest threats to society. Eminent members of a multi-national panel stated that there is no one principal activity to reduce the risk of nuclear terrorism and that a combination of activities is required. This paper seeks to identify those activities by analyzing the elements that comprise the risk of nuclear terrorism. For the purpose of the analysis, risk is the product of the probability of a terrorist attack (A p ), the success of a terrorist act (S p ) and the consequence (C) of the attack: R=A p * S p * C. The paper examines each of these three elements of risk with the objective of identifying what we are doing and what else we could be doing to reduce risk. It takes into consideration some historic catastrophes, examines how they might have been prevented or their consequences reduced, and if there are lessons that are applicable to reducing the risk of nuclear terrorism. The paper demonstrates that we have concentrated on only one of the three elements of risk and offer suggestions for diminishing the risk of nuclear terrorism by addressing all the elements. (author)
The thesis analyses international law and practice in relation to terrorism and counter-terrorism in the post 9/11 environment. It finds terrorism to be a term of acute and wide-ranging political significance yet one which is not defined under generally accepted treaty or customary international
... 1121-AA78 International Terrorism Victim Expense Reimbursement Program AGENCY: Office of Justice... promulgating this interim-final rule for its International Terrorism Victim Expense Reimbursement Program... international terrorism. DATES: Effective date: This interim-final rule is effective April 11, 2011. Comment...
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Iran. 742.8 Section... BASED CONTROLS § 742.8 Anti-terrorism: Iran. (a) License Requirements. (1) A license is required for anti-terrorism purposes to export or reexport to Iran any item for which AT column 1 or AT column 2 is...
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: North Korea. 742.19...-CCL BASED CONTROLS § 742.19 Anti-terrorism: North Korea. (a) License Requirements. (1) All items on... anti-terrorism reasons require a license for export or reexport to North Korea. This includes all items...
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Syria. 742.9 Section... BASED CONTROLS § 742.9 Anti-terrorism: Syria. (a) License requirements. (1) If AT Column 1 of the... required for export and reexport to Syria for anti-terrorism purposes. (2) The Secretary of State has...
The threat of terrorism is a concern in public facilities including schools. This study focused on school districts in a southwestern state. Terrorism emergency preparedness policies are well-documented as measures to protect students and staff in school districts from terrorism threats and vulnerabilities. However, those threats and…
... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Program Loss Reporting AGENCY: Departmental Offices, Terrorism Risk Insurance Program Office, Treasury. ACTION: Notice and request for... 1995, Public Law 104-13 (44 U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program...
Fischer, Peter; Ai, Amy L.
International terrorism has become a major global concern. Several studies conducted in North America and Europe in the aftermath of terrorist attacks reveal that international terrorism represents a significant short-term and long-term threat to mental health. In the present article, the authors clarify the concept and categories of terrorism and…
Full Text Available The article issued theoretical and practice problems of combating terrorism in current conditions, in particular, analyzes the concept of bio-terrorism as a form of terrorism, we investigate its nature, characteristics, and also referred to the major directions of countering.
Long, Kenneth J.
Critiques conventional definitions of terrorism. Advocates sensitizing students to the semantics of terrorism and teaching skepticism of leaders who manipulate such concepts. Recommends using historical case studies to clarify issues, inform students about state and state-sponsored terrorism, and challenge students' preconceptions. Includes a…
Aricak, Tolga; Bekci, Banu; Siyahhan, Sinem; Martinez, Rebecca
Introduction: Historically, terrorism has occurred in various regions of the world and has been considered a local problem until the September, 11 terrorist attacks on the United States in 2001. After 9/11, terrorism has become a global concern. The definition of terrorism has changed from a violent act of a group of local people against their…
Hoffmann, Petra; Schiele, Holger; Song, Michael; Krabbendam, Johannes Jacobus
Supply risk management gained prominence over the last decade, both in the academic discourse and in practical application. This research examines the influence of Transaction Cost characteristics -behavioral uncertainty, environmental uncertainty and asset specificity on supply risk management performance. We also identify two antecedents of the transaction cost constructs based on social exchange theory: dependency and preferred customer status. We used survey data to discover a positive in...
One of the major domain of empirical and theoretical interest in psychology of organisation and management is a leadership. Long ago professionals and scientists have been searching for universal prescription for an effective management. The inventor for sure will become one of the richest people in the world. Instantly, the question arises if such a universal prescription really exists? This article presents the survey of leadership theories as an important aspect of a managem...
Full Text Available The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable moral implications with regards to the treatment of other human beings, a further common and troubling implication of terrorism and war consists in the fact that dehumanization of others leads also to a dehumanization of ourselves. .
Full Text Available This paper focuses on the analysis of the phenomenon of domestic violence and the distinctive features for which is it may be recognized as a specific form of torture and/or terrorism at home. The author provides an overview of the scientific debate among feminist authors on this conception which has given rise to an innovative approach to understanding the concept of domestic violence. Underscoring the substantive similarity of domestic violence with the acts of torture and/or terrorism, the author urges for state action arguing that domestic violence as a form of gender-based violence should be approached by applying the same logic and strategies which are employed in response to traditional torture and terrorism.
Ellenberg, Eytan; Taragin, Mark; Bar-On, Zvia; Cohen, Osnat; Ostfeld, Ishay
Medical impact of terror is a public health issue as the threat is growing all over the world. Our objective was to compare the number of injured and incidents in the three different databases and reports [Global Terrorism Database (GTD), Israeli Security Agency (ISA) and National Insurance Institute (NII)] in Israel. Retrospective study. Analyses of three different databases (GTD, ISA and NII) and basic comparison. The victims reimbursed for medical expenses are the largest population. The number of injured as described by GTD and ISA database are less important. The 2010-2013 years are marked by more incidents recognized in Israel vs GTD assessment (except in 2014). The number of victims being reimbursed for medical and mental health services is radically different from the GTD and the ISA reports. Public Health specialists should be advised of this phenomenon to deliver their right approach (including mental health) to growing threat and develop new definition of victim of terror.
The role of the legal instruments in the war against nuclear terrorism. Control of radioactive sources. Elements of Nuclear Law: Definition: it is the body of special legislation that regulates the pacific uses of nuclear energy and the conduct of the persons engaged in activities related to fissionable materials and ionizing radiation . Objective: to provide a legal framework in order to protect individuals , property and the environment against the harmful effects of the use of nuclear energy and ionising radiation. Principles of nuclear energy legislation: safety principle, exclusively operator responsibility, authorization, independence of the regulatory body, inspections and enforcement, nuclear damage compensation, international cooperation. National regulatory infrastructure. Establishment of special law in Emergency Preparedness for nuclear or radiological disaster. IAEA Conventions. Transportation of nuclear material. IAEA regulations on radioactive material. Compensation for nuclear damage. Nuclear safety, security and terrorism. International and domestic instruments. Anti terrorism acts. International agreements on Safety Cooperation. (Author)
Garwin, Richard L.
In the Seminars on Planetary Emergencies, we have for more than a decade had a strong focus on terrorism, and, indeed, on megaterrorism. We realized early that there was much that could be achieved to mitigate the consequences of terrorists' acts, and so our original PMP, ably chaired by Kamal, was split into PMP-MTA (Mitigation of Terrorists Acts) and PMP-Motivation of Terrorism. Clearly, terrorism doesn't just happen, but is performed by people, either relatively spontaneously or in an organized fashion. I will not presume to report on the considerations and accomplishments of our colleagues, chaired by John Alderdice, who have studied terrorist motivations and worked hard to eliminate such motivations...
Cristina Elena ALBU
Full Text Available We live in a society marked by major changes in the tourism field. Tourist destinations make all possible efforts to best promote their tourist offer and attract as different tourist categories as there might be. However, these tourist destinations are sometimes associated with terrorist attacks that can turn a famous tourist area into a highly avoided one. Terrorism may be permanently detrimental to a tourist destination on both social and economic levels. The purpose of this paper is to highlight the impact that terrorist attacks have on tourism around the globe. The research method used for the achievement of this article is documentary research. Through the proportions and forms that it has taken, terrorism has become one of the more and more active and threatening calamities that affect the international community. For some organizations, terrorism has become a means of solving their political, cultural and religious problems, taking tourism as a niche through which they can carry out their targets.
Lee, Doyoung; Kim, ChangLak [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)
There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South
Lee, Doyoung; Kim, ChangLak
There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South
The obligation to include terrorism cover in all Property Damage policies issued on the French Market is ruled by an Act of 1986 and introduced under Section R 126-2 of the French Code of Insurance. This section stipulates that Property Damage policies must provide cover for damage resulting from acts of terrorism, with the same deductible and the same limit than that of the other damage covered in the policy. Soon after the dramatic events of September 11, 2001 in the United States and although reinsurers worldwide restricted their offer of capacities, French insurers recognized that they had to maintain this global cover for the benefit of their insurers. After difficult discussions between insurers, reinsurers, brokers, risk managers and representatives of the State, the creation of a new Pool, backed with a State guarantee, was decided in less than three months. Effective January 1, 2002 and called Gestion d'Assurance et de Reassurance des Risques Attentats et Actes de Terrorisme (GAREAT), the Pool offers a multiple layers stop-loss cover for Property Damage only, i.e. excluding TPL policies. Considering that nuclear risks should be treated in the same way as other industrial risks, it was decided that they would be covered by GAREAT as well. In the meantime, by a Decree of December 28, 2001 modifying Section R 126-2, a special provision, aiming at reducing the limit and thus the price of this cover, was introduced in the Code. The purpose of this paper is to expose the present situation applying through GAREAT and, after two years of operation to discuss future developments, including other sources of capacity for the coverage of acts of terrorism in nuclear risks insurance.(author)
Radiation sources utilising either radioactive materials or radiation generators have been widely used throughout the world in medicine, research, industry and education for decades. There are both, legal and governmental responsibilities in respect of the safe use of ionising radiation sources, radiation protection, the safe management of radioactive waste and the safe transport of radioactive material. The attacks of 11 September 2001 brought a new dimension to the actions against terrorism. There are not enough legal instruments to control this phenomenon. Potential threat: acquisition of a nuclear weapon, acquisition of nuclear material to construct a nuclear weapon or to cause a radiological hazard, violent acts against nuclear facilities to cause a radiological hazard, acquisition of other radioactive materials to construct a dirty bomb to cause a radiological hazard. 'The Convention on the Physical Protection of Nuclear Material', IAEA, 1980 obliges Parties to apply established levels of physical protection to nuclear material used for peaceful purposes in international transport. It also requires Parties to criminalize under their respective laws various acts such as theft, illegal acquisition, possession and use, and to establish jurisdiction over those offences to enable the prosecution or extradition of alleged offenders. This is the only international legal instrument in the area of physical protection. Conclusion: At present the threat is not only of a nuclear accident but of a nuclear terrorism attack which could affect any country in the world and the lack of effective legal instruments to respond to that situation. It shows the need for the international community to work together in order to reinforce coordinated and integrated nuclear security and safeguards measures. States shall create appropriated regulatory infrastructures to ensure that the radioactive sources are appropriately regulated and adequately secured at all times. Stronger and
Faran, D.; Faran, D.; Wijnhoven, Alphonsus B.J.M.
This essay highlights the state of unawareness to which the theories held by managers are susceptible. The essay opens up the question whether the critical rationalist approach, which specifically addresses the unawareness problem in science, is indeed inadequate for organizations as commonly
Jaradat, Suhair; Qablan, Ahmad; Barham, Areej
This paper explains how the activity theory is used as a framework to analyze the barriers to a virtual Management Information Stream (MIS) Curriculum in Jordanian schools, from both the sociocultural and pedagogical perspectives. Taking the activity system as a unit of analysis, this study documents the processes by which activities shape and are…
Farmer, Kevin; Meisel, Steven I.; Seltzer, Joe; Kane, Kathleen
The Mock Trial is an experiential exercise adapted from a law school process that encourages students to think critically about theories, topics, and the practice of management in an innovative classroom experience. Playing the role of attorneys and witnesses, learners ask questions and challenge assumptions by playing roles in a trial with…
Claudio Barbieri da Cunha
Full Text Available
Nesse texto o autor apresenta uma resenha acerca do livro "The logic of logistics: theory, algorithms and applications for logistics management", de autoria de Julien Bramel e David Simchi-Levi, publicado pela Springer-Verlag, em 1997.
Faran, Doron; Wijnhoven, Alphonsus B.J.M.
The common wisdom is that Popper's critical rationalism, a method aimed at knowledge validation through falsification of theories, is inadequate for managers in organizations. This study falsifies this argument in three phases: first, it specifies the obstructers that prevent the method from being
Green, Zakevia Denise
Although research on the theory-practice gap is available across multiple disciplines, similar studies focusing on the profession of health information management/technology (HIM/T) are not yet available. The projected number of qualified HIM/T needed with advanced skills and training suggests that skillful use of electronic health records (EHR)…