WorldWideScience

Sample records for terrorism information sharing

  1. 2013 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  2. 2012 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  3. Information Sharing About International Terrorism in Latin America

    Science.gov (United States)

    2005-06-01

    articles/anmviewer.asp?a=464&print=yes. Somoza, L. (2001). Inteligencia: Su Utilidad para la Toma de Decisiones en un Mundo de Nuevos Conflictos...Terrorism Violence in Europe.” March 9-11, 2001, Minda de Gunzburg Center for European Studies, Harvard University, Cambridge, Massachusetts. 56...Taylor and Francis. Jane’s (2005). Terrorism and Insurgency Center. Fuerzas Armadas Revolucionarias de Colombia (FARC). Retrieved February 25, 2005

  4. 77 FR 74685 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2012-12-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and...: Comments that include trade secrets, confidential commercial or financial information, Chemical-terrorism...

  5. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...

  6. Concept of Operations for the Information Sharing Environment Electronic Directory Services - People and Organizations

    National Research Council Canada - National Science Library

    2006-01-01

    Section 1016 of the Intelligence Reform and Terrorism Prevention Act (IRTPA) calls for improved sharing of terrorism information to support the country's ability to effectively prosecute the counterterrorism (CT) mission...

  7. 78 FR 16698 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2013-03-18

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and... notice is also soliciting comments concerning the Information Collection Request, Chemical Facility Anti...

  8. Terrorism and information sharing between the intelligence and law enforcement communities in the US and the Netherlands: emergency criminal law?

    NARCIS (Netherlands)

    Vervaele, J.A.E.

    2005-01-01

    Intelligence sharing between intelligence and police services with a view to preventing and combating terrorism is high on the political agenda in Brussels and The Hague. The Netherlands is one of the few countries in the EU where this topic is subject of political scrutiny. It also led to

  9. The problems of informational terrorism in African countries

    Directory of Open Access Journals (Sweden)

    Voznyuk Eugenia Vasylivna

    2017-12-01

    Full Text Available The features of informational terrorism in African countries, especially in SADC countries, are analyzed as well as the ways to combat information terrorism in this region. The major issues related to information terrorism are highlighted, which include data exfiltration, social engineering, insider threats, database breaches as well as poor identity and access management. The essence of Computer Security (Cyber Security is revealed and its main tasks are characterized: accessibility, integrity, including authenticity and confidentiality. The main threats for cyberspace are distinguished.

  10. The War Against Terror and Transatlantic Information Sharing: Spillovers of Privacy or Spillovers of Security?

    Directory of Open Access Journals (Sweden)

    Maria Tzanou

    2015-02-01

    Full Text Available The EU-US Passenger Name Record (PNR agreement has been among the most controversial instruments in the fight against terrorism that the EU negotiated with the US after the 9/11 terrorist attacks. The agreement has been heavily criticised for its implications regarding fundamental rights, in particular the rights to privacy and data protection. Nevertheless, the EU has put forward plans to develop its own PNR programme. The present article aims to examine the new dynamics concerning privacy that arise from the transatlantic fight against terrorism. It argues that, while attempts for the development of a transatlantic privacy protection framework have been made, ‘spillovers’ of security, taking the form of internalisation of external counter-terrorism measures, are prevalent in the era of the war against terror.

  11. Terrorism and information sharing between the intelligence and law enforcement communities in the US and the Netherlands: emergency criminal law?

    Directory of Open Access Journals (Sweden)

    John A. E. Vervaele

    2005-06-01

    Full Text Available Intelligence sharing between intelligence and police services with a view to preventing and combating terrorism is high on the political agenda in Brussels and The Hague. The Netherlands is one of the few countries in the EU where this topic is subject of political scrutiny. It also led to controversial case law. Recently, Justice Minister Donner has used an expedited procedure to submit a legislative proposal concerning shielded witnesses. This Bill raises many questions, that concern, amongst others, the discretion of intelligence services to determine which information will be provided for use in criminal proceedings and the relationship between this discretionary power and the connected legal duty of secrecy on the one hand and the rights of the defence to test and question that information on the other. Furthermore, questions raise regarding the evidentiary quality of this information. The proposed rules also influence the legitimacy of criminal law and the position of the criminal courts. What effect does the paradigm of security-orientated thinking have on the historical connection between criminal law and the rule of law? This issue is also addressed in this article.

  12. The Nature Terrorism Reports on Social Networks

    Directory of Open Access Journals (Sweden)

    James Okolie-Osemene

    2015-12-01

    Full Text Available As new tools of communication, an in-depth study of social networking in the era of global terrorism is attempted in this article. This emerging tradition of information sharing is driven by social media technology which has greatly revolutionalised communication in all sectors. The article explored the information sharing relevance of new technologies in the age of terrorism and counterterrorism. It focused on how social networks are increasingly utilised by different groups. In terms of methodology, the study extracted and utilised positive, negative and neutral posts, updates, tweets and reports on social networks through different individual and organisational media accounts and blogs, and analysed the data qualitatively. Findings show that despite being used by extremist groups in promoting their political agenda, social networks are also useful in promoting positive perceptions that society has about Muslims in the era of terrorism, emphasising that Muslims are not terrorists. Through the instrumentality of social media, users are able to map the trends of terrorism and responses from stakeholders in government and security sector in curbing the menace. Given their capacity to reach a wider audience, breaking cultural and religious barriers, social networks serve as early warning signs and make it possible for people to share new ideas on possible ways of curbing the proliferation of terrorist organisations.

  13. Emergent information technologies and enabling policies for counter-terrorism

    CERN Document Server

    Popp, R

    2006-01-01

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberti...

  14. Homegrown terrorism; the known unknown

    OpenAIRE

    Hinkkainen, Kaisa

    2012-01-01

    Homegrown terrorism has attracted significant attention following the 2004 Madrid and 2005 London bombings. Homegrown terrorism is usually thought to be a new phenomenon, with few observed events, and inherently distinct from transnational terrorism or the old domestic terrorism in Europe. However, little research has so far examined the alleged distinctiveness of homegrown terrorism empirically. I argue that homegrown terrorism shares many similarities with domestic and international terrori...

  15. 78 FR 30934 - Agency Information Collection Activities: Customs-Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2013-05-23

    ... Activities: Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... information collection requirement concerning the Customs-Trade Partnership Against Terrorism (C-TPAT). This... information collection: Title: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077...

  16. Terrorism Risk Insurance: An Overview

    National Research Council Canada - National Science Library

    Webel, Baird

    2005-01-01

    .... Addressing this problem, Congress enacted the Terrorism Risk Insurance Act of 2002 (TRIA) to create a temporary program to share future insured terrorism losses with the property-casualty insurance industry and policyholders...

  17. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    National Research Council Canada - National Science Library

    Gallagher, Jerry P

    2008-01-01

    ... between private security and the KCPD. To empower this resource as a terrorism prevention force multiplier the development of a web based virtual knowledge sharing initiative was explored in this study as a solution to provide "one stop...

  18. Final Report: Multi-State Sharing Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Begoli, Edmon [ORNL; Boehmann, Brant [ORNL; DeNap, Frank A [ORNL

    2012-04-01

    In 2003 a joint effort between the U.S. Department of Homeland Security (DHS) and the U.S. Department of Justice created state and metropolitan intelligence fusion centers. These fusion centers were an effort to share law enforcement, disaster, and terrorism related information and intelligence between state and local jurisdictions and to share terrorism related intelligence between state and local law enforcement agencies and various federal entities. In 2006, DHS commissioned the Oak Ridge National Laboratory to establish and manage a groundbreaking program to assist local, state, and tribal leaders in developing the tools and methods required to anticipate and forestall terrorist events and to enhance disaster response. This program, called the Southeast Region Research Initiative (SERRI), combines science and technology with validated operational approaches to address regionally unique requirements and suggest regional solutions with the potential for national application. In 2009, SERRI sponsored the Multistate Sharing Initiative (MSSI) to assist state and metropolitan intelligence fusion centers with sharing information related to a wider variety of state interests than just terrorism. While these fusion centers have been effective at sharing data across organizations within their respective jurisdictions, their organizational structure makes bilateral communication with federal entities convenient and also allows information to be further disbursed to other local entities when appropriate. The MSSI-developed Suspicious Activity Report (SAR) sharing system allows state-to-state sharing of non-terrorism-related law enforcement and disaster information. Currently, the MSSI SAR system is deployed in Alabama, Kentucky, Tennessee, and South Carolina. About 1 year after implementation, cognizant fusion center personnel from each state were contacted to ascertain the status of their MSSI SAR systems. The overwhelming response from these individuals was that the MSSI

  19. Information Sharing and Knowledge Sharing as Communicative Activities

    Science.gov (United States)

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  20. Information and the War against Terrorism, Part V: The Business Implications.

    Science.gov (United States)

    Strickland, Lee S.

    2002-01-01

    Discussion of changes in business information protection since the September 11th terrorist attacks focuses on three planning goals: continuing to serve the customer in times of threat; implementing new communication paradigms; and establishing a comprehensive knowledge redundancy program. Considers threats other than terrorism, risk management…

  1. Challenges in sharing information effectively

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    2006-01-01

    collaborating successfully, i.e., a deceptively false shared understanding had emerged. These incidents were analysed to discover what led to these unsuspected breakdowns in information sharing. Results. Unsuspected breakdowns in information sharing emerged when: differences in implementations of shared symbols......Introduction. The goal of information sharing is to change a person's image of the world and to develop a shared working understanding. It is an essential component of collaboration. This paper examines barriers to sharing information effectively in dynamic group work situations. Method. Three...... types of battlefield training simulations were observed and open-ended interviews with military personnel were conducted. Analysis. Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were...

  2. Psychiatry and terrorism.

    Science.gov (United States)

    Stoddard, Frederick J; Gold, Joel; Henderson, Schuyler W; Merlino, Joseph P; Norwood, Ann; Post, Jerrold M; Shanfield, Stephen; Weine, Stevan; Katz, Craig L

    2011-08-01

    Terrorism has dominated the domestic and international landscape since 9/11. Like other fields, psychiatry was not well prepared. With the 10th anniversary of the 9/11 attack approaching, it is timely to consider what can be done to prepare before the next event. Much has been learned to provide knowledge and resources. The roles of psychiatrists are challenged by what is known of the causes of, consequences of, and responses to terrorism. Reflecting on knowledge from before and since 9/11 introduces concepts, how individuals become terrorists, how to evaluate the psychiatric and behavioral effects of terrorism, and how to expand treatments, behavioral health interventions, public policy initiatives, and other responses for its victims. New research, clinical approaches, and policy perspectives inform strategies to reduce fear and cope with the aftermath. This article identifies the psychiatric training, skills and services, and ethical considerations necessary to prevent or reduce terrorism and its tragic consequences and to enhance resilience.

  3. National Strategy for Information Sharing: Successes and Challenges in Improving Terrorism-Related Information Sharing

    National Research Council Canada - National Science Library

    2007-01-01

    .... While this Strategy describes the vision that has guided the Administration for the past six years, it also sets forth our plan to build upon progress and establish a more integrated information...

  4. Terrorism, Anti-Terrorism, and the Copycat Effect

    DEFF Research Database (Denmark)

    Jensen, Thomas

    that an increase in anti-terrorism makes it more likely that cells will plan small rather than large attacks. Furthermore, we see that an increase in anti-terrorism can make a terrorist attack more likely. Analyzing the problem of optimal anti-terrorism we see that the introduction of a copycat effect rationalizes...... an increase in the level of anti-terrorism after a large attack. Using this result we show how the copycat effect changes the dynamic pattern of terrorism attacks and what the long run consequences are...

  5. Sleep Terrors (Night Terrors)

    Science.gov (United States)

    ... terrors or other family members Lead to safety concerns or injury Result in daytime symptoms of excessive sleepiness or problems functioning Continue beyond the teen years or start in adulthood Causes Sleep terrors ...

  6. International Convention for the Suppression of Acts of Nuclear Terrorism. United Nations 2005: International Convention for the Suppression of Acts of Nuclear Terrorism

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    The International Convention for the Suppression of Acts of Nuclear Terrorism is a 2005 United Nations treaty designed to criminalize acts of nuclear terrorism and to promote police and judicial cooperation to prevent, investigate and punish those acts. As of September 2016, the convention has 115 signatories and 106 state parties, including the nuclear powers China, France, India, Russia, the United Kingdom, and the United States. The Convention covers a broad range of acts and possible targets, including nuclear power plants and nuclear reactors; covers threats and attempts to commit such crimes or to participate in them, as an accomplice; stipulates that offenders shall be either extradited or prosecuted; encourages States to cooperate in preventing terrorist attacks by sharing information and assisting each other in connection with criminal investigations and extradition proceedings; and, deals with both crisis situations, assisting States to solve the situations and post-crisis situations by rendering nuclear material safe through the International Atomic Energy Agency (IAEA)

  7. Confronting the risks of terrorism: making the right decisions

    International Nuclear Information System (INIS)

    John Garrick, B.; Hall, James E.; Kilger, Max; McDonald, John C.; O'Toole, Tara; Probst, Peter S.; Rindskopf Parker, Elizabeth; Rosenthal, Robert; Trivelpiece, Alvin W.; Van Arsdale, Lee A.; Zebroski, Edwin L.

    2004-01-01

    This report offers a methodology for assessing, quantitatively, the risks of terrorism. The purpose of the methodology is to support effective decision making to combat terrorism. The emphasis is on terrorist attacks that could have catastrophic consequences. The perspective taken is that in order to make the right decisions about combating terrorism, their needs to be a systematic means of assessing the likelihood of such attacks. A process of implementation of the decisions resulting from risk assessment is essential. That process includes (1) an understanding of the nature of the threat, (2) an information system linked directly to 'intelligence' on terrorism, and (3) organizational structures that can take timely, coordinated, and effective actions. There must also be sound evidence that the methodology can be successfully applied. A description of the nature of terrorism, a terrorism risk assessment methodology, information requirements to fight terrorism, and recommendations for successful implementation is what this report is about

  8. Cyber terrorism prevention and counteraction workshop review

    NARCIS (Netherlands)

    Pastukhov, O.M.

    2011-01-01

    A NATO Advanced Training Course (ATC ) on Cyber Terrorism Prevention and Counteraction workshop, held in Kiev on September 27-29, 2010, allowed the participants to share their experiences with experts from Ukraine, a Partnership for Peace country. The participants exchanged their ideas on the ways

  9. 75 FR 18850 - National Protection and Programs Directorate; Chemical Facility Anti-Terrorism Standards...

    Science.gov (United States)

    2010-04-13

    ... Directorate; Chemical Facility Anti-Terrorism Standards Personnel Surety Program AGENCY: National Protection...-terrorism Vulnerability Information (CVI), Sensitive Security Information (SSI), or Protected Critical... . SUPPLEMENTARY INFORMATION: Program Description The Chemical Facility Anti-Terrorism Standards (CFATS), 6 CFR...

  10. Nuclear terrorism and reality

    International Nuclear Information System (INIS)

    St Sauver, J.E.

    1983-01-01

    Unlike conventional terrorist violence, bona-fide nuclear terrorism is a self-publicizing phenomenon. It is a public event by the very scope of its impact. Apocalyptic and catastrophically destructive, a nuclear explosion is the ideal instrument of mass terror. Rational nuclear insurgents would not inform authorities that a nuclear device is about to be detonated. Advance warning of an impending nuclear explosion would reduce the maximum potential effectiveness of any response to such an event

  11. Environmental terrorism

    International Nuclear Information System (INIS)

    Zirschky, J.

    1988-01-01

    Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts

  12. Understanding and Teaching the Semantics of Terrorism: An Alternative Perspective.

    Science.gov (United States)

    Long, Kenneth J.

    1990-01-01

    Critiques conventional definitions of terrorism. Advocates sensitizing students to the semantics of terrorism and teaching skepticism of leaders who manipulate such concepts. Recommends using historical case studies to clarify issues, inform students about state and state-sponsored terrorism, and challenge students' preconceptions. Includes a…

  13. 78 FR 44961 - Agency Information Collection Activities; Customs-Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2013-07-25

    ... Activities; Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... accordance with the Paperwork Reduction Act: Customs-Trade Partnership Against Terrorism (C-TPAT). This is a...: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract...

  14. What to Share and Why to Share? A Case Study of CrossBoundary Information Sharing in Taiwan e-Government

    Directory of Open Access Journals (Sweden)

    Tung-Mou Yang

    2013-06-01

    Full Text Available In the public sector, cross-boundary information sharing has been an important theme among governmental collaboration and is critical to organizational efficiency and performance. This research explores the types and characteristics of shared information and the intended purposes of information sharing. In the case study, the cross-boundary shared information can be abstracted into five fundamental types: the collected raw data, the value-added information, the administration oriented information, the administration-oriented knowledge, and the domain-oriented knowledge. Another framework is proposed to conceptualize the purposes of interagency information sharing. The identified seven purposes are administrative work, information search and verification, information aggregation, business process chain, innovative service, experience-based knowledge sharing, and crisis and emergency. The seven purposes do not mean to be an exhaustive list but to provide an initial conceptualization to perceive the functionalities and roles that cross-boundary information sharing plays among government agencies. The two proposed frameworks can help both researchers and practitioners perceive and clarify the fundamental part of cross-boundary information sharing in the public sector. The finding of this research is also expected to enrich the current information-sharing theories and to contribute to the current e-Government literature from an international perspective.

  15. Multiprocessor shared-memory information exchange

    International Nuclear Information System (INIS)

    Santoline, L.L.; Bowers, M.D.; Crew, A.W.; Roslund, C.J.; Ghrist, W.D. III

    1989-01-01

    In distributed microprocessor-based instrumentation and control systems, the inter-and intra-subsystem communication requirements ultimately form the basis for the overall system architecture. This paper describes a software protocol which addresses the intra-subsystem communications problem. Specifically the protocol allows for multiple processors to exchange information via a shared-memory interface. The authors primary goal is to provide a reliable means for information to be exchanged between central application processor boards (masters) and dedicated function processor boards (slaves) in a single computer chassis. The resultant Multiprocessor Shared-Memory Information Exchange (MSMIE) protocol, a standard master-slave shared-memory interface suitable for use in nuclear safety systems, is designed to pass unidirectional buffers of information between the processors while providing a minimum, deterministic cycle time for this data exchange

  16. Understanding Interdependency Through Complex Information Sharing

    Directory of Open Access Journals (Sweden)

    Fernando Rosas

    2016-01-01

    Full Text Available The interactions between three or more random variables are often nontrivial, poorly understood and, yet, are paramount for future advances in fields such as network information theory, neuroscience and genetics. In this work, we analyze these interactions as different modes of information sharing. Towards this end, and in contrast to most of the literature that focuses on analyzing the mutual information, we introduce an axiomatic framework for decomposing the joint entropy that characterizes the various ways in which random variables can share information. Our framework distinguishes between interdependencies where the information is shared redundantly and synergistic interdependencies where the sharing structure exists in the whole, but not between the parts. The key contribution of our approach is to focus on symmetric properties of this sharing, which do not depend on a specific point of view for differentiating roles between its components. We show that our axioms determine unique formulas for all of the terms of the proposed decomposition for systems of three variables in several cases of interest. Moreover, we show how these results can be applied to several network information theory problems, providing a more intuitive understanding of their fundamental limits.

  17. Winning the war on terror: psychology as a strategic framework.

    Science.gov (United States)

    Beecroft, Nicholas

    2006-01-01

    International relations is fundamentally about people. Psychology provides a wide range of tools to understand the rise of Islamic fundamentalist terrorism and offers part of the framework for its resolution. Western societies need to avoid being consumed with fear, revenge or anger which might lead to polarisation and perpetuate the cycle of violence. Understanding the enemy and the virulence of their ideas is essential to winning the hearts and minds of their potential supporters through dialogue, public diplomacy and foreign policy. The West needs to build trust, relationships, reputation and address double standards in its behaviour in order to build a global coalition of people with shared values. The concept of 'war on terror' has been damaging, not least by inhibiting western societies from the self-reflection required to overcome the challenge of terrorism.

  18. Risk communication and radiological/nuclear terrorism: a strategic view.

    Science.gov (United States)

    Becker, Steven M

    2011-11-01

    It is now widely recognized that effective communication is a crucial element in radiological/nuclear terrorism preparedness. Whereas in the past, communication and information issues were sometimes viewed as secondary in comparison with technical concerns, today the need to improve risk communication, public information, and emergency messaging is seen as a high priority. The process of improving radiological/nuclear terrorism risk communication can be conceptualized as occurring in four overlapping phases. The first phase involves the recognition that communication and information issues will be pivotal in shaping how a radiological/nuclear terrorism incident unfolds and in determining its outcome. This recognition has helped shape the second phase, in which various research initiatives have been undertaken to provide an empirical basis for improved communication. In the third and most recent phase, government agencies, professional organizations and others have worked to translate research findings into better messages and informational materials. Like the first and second phases, the third phase is still unfolding. The fourth phase in risk communication for radiological/nuclear terrorism-a mature phase-is only now just beginning. Central to this phase is a developing understanding that for radiological/nuclear terrorism risk communication to be fully effective, it must go beyond crafting better messages and materials (as essential as that may be). This emerging fourth phase seeks to anchor radiological/nuclear communication in a broader approach: one that actively engages and partners with the public. In this article, each of the four stages is discussed, and future directions for improving radiological/nuclear terrorism risk communication are explored.

  19. Potential for nuclear terrorism: a discussion

    International Nuclear Information System (INIS)

    Kellen, K.

    1987-01-01

    Because there has never been an incident of nuclear terrorism, the author is reduced to informed speculation. The past cannot be used to extrapolate into the future. For terrorists as for nations, the domain of nuclear attack represents are unprecedented quantum leap, one that groups think carefully about. Terrorists will consider many factors, including the public climate, because they are not psychotics operating in a vacuum (though groups may include psychotic individuals). Rather, they are people involved in a reciprocal political and psychological relationship with the rest of the world. In reaching some assessment of the potential for nuclear terrorism, there is an immense number of variables to deal with, beginning with the many types of terrorists and terrorism, including nuclear. They can, however, look at individual terrorist groups - a their compositions, capabilities, motivations, and modus operandi - and reach some conclusions. The author first looks at the possible forms nuclear terrorism might take and at the severity of the consequences. A strict distinction must be made between nuclear terrorism where nuclear things are the means (for example, a nuclear device) and nuclear terrorism where nuclear things are the target (for example, nuclear power stations), or where they are both such as a nuclear weapon thrown at a nuclear power station. 2 tables

  20. Cyber-Terrorism: Modem Mayhem

    National Research Council Canada - National Science Library

    White, Kenneth

    1998-01-01

    .... The arrival of the information age has created a new menace cyber terrorism. This threat recognizes no boundaries, requires minimal resources to mount an attack, and leaves no human footprint at ground zero...

  1. Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Hagan, Ross F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-29

    This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature.

  2. 75 FR 6678 - Agency Information Collection Activities: Customs and Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2010-02-10

    ... Activities: Customs and Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border... Terrorism (C-TPAT). This request for comment is being made pursuant to the Paperwork Reduction Act of 1995... Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract: The Customs and Trade...

  3. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  4. Terrorism in South Korea.

    Science.gov (United States)

    Wang, Soon Joo; Choi, Jin Tae; Arnold, Jeffrey

    2003-01-01

    South Korea has experienced > 30 suspected terrorism-related events since 1958, including attacks against South Korean citizens in foreign countries. The most common types of terrorism used have included bombings, shootings, hijackings, and kidnappings. Prior to 1990, North Korea was responsible for almost all terrorism-related events inside of South Korea, including multiple assassination attempts on its presidents, regular kidnappings of South Korean fisherman, and several high-profile bombings. Since 1990, most of the terrorist attacks against South Korean citizens have occurred abroad and have been related to the emerging worldwide pattern of terrorism by international terrorist organizations or deranged individuals. The 1988 Seoul Olympic Games provided a major stimulus for South Korea to develop a national emergency response system for terrorism-related events based on the participation of multiple ministries. The 11 September 2001 World Trade Center and Pentagon attacks and the 2001 United States of America (US) anthrax letter attacks prompted South Korea to organize a new national system of emergency response for terrorism-related events. The system is based on five divisions for the response to specific types of terrorist events, involving conventional terrorism, bioterrorism, chemical terrorism, radiological terrorism, and cyber-terrorism. No terrorism-related events occurred during the 2002 World Cup and Asian Games held in South Korea. The emergency management of terrorism-related events in South Korea is adapting to the changing risk of terrorism in the new century.

  5. Globalisation, Faith and Terrorism: Religious Opposition to Modern ...

    African Journals Online (AJOL)

    The world is now moving from secular wars to religious motivated wars, from conventional wars to unconventional wars, that is, terrorism. This new phenomenon has been fuelled by globalisation and the drive to turn the world into a single global village. At the local level, Nigeria has had its own share of religious motivated ...

  6. FATF in Combating the Financing of Terrorism

    Directory of Open Access Journals (Sweden)

    Kristina Slavikovna Melkumyan

    2014-01-01

    Full Text Available The article examines the FATF specific approach to the problem of terrorism financing. The FATF essence, content of the activity and influence levers are also analyzed within the article. It is shown that the FATF has reviewed the problem of terrorism financing in the broadest perspective, having engaged simultaneously and consistently mechanisms for combating money laundering and terrorism financing. The Task Force has greatly contributed to building of the world counter-terrorism financing system through forming the legal and institutional basis as well as through interaction with all the possible participants and actors of world politics in this area. Moreover, the FATF has succeeded in geographical expansion of the FATF influence from the original 16 to187 jurisdictions by promotion of FATF-style regional bodies establishment. Particular attention is drawn to the unique features of the FATF Recommendations in comparison with the earlier issued sources of international law, which define the international counter-terrorism financing regime. The author believes that one of the advantages of the FATF as an institute within the counter-terrorism financing system among others is the informal status of the FATF, which provides its flexibility and high ability to respond quickly and in a timely manner to evolving nature of money laundering and terrorism financing as well as emerging threats.

  7. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  8. Sharing Elderly Healthcare information on Cloud Computing

    OpenAIRE

    Lu, Fangjie; Khan, Israr

    2012-01-01

    Context: Due to rapid increase in the population of elderly people, sharing healthcare information has become an essential requirement for the development of e-health system. By conducting a research in e-health and cloud computing we have explored the advantages and disadvantages of sharing healthcare information for elderly people through cloud computing. Objectives: The main purpose of this research is to investigate the suitability of cloud computing to share healthcare information. The s...

  9. Sharing information among existing data sources

    Science.gov (United States)

    Ashley, W. R., III

    1999-01-01

    The sharing of information between law enforcement agencies is a premise for the success of all jurisdictions. A wealth of information resides in both the databases and infrastructures of local, state, and regional agencies. However, this information is often not available to the law enforcement professionals who require it. When the information is, available, individual investigators must not only know that it exists, but where it resides, and how to retrieve it. In many cases, these types of cross-jurisdictional communications are limited to personal relationships that result from telephone calls, faxes, and in some cases, e-mail. As criminal elements become more sophisticated and distributed, law enforcement agencies must begin to develop infrastructures and common sharing mechanisms that address a constantly evolving criminal threat. Historically, criminals have taken advantage of the lack of communication between law enforcement agencies. Examples of this are evident in the search for stolen property and monetary dealings. Pawned property, cash transactions, and failure to supply child support are three common cross- jurisdictional crimes that could be better enforced by strengthening the lines of communication. Criminal behavior demonstrates that it is easier to profit from their actions by dealing in separate jurisdictions. For example, stolen property is sold outside of the jurisdiction of its origin. In most cases, simply traveling a short distance to the adjoining county or municipality is sufficient to ensure that apprehension of the criminal or seizure of the stolen property is highly unlikely. In addition to the traditional burglar, fugitives often sell or pawn property to finance their continued evasion from the law. Sharing of information in a rapid manner would increase the ability of law enforcement personnel to track and capture fugitives, as well as criminals. In an example to combat this threat, the State of Florida recently acted on the need to

  10. Sharing and helping: predictors of adolescents' willingness to share diabetes personal health information with peers.

    Science.gov (United States)

    Vaala, Sarah E; Lee, Joyce M; Hood, Korey K; Mulvaney, Shelagh A

    2018-02-01

    Sharing personal information about type 1 diabetes (T1D) can help adolescents obtain social support, enhance social learning, and improve self-care. Diabetes technologies, online communities, and health interventions increasingly feature data-sharing components. This study examines factors underlying adolescents' willingness to share personal T1D information with peers. Participants were 134 adolescents (12-17 years of age; 56% female) who completed an online survey regarding experiences helping others with T1D, perceived social resources, beliefs about the value of sharing information and helping others, and willingness to share T1D information. Hemoglobin A1c values were obtained from medical records. Adolescents were more willing to share how they accomplished T1D tasks than how often they completed them, and least willing to share glucose control status. In multivariate analyses, sharing/helping beliefs (β = 0.26, P value; β = -0.26, P personal health information. Glucose control moderated relationships such that adolescents with worse A1c values had stronger relationships between sharing/helping beliefs and willingness to share (β = 0.18, P personal health information, particularly if they have better diabetes health status and a stronger belief in the benefits of sharing. Social learning and social media components may improve intervention participation, engagement, and outcomes by boosting adolescents' beliefs about the benefits of sharing information and helping others. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  11. A Taxonomy of Terror - About the Effect of Different Kinds of Terror on Risk Perceptions

    OpenAIRE

    Wolff, Katharina; Larsen, Svein

    2016-01-01

    Terrorism is an increasing problem; still, research systematically investigating the impact of varying kinds of terrorism is scarce. The present investigation uses hypothetical scenarios to look at effects of diverging sorts of terrorism on risk perceptions in a student- and a tourist sample. Two characteristics of terrorism were varied systematically: frequency (whether terrorism hits a destination where terrorism is frequent or infrequent) and degree of organization (whether terrorism is co...

  12. A new international convention against terrorism: the International Convention for the Suppression of Acts of Nuclear Terrorism. Full text in French, English and Spanish. Introduction to the main elements of the convention

    International Nuclear Information System (INIS)

    Laborde, Jean-Paul; )

    2005-01-01

    The International Convention for the Suppression of Acts of Nuclear Terrorism is a 2005 United Nations treaty designed to criminalize acts of nuclear terrorism and to promote police and judicial cooperation to prevent, investigate and punish those acts. As of September 2016, the convention has 115 signatories and 106 state parties, including the nuclear powers China, France, India, Russia, the United Kingdom, and the United States. The Convention covers a broad range of acts and possible targets, including nuclear power plants and nuclear reactors; covers threats and attempts to commit such crimes or to participate in them, as an accomplice; stipulates that offenders shall be either extradited or prosecuted; encourages States to cooperate in preventing terrorist attacks by sharing information and assisting each other in connection with criminal investigations and extradition proceedings; and, deals with both crisis situations, assisting States to solve the situations and post-crisis situations by rendering nuclear material safe through the International Atomic Energy Agency (IAEA)

  13. Global games with noisy sharing of information

    KAUST Repository

    Touri, Behrouz; Shamma, Jeff S.

    2014-01-01

    We provide a framework for the study of global games with noisy sharing of information. In contrast to the previous works where it is shown that an intuitive threshold policy is an equilibrium for such games, we show that noisy sharing of information leads to non-existence of such an equilibrium. We also investigate the group best-response dynamics of two groups of agents sharing the same information to threshold policies based on each group's observation and show the convergence of such dynamics.

  14. System Dynamics Modeling for Supply Chain Information Sharing

    Science.gov (United States)

    Feng, Yang

    In this paper, we try to use the method of system dynamics to model supply chain information sharing. Firstly, we determine the model boundaries, establish system dynamics model of supply chain before information sharing, analyze the model's simulation results under different changed parameters and suggest improvement proposal. Then, we establish system dynamics model of supply chain information sharing and make comparison and analysis on the two model's simulation results, to show the importance of information sharing in supply chain management. We wish that all these simulations would provide scientific supports for enterprise decision-making.

  15. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  16. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    phenomenon. This Research Paper, by contrast, considers another source of data that could inform this analysis, namely the financial intelligence (FININT generated by the huge quantities of transaction data gathered by the financial-services industry as it processes bank transfers, ATM withdrawals and credit-card transactions. It asks what barriers exist to greater partnership and information sharing between the security authorities and the financial-services industry in tackling terrorism. And whether, within the parameters of acceptable data-privacy restrictions, an intelligent and intelligence-led relationship between the security authorities and the financial-services industry could provide greater and more timely insight into which individuals are travelling to Syria or are already in-country, and (perhaps most importantly who, having been exposed to the extremist ideology espoused by groups such Daesh, has returned home. The lack of partnership and information sharing between the public and private sectors is dramatically hindering the valuable role banks could play in assisting in disrupting terrorism. Advances in technology and transaction-monitoring systems have immeasurably improved the capabilities of banks and other financial institutions, such as large-scale remittance companies, to play the front-line role that is required of them by the authorities. The security threat posed by FTFs – and the apparent struggle faced by national security authorities in identifying and tracking such individuals – provides an ideal and timely platform from which to discuss the role that banks can play in countering terrorist threats, which requires urgent re-evaluation and enhancement. The FTF phenomenon has caught security authorities across the globe off guard. Authorities in many Western capitals only awoke, belatedly, to the threat once many hundreds of their citizens had made the journey to Syria and had begun openly to promote their actions via social media. Significant

  17. Information Sharing and Channel Construction of Supply Chain under Asymmetric Demand Information

    Directory of Open Access Journals (Sweden)

    Guangdong Wu

    2014-01-01

    Full Text Available Information sharing and marketing channel building have become an important problem of supply chain management theory and practice. The research of information sharing focused on traditional channel of supply chain between upstream and downstream enterprises; however, the research ignores the behavior of information sharing with potential entrants and composite structure characteristics about traditional marketing channel with the direct channel. This paper uses the model to research the effects brought about sharing demand information with potential entrants and building marketing channel, which reveals information sharing and channel building mechanism in the supply chain. The study found that the five-force model of Porter regards potential entrants only as a threat that is one-sided. When the channel competitiveness meets certain conditions, manufacturer and retailer will share demand information with potential entrants. Building composite marketing channel is the manufacturer's absolute dominant strategy. Channel construction will increase the entry barriers for potential entrants and weaken the effect of double marginalization; meanwhile, the performance of supply chain will be augmented.

  18. Global games with noisy sharing of information

    KAUST Repository

    Touri, Behrouz

    2014-12-15

    We provide a framework for the study of global games with noisy sharing of information. In contrast to the previous works where it is shown that an intuitive threshold policy is an equilibrium for such games, we show that noisy sharing of information leads to non-existence of such an equilibrium. We also investigate the group best-response dynamics of two groups of agents sharing the same information to threshold policies based on each group\\'s observation and show the convergence of such dynamics.

  19. Terrorism as Communication.

    Science.gov (United States)

    Decker, Warren; Rainey, Daniel

    Terrorism has become not merely a political act, but a carefully designed and rhetorically sophisticated attempt at communication. What role should the communication scholar play in the investigation of terrorism? Specifically, there are six areas within which the communication scholar may actively contribute to an understanding of terrorism as…

  20. Information Sharing and Information Acqusition in Credit Markets

    NARCIS (Netherlands)

    Karapetyan, A.; Stacescu, B.

    2009-01-01

    Since information asymmetries have been identified as an important source of bank profits, it may seem that the establishment of information sharing arrangements such as credit registers and bureaus will lead to lower investment in acquiring information. However, banks base their decisions on both

  1. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  2. Issue in Information Sharing of Halal Food Supply Chain

    Directory of Open Access Journals (Sweden)

    Masrom Nor Ratna

    2017-01-01

    Full Text Available Information sharing serves as an essential approach for the companies and antecedents of supply chain integration. Nowadays, with the highly competitive in halal food market, information sharing has become more conceivable. Furthermore, information sharing in supply chains has become more efficient by having meaningful relationship with the members of halal supply chain. There is a lack information regarding information shared within members in halal food supply chain literature. The information needed in order to shed the light of how companies nowadays can be more competitive. The purpose of this study is to investigate to what extent the information can be shared among the members of the halal food supply chain. This study elaborates the barriers of information sharing leading to enhanced supply chain integration among enterprises, as a result. The interview with four managers from halal certified food manufactures has been deployed to get rich data about the information sharing. The finding shows that most of cases halal certified food manufacturers has low communication with their suppliers. Trust is the key enablers within the members of halal food supply chain.

  3. Understanding Contemporary Terrorism.

    Science.gov (United States)

    Mitchell, Thomas H.

    1989-01-01

    Discusses the issue of terrorism as it exists today and examines progress that has been made toward understanding its dimensions. Suggests how this subject can be explored in the classroom. Dispels misconceptions about terrorism by defining the term, and examines some causes of terrorism and strategies employed by terrorists. (KO)

  4. Terrorism Research Centres: 100 Institutes, Programs and Organisations in the Field of Terrorism, Counter-Terrorism, Radicalisation and Asymmetric Warfare Studies

    Directory of Open Access Journals (Sweden)

    Benjamin Freedman

    2010-12-01

    Full Text Available Who is doing research – academic and otherwise – on terrorism? The field of terrorism research is broad and ever-expanding. Governments sponsor intelligence-driven analytical research agencies. Commercial intelligence firms like Jane’s, sell their research to corporate and governmental clients. There are think tanks likeRAND, which work closely with government agencies. An increasing number of universities house terrorism research centres, the oldest one being the Centre for the Study of Terrorism and Political Violence at the University of St. Andrews. Then there are virtual networks, such as the Terrorism Research Initiative (TRI, that try to create synergies between a wide array of researchers and topics.

  5. Contracting and Information Sharing Under Supply Chain Competition

    OpenAIRE

    Albert Y. Ha; Shilu Tong

    2008-01-01

    We investigate contracting and information sharing in two competing supply chains, each consisting of one manufacturer and one retailer. The two supply chains are identical, except they may have different investment costs for information sharing. The problem is studied using a two-stage game. In the first stage, the manufacturers decide whether to invest in information sharing. In the second stage, given the information structure created in the first stage, the manufacturers offer contracts t...

  6. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  7. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  8. Terrorism and its centuries challenges

    Directory of Open Access Journals (Sweden)

    Jonida Drogu

    2018-03-01

    Full Text Available The goal of this article is to portray how to better understand the epistemic differences of terminology used for terrorism and how people’s lives have been and are still affected by this undefined violence. By collecting some diary information from 20people about their perception about terrorism attaches we will analyze some of overall countries and Saudi Arabia’s commitment in fighting this century’s challenge. Fighting radical religious beliefs in the Kingdom is an immense challenge. The true Islamic faith is in large contrast to those individuals and entities whose actions are centered on the intentional misrepresentation or the degradation of the teachings of Islam. The base of this data will indicate the progress within Saudi Arabia, its position in the world prospect and its impact in society since it remains a robust construction even now days, even thought, a lot has been done. The first signs provided in this analysis start with the beginning of the new century, when a strong attack happened just days before it began. Some important indicators such as terrorism founding, or money charities caused many changes in Saudi Arabia as a leading power, in the war against terrorism in Middle East.

  9. Privacy Protection Standards for the Information Sharing Environment

    Science.gov (United States)

    2009-09-01

    enable ISE participants to share information and data (see ISE Implementation Plan, p. 51, ISE Enterprise Architecture Framework, pp. 67, 73–74 and...of frontiers. This article shall not prevent States from requiring the licensing of broadcasting, television or cinema enterprises. 2. The exercise...5 U.S.C. § 552a, as amended. Program Manager-Information Sharing Environment. (2008). Information Sharing Enterprise Architecture Framework

  10. Containing Terrorism: A Dynamic Model

    Directory of Open Access Journals (Sweden)

    Giti Zahedzadeh

    2017-06-01

    Full Text Available The strategic interplay between counterterror measures and terror activity is complex. Herein, we propose a dynamic model to depict this interaction. The model generates stylized prognoses: (i under conditions of inefficient counterterror measures, terror groups enjoy longer period of activity but only if recruitment into terror groups remains low; high recruitment shortens the period of terror activity (ii highly efficient counterterror measures effectively contain terror activity, but only if recruitment remains low. Thus, highly efficient counterterror measures can effectively contain terrorism if recruitment remains restrained. We conclude that the trajectory of the dynamics between counterterror measures and terror activity is heavily altered by recruitment.

  11. How terrorism news reports increase prejudice against outgroups: A terror management account

    NARCIS (Netherlands)

    Das, E.; Bushman, B.J.; Bezemer, M.D.; Kerkhof, P.; Vermeulen, I.E.

    2009-01-01

    Three studies tested predictions derived from terror management theory (TMT) about the effects of terrorism news on prejudice. Exposure to terrorism news should confront receivers with thoughts about their own death, which, in turn, should increase prejudice toward outgroup members. Non-Muslim

  12. Information Sharing and Channel Construction of Supply Chain under Asymmetric Demand Information

    OpenAIRE

    Wu, Guangdong; Kong, Qingshan; Shi, Jian-gang; Karimi, Hamid Reza; Zhang, Wei

    2014-01-01

    Information sharing and marketing channel building have become an important problem of supply chain management theory and practice. The research of information sharing focused on traditional channel of supply chain between upstream and downstream enterprises; however, the research ignores the behavior of information sharing with potential entrants and composite structure characteristics about traditional marketing channel with the direct channel. This paper uses the model to research the eff...

  13. Defining Terrorism.

    Science.gov (United States)

    Hoffman, Bruce

    1986-01-01

    Notes the lack of a concise meaning for the word terrorism. Develops a working definition which states that terrorism is the deliberate creation and exploitation of fear through violence or the threat of violence in the attainment of political objectives. (JDH)

  14. Terrorism as a process: a critical review of Moghaddam's "Staircase to Terrorism".

    Science.gov (United States)

    Lygre, Ragnhild B; Eid, Jarle; Larsson, Gerry; Ranstorp, Magnus

    2011-12-01

    This study reviews empirical evidence for Moghaddam's model "Staircase to Terrorism," which portrays terrorism as a process of six consecutive steps culminating in terrorism. An extensive literature search, where 2,564 publications on terrorism were screened, resulted in 38 articles which were subject to further analysis. The results showed that while most of the theories and processes linked to Moghaddam's model are supported by empirical evidence, the proposed transitions between the different steps are not. These results may question the validity of a linear stepwise model and may suggest that a combination of mechanisms/factors could combine in different ways to produce terrorism. © 2011 The Authors. Scandinavian Journal of Psychology © 2011 The Scandinavian Psychological Associations.

  15. Informal milk sharing: what nurses need to know.

    Science.gov (United States)

    Martino, Kimberly; Spatz, Diane

    2014-01-01

    Human milk is the ideal food for human infants. However, some infants will be in situations wherein there is insufficient human milk to meet their needs. This article addresses formal breast milk donation (donor milk) and informal sharing of breast milk. Healthcare providers are likely to encounter families who access milk by informal breast milk sharing or cross-nursing. Both practices rely heavily on receiving human milk from women who are potentially unscreened for disease, medication, and illicit substances. Therefore, it is important for perinatal nurses to have adequate information to be able to inform these families of the risks and benefits of breast milk sharing. Two case exemplars are provided to illustrate the nuances of informal milk sharing. Implications for practice include providing families with information on health history and laboratory screening as well as safe milk-handling practices.

  16. Exploring a social network for sharing information about pain.

    Science.gov (United States)

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  17. Nuclear Terrorism and its Confrontation

    International Nuclear Information System (INIS)

    Al Barody, M.M.

    2006-01-01

    The whole world first knew nuclear terrorism during the second world war through the use of excessive violence that to terror exercised by one country against another, as was carried out by USA when it exploded two nuclear bombs over Hiroshima and Nagasaki t the end of the war. there are numerous types of nuclear terrorism that can be performed by individuals or organized groups for achieving political or social objectives. the definition of the term t errorism i s correlated with u sing means capable of creating a case of public dnger . that property exists in all types of direct or indirect nuclear terrorism . the present study is divided into two chapters. Chapter one deals with nuclear terrorism and consists of two sections , the first deals with the identification of the nature of nuclear terrorism an the second deals with organize nuclear terrorism on the international level. Chapter two deals with the confrontation of nuclear terrorism in two sections. the first deals with the role of the state in combating against nuclear terrorism nd the second deals with combating against nuclear terrorism on the international level. while internally it is confronted through promulgation of legislations that deal with the protection against nuclear terrorism as well as the national legal instruments for protection of nuclear materials and installation and combating illicit trafficking of nuclear materials, confrontation of nuclear terrorism on the international level is carried out through the promulgation of international convention such as that on suppression of actions of nuclear terrorism which shall be opened for signature on sept.14 -2005 according to the recommendation the general assembly of the united nations in its 59 t h session

  18. Discussion on the nuclear information resources co-constructing and sharing under network information

    International Nuclear Information System (INIS)

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  19. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    Directory of Open Access Journals (Sweden)

    Chao-Chen Lin

    2017-10-01

    Full Text Available This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on terrorism and face the danger from it.

  20. Enabling information sharing in a port

    DEFF Research Database (Denmark)

    Olesen, Peter Bjerg; Hvolby, Hans-Henrik; Dukovska-Popovska, Iskra

    2012-01-01

    Ports are integral parts of many supply chains and are as such a contributing factor to the overall efficiency of the supply chain. Ports are also dynamic entities where things changes continuously. The dynamic nature of ports is also a problem when trying to optimise the utilisation of resources...... and ensure a low lead-time. Information sharing is a very important tool to reduce the effect of dynamism. This paper attempts to explain how information sharing is enabled in such an environment, and which considerations are relevant, both in regards to the information and required technology. The paper...

  1. The Value of Sharing Information: A Neural Account of Information Transmission.

    Science.gov (United States)

    Baek, Elisa C; Scholz, Christin; O'Donnell, Matthew Brook; Falk, Emily B

    2017-07-01

    Humans routinely share information with one another. What drives this behavior? We used neuroimaging to test an account of information selection and sharing that emphasizes inherent reward in self-reflection and connecting with other people. Participants underwent functional MRI while they considered personally reading and sharing New York Times articles. Activity in neural regions involved in positive valuation, self-related processing, and taking the perspective of others was significantly associated with decisions to select and share articles, and scaled with preferences to do so. Activity in all three sets of regions was greater when participants considered sharing articles with other people rather than selecting articles to read themselves. The findings suggest that people may consider value not only to themselves but also to others even when selecting news articles to consume personally. Further, sharing heightens activity in these pathways, in line with our proposal that humans derive value from self-reflection and connecting to others via sharing.

  2. Affording to exchange: social capital and online information sharing.

    Science.gov (United States)

    Maksl, Adam; Young, Rachel

    2013-08-01

    The potential harm and benefit associated with sharing personal information online is a topic of debate and discussion. Using survey methods (n=872), we explore whether attainment of social capital online relates to greater comfort with sharing personal information. We found that perceptions of bridging and bonding social capital earned from using Facebook are significant predictors of overall comfort levels with sharing personal information. This research raises timely questions about how the perceived benefits of social networking sites influence how personal information is shared online.

  3. Terrorism as Media Event

    Directory of Open Access Journals (Sweden)

    2012-07-01

    Full Text Available Proving that terrorism should be seen as a media event (as defined by Dayan and Katzafter 9/11 and treated accordingly. We have turned to the work of Dayan and Katz and GeorgeGerbner’s for a definition of media events and of violence in the mass media. This paper is ahermeneutical interpretation of the concept of terrorism and its relation to communication. We haveput forward a better understanding of the complex concept of terrorism and its definitions in the massmedia context. Terrorism nowadays should always be defined within its inherent relation with themedia. The article is the first to define terrorism as media evenit in Dayan and Katz’s terms.

  4. Optimal Physical Protection against Nuclear Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Doyoung; Kim, ChangLak [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2014-10-15

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  5. Optimal Physical Protection against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Lee, Doyoung; Kim, ChangLak

    2014-01-01

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  6. Out from under the rock: improving FDNY information sharing

    Science.gov (United States)

    2017-03-01

    54 Ibid., 6. 55 Michael R. Bloomberg, Nicholas Scoppetta, and Salvatore J. Cassano, Terrorism and Disaster Preparedness Strategy (New York...98 Gilley, Gilley, and Godek, “Change, Resistance, and the Organizational Immune System,” 9. 99 David K. Tan , “Rescue Task Force Is Best...Bloomberg, Michael R., Nicholas Scoppetta, and Salvatore J. Cassano. Terrorism and Disaster Preparedness Strategy. New York: FDYN, 2007. http

  7. 31 CFR 594.311 - Terrorism.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism. 594.311 Section 594.311... ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.311 Terrorism. The term terrorism means an activity that: (a) Involves a violent act or an act...

  8. Updates in the War against Terrorism.

    Science.gov (United States)

    Strickland, Lee S.

    2002-01-01

    Provides an update of new court cases related to Part IV of the series on Information and the War Against Terrorism. Discusses civil liberties versus security involving the legality of mandatory commercial use of biometrics as identification; and communication of privileged information between a person and his or her attorney. (LRW)

  9. Online Information Sharing About Risks: The Case of Organic Food.

    Science.gov (United States)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-03-23

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic food products. An online survey among 535 respondents was conducted in the Netherlands to examine the determinants of information sharing behavior, and their relationships. Structural equation modeling was applied to test both the measurement model and the structural model. Results showed that the intention to share information online about the risks of organic food was low. Conversations and email were the preferred channels to share information; of the social media Facebook stood out. The developed model was found to provide an adequate description of the data. It explained 41% of the variance in information sharing. Injunctive norms and outcome expectancies were most important in predicting online information sharing, followed by information-related determinants. Risk-perception-related determinants showed a significant, but weak, positive relationship with online information sharing. Implications for authorities communicating on risks associated with food are addressed. © 2018 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  10. On Welfare and Terror: Social Welfare Policies and Political-Economic Roots of Terrorism

    Science.gov (United States)

    Burgoon, Brian

    2006-01-01

    This article argues that social welfare policies may reduce international and domestic terrorism. Social policies likely affect terrorism in offsetting ways but, on balance, should diminish preferences for terrorism by reducing economic insecurity, inequality, poverty, and religious-political extremism. Thus, countries with more generous welfare…

  11. Counter-Terrorism, Technology and Transparency: Reconsidering State Accountability

    Directory of Open Access Journals (Sweden)

    Quirine Eijkman

    2012-02-01

    Full Text Available In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal information, biometrics, satellite technology and other forms of ICT technology used in the fight against terrorism. Although technology is a powerful tool to fight terrorism, it is also a means for increasing social control by the state. Henceforth, there is a risk that panoptic surveillance – where the few view the many – could develop. Therefore accountability in relation to use of technological counter-terrorism measures such as smart surveillance cameras, biometric devices or the tracking of personal data is discussed in this article. The extra powers that both public authorities and private companies gain through new (surveillance technologies should be counterbalanced. In this context the role of the state, because of its monopoly to use force and its duty to protect the rule of law, is crucial. By reconsidering how to enforce accountability by the state, the effects of technological counter-terrorism measures could be checked and balanced.

  12. Maximizing Intelligence Sharing Within the Los Angeles Police Department

    Science.gov (United States)

    2013-09-01

    terrorism-even suicide terrorism-are a little different from those that conventional criminals displays” (2008, p. 21). If LAPD is going to be a leader in...was, was being waged by an army of music sharing teens , college students and IPod carrying businessmen” (Brackman & Beckstrom, 2006, pp. 5–7). On...millions from starvation and reverse a crippling depression . But FDR’s government, like our own today, was too centralized to respond quickly to the

  13. Sharing health information online in South Korea: motives, topics, and antecedents.

    Science.gov (United States)

    Kye, S Y; Shim, M; Kim, Y C; Park, K

    2017-10-11

    This study aimed to examine the motives, topics and antecedents for sharing health information online among Korean Internet users. Eight hundred adults completed a web-based survey exploring the motives; topics; physical, cognitive, affective and environmental factors; and experiences relating to sharing health information online. The motives for not sharing information included information absence and inappropriateness. The most preferred topic was disease. Good subjective health was significantly associated with frequent information sharing while individuals with a history of disease involving themselves or family members were more likely to share health information than were those without such a history. Further, a higher level of depressed mood was related to a higher level of sharing. Internet-related self-efficacy and trust in information delivery channels were positively related to sharing. Future research could extend the factors related to information sharing to include the evaluation of shared information. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. [Terrorism, public health and health services].

    Science.gov (United States)

    Arcos González, Pedro; Castro Delgado, Rafael; Cuartas Alvarez, Tatiana; Pérez-Berrocal Alonso, Jorge

    2009-01-01

    Today the terrorism is a problem of global distribution and increasing interest for the international public health. The terrorism related violence affects the public health and the health care services in an important way and in different scopes, among them, increase mortality, morbidity and disability, generates a context of fear and anxiety that makes the psychopathological diseases very frequent, seriously alters the operation of the health care services and produces important social, political and economic damages. These effects are, in addition, especially intense when the phenomenon takes place on a chronic way in a community. The objective of this paper is to examine the relation between terrorism and public health, focusing on its effects on public health and the health care services, as well as to examine the possible frames to face the terrorism as a public health concern, with special reference to the situation in Spain. To face this problem, both the public health systems and the health care services, would have to especially adapt their approaches and operational methods in six high-priority areas related to: (1) the coordination between the different health and non health emergency response agencies; (2) the reinforcement of the epidemiological surveillance systems; (3) the improvement of the capacities of the public health laboratories and response emergency care systems to specific types of terrorism as the chemical or biological terrorism; (3) the mental health services; (4) the planning and coordination of the emergency response of the health services; (5) the relations with the population and mass media and, finally; (6) a greater transparency in the diffusion of the information and a greater degree of analysis of the carried out health actions in the scope of the emergency response.

  15. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    OpenAIRE

    Chao-Chen Lin

    2017-01-01

    This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on te...

  16. Epidemiology of terror-related versus non-terror-related traumatic injury in children.

    Science.gov (United States)

    Aharonson-Daniel, Limor; Waisman, Yehezkel; Dannon, Yehuda L; Peleg, Kobi

    2003-10-01

    In the past 2 years hundreds of children in Israel have been injured in terrorist attacks. There is a paucity of data on the epidemiology of terror-related trauma in the pediatric population and its effect on the health care system. The objective of this study was to review the accumulated Israeli experience with medical care to young victims of terrorism and to use the knowledge obtained to contribute to the preparedness of medical personnel for future events. Data on all patients who were younger than 18 years and were hospitalized from October 1, 2000, to December 31, 2001, for injuries sustained in a terrorist attack were obtained from the Israel National Trauma Registry. The parameters evaluated were patient age and sex, diagnosis, type, mechanism and severity of injury, interhospital transfer, stay in intensive care unit, duration of hospitalization, and need for rehabilitation. Findings were compared with the general pediatric population hospitalized for non-terror-related trauma within the same time period. During the study period, 138 children were hospitalized for a terror-related injury and 8363 for a non-terror-related injury. The study group was significantly older (mean age: 12.3 years [standard deviation: 5.1] v 6.9 years [standard deviation: 5.3]) and sustained proportionately more penetrating injuries (54% [n = 74] vs 9% [n = 725]). Differences were also noted in the proportion of internal injuries to the torso (11% in the patients with terror-related trauma vs 4% in those with non-terror-related injuries), open wounds to the head (13% vs 6%), and critical injuries (Injury Severity Score of 25+; 25% vs 3%). The study group showed greater use of intensive care unit facilities (33% vs 8% in the comparison group), longer median hospitalization time (5 days vs 2 days), and greater need for rehabilitative care (17% vs 1%). Terror-related injuries are more severe than non-terror-related injuries and increase the demand for acute care in children.

  17. Count Your Calories and Share Them: Health Benefits of Sharing mHealth Information on Social Networking Sites.

    Science.gov (United States)

    Oeldorf-Hirsch, Anne; High, Andrew C; Christensen, John L

    2018-04-23

    This study investigates the relationship between sharing tracked mobile health (mHealth) information online, supportive communication, feedback, and health behavior. Based on the Integrated Theory of mHealth, our model asserts that sharing tracked health information on social networking sites benefits users' perceptions of their health because of the supportive communication they gain from members of their online social networks and that the amount of feedback people receive moderates these associations. Users of mHealth apps (N = 511) completed an online survey, and results revealed that both sharing tracked health information and receiving feedback from an online social network were positively associated with supportive communication. Network support both corresponded with improved health behavior and mediated the association between sharing health information and users' health behavior. As users received greater amounts of feedback from their online social networks, however, the association between sharing tracked health information and health behavior decreased. Theoretical implications for sharing tracked health information and practical implications for using mHealth apps are discussed.

  18. Overview of DOE-NE Proliferation and Terrorism Risk Assessment

    International Nuclear Information System (INIS)

    Sadasivan, Pratap

    2012-01-01

    Research objectives are: (1) Develop technologies and other solutions that can improve the reliability, sustain the safety, and extend the life of current reactors; (2) Develop improvements in the affordability of new reactors to enable nuclear energy; (3) Develop Sustainable Nuclear Fuel Cycles; and (4) Understand and minimize the risks of nuclear proliferation and terrorism. The goal is to enable the use of risk information to inform NE R and D program planning. The PTRA program supports DOE-NE's goal of using risk information to inform R and D program planning. The FY12 PTRA program is focused on terrorism risk. The program includes a mix of innovative methods that support the general practice of risk assessments, and selected applications.

  19. Terrorism and Investigation Strategies

    OpenAIRE

    Muhammad Mustofa

    2005-01-01

    This paper discussed that, for successful implementation of the strategies in investigating terrorism, besides requiring professional skilled investigators, there are some additional requirements that need to be fulfilled. Effective and long term prevention of terrorism should be directed towards producing good social welfare and to minimize every condition that may be conducive to the emergence of terrorism, such as discrimination and marginalization.

  20. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  1. Behavioural aspects of terrorism.

    Science.gov (United States)

    Leistedt, Samuel J

    2013-05-10

    Behavioural and social sciences are useful in collecting and analysing intelligence data, understanding terrorism, and developing strategies to combat terrorism. This article aims to examine the psychopathological concepts of terrorism and discusses the developing roles for behavioural scientists. A systematic review was conducted of studies investigating behavioural aspects of terrorism. These studies were identified by a systematic search of databases, textbooks, and a supplementary manual search of references. Several fundamental concepts were identified that continue to influence the motives and the majority of the behaviours of those who support or engage in this kind of specific violence. Regardless of the psychological aspects and new roles for psychiatrists, the behavioural sciences will continue to be called upon to assist in developing better methods to gather and analyse intelligence, to understand terrorism, and perhaps to stem the radicalisation process. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  2. Effect of information sharing on research and teaching activities of ...

    African Journals Online (AJOL)

    This study was designed to determine the effect of Information sharing on research and teaching activities of Academic Scientists in Federal Universities in the North- East Nigeria. Investigation was done on the activities of information sharing and the effect of information sharing on teaching and research activities. Survey ...

  3. Hidden profiles and concealed information: strategic information sharing and use in group decision making.

    Science.gov (United States)

    Toma, Claudia; Butera, Fabrizio

    2009-06-01

    Two experiments investigated the differential impact of cooperation and competition on strategic information sharing and use in a three-person group decision-making task. Information was distributed in order to create a hidden profile so that disconfirmation of group members' initial preferences was required to solve the task. Experiment 1 revealed that competition, compared to cooperation, led group members to withhold unshared information, a difference that was not significant for shared information. In competition, compared to cooperation, group members were also more reluctant to disconfirm their initial preferences. Decision quality was lower in competition than in cooperation, this effect being mediated by disconfirmation use and not by information sharing. Experiment 2 replicated these findings and revealed the role of mistrust in predicting strategic information sharing and use in competition. These results support a motivated information processing approach of group decision making.

  4. Security Investment, Hacking, and Information Sharing between Firms and between Hackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2017-05-01

    Full Text Available A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker receives less information, and mixed motives may exist between information sharing and own reputation gain. The second hacker’s attack is deterred by the first hacker’s reputation gain. Increasing information sharing effectiveness causes firms to substitute from defense to information sharing, which also increases in the firms’ unit defense cost, decreases in each firm’s unit cost of own information leakage, and increases in the unit benefit of joint leakage. Increasing interdependence between firms causes more information sharing between hackers caused by larger aggregate attacks, which firms should be conscious about. We consider three corner solutions. First and second, the firms deter disadvantaged hackers. When the second hacker is deterred, the first hacker does not share information. Third, the first hacker shares a maximum amount of information when certain conditions are met. Policy and managerial implications are provided for how firms should defend against hackers with various characteristics.

  5. Sharing is caring, but not error free: transparency of granular controls for sharing personal health information in social networks.

    Science.gov (United States)

    Hartzler, Andrea; Skeels, Meredith M; Mukai, Marlee; Powell, Christopher; Klasnja, Predrag; Pratt, Wanda

    2011-01-01

    When patients share personal health information with family and friends, their social networks become better equipped to help them through serious health situations. Thus, patients need tools that enable granular control over what personal health information is shared and with whom within social networks. Yet, we know little about how well such tools support patients' complex sharing needs. We report on a lab study in which we examined the transparency of sharing interfaces that display an overview and details of information sharing with network connections in an internet-based personal health information management tool called HealthWeaver. Although participants found the interfaces easy to use and were highly confident in their interpretation of the sharing controls, several participants made errors in determining what information was shared with whom. Our findings point to the critical importance of future work that examines design of usable interfaces that offer transparent granularity in support of patients' complex information sharing practices.

  6. The Reality Of The Homeland Security Enterprise Information Sharing Environment

    Science.gov (United States)

    2017-12-01

    Related Information to Protect the Homeland (GAO 15- 290) (Washington, DC: U.S. Government Accountability Office, 2015), http://www.gao.gov/ assets...Government Accountability Office [GAO], Information Sharing Environment Better Road Map Needed to Guide Implementation and Investments (GAO-11-455...and its ISE PM would have clearer accountability for information sharing lapses and a faster ability to reform or develop domestic information -sharing

  7. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  8. Fighting terrorism in Africa: Benchmarking policy harmonization

    Science.gov (United States)

    Asongu, Simplice A.; Tchamyou, Vanessa S.; Minkoua N., Jules R.; Asongu, Ndemaze; Tchamyou, Nina P.

    2018-02-01

    This study assesses the feasibility of policy harmonization in the fight against terrorism in 53 African countries with data for the period 1980-2012. Four terrorism variables are used, namely: domestic, transnational, unclear and total terrorism dynamics. The empirical evidence is based on absolute beta catch-up and sigma convergence estimation techniques. There is substantial absence of catch-up. The lowest rate of convergence in terrorism is in landlocked countries for regressions pertaining to unclear terrorism (3.43% per annum for 174.9 years) while the highest rate of convergence is in upper-middle-income countries in domestic terrorism regressions (15.33% per annum for 39.13 years). After comparing results from the two estimation techniques, it is apparent that in the contemporary era, countries with low levels of terrorism are not catching-up their counterparts with high levels of terrorism. As a policy implication, whereas some common policies may be feasibly adopted for the fight against terrorism, the findings based on the last periodic phase (2004-2012) are indicative that country-specific policies would better pay-off in the fight against terrorism than blanket common policies. Some suggestions of measures in fighting transnational terrorism have been discussed in the light of an anticipated surge in cross-national terrorism incidences in the coming years.

  9. Mass media as an Effective Tool for Prevention of Socio-psychological Factors in the Development of Terrorism

    Directory of Open Access Journals (Sweden)

    Yuri P. Zinchenko

    2009-01-01

    Full Text Available Recently mass media play crucial role in social counterterrorism activity. The article is devoted to analysis of possibilities of mass media in prevention of the development of terrorism. Socio-psychological factors of development of terrorism, including concept of “contributing events” as well as hypothesis “frustration-aggression” are studied. The psychological component of terrorism in three major attitudes is considered in the article: psychology of terrorism, psychology of counteraction to terrorism, and using mass media for prevention the development of terrorism. Specific features and the external factors promoting involving into terrorism are analysed. Role of mass media in covering the information about terrorism events is analysed from point of view related to prevention of development of terrorism. Some key recommendations on counterterrorism activity using mass media means are formulated.

  10. Workplace Preparedness for Terrorism

    National Research Council Canada - National Science Library

    Ursano, Robert J

    2006-01-01

    Comprehensive workplace preparedness for terrorism must address and integrate the psychological and behavioral aspects of terrorism preparedness and response in order to address issues of human continuity...

  11. Socioconomic nature of terrorism

    Directory of Open Access Journals (Sweden)

    Valeriy Petrovich Chichkanov

    2013-12-01

    Full Text Available In the article, the theoretical and methodological foundations of investigation of the  socioeconomic nature of terrorism are considered. Hypothesis of research is the existence of methodological criteria of territory classification on the basis of external and internal terrorism. On the basis of the analysis of theoretical works of national and foreign authors, normative documents of state and international level the genesis of approaches to the understanding of the essence of modern terrorism, its contents, the subject-object relations and manifestation forms is received. As the result, according to the authors’ definition “terrorism” is understood as an ideology connected with deliberate violence or threats against the civilian population or property to influence on the government or the interstate organizations. In the work, the factors of development and spreading of terrorism in the Russian Federation’s regions are allocated and quantitatively proved. Weight parameters of the specified factors are determined. The methodological differentiation of the specified factors on factors of terrorism external (attacks from the outside and an internal form (distribution and realization of radical ideas within the region in the territory is the distinctive feature of the conducted research. During the research, the cluster analysis of a region is carried out to distribute of Russia’s regions according to the typological characteristic of the region of internal and external terrorism. The obtained data are verified in accordance with empirical data, the hypothesis of the existence of methodological criteria of the region classification on the basis of external and internal terrorism is proved.

  12. Anti-Romani Terrorism in Europe

    Directory of Open Access Journals (Sweden)

    Mareš Miroslav

    2016-12-01

    Full Text Available This article analyzes terrorism against the Roma in Europe. It identifies acts of terrorism in violence that targets the largest stateless nation on the continent and categorizes this terrorism according to current research methods. Focusing on events in both Western and Eastern Europe, the article analyses and compares the most significant terrorist acts against the Roma of recent years. It concludes that anti-Romani terrorism is heterogeneous in terms of tactics, strategies, and ideological justification, yet can usually be subsumed into the broadly conceived category of far-right terrorism. The variety of attacks suggests that terrorist acts are an offshoot of the broad spectrum of anti-Romani activity, and are influenced by contemporary trends in inter-ethnic violence.

  13. Modern terrorism: concept and approach analysis

    OpenAIRE

    CHAIKA ALEXANDER VIKTOROVICH

    2015-01-01

    The problem of modern terrorism as an image of counterculture environment is considered. The analysis of concepts and approaches of foreign and native authors, specialists of terrorism problem research was conducted. Separate features of the modern terrorism are considered and emphasized. The author drew conceptual conclusions on the basis of dialectical approach to modern terrorism counterculture phenomenon research.

  14. 75 FR 2445 - Chemical Facility Anti-Terrorism Standards

    Science.gov (United States)

    2010-01-15

    ... include trade secrets, confidential commercial information, Chemical-terrorism Vulnerability Information... and submit an online data collection (the Top-Screen) to DHS. The Department uses the facility's Top... required to submit Top-Screens. See 72 FR 65397-65398. \\2\\ Among other things, the November 2007 rule...

  15. Suggestion on Information Sharing for AP implementation

    Energy Technology Data Exchange (ETDEWEB)

    Shim, Hye Won; Kim, Min Su; Koh, Byung Marn [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2013-10-15

    Under the Additional Protocol, States should provide the IAEA with expanded declarations of activities related to the nuclear fuel cycle and other nuclear activities, and with expanded access to the relevant information and sites to allow the IAEA to verify the completeness of these declarations. The AP to the Safeguards Agreement (the Additional Protocol) was signed on June 21{sup st}, 1999 and entered into force on February 19{sup th}, 2004. ROK submitted initial declarations in August 2004. Since then, ROK has been submitting annual updated reports of initial declaration on every May 15{sup th}. To achieve successful implementation, it is necessary to collect the information for each individual article in Article 2 of the AP and verify the declared information provided by facility operators. Therefore, the cooperation among the ministries and offices concerned is a prerequisite for successful implementation of AP. Unfortunately, the formal procedure for inter-organizational information sharing and cooperation is not established. This paper will briefly outline the AP declarations and suggest the information sharing among the ministries, offices and organizations for effective and efficient implementation of AP. The State authority has responsibility for AP implementation and it should verify correctness and completeness of the information declared by facility operators before submitting the declarations. The close cooperation and information sharing among the ministries, offices and organizations are indispensable to effective and efficient implementation of AP.

  16. Communications and Information Sharing (CIS) Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — TheCommunications and Information Sharing (CIS) Laboratory is a Public Safety interoperable communications technology laboratory with analog and digital radios, and...

  17. Socially Shared Health Information

    DEFF Research Database (Denmark)

    Hansen, Kjeld S.

    2018-01-01

    In this PhD project, I'm investigating how health organizations are sharing health information on social media. My PhD project is divided into two parts, but in this paper, I will only focus on the first part: To understand current practices of how health organizations engage with health...... information and users on social media (empirical studies 1,2,3) and to develop a theoretical model for how it is done efficiently and effectively. I have currently conducted and published on two empirical studies (1,2). I am in the process of collecting data for a revised version of empirical study (2...

  18. Conflict and complexity countering terrorism, insurgency, ethnic and regional violence

    CERN Document Server

    Bar-Yam, Yaneer; Minai, Ali

    2015-01-01

    Complexity science affords a number of novel tools for examining terrorism, particularly network analysis and NK-Boolean fitness landscapes as well as other tools drawn from non-linear dynamical systems modeling. This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.

  19. Against CBRN terrorism

    International Nuclear Information System (INIS)

    Inoue, Tadao

    2016-01-01

    Although CBRN (Chemical, Biological, Radiological, Nuclear) terrorism has seldom happened in recent terrorist attacks, a large number of victims would appear leading to disastrous situation if it arises. This paper discussed what CBRN terrorism is, why terrorists are interested in these weapons, and how to deal with these cases, with reference to the lessons learnt from the Tokyo subway sarin event, which occurred in Japan. It also outlined the features of CBRN terrorism and protective measures against it. CBRN terrorism is the terror activity using unusual weapons and agents such as chemicals, biological agents, radioactive substances, and nuclear weapons. As the reasons why terrorists are interested in CBRN weapons, there are such factors that raw materials are easy to obtain, manufacturing is not difficult, weapons are easy to transport, and indiscriminate and mass slaughter is possible when used. From the lessons from the Tokyo subway sarin event, the Tokyo Fire Department has been engaging in the following items: (1) strengthening knowledge and skills, (2) introduction of detection equipment, (3) construction and strengthening of decontamination system, (4) collaboration among firefighting - police - SDF - medical institutions, and (5) enhancing and strengthening organizational structure. Although protective measures vary depending on the type of chemical agent, biological agent, etc., it is important to prepare in daily life for detoxification, decontamination, evacuation, etc. (A.O.)

  20. Information Sharing and International Taxation

    NARCIS (Netherlands)

    Keen, M.; Ligthart, J.E.

    2004-01-01

    The sharing between national tax authorities of taxpayer-specific information has emerged over the last few years as a-probably "the"-central issue in the formation of international tax policy.Yet this refocusing of the debate on international taxation-away from parametric tax coordination and

  1. Aligning Learner Preferences for Information Seeking, Information Sharing and Mobile Technologies

    Science.gov (United States)

    Mills, Leila A.; Knezek, Gerald; Khaddage, Ferial

    2012-01-01

    This paper reports on the development of a new information communications technology (ICT) learning preference survey, its cross-validation with attitudes towards mobile learning, and new perspectives on information seeking, information sharing, and mobile access derived from the relationships uncovered. The Information and Communications…

  2. Enhancing Group Decision Making: An Exercise to Reduce Shared Information Bias

    Science.gov (United States)

    Baker, Diane F.

    2010-01-01

    Research on shared information bias has shown that group members involved in a decision-making task tend to undervalue information that a single member shares with the group, especially when that information conflicts with their prior conclusions. The group activity in this article is intended to heighten awareness of this shared information bias…

  3. Groups like the support sharing channel of information and knowledge

    Directory of Open Access Journals (Sweden)

    Armando Sergio de Aguiar Filho

    2016-12-01

    Full Text Available Introduction: The role of sharing information and knowledge which tends to lead to a new understanding of distribution channels, allowing the maturation of sharing concept and its relationship to the process of information management. This interaction arises range of alternatives par as organizations relate internally with employees and externally with your audience. Objects: The goal is to survey and presentation of studies related to information sharing and knowledge channels, trying to identify its correlates in the area of administration. Methodology: The work was developed from a literature search. For both sought to initially align the concepts and terminology of information science area and a second time to identify a differentiated approach to sharing that would contribute to validate the interdisciplinary character of the information area and the contribution that other areas can make to the studies of information management and knowledge. Results: The analysis of the survey indicated considerations relevant to the understanding of the various approaches used in relation to the sharing of channels, as well as the common and different characteristics of these media and the impact on their dynamics. Conclusions: The Support Group terminology is one of several approaches used in the sharing of information and knowledge, and, like the other approaches presented to assess and promote better information services to meet the specific demands.

  4. Defining and Distinguishing Secular and Religious Terrorism

    Directory of Open Access Journals (Sweden)

    Heather S. Gregg

    2014-04-01

    Full Text Available Religious terrorism is typically characterised as acts of unrestrained, irrational and indiscriminant violence, thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from traditional terrorism; investigate three goals of religious terrorism (fomenting the apocalypse, creating a religious government, and establishing a religiously pure state; consider the role of leadership and target selection of religious terrorists; and, finally, suggest a range of counterterrorism strategies based on these observations.

  5. Multiparty secret sharing of quantum information based on entanglement swapping

    International Nuclear Information System (INIS)

    Li Yongmin; Zhang Kuanshou; Peng Kunchi

    2004-01-01

    A protocol of multiparty secret sharing of quantum information based on entanglement swapping is analyzed. In this protocol, Bell states are needed in order to realize the quantum information secret sharing and it is convenient to realize the quantum secret sharing among the members of any subset of users

  6. Cyber terrorism and cyber-crime – threats for cyber security

    OpenAIRE

    Ackoski, Jugoslav; Dojcinovski, Metodija

    2012-01-01

    This paper has aim to give contribution in supporting efforts against cyber threats recognized as a cyber terrorism and cyber crime. Also, it has aim to show future challenges related to cyber security and their emerging threats – cyber war, cyber terrorism and cyber crime. Accelerate weapon development called ICT (Information Communication Technology) which is developed every day faster and faster, and development of human conscious on higher level about consequences of ICT enormous pene...

  7. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  8. Library information sharing. Best practices and trends. Challenges and prospects

    Directory of Open Access Journals (Sweden)

    Posner Beth

    2017-12-01

    Full Text Available Libraries share information with each other, through interlibrary loan services, so that their library users can access more of the world of information than is available in any one library. When supported with enough budget, staff and authority to do so, library resource sharing specialists can facilitate information access in a variety of traditional and innovative ways, including and beyond lending and borrowing print and digital information. Best practices, trends and new solutions for library resource sharing are reviewed. International cooperation is also highlighted.

  9. The dislocations of terror: Assessments of risk during the Second Intifada.

    Science.gov (United States)

    Spilerman, Seymour; Stecklov, Guy

    2013-05-01

    The goal of terrorism is to create havoc and disrupt the normal functioning of society. To understand the impact of terrorism on a country it is useful to consider two types of country experiences with these shocks to the social order-the instance of a very small number of attacks against high profile targets and the case of chronic terror with a great number of attacks, generally against targets that are part of routine daily activities. The present study explores the Israeli experience with chronic terror. Using expenditure information from coffee shops and restaurants we examine how individuals assess their vulnerability to an attack and adjust their behavior. Specifically, we explore whether distance from the site of an attack, and similarity of a contemplated undertaking to the target of a recent attack, influence decision making in a context of chronic terror. We find strong support for a situational similarity effect but only weak evidence for a proximity effect. We examine the implications of these findings for the organization of economic activity. Copyright © 2012 Elsevier Inc. All rights reserved.

  10. 31 CFR 596.310 - Terrorism List Government.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  11. Georgetown University Research Psychologist Shares Terrorism Insight

    OpenAIRE

    Center for Homeland Defense and Security

    2013-01-01

    Georgetown University research psychologist Dr. Anne Speckhard has spent the last decade interviewing more than four hundred terrorists, terrorist supporters, family members, close associates and even terrorist's hostages in Western Europe and the Middle East. Speckhard shared her insights with students at the Naval Postgraduate School Center for Homeland Defense and Security in July.

  12. Violation of human rights to combat terrorism.

    OpenAIRE

    2012-01-01

    LL.B. No one definition of terrorism has gained universal acceptance. The lack of agreement on a definition of terrorism has been a major obstacle to meaningful international countermeasures to combat terrorism. There are 12 International Conventions related to terrorism and an explicit definition is still missing. Many states have tried to define terrorism and none of these definitions has been implemented, either by the United Nations or these states. There are many International Convent...

  13. New trends in terrorism : the use of social media, cyber-terrorism, the role of open-source intelligence and the cases of rightwing extremism and lone wolf terrorism

    OpenAIRE

    Καραδήμα, Σοφία

    2016-01-01

    Terrorism has existed almost as long as humanity, and has appeared in various forms, creating new and evolving trends, making the definition of terrorism even more difficult to define. The purpose of this thesis is to examine the new trends in terrorism after the terrorist attacks of 9/11, as well as attempting to find the factors that facilitate the emergence and/or recurrence of trends in terrorism, by examining the related Literature, creating case studies and providing supp...

  14. Labelling : Security in Information Management and Sharing

    NARCIS (Netherlands)

    Schotanus, H.A.; Hartog, T.; Hut, D.H.; Boonstra, D.

    2011-01-01

    Military communication infrastructures are often deployed as stand-alone information systems operating at the System High mode. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements for information management and sharing which current communication

  15. User observations on information sharing (corporate knowledge and lessons learned)

    Science.gov (United States)

    Montague, Ronald A.; Gregg, Lawrence A.; Martin, Shirley A.; Underwood, Leroy H.; Mcgee, John M.

    1993-01-01

    The sharing of 'corporate knowledge' and lessons learned in the NASA aerospace community has been identified by Johnson Space Center survey participants as a desirable tool. The concept of the program is based on creating a user friendly information system that will allow engineers, scientists, and managers at all working levels to share their information and experiences with other users irrespective of location or organization. The survey addresses potential end uses for such a system and offers some guidance on the development of subsequent processes to ensure the integrity of the information shared. This system concept will promote sharing of information between NASA centers, between NASA and its contractors, between NASA and other government agencies, and perhaps between NASA and institutions of higher learning.

  16. Global initiatives to prevent nuclear terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    The fight against nuclear and radiological terrorism - someone to blow up a nuclear weapon or spread radioactive material as a 'dirty bomb' that act of terrorism - is one of the most serious threats to international security. The Global Initiative to prevent nuclear terrorism is a Norwegian-sponsored initiative that is aimed directly at combating terrorism by non-state actors. NRPA follow up Norwegian measures, including in Kazakhstan, and verifies that they are implemented and functioning as intended. (AG)

  17. Understanding Terrorism from an Economic perspective

    OpenAIRE

    Haldar, Tanushree

    2013-01-01

    Terrorism has emerged as a major threat to the contemporary society. Nation States are reliant on their counter-terrorism laws for checking terrorism and deterring terrorists. To understand the effectiveness of these counter terrorism laws, it is important to first understand the behaviour of terrorists, so as to comprehend what actions can dissuade terrorist’s behaviour and decision to propagate violence. This paper will first look at behaviour of terrorist in decision making from an economi...

  18. Online Information Sharing About Risks : The Case of Organic Food

    NARCIS (Netherlands)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-01-01

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic

  19. Gender Imbalance and Terrorism in Developing Countries.

    Science.gov (United States)

    Younas, Javed; Sandler, Todd

    2017-03-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results.

  20. Terrorism and financial supervision

    NARCIS (Netherlands)

    Krans, Anatoli van der

    2005-01-01

    This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective,

  1. Terrorism in Canada.

    Science.gov (United States)

    Kollek, Daniel

    2003-01-01

    This paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses. Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.

  2. A Fear Management Approach to Counter-Terrorism

    Directory of Open Access Journals (Sweden)

    Tinka Veldhuis

    2012-02-01

    Full Text Available Spreading fear is the essence of terrorism. Terrorists exploit fear by terrorising the target audience into concessions. Understanding how feelings of fear influence the way people feel, think and act is therefore an important starting point to explore how individuals and societies can learn how to cope with fear of terrorism. In this Policy Brief, Research Fellows Prof. Dr. Edwin Bakker and Dr. Tinka Veldhuis explore the dynamics of fear in response to terrorism, and emphasise the importance of integrating initiatives to manage fear of terrorism and reduce its negative consequences into overarching counter-terrorism strategies. It argues that societies can benefit greatly from promoting resilience and a fear management approach to counter-terrorism.

  3. Sharing information: Mixed-methods investigation of brief experiential interprofessional

    Science.gov (United States)

    Cocksedge, Simon; Barr, Nicky; Deakin, Corinne

    In UK health policy ‘sharing good information is pivotal to improving care quality, safety, and effectiveness. Nevertheless, educators often neglect this vital communication skill. The consequences of brief communication education interventions for healthcare workers are not yet established. This study investigated a three-hour interprofessional experiential workshop (group work, theoretical input, rehearsal) training healthcare staff in sharing information using a clear structure (PARSLEY). Staff in one UK hospital participated. Questionnaires were completed before, immediately after, and eight weeks after training, with semistructured interviews seven weeks after training. Participants (n=76) were from assorted healthcare occupations (26% non-clinical). Knowledge significantly increased immediately after training. Self-efficacy, outcome expectancy, and motivation to use the structure taught were significantly increased immediately following training and at eight weeks. Respondents at eight weeks (n=35) reported their practice in sharing information had changed within seven days of training. Seven weeks after training, most interviewees (n=13) reported confidently using the PARSLEY structure regularly in varied settings. All had re-evaluated their communication practice. Brief training altered self-reported communication behaviour of healthcare staff, with sustained changes in everyday work. As sharing information is central to communication curricula, health policy, and shared decision-making, the effectiveness of brief teaching interventions has economic and educational implications.

  4. Female terrorism : a review

    NARCIS (Netherlands)

    Jacques, Karen; Taylor, Paul J.

    2009-01-01

    The sharp growth in the number of publications examining female involvement in terrorism has produced a valuable but un-integrated body of knowledge spread across many disciplines. In this paper, we bring together 54 publications on female terrorism and use qualitative and quantitative analyses to

  5. Acts of terrorism and mass violence targeting schools : Analysis and implications for preparedness in the USA.

    Science.gov (United States)

    Schlegelmilch, Jeff; Petkova, Elisaveta; Martinez, Stephanie; Redlener, Irwin

    2017-01-01

    To enhance the preparedness of US schools to acts of terrorism and mass violence, the landscape of threats against schools must first be understood. This includes exploring the global trends of acts of terrorism against schools, as well as looking specifically at the history of terrorism and acts of mass violence against schools domestically. This paper conducts a review of two databases in order to look at the trends in acts of terrorism and mass violence carried out against schools, and provides recommendations for domestic school preparedness based on this information.

  6. Introduction to Teaching About Terrorism.

    Science.gov (United States)

    Totten, Sam

    1986-01-01

    Provides an historical and conceptual framework for understanding contemporary terrorism. Includes quotations from government officials, syndicated columnists, and scholars regarding terrorism and its effects on society. (JDH)

  7. Gender Imbalance and Terrorism in Developing Countries

    Science.gov (United States)

    Younas, Javed

    2016-01-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results. PMID:28232755

  8. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam

    2015-12-15

    It is known that global games with noisy sharing of information do not admit a certain type of threshold policies [1]. Motivated by this result, we investigate the existence of threshold-type policies on global games with noisy sharing of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a solution to a fixed point equation. Then, we show that for a sufficiently noisy environment, the functional fixed point equation leads to a contraction mapping, and hence, its iterations converge to a unique continuous threshold policy.

  9. The normalisation of terror: the response of Israel's stock market to long periods of terrorism.

    Science.gov (United States)

    Peleg, Kobi; Regens, James L; Gunter, James T; Jaffe, Dena H

    2011-01-01

    Man-made disasters such as acts of terrorism may affect a society's resiliency and sensitivity to prolonged physical and psychological stress. The Israeli Tel Aviv stock market TA-100 Index was used as an indicator of reactivity to suicide terror bombings. After accounting for factors such as world market changes and attack severity and intensity, the analysis reveals that although Israel's financial base remained sensitive to each act of terror across the entire period of the Second Intifada (2000-06), sustained psychological resilience was indicated with no apparent overall market shift. In other words, we saw a 'normalisation of terror' following an extended period of continued suicide bombings. The results suggest that investors responded to less transitory global market forces, indicating sustained resilience and long-term market confidence. Future studies directly measuring investor expectations and reactions to man-made disasters, such as terrorism, are warranted. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  10. Terrorism: some philosophical and ethical dilemmas

    OpenAIRE

    Stojanov, Trajce; Unsal, Zeynep

    2017-01-01

    Philosophers weren`t thinking a lot about terrorism before the terrorist attacks in the United States on 11 September 2001. Or even when they were thinking the main concern was how to deal with terrorism. But after this attack terrorism was high on the philosophical agenda mainly manifested as an ethical problem. The key concern was: can terrorism be morally justified? That is the issue we are dealing in this paper too. But, the answer of this question largely depends on the treatment of t...

  11. How to fight terrorism? Political and strategic aspects.

    Science.gov (United States)

    Vad, Erich

    2018-04-01

    "Fighting terrorism is like eating soup with a fork" (Shimon Peres). Peres's quote symbolically captures the key problem of countering terrorism. 9/11 proved to be a hallmark in the global perception of modern terrorism. The following questions form the framework of the present essay: What is the essence of modern terrorism? How did it develop during the past two decades? Who are the key players within the terror framework? What are the root causes for global terrorism? How are we to deal appropriately with the global phenomenon of terrorism? Are there any solutions (short-, medium-, long-term) to terrorism? If yes, where do we have to look for them? The underlying essay provides a strategic overview of antiterrorism policy that is based on the author's years-long experience as a high-level expert and advisor within the security policy framework. For this reason, citations are expressly not included. The key target audience comprises laypersons interested in the phenomenon of global terrorism and its social interplay.

  12. Anonymity versus privacy: Selective information sharing in online cancer communities

    OpenAIRE

    Frost, J.H.; Vermeulen, I.E.; Beekers, N.

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients ap...

  13. Terrorism as Genocide: Killing with “Intent”

    Directory of Open Access Journals (Sweden)

    Ashlie Perry

    2012-07-01

    Full Text Available It is plausible that terrorism can manifest itself as a form of genocide. Using Raphael Lemkin’s definition of genocide and the UN Genocide Convention’s definition of genocide, non-state and state terrorism are assessed as a form of genocide. Commonalities found in the definitions of both genocide and terrorism supports the argument. The psychology of terrorism and Lemkin’s psychology of genocide describe similar motivations of perpetrators. The September 11th attacks and the U.S. invasion of Iraq are used as case studies to illustrate that terrorism can result in genocide or genocidal acts. Framing acts of terrorism as genocide allows for prosecution in international courts and brings a new perspective to the concept of killing with intent.

  14. Model of health information sharing behavior among patients in cervical cancer

    Directory of Open Access Journals (Sweden)

    Ragil Tri atmi

    2018-01-01

    Full Text Available Cervical cancer is the second highest cause of death for women in Indonesia, despite a deadly illness, patients with cervical cancer are not desperate to survive. Instead, they are motivated to undertake positive actions, one of which is to do health informtion sharing or share information on environmental health tersekatnya. This study aims to look at how the patterns of behavior of sharing health information on cervical cancer patients, as well as the motive behind their actions the health information sharing. This study uses the method of qualitative research grounded approach. Location of the study conducted in Surabaya, while the search for informants researchers used snowball sampling. The results from this study is there are different behavior patterns of health information sharing among cervical cancer patients who have been diagnosed with advanced cervical cancer with cervical cancer at an early stage level.

  15. Security investment, hacking, and information sharing between firms and between hackers

    OpenAIRE

    Hausken, Kjell

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers' attacks and the firms' defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm's defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  16. Prevention and Pre-emption in Australia’s Domestic Anti-terrorism Legislation

    Directory of Open Access Journals (Sweden)

    Tamara Tulich

    2012-11-01

    Full Text Available The move towards prevention in domestic anti-terror law and policy was initially justified as an exceptional response to the exceptional threat of transnational terrorism following September 11, 2001. However, commonalities are discernable between prevention in anti-terror law and prevention as employed in other areas of Australian law. To begin contextualising and analysing preventive practices in Australia, a framework is required. ‘The preventive state’ provides one way to view the collection of preventive measures employed in Australia. Engaging a governmentality perspective has the potential to make visible prevention and pre-emption in law and governance, and to inform critical treatment of the preventive state itself. Whether and how prevention and pre-emption in anti-terror law differ from and exhibit continuities with other preventive measures has the potential to expose issues of selectivity and proportionality between preventive measures and force consideration of the limits of state action to prevent or pre-empt harm.

  17. Sleep Terrors in Twins

    OpenAIRE

    J Gordon Millichap

    2008-01-01

    In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  18. Pregnant Women Sharing Pregnancy-Related Information on Facebook: Web-Based Survey Study

    Science.gov (United States)

    2018-01-01

    Background Research indicates expectant and new mothers use the Internet, specifically social media, to gain information and support during the transition to parenthood. Although parents regularly share information about and photos of their child or children on Facebook, researchers have neither explored the use of Facebook to share pregnancy-related information nor investigated factors that influence such sharing. Objective The aim of this study was to address a gap in the literature by exploring the use of Facebook by pregnant women. Specifically, the study examined the use of Facebook to share pregnancy-related information, as well as any association between prenatal attachment and the aforementioned aspects of sharing pregnancy-related information on Facebook. Methods Pregnant women who were at least 18 years of age were recruited for participation in the study through posts and paid advertisements on Facebook and posts to professional organization listservs. Individuals interested in participating were directed to a secure Web-based survey system where they completed the consent form and the survey that focused on their current pregnancy. Participants completed the Maternal Antenatal Attachment Scale and answered questions that assessed how often they shared pregnancy-related information on Facebook, who they shared it with, why they shared it, and what they shared. Results A total of 117 pregnant women completed the survey. Descriptive statistics indicated that the pregnancy announcement was most commonly shared (75/108, 69.4%), with most women sharing pregnancy-related information on Facebook less than monthly (52/117, 44.4%) with only family and friends (90/116, 77.6% and 91/116, 78.4%, respectively) and for the purpose of involving others or sharing the experience (62/107, 57.9%). Correlation and regression analyses showed that prenatal attachment, in general, was positively and significantly related to all aspects of sharing pregnancy-related information

  19. Information Sharing and Collaboration Business Plan

    Science.gov (United States)

    2006-03-30

    for information sharing The proposed environment will need a common definition of terms and dictionaries of competing terms where common definitions...a lexicon, a monolingual on-line handbook, and a thesaurus and ontology of abbreviations, acronyms, and terminology. (ISCO 2005, 18

  20. Pregnant Women Sharing Pregnancy-Related Information on Facebook: Web-Based Survey Study.

    Science.gov (United States)

    Harpel, Tammy

    2018-03-22

    Research indicates expectant and new mothers use the Internet, specifically social media, to gain information and support during the transition to parenthood. Although parents regularly share information about and photos of their child or children on Facebook, researchers have neither explored the use of Facebook to share pregnancy-related information nor investigated factors that influence such sharing. The aim of this study was to address a gap in the literature by exploring the use of Facebook by pregnant women. Specifically, the study examined the use of Facebook to share pregnancy-related information, as well as any association between prenatal attachment and the aforementioned aspects of sharing pregnancy-related information on Facebook. Pregnant women who were at least 18 years of age were recruited for participation in the study through posts and paid advertisements on Facebook and posts to professional organization listservs. Individuals interested in participating were directed to a secure Web-based survey system where they completed the consent form and the survey that focused on their current pregnancy. Participants completed the Maternal Antenatal Attachment Scale and answered questions that assessed how often they shared pregnancy-related information on Facebook, who they shared it with, why they shared it, and what they shared. A total of 117 pregnant women completed the survey. Descriptive statistics indicated that the pregnancy announcement was most commonly shared (75/108, 69.4%), with most women sharing pregnancy-related information on Facebook less than monthly (52/117, 44.4%) with only family and friends (90/116, 77.6% and 91/116, 78.4%, respectively) and for the purpose of involving others or sharing the experience (62/107, 57.9%). Correlation and regression analyses showed that prenatal attachment, in general, was positively and significantly related to all aspects of sharing pregnancy-related information at the PFacebook for a variety of

  1. Nuclear terrorism: Facts and fiction

    International Nuclear Information System (INIS)

    Kamp, K.H.

    1994-01-01

    The study tries to assess the risk of nuclear terrorism in the light of recent developments in the area of nuclear weapons proliferation, and to develop suggestions of how to cope with existing challenges. First of all the term of ''nuclear terrorism'' is defined and differentiated from other forms of nuclear crimes. In a second step the attempt is made to compile the findings and assessments of the past on the problem of nuclear terrorism. Since, as a rule, a threat potential is composed of 'intentions' and 'capabilities', a third part is dedicated to terrorist intentions and studies the degree of probability of terrorists considering nuclear weapons an appropriate means for their aims. In connection with 'capabilities' it is scrutinized whether terrorist groups will be able at all to procure, design or initiate nuclear warheads. This leads to the question as to which consequences result from nuclear safety shortcomings - in particular in Russia - with a view to nuclear terrorism. Based on the preceding considerations, several proposals for coping with the danger of nuclear terrorism are made. (orig./HP) [de

  2. Security Investment, Hacking, and Information Sharing between Firms and between Hackers

    OpenAIRE

    Kjell Hausken

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  3. Security Investment, Hacking, and Information Sharing Between Firms and Between Hackers

    OpenAIRE

    Hausken, Kjell

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  4. Future Roles of Air and Space Power in Combatting Terrorism

    National Research Council Canada - National Science Library

    McAlpine, Mark

    1997-01-01

    .... The political, economic, and informational instruments of power play primary roles in addressing and eliminating the root causes behind terrorism attacks, but the military instrument will prevent...

  5. Definitions of Cyber Terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an

  6. Sleep Terrors in Twins

    Directory of Open Access Journals (Sweden)

    J Gordon Millichap

    2008-12-01

    Full Text Available In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  7. The Information Aspect of Extremism and Terrorism and the Destructive Trends in the Mass Media

    Directory of Open Access Journals (Sweden)

    E V Nekrasova

    2013-12-01

    Full Text Available The article is devoted to the problem of destructive trends in modern Russian mass media as well as to the information component in the activities of extremist and terrorist organizations. The destructive trends in the mass media manifest themselves in the escalation of animosity, aggression, creation of the cult of violence and xenophobia moods. Terrorist organizations use the mass media for their own purposes: they create the atmosphere of fear and tension in society, recruit new followers, mainly among the youth, which is a serious problem. It is important to use the positive potential of the mass media to counteract extremism and terrorism.

  8. A social-cognitive perspective of terrorism risk perception and individual response in Canada.

    Science.gov (United States)

    Lee, Jennifer E C; Lemyre, Louise

    2009-09-01

    The volume of research on terrorism has increased since the events of September 11, 2001. However, efforts to develop a contextualized model incorporating cognitive, social-contextual, and affective factors as predictors of individual responses to this threat have been limited. Therefore, the aim of this study was to evaluate a series of hypotheses drawn from such a model that was generated from a series of interviews with members of the Canadian public. Data of a national survey on perceived chemical, biological, radiological, nuclear, and explosives (CBRNE) terrorism threat and preparedness were analyzed. Results demonstrated that worry and behavioral responses to terrorism, such as individual preparedness, information seeking, and avoidance behaviors, were each a function of cognitive and social-contextual factors. As an affective response, worry about terrorism independently contributed to the prediction of behavioral responses above and beyond cognitive and social-contextual factors, and partially mediated the relationships of some of these factors with behavioral responses. Perceived coping efficacy emerged as the cognitive factor associated with the most favorable response to terrorism. Hence, findings highlight the importance of fostering a sense of coping efficacy to the effectiveness of strategies aimed at improving individual preparedness for terrorism.

  9. Patterns of Knowledge Sharing and Knowledge Creation in New Information Environments

    DEFF Research Database (Denmark)

    Nielsen, Jørgen Lerche; Meyer, Kirsten

    2006-01-01

    and creation processes. The aim is to obtain a deeper comprehension of which factors determine whether the use of information technology becomes a success or a failure in relation to knowledge sharing and creation. The paper is based on three previous studies investigating the use of information technology......Do the knowledge sharing and creation processes in collaborating groups benefit from the use of new information environments or are the environments rather inhibitive to the development of these processes? A number of different studies have shown quite varied results when it comes to appraising...... the importance and value of using new information technology in knowledge sharing and creation processes. In this paper we will try to unveil the patterns appearing in the use of new information environment and the users' understanding of the significance of using information technology in knowledge sharing...

  10. Cooperative Games arising from Information Sharing Situations

    NARCIS (Netherlands)

    Brânzei, R.; Tijs, S.H.; Timmer, J.B.

    2000-01-01

    Relations are established between information sharing (IS) situations and IS-games on one hand and information collecting (IC) situations and IC-games on the other hand. It is shown that IC-games can be obtained as convex combinations of so-called local games. Properties are described which IC-games

  11. What's 'Awe' The Hype? Motivations to Share Video Game Information

    OpenAIRE

    Blankenbeckler, Logan Bryan

    2017-01-01

    Over the past few decades, video games have become a popular avenue for dissemination of information and publicity about video games is word-of-mouth sharing. Thus, it is imperative for researchers to examine the social, and individual processes that guide this behavior. Focusing on prerelease sharing behavior specifically, this pair of studies aimed to identify predictors and dimensions of video game information sharing, and explore the impact content characteristics have on individuals' ...

  12. Terror explosive injuries: a comparison of children, adolescents, and adults.

    Science.gov (United States)

    Jaffe, Dena H; Peleg, Kobi

    2010-01-01

    We sought to characterize injuries and outcomes from terror explosions with specific attention to children (0-10 years) and adolescents (11-15 years) compared to adults (16-45 years). Terror explosions target vulnerable populations and result in multidimensional injuries that may vary according to age group. The relative dearth of information regarding terror-related injuries among children inhibits proper preparedness and optimum management during such an event. A retrospective study was performed using data from the national Israel Trauma Registry (October 2000 to December 2005). Included were civilians and nonactive military personnel hospitalized as a result of a terror explosion. During the 5.3-year study period, 49 children (0-10 years), 65 adolescents (11-15 years), and 723 adults (16-45 years) were hospitalized from terror explosions. Children were more likely than adults to sustain severe injuries (27% vs. 12%) and traumatic brain injury (35% vs. 20%) and less likely to sustain injuries to their extremities (35% vs. 57%) or open wounds (39% vs. 59%) (P profile was similar to that of adults, however, adolescents presented with less internal injuries, more contusions, and superficial wounds to extremities and were more likely to require surgery for mild to moderate wounds. Differences in hospital utilization and outcomes by age groups were observed when data were stratified by injury severity. Compared to adults, children, and adolescents exposed to terror explosions present with different injuries and hospital utilization and outcomes. These results further confirm that preparedness of a pediatric healthcare system is essential for effective management in the event of a future mass casualty incident.

  13. The virtues of gossip: reputational information sharing as prosocial behavior.

    Science.gov (United States)

    Feinberg, Matthew; Willer, Robb; Stellar, Jennifer; Keltner, Dacher

    2012-05-01

    Reputation systems promote cooperation and deter antisocial behavior in groups. Little is known, however, about how and why people share reputational information. Here, we seek to establish the existence and dynamics of prosocial gossip, the sharing of negative evaluative information about a target in a way that protects others from antisocial or exploitative behavior. We present a model of prosocial gossip and the results of 4 studies testing the model's claims. Results of Studies 1 through 3 demonstrate that (a) individuals who observe an antisocial act experience negative affect and are compelled to share information about the antisocial actor with a potentially vulnerable person, (b) sharing such information reduces negative affect created by observing the antisocial behavior, and (c) individuals possessing more prosocial orientations are the most motivated to engage in such gossip, even at a personal cost, and exhibit the greatest reduction in negative affect as a result. Study 4 demonstrates that prosocial gossip can effectively deter selfishness and promote cooperation. Taken together these results highlight the roles of prosocial motivations and negative affective reactions to injustice in maintaining reputational information sharing in groups. We conclude by discussing implications for reputational theories of the maintenance of cooperation in human groups.

  14. Body and Terror: Women’s Bodies as Victims and Perpetrators of Terror

    Directory of Open Access Journals (Sweden)

    Parvin Sultana

    2014-07-01

    Full Text Available Bodies are vulnerable because they are intrinsically linked to death. Bodies are social and they are embedded with meaning. They cannot be extracted from their specific contexts. The nation is also often equated with body politic. As a result individual bodies become the site of security/ insecurity depending on the social location of bodies. Within this discourse, this article tries to locate the bodies of women. It will look at the bodies of women as victims of terror as well as perpetrators of terror. It will try to understand if in these differentiated roles, women are able to break away from stereotypes or are still caught in heteronormative narratives. Keywords: Body, Suicide Bombers, Victims, Ethnic Conflict, Terrorism.

  15. Terrorism and disarmament

    International Nuclear Information System (INIS)

    2001-01-01

    In addressing the General Assembly at the opening of its debate on international terrorism (1 to 5 October 2001), the Secretary-General warned that a single attack involving a nuclear or biological weapon could kill millions. While the world was unable to prevent the II September attacks, there is much we can do to help prevent future terrorist acts carried out with weapons of mass destruction, he emphasized, calling for redoubled efforts to implement key treaties relating to those arms, closer cooperation among international organizations dealing with them, and tighter national legislation covering the exports of goods and technologies used in their production. Many representatives from all countries and all regions echoed the Secretary-General's sentiment during the debate. The general conclusion was that all countries could be affected in some form or another by such a fearful proposition, and all countries must work together to prevent it. To gain a greater understanding of the increased threat of international terrorism today, the Department for Disarmament Affairs sponsored a panel of high-level experts to discuss terrorism and its relationship to disarmament. Two leading experts from the Centre for the Study of Terrorism and Political Violence at the University of St. Andrews in Scotland, Professor Wilkinson and Dr. Gunaratna, put the attacks on the United States in an historical perspective, present some of the repercussions of the unprecedented scope of the attacks and give their views on how international institutions and agreements can assist in combating future acts of this kind. Mr Vladimir P Salov of the Russian Federation addresses the suppression of financing of terrorism and how Russia works towards that end. The IAEA has been trying for almost 50 years to safeguard nuclear materials from diversions to nuclear-weapon users and, in recent years, working more intensively on physical protection of nuclear material. Dr Nilsson's presentation

  16. The enigma of lone wolf terrorism: an assessment

    NARCIS (Netherlands)

    Spaaij, R.

    2010-01-01

    Lone wolf terrorism remains an ambiguous and enigmatic phenomenon. The boundaries of lone wolf terrorism are fuzzy and arbitrary. This article aims to define and analyze the main features and patterns of lone wolf terrorism in fifteen countries. Lone wolf terrorism is shown to be more prevalent in

  17. Defining and Distinguishing Traditional and Religious Terrorism

    OpenAIRE

    Gregg, Heather S.

    2014-01-01

    The article of record may be found at: http://dx.doi.org/10.1080/23296151.2016.1239978 thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from tr...

  18. Mass Media and Terrorism: Deconstructing the Relationship

    OpenAIRE

    Prayudi, Prayudi

    2008-01-01

    Issue of terrorism came to surface in this early twenty first century through a number ofacts violence that have killed hundreds and injured thousands of people. At the same time, theseevents have been dominated the mass media contents. Principally, mass media and issue ofterrorism are inseparable. This paper examines the relationship between mass media and terrorism.It is done through the deconstruction of the concept of terrorism and how terrorism isunderstood as a communicational process. ...

  19. Nuclear and Radiological Terrorism

    International Nuclear Information System (INIS)

    Cizmek, A.

    2003-01-01

    Radiological and nuclear terrorism is widely considered as a major if not ultimate terrorist threat for modern societies. Highly industrialized countries could be extremely sensitive to terrorist aggressions of this kind. Nuclear terrorism is often associated with nuclear proliferation. Strictly speaking, nuclear proliferation deals with the spread of nuclear weapons into states which doesn't posses them. But proliferation can also be understood as the spread of radioactive material or even nuclear explosives into the hands of non-state organizations, such as sub national terrorist or criminal organizations as well as any kind of extreme groups for sabotage, blackmail or any other destabilization or destruction purposes. New driving factors for nuclear terrorism which 'help' terrorists are: the consequence of the break down of the Soviet Union and 'easy' radioactive smuggling and black market. What is 'New terrorism'? In analyzing the treat, one has to start by posing several crucial questions such as 'do such groups or individuals have the skill to complete their aim'? 'Who are these groups and individuals', 'how they can be categorized', 'what is their motivation'? If analysis of the 'new terrorism' is one side of the coin, the other is just as daunting. Who, what, when, where and how would be targeted by 'new terrorism'? Although there are existing different reasons (religious and political/social), mainly the target is civilian population. In many instances the aim is to exert either political or economic pressure on authorities or both. Police, ambulance - first call response teams - local, regional and national authorities have a hard task still ahead of them. The upside is that industrialized nations have acknowledged the need to reassess where we are and what the risk is. The bottom line has to be 'who is likely to want to resort to such methods and what the likelihood of them succeeding would be. (author)

  20. Irrational Rationality of Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Nalbandov

    2013-12-01

    Full Text Available The present article deals with the ontological problem of applying the rational choice frameworks to the study of terrorism. It testing the application of the rational choice to the “old” (before the end of the Cold War and the “new” (after the end of the Cold War terrorisms. It starts with analyzing the fundamentals of rationality and applies it at two levels: the individual (actors and group (collective via two outlooks: tactical (short-term and strategic (long-term. The main argument of the article is that while the “old” terrorism can be explained by the rational choice theory its “new” version represents a substantial departure from rationality.

  1. Terrorism, Hegel, Honneth

    Directory of Open Access Journals (Sweden)

    Sinkwan Cheng

    2015-07-01

    Full Text Available My essay begins by analyzing how Hegel and Honneth’s theory of recognition would seem to lend support to insurgent terrorists’ struggle for the right to self-determination. Insurgent terrorism often looks like a concretization of what Honneth calls the moral protest of the oppressed launched against the dominating powers. Insurgent terrorism also bears affinity to the politics of recognition in the sense that it challenges the legitimacy and authority of the forces owned by the state, and seeks to gain public recognition instead for the legitimacy of their own cause. Precisely because what matters uppermost to terrorists is the gaining of recognition for their cause as just, terrorists are eager to seize the mass media as a means of spreading their ideas. My essay will end, however, by pointing out major differences between insurgent terrorism on the one hand, and Hegel and Honneth on the other.

  2. Sharing sensitive health information through social media in the Arab world.

    Science.gov (United States)

    Asiri, Eman; Khalifa, Mohamed; Shabir, Syed-Abdul; Hossain, Md Nassif; Iqbal, Usman; Househ, Mowafa

    2017-02-01

    Sharing daily activities on social media has become a part of our lifestyle, but little is known about sharing sensitive health information in the Arab world. The objective of this study is to explore how social media users in the Arab world share sensitive health information through Facebook. A retrospective qualitative analysis was used in the study. A total of 110 Facebook groups, related to HIV, sickle cell and depression were screened between 5 June and 1 December 2014. Forty four Facebook groups met the inclusion criteria. 28 471 posts were extracted, of which 649 met inclusion criteria. Forty two percent of health information exchanged were related to HIV, 34% to depression and 24% to sickle cell diseases. The majority of postings were from Egypt 21.1%, Saudi Arabia 20%, Algeria 10% and Libya 9.2%. Male posts were 54.2% while 45.8% were posted by females. Individuals utilized Facebook groups to share personal experiences of their disease 31%, in addition to being used for seeking queries 13.6%, offering explicit advice 8.3%, reporting signs and symptoms of the disease 7.3% and posting their communication with the health-care provider 6.6%. Users in the Arab world use social media to exchange sensitive health information, which could have serious implications regarding the privacy of the information shared with other members of the group. On the other hand, sharing health information could have positive effects for patients, such as sharing disease experiences and peer support. However, more work is needed to ensure that Facebook users in the Arab world are aware of the potential consequences of sharing sensitive health information through social media. © The Author 2016. Published by Oxford University Press in association with the International Society for Quality in Health Care. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  3. Terrorism in Colombia.

    Science.gov (United States)

    Paredes Zapata, Gabriel Darío

    2003-01-01

    Colombia is a poor country that has been plagued by ongoing violence for more than 120 years. During the 1940s, subversive terrorist groups emerged in rural areas of the country when criminal groups came under the influence of Communism, and were later transformed into contemporary groups, such as the Ejercito de Liberacion Nacional (ELN) or National Liberation Army and Fuerzas Armadas Revolucionares de Colombia (FARC) or Revolutionary Armed Forces of Colombia). Paramilitary terrorist groups emerged in response to subversive groups and were later transformed into contemporary groups, such as the Autodefensas Unidas de Colombia (AUC) or United Self-Defense Forces of Colombia. Terrorism has placed an enormous burden on modern Colombia. From 1995 to 2002, 9,435 people were killed by terrorism-related events, of which 5,864 were killed by subversive terrorist activities and 3,571 were killed by paramilitary terrorist activities. In 2002, at least nineteen attacks produced 10 or more casualties, of which 18 were bombings. In 2002, terrorists killed at least 12 mayors, 71 legislators, and internally displaced 300,000 persons from their homes. Since terrorist groups in Colombia are typically supported by drug manufacturing and trafficking, it has been difficult at times to distinguish violence due to terrorism from violence due to illicit drug trafficking. Terrorism has also had a major adverse effect on the economy, with restricted travel, loss of economic resources, and lack of economic investment. In addition to political, military, and commercial targets, terrorists have specifically targeted healthcare infrastructure and personnel. At the national and local levels, much emergency planning and preparedness has taken place for terrorism-related events. The Centro Regulador de Urgencias (CRU) or Emergency Regulation Center in Bogota plays a major role in coordinating local prehospital and hospital emergency response in the capital city and the national level where

  4. Review and expectations of terror attack emergency rescue

    Directory of Open Access Journals (Sweden)

    De-wen WANG

    2012-03-01

    Full Text Available Ten years of anti-terror struggle since the 9/11 event has indicated adequately that terrorism is a global problem and international danger. Likewise, anti-terror emergency rescue is also an important task which will influence the safety and benefit of every country all over the world. This paper reviews the main progress and result of international anti-terror struggle in the last ten years, and also introduces the new characteristic of the international anti-terror activity. Besides that, this paper also brings forward the further consideration about the anti-terror emergency medical rescue and the researches remaining to be carried out. The latter includes: (1 to further perfect the high-efficient medical rescue command organization; (2 to further perfect the emergency medical rescue prearranged scheme; (3 to further perfect the construction of rescue system and rescue base after various types of terror attack; (4 to further promote the anti-terror consciousness in the public, and pay more attention to the prevention and investigation of the psychological disaster; (5 to further carry out the basic investigation on emergency medical rescue after various terror attack injuries (for example the types and characteristics of new injuries, pathophysiology and prevention and treatment of stress-psychological effect induced by terror attack, new high-efficient medical rescue measure and equipments, and so on.

  5. Latin America: Terrorism Issues

    National Research Council Canada - National Science Library

    Sullivan, Mark P

    2005-01-01

    .... In its annual report on worldwide terrorism, the State Department highlights threats in Colombia, Peru, and the tri-border region of Argentina, Brazil, and Paraguay. The State Department also has designated four terrorist groups (three in Colombia and one in Peru) as Foreign Terrorist Organizations, and Cuba has been listed as a state sponsor of terrorism since 1982.

  6. Information Sharing in a Closed-Loop Supply Chain with Asymmetric Demand Forecasts

    Directory of Open Access Journals (Sweden)

    Pan Zhang

    2017-01-01

    Full Text Available This paper studies the problem of sharing demand forecast information in a closed-loop supply chain with the manufacturer collecting and remanufacturing. We investigate two scenarios: the “make-to-order” scenario, in which the manufacturer schedules production based on the realized demand, and the “make-to-stock” scenario, in which the manufacturer schedules production before the demand is known. For each scenario, we find that it is possible for the retailer to share his forecast without incentives when the collection efficiency of the manufacturer is high. When the efficiency is moderate, information sharing can be realized by a bargaining mechanism, and when the efficiency is low, non-information sharing is a unique equilibrium. Moreover, the possibility of information sharing in the make-to-stock scenario is higher than that in the make-to-order scenario. In addition, we analyze the impact of demand forecasts’ characteristics on the value of information sharing in both scenarios.

  7. Content Sharing Based on Personal Information in Virtually Secured Space

    Science.gov (United States)

    Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.

    User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.

  8. CULTURAL FEATURES SHARED BY INFORMATION SYSTEMS USERS

    Directory of Open Access Journals (Sweden)

    Marilena Maldonado

    2006-11-01

    Full Text Available Problems may arise when organizational culture is not considered in the development of information systems, such as difficulties in system implementation, since users do not accept changes in their work cultures. However, current methodology designs do not contemplate cultural factors. The objective of this investigation was to identify the main cultural features shared by the users of information systems in an Argentinean university. As result of this work it was possible to identify the memes shared by the members of the community selected, and to categorize such memes according to their incidence grade. This work seeks to be an initial step towards the construction of systems that evolve along with the organizational culture they are an integral part of.

  9. Bringing the State Back into Terrorism Studies

    OpenAIRE

    Blakeley, Ruth

    2007-01-01

    Orthodox terrorism studies tend to focus on the activities of illiberal nonstate actors against the liberal democratic states in the North. It thus excludes state terrorism, which is one of a number of repressive tools that great powers from the North have used extensively in the global South in\\ud the service of foreign policy objectives. I establish the reasons for the absence of state terrorism from orthodox accounts of terrorism and argue that critical–normative approaches could help to o...

  10. Graduating to Postdoc: Information-Sharing in Support of Organizational Structures and Needs

    Science.gov (United States)

    Keller, Richard M.; Lucas, Paul J.; Compton, Michael M.; Stewart, Helen J.; Baya, Vinod; DelAlto, Martha

    1999-01-01

    The deployment of information-sharing systems in large organizations can significantly impact existing policies and procedures with regard to authority and control over information. Unless information-sharing systems explicitly support organizational structures and needs, these systems will be rejected summarily. The Postdoc system is a deployed Web-based information-sharing system created specifically to address organizational needs. Postdoc contains various organizational support features including a shared, globally navigable document space, as well as specialized access control, distributed administration, and mailing list features built around the key notion of hierarchical group structures. We review successes and difficulties in supporting organizational needs with Postdoc

  11. Secure medical information sharing in cloud computing.

    Science.gov (United States)

    Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia

    2015-01-01

    Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.

  12. The 'war on terror"and international law

    NARCIS (Netherlands)

    Duffy, Helen

    2013-01-01

    The thesis analyses international law and practice in relation to terrorism and counter-terrorism in the post 9/11 environment. It finds terrorism to be a term of acute and wide-ranging political significance yet one which is not defined under generally accepted treaty or customary international

  13. The Changing Nonlinear Relationship between Income and Terrorism

    Science.gov (United States)

    Enders, Walter; Hoover, Gary A.

    2014-01-01

    This article reinvestigates the relationship between real per capita gross domestic product (GDP) and terrorism. We devise a terrorism Lorenz curve to show that domestic and transnational terrorist attacks are each more concentrated in middle-income countries, thereby suggesting a nonlinear income–terrorism relationship. Moreover, this point of concentration shifted to lower income countries after the rising influence of the religious fundamentalist and nationalist/separatist terrorists in the early 1990s. For transnational terrorist attacks, this shift characterized not only the attack venue but also the perpetrators’ nationality. The article then uses nonlinear smooth transition regressions to establish the relationship between real per capita GDP and terrorism for eight alternative terrorism samples, accounting for venue, perpetrators’ nationality, terrorism type, and the period. Our nonlinear estimates are shown to be favored over estimates using linear or quadratic income determinants of terrorism. These nonlinear estimates are robust to additional controls. PMID:28579636

  14. 78 FR 16692 - Chemical Facility Anti-Terrorism Standards (CFATS)

    Science.gov (United States)

    2013-03-18

    ... trade secrets, confidential commercial or financial information, Chemical-terrorism Vulnerability... from other comments in response to this notice. Comments containing trade secrets, confidential... Burden Cost (operating/maintaining): $3,977. Instrument: Notification of a New Top Screen. Frequency: On...

  15. Library Learning: Undergraduate Students’ Informal, Self-directed, and Information Sharing Strategies

    Directory of Open Access Journals (Sweden)

    Jo Ann Murphy

    2014-04-01

    Full Text Available A focus group study of fourteen University of Saskatchewan second to fourth year humanities and social science undergraduate students was conducted in the fall of 2011. The purpose of the research was to determine how students learn about library resources and services. Findings indicate that the participants often use a variety of informal, self-directed and information sharing strategies. Seeking help from professors, peers, friends, and family members is a common practice. Convenience, familiarity, and perceived knowledge are key factors that determine who and how these students learn about the library. Formal instruction and seeking assistance from librarians did not resonate for participants as a typical approach for learning about the library. The author suggests that undergraduate students engage in informal learning and information sharing as many ‘adult learners’ do, similar to an employment setting. The library, within the formal educational structure, lends itself to a more informal learning context. The study concludes that libraries must continue to develop resources, services, and innovative programs that support students’ informal learning styles, while also providing formal instruction as part of the undergraduate curriculum ensuring students are exposed early on to core foundational skills that contribute to their success as informal and self-directed learners.

  16. Teaching about Terrorism: Lessons Learned at SWOTT

    Science.gov (United States)

    Miller, Gregory D.

    2009-01-01

    This article discusses some of the challenges and lessons for teaching undergraduate-level courses related to terrorism. The author outlines some of the primary issues that instructors can expect to face, and provides strategies for dealing with several of these challenges. The goal is to relay useful information to those teaching, or planning to…

  17. Hospitals: Soft Target for Terrorism?

    Science.gov (United States)

    De Cauwer, Harald; Somville, Francis; Sabbe, Marc; Mortelmans, Luc J

    2017-02-01

    In recent years, the world has been rocked repeatedly by terrorist attacks. Arguably, the most remarkable were: the series of four coordinated suicide plane attacks on September 11, 2001 on buildings in New York, Virginia, and Pennsylvania, USA; and the recent series of two coordinated attacks in Brussels (Belgium), on March 22, 2016, involving two bombings at the departure hall of Brussels International Airport and a bombing at Maalbeek Metro Station located near the European Commission headquarters in the center of Brussels. This statement paper deals with different aspects of hospital policy and disaster response planning that interface with terrorism. Research shows that the availability of necessary equipment and facilities (eg, personal protective clothing, decontamination rooms, antidotes, and anti-viral drugs) in hospitals clearly is insufficient. Emergency teams are insufficiently prepared: adequate and repetitive training remain necessary. Unfortunately, there are many examples of health care workers and physicians or hospitals being targeted in both political or religious conflicts and wars. Many health workers were kidnapped and/or killed by insurgents of various ideology. Attacks on hospitals also could cause long-term effects: hospital units could be unavailable for a long time and replacing staff could take several months, further compounding hospital operations. Both physical and psychological (eg, posttraumatic stress disorder [PTSD]) after-effects of a terrorist attack can be detrimental to health care services. On the other hand, physicians and other hospital employees have shown to be involved in terrorism. As data show that some offenders had a previous history with the location of the terror incident, the possibility of hospitals or other health care services being targeted by insiders is discussed. The purpose of this report was to consider how past terrorist incidents can inform current hospital preparedness and disaster response planning

  18. Space Sharing Between Formal and Informal Sectors In Kemang Area

    Science.gov (United States)

    Sihombing, Antony; Dewanti, Hafizka Chandra

    2018-01-01

    Sharing is a form of human activity as a social being, over resources or spaces. Humans generally define their space according to their psychological and biological needs. However, what if space sharing takes place in an urban scope? The phenomenon of space sharing happens in Kemang area done by two distinct sectors, formal and informal which both are engaged in commercial activities independently. In the study of territory and the behavior settings, the quality of environment can affect the formation of human activities in a space, occurs a phenomenon of space sharing. The researcher will discuss and present a form of the space sharing by the formal and informal sectors in a commercial area through different environmental qualities. In some circumstance, a form of space sharing can increase the value of space and obtain to a shared space, where both sectors mutually take benefits. Otherwise, it leads to an adverse impact in some others. It is clear that differences in the physical environment and social environment have an impact on the formation of space sharing and the value of space in an urban region.

  19. Terrorism, forgiveness and restorative justice

    NARCIS (Netherlands)

    Pemberton, A.

    2014-01-01

    This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly

  20. Animal rights and environmental terrorism

    Directory of Open Access Journals (Sweden)

    Steve Cooke

    2013-09-01

    Full Text Available Many paradigmatic forms of animal rights and environmental activism have been classed as terrorism both in popular discourse and in law. This paper argues that the labelling of many violent forms of direct action carried out in the name of animal rights or environmentalism as ‘terrorism’ is incorrect. Furthermore, the claim is also made that even those acts which are correctly termed as terrorism are not necessarily wrongful acts. The result of this analysis is to call into question the terms of public debate and the legitimacy of anti-terrorism laws targeting and punishing radical activism.

  1. Can or can not? Electronic information sharing influence the participation behavior of the employees

    International Nuclear Information System (INIS)

    Mohammed, M. A.; Eman, Y.; Huda, I.; Thamer, A.

    2015-01-01

    Information sharing refers to information being shared between employees inside or outside an agency, or by providing accessibility of their information and data to other agencies so as to allow effective decision making. Electronic information sharing is a key to effective government. This study is conducted to investigate the factors of electronic information sharing that influence the participation behavior so as to augment it amongst the employees in public organizations. Eleven domains of factors that are considered in this study are benefits, risk, social network, Information stewardship, information quality, trust, privacy, reciprocity. The paper proposes electronic information sharing factors in public sector to increase the participation

  2. Can or can not? Electronic information sharing influence the participation behavior of the employees

    Energy Technology Data Exchange (ETDEWEB)

    Mohammed, M. A., E-mail: mhmdaldbag@yahoo.com; Eman, Y., E-mail: emaroof94@yahoo.com; Huda, I., E-mail: huda753@uum.edu.my; Thamer, A. [University Utara Malaysia, UUM Sintok (Malaysia)

    2015-12-11

    Information sharing refers to information being shared between employees inside or outside an agency, or by providing accessibility of their information and data to other agencies so as to allow effective decision making. Electronic information sharing is a key to effective government. This study is conducted to investigate the factors of electronic information sharing that influence the participation behavior so as to augment it amongst the employees in public organizations. Eleven domains of factors that are considered in this study are benefits, risk, social network, Information stewardship, information quality, trust, privacy, reciprocity. The paper proposes electronic information sharing factors in public sector to increase the participation.

  3. The failure of international action against terrorism.

    Science.gov (United States)

    Suter, Keith

    2006-01-01

    Progress on the so-called 'War on Terrorism' is slow. There is no agreed definition of terrorism and no consistent government policy in respect of it. Consideration of terrorism ignores the role of some governments in what could be regarded as terrorist activity, often with the connivance of others for reasons of political expediency. The special case of suicide terrorism is discussed in detail. It is concluded that the world is now exposed to a new form of warfare, and that even with new military thinking this could continue for perhaps decades to come.

  4. Pathological responses to terrorism.

    Science.gov (United States)

    Yehuda, Rachel; Bryant, Richard; Marmar, Charles; Zohar, Joseph

    2005-10-01

    Many important gains have been made in understanding PTSD and other responses to trauma as a result of neuroscience-based observations. Yet there are many gaps in our knowledge that currently impede our ability to predict those who will develop pathologic responses. Such knowledge is essential for developing appropriate strategies for mounting a mental health response in the aftermath of terrorism and for facilitating the recovery of individuals and society. This paper reviews clinical and biological studies that have led to an identification of pathologic responses following psychological trauma, including terrorism, and highlights areas of future-research. It is important to not only determine risk factors for the development of short- and long-term mental health responses to terrorism, but also apply these risk factors to the prediction of such responses on an individual level. It is also critical to consider the full spectrum of responses to terrorism, as well as the interplay between biological and psychological variables that contribute to these responses. Finally, it is essential to remove the barriers to collecting data in the aftermath of trauma by creating a culture of education in which the academic community can communicate to the public what is and is not known so that survivors of trauma and terrorism will understand the value of their participation in research to the generation of useful knowledge, and by maintaining the acquisition of knowledge as a priority for the government and those involved in the immediate delivery of services in the aftermath of large-scale disaster or trauma.

  5. Terror.com

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    En stor del af terrorens formål er at skabe frygt. Frygt for gentagelse af terror handlinger og dermed opnåelsen af en psykologisk effekt på mennesker eller grupper af mennesker med henblik på at ændre deres holdninger eller adfærd. Et af de primære midler til at opnå denne psykologiske effekt er......, udover terror handlingerne selv, propaganda som opfølgning på terrorhandlinger for at forøge effekten af disse. Eller propaganda som slet og ret har til formål at skabe frygt og usikkerhed. Traditionelt set har meget af spredningen af terrorpropaganda beroet på, at medierne omtalte terrorhandlingerne og...

  6. Basic Research Needs for Countering Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, W.; Michalske, T.; Trewhella, J.; Makowski, L.; Swanson, B.; Colson, S.; Hazen, T.; Roberto, F.; Franz, D.; Resnick, G.; Jacobson, S.; Valdez, J.; Gourley, P.; Tadros, M.; Sigman, M.; Sailor, M.; Ramsey, M.; Smith, B.; Shea, K.; Hrbek, J.; Rodacy, P.; Tevault, D.; Edelstein, N.; Beitz, J.; Burns, C.; Choppin, G.; Clark, S.; Dietz, M.; Rogers, R.; Traina, S.; Baldwin, D.; Thurnauer, M.; Hall, G.; Newman, L.; Miller, D.; Kung, H.; Parkin, D.; Shuh, D.; Shaw, H.; Terminello, L.; Meisel, D.; Blake, D.; Buchanan, M.; Roberto, J.; Colson, S.; Carling, R.; Samara, G.; Sasaki, D.; Pianetta, P.; Faison, B.; Thomassen, D.; Fryberger, T.; Kiernan, G.; Kreisler, M.; Morgan, L.; Hicks, J.; Dehmer, J.; Kerr, L.; Smith, B.; Mays, J.; Clark, S.

    2002-03-01

    To identify connections between technology needs for countering terrorism and underlying science issues and to recommend investment strategies to increase the impact of basic research on efforts to counter terrorism.

  7. Islamic Law and Terrorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Ramlani Lina Sinaulan

    2016-03-01

    Full Text Available Jihād and terrorism are not the same. In the context of sharia that implementation of the jihād has parameters measured with a layer of ethics based on the commands Al Quran and the Hadith of Prophet and the explanation the Ulama. Muslims in Indonesia views that the essentially not much different from the views on jihād and terror in other Islamic countries, especially the Middle East. In the context of Islamic law, jihād has multi spectral studies, but none of these studies that equate the meaning of jihād with terrorism, or none of them agreed that acts of terror as has been demonstrated by radical groups that are part of the concept Islam.

  8. 15 CFR 742.9 - Anti-terrorism: Syria.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Syria. 742.9 Section... BASED CONTROLS § 742.9 Anti-terrorism: Syria. (a) License requirements. (1) If AT Column 1 of the... required for export and reexport to Syria for anti-terrorism purposes. (2) The Secretary of State has...

  9. Terror and Wellbeing

    DEFF Research Database (Denmark)

    Raffnsøe, Sverre

    Currently, terrorism provokes a widespread feeling of insecurity and global reactions to the terrorist attacks. This is not simply because it poses a substantial threat to society and to the lives of individual citizens. The relatively rare incidents of terrorism cause emotional overreaction...... because they challenge and intensify the contract that supersaturates today's society.In the welfare society one can observe the existence of a diffuse but widespread social contract, which has become the single most cohesive element in the social fabric. According the terms of this contract, we agree...

  10. Terrorism in Pakistan: a behavioral sciences perspective.

    Science.gov (United States)

    Nizami, Asad Tamizuddin; Rana, Mowadat Hussain; Hassan, Tariq Mahmood; Minhas, Fareed Aslam

    2014-01-01

    This article reviews the behavioral science perspectives of terrorism in Pakistan. It can be argued that Pakistan has gained worldwide attention for "terrorism" and its role in the "war against terrorism". The region is well placed geopolitically for economic successes but has been plagued by terrorism in various shapes and forms. A behavioral sciences perspective of terrorism is an attempt to explain it in this part of the world as a complex interplay of historical, geopolitical, anthropological and psychosocial factors and forces. Drawing from theories by Western scholars to explain the behavioral and cognitive underpinnings of a terrorist mind, the authors highlight the peculiarities of similar operatives at individual and group levels. Thorny issues related to the ethical and human right dimensions of the topic are visited from the unique perspective of a society challenged by schisms and divergence of opinions at individual, family, and community levels. The authors have attempted to minimize the political descriptions, although this cannot be avoided entirely, because of the nature of terrorism. Copyright © 2014 John Wiley & Sons, Ltd.

  11. Art, Terrorism and the Negative Sublime

    Directory of Open Access Journals (Sweden)

    Arnold Berleant

    2009-01-01

    Full Text Available The range of the aesthetic has expanded to cover not only a wider range of objects and situations of daily life but also to encompass the negative. This includes terrorism, whose aesthetic impact is central to its use as a political tactic. The complex of positive and negative aesthetic values in terrorism are explored, introducing the concept of the sublime as a negative category to illuminate the analysis and the distinctive aesthetic of terrorism.

  12. Cultures of Violence and Acts of Terror: Applying a Legitimation-Habituation Model to Terrorism

    Science.gov (United States)

    Mullins, Christopher W.; Young, Joseph K.

    2012-01-01

    Although uniquely positioned to provide insight into the nature and dynamics of terrorism, overall the field of criminology has seen few empirically focused analyses of this form of political violence. This article seeks to add to the understanding of terror through an exploration of how general levels of violence within a given society influence…

  13. The public production and sharing of medical information. An Australian perspective

    Directory of Open Access Journals (Sweden)

    Henry C.H. Ko

    2010-03-01

    Full Text Available There is a wealth of medical information now available to the public through various sources that are not necessarily controlled by medical or healthcare professionals. In Australia there has been a strong movement in the health consumer arena of consumer-led sharing and production of medical information and in healthcare decision-making. This has led to empowerment of the public as well as increased knowledge-sharing. There are some successful initiatives and strategies on consumer- and public-led sharing of medical information, including the formation of specialised consumer groups, independent medical information organisations, consumer peer tutoring, and email lists and consumer networking events. With well-organised public initiatives and networks, there tends to be fairly balanced information being shared. However, there needs to be caution about the use of publicly available scientific information to further the agenda of special-interest groups and lobbying groups to advance often biased and unproven opinions or for scaremongering. With the adoption of more accountability of medical research, and the increased public scrutiny of private and public research, the validity and quality of medical information reaching the public is achieving higher standards.

  14. Letting Your Personal Health Information Be Used and Shared for Research

    Science.gov (United States)

    ... research study as my okay to share my information for marketing? No. The Privacy Rule does not allow a ... use your authorization to use or share your information for research as an authorization for marketing. What can I do if I think someone ...

  15. 15 CFR 742.8 - Anti-terrorism: Iran.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Iran. 742.8 Section... BASED CONTROLS § 742.8 Anti-terrorism: Iran. (a) License Requirements. (1) A license is required for anti-terrorism purposes to export or reexport to Iran any item for which AT column 1 or AT column 2 is...

  16. 15 CFR 742.10 - Anti-terrorism: Sudan.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Sudan. 742.10 Section...-CCL BASED CONTROLS § 742.10 Anti-terrorism: Sudan. (a) License requirements. (1) If AT column 1 or AT... ECCN, a license is required for export to Sudan for anti-terrorism purposes. 1 AT column 1 refers to...

  17. Empirical scaling law connecting persistence and severity of global terrorism

    Science.gov (United States)

    Gao, Jianbo; Fang, Peng; Liu, Feiyan

    2017-09-01

    Terrorism and counterterrorism have both been evolving rapidly. From time to time, there have been debates on whether the new terrorism is evolutionary or revolutionary. Such debate often becomes more heated after major terrorist activities, such as the terrorist attacks on September 11, 2001 and the November 13, 2015 coordinated Paris terror attack. Using country-wide terrorism data since 1970, we show that there exist scaling laws governing the continuity and persistence of world-wide terrorism, with the long-term scaling parameter for each country closely related to its yearly global terrorism index. This suggests that the new terrorism is more accurately considered evolutionary. It is further shown that the imbalance in the seesaw of terrorism and counterterrorism is not only responsible for the scaling behavior found here, but also provides new means of quantifying the severity of the global terrorism.

  18. Health information sharing on Facebook: An exploratory study on diabetes mellitus

    Directory of Open Access Journals (Sweden)

    Zainab A. AlQarni

    2016-11-01

    Full Text Available Summary: Background: Increasingly, people are using Facebook (FB to share health information. However, little is known about the type of information sharing and its potential health consequences in the Arabic speaking world. This study attempts to fill this knowledge gap for diabetes mellitus (DM. Method: We conducted a retrospective qualitative FB content analysis using predefined eligibility criteria. The analysis was restricted to diabetes related groups in the Arabic speaking world. The data were collected between June 2010 and December 2015. A total of 55 groups were screened of which seven met the eligibility criteria. Results: We found 6107 posts in Arabic related to DM of which 1551 posts were included for further analysis. There were 458 (30% FB posts from Egypt with no posts from Somalia, Yemen, Comoros, and Djibouti. The majority of the posts, 863 (56%, were from females. The focus of the posts was on sharing personal experiences (n = 423, 27%, raising awareness (n = 210, 3.5%, providing spiritual support (n = 162, 10.4%, sharing latest research (n = 147, 9.5%, and providing education (n = 110, 7.1% on DM. A large number of the posts by people in 40–60 year age group were around finding out diagnosis related information due to limited access to care in their home countries. Conclusion: Patients with DM are increasingly sharing their health information with other FB users. This study will help inform future research with regard to health information sharing and designing appropriate interventions to harness the power of social media in improving public health. Keywords: Health information, Facebook, Diabetes mellitus, Arab world

  19. The Impact of 'Narco-terrorism' on HRM

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Muñiz, Carlos

    This paper presents a mixed-method study that explores the configuration of human resource management (HRM) systems in “narco-terrorism” environments. The quantitative analysis focuses on 204 news stories. In addition, 25 interviews were conducted with managers and HR professionals at 20 firms...... in Mexico to explore the direct and indirect impacts of narco-terrorism on firms. Our analysis of firms’ responses in terms of HRM systems indicate that trust of formal and informal institutions seems to shape HRM system in the focal firms. More specifically, a combination of strict employee control......, an emphasis on soft-skills training and development, and a flexible work schedule seems to facilitate the building of trust in narco-terrorism contexts. It seems that the role of firms as social institutions integrate strategies, which seems to aim at avoid and manipulate the institutional constraints. Our...

  20. Night Terrors in Children

    OpenAIRE

    Feferman, Irv

    1988-01-01

    Night terrors are a bizarre sleep disorder that affects young children. The child partially awakes during the night agitated, afraid and terrified, and cannot be consoled. These events, which may be related to emotional turmoil, are self-limiting. Psychiatric evaluation is indicated in certain cases, and drug therapy is almost never necessary. Parents should be reassured that night terrors are not dangerous and do not reflect any serious pathology.

  1. Responding to nuclear terrorism. Chapter 3. Combating radiological terrorism - A multi-faceted challenge

    International Nuclear Information System (INIS)

    Wolf, A.; Yaar, I.

    2006-01-01

    In the twentieth century, radioactive sources have become extensively used in everyday life. These sources, in the hand of terror organizations, can become a threat to the security of civilized nations, causing severe disruption to normal life. On of the main challenges of the civilized world is to keep ahead of the terrorist organizations and take appropriate preventive measures in order to prevent and reduce to minimum the impact of their actions. In order to succeed, a joint and comprehensive effort has to be undertaken to address the scientific, technological, organizational, sociological, psychological and educational aspects of the radiological terrorism threat. In this paper, some of the main activities required for preventing radiological terror events, and the way in which a modular response plan can be prepared are discussed

  2. The Development of a United Nations Counter-Terrorism Policy: A pragmatic approach to the problem of a definition of Terrorism

    OpenAIRE

    Turney-Harris, Latasha

    2014-01-01

    The primary object of this thesis is to propose a pragmatic solution to the legitimacy problems associated with the absence of a definition of Terrorism within United Nations Counter Terrorism Policy. It contends that the attempts to draft such a definition within the Ad Hoc Committee on Terrorism have now come to a political standstill and are unlikely to result in a strong legal definition of terrorism. Any outcome is likely to be a political compromise in nature. This thesis therefore ...

  3. Terrorism and the behavioral sciences.

    Science.gov (United States)

    Schouten, Ronald

    2010-01-01

    Terrorism has existed for millennia and is a phenomenon well-known to many parts of the world. Americans were forced to recognize this phenomenon, and our vulnerability to it, by two sets of events in 2001: the attacks on New York City and Washington, DC, and the anthrax mailings that followed shortly thereafter. Psychiatry, psychology, and other behavioral and social sciences have been looked to for assistance in collecting and analyzing intelligence data, understanding terrorism, and developing strategies to combat terrorism. In addition to reviewing areas in which the behavioral sciences have made contributions in addressing this problem, this article discusses the developing roles for behavioral scientists in this field.

  4. Terror Operations: Case Studies in Terrorism (U.S. Army TRADOC G2 Handbook No. 1.01)

    Science.gov (United States)

    2007-07-25

    terrorism topics. Unless stated otherwise, masculine nouns or pronouns do not refer exclusively to men. Proponent Statement. Headquarters, U.S. Army...Economic and political disruptions can have profound global consequences. Sources of instability within the region include hegemony , terrorism

  5. The influence of locative media on social information sharing: a review

    NARCIS (Netherlands)

    Keijl, Edwin; Klaassen, Randy; op den Akker, Hendrikus J.A.

    2013-01-01

    Mobile phones and social media enable people to share information with others whenever they want, wherever they want. More recent developments allow people to augment their sharing experience by geo-tagging their information through GPS enabled phones. These 'locative media' can be used to

  6. Domestic Violence as Everyday Terrorism

    DEFF Research Database (Denmark)

    Cooper-Cunningham, Dean

    2016-01-01

    Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society.......Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society....

  7. 75 FR 45563 - Terrorism Risk Insurance Program; Final Netting

    Science.gov (United States)

    2010-08-03

    ... DEPARTMENT OF THE TREASURY 31 CFR Part 50 RIN 1505-AC24 Terrorism Risk Insurance Program; Final... Title I of the Terrorism Risk Insurance Act of 2002 (``TRIA'' or ``the Act''), as amended by the Terrorism Risk Insurance Extension Act of 2005 (``Extension Act'') and the Terrorism Risk Insurance Program...

  8. Encouraging information sharing to boost the name-your-own-price auction

    Science.gov (United States)

    Chen, Yahong; Li, Jinlin; Huang, He; Ran, Lun; Hu, Yusheng

    2017-08-01

    During a name-your-own-price (NYOP) auction, buyers can learn a lot of knowledge from their socially connected peers. Such social learning process makes them become more active to attend the auction and also helps them make decisions on what price to submit. Combining an information diffusion model and a belief decision model, we explore three effects of bidders' information sharing on the buyers' behaviors and the seller profit. The results indicate that information sharing significantly increases the NYOP popularity and the seller profit. When enlarging the quality or quantity of information sharing, or increasing the spreading efficiency of the network topology, the number of attenders and the seller profit are increased significantly. However, the spread of information may make bidders be more likely to bid higher and consequently lose surplus. In addition, the different but interdependent influence of the successful information and failure information are discussed in this work.

  9. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    International Nuclear Information System (INIS)

    Gareva, R.

    2007-01-01

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  10. [Terrorism and human behavior].

    Science.gov (United States)

    Leistedt, S J

    2018-04-01

    Theories of religion are essential for understanding current trends in terrorist activities. The aim of this work is to clarify religion's role in facilitating terror and outline in parallel with recent theoretical developments on terrorism and human behaviour. Several databases were used such as PubCentral, Scopus, Medline and Science Direct. The search terms "terrorism", "social psychology", "religion", "evolution", and "cognition" were used to identify relevant studies in the databases. This work examines, in a multidimensional way, how terrorists employ these features of religion to achieve their goals. In the same way, it describes how terrorists use rituals to conditionally associate emotions with sanctified symbols that are emotionally evocative and motivationally powerful, fostering group solidarity, trust, and cooperation. Religious beliefs, including promised rewards in the afterlife, further serve to facilitate cooperation by altering the perceived payoffs of costly actions, including suicide bombing. The adolescent pattern of brain development is unique, and young adulthood presents an ideal developmental stage to attract recruits and enlist them in high-risk behaviors. This work offers insights, based on this translational analysis, concerning the links between religion, terrorism and human behavior. Copyright © 2017 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  11. Policy lessons from comparing mortality from two global forces: international terrorism and tobacco

    Directory of Open Access Journals (Sweden)

    Wilson Nick

    2005-12-01

    Full Text Available Abstract Background The aim of this study was to compare the mortality burdens from two global impacts on mortality: international terrorism and the major cause of preventable death in developed countries – tobacco use. We also sought to examine the similarities and differences between these two causes of mortality so as to better inform the policy responses directed at prevention. Methods Data on deaths from international terrorism were obtained from a US State Department database for 1994–2003. Estimates for tobacco-attributable deaths were based on Peto et al 2003. The countries were 37 developed and East European countries. Results and discussion The collective annualized mortality burden from tobacco was approximately 5700 times that of international terrorism. The ratio of annual tobacco to international terrorism deaths was lowest for the United States at 1700 times, followed by Russia at 12,900 times. The tobacco death burden in all these countries was equivalent to the impact of an 11 September type terrorist attack every 14 hours. Different perceptions of risk may contribute to the relative lack of a policy response to tobacco mortality, despite its relatively greater scale. The lack is also despite tobacco control having a stronger evidence base for the prevention measures used. Conclusion This comparison highlights the way risk perception may determine different policy responses to global forces causing mortality. Nevertheless, the large mortality differential between international terrorism and tobacco use has policy implications for informing the rational use of resources to prevent premature death.

  12. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  13. Entering the Black Hole: The Taliban, Terrorism, and Organised Crime

    Directory of Open Access Journals (Sweden)

    Matthew D. Phillips

    2014-09-01

    Full Text Available 'Cooperation and imitation among crime and terror groups in recent years has given rise to a crime-terror nexus. A linear conceptualisation of a crime-terror spectrum, suggests that complete convergence of crime and terror in a failed state can give rise to a ‘black hole.’ Theoretical models of the crime-terror nexus, however, do not specify the means by which a crime-terror group enters this black hole state, yet others do not. Using the Taliban movement as a case study, this article presents a theoretical extension of black hole theory, using organisation-level characteristics to merge black hole theory with the crime-terror continuum.'

  14. Online GIS services for mapping and sharing disease information

    DEFF Research Database (Denmark)

    Gao, Sheng; Mioc, Darka; Anton, François

    2008-01-01

    Background Disease data sharing is important for the collaborative preparation, response, and recovery stages of disease control. Disease phenomena are strongly associated with spatial and temporal factors. Web-based Geographical Information Systems provide a real-time and dynamic way to represent...... and responding to disease outbreaks. To overcome these challenges in disease data mapping and sharing, the senior authors have designed an interoperable service oriented architecture based on Open Geospatial Consortium specifications to share the spatio-temporal disease information. Results A case study...... of infectious disease mapping across New Brunswick (Canada) and Maine (USA) was carried out to evaluate the proposed architecture, which uses standard Web Map Service, Styled Layer Descriptor and Web Map Context specifications. The case study shows the effectiveness of an infectious disease surveillance system...

  15. A methodology for modeling regional terrorism risk.

    Science.gov (United States)

    Chatterjee, Samrat; Abkowitz, Mark D

    2011-07-01

    Over the past decade, terrorism risk has become a prominent consideration in protecting the well-being of individuals and organizations. More recently, there has been interest in not only quantifying terrorism risk, but also placing it in the context of an all-hazards environment in which consideration is given to accidents and natural hazards, as well as intentional acts. This article discusses the development of a regional terrorism risk assessment model designed for this purpose. The approach taken is to model terrorism risk as a dependent variable, expressed in expected annual monetary terms, as a function of attributes of population concentration and critical infrastructure. This allows for an assessment of regional terrorism risk in and of itself, as well as in relation to man-made accident and natural hazard risks, so that mitigation resources can be allocated in an effective manner. The adopted methodology incorporates elements of two terrorism risk modeling approaches (event-based models and risk indicators), producing results that can be utilized at various jurisdictional levels. The validity, strengths, and limitations of the model are discussed in the context of a case study application within the United States. © 2011 Society for Risk Analysis.

  16. Using Information-Sharing Exchange Techniques from the Private Sector to Enhance Information Sharing Between Domestic Intelligence Organizations

    Science.gov (United States)

    2013-12-01

    Travel Alliance —Fast Res System Flow (From Open Travel, 2009a...Intelligence Center THN Tourism Harmonisation Network VCC Virtual Command Center xiii ACKNOWLEDGMENTS I would like to open with thanking my wife...HSIN) The HSIN brand is divided into two parts, HSIN and HSIN-Intel. The larger HSIN is devoted to information sharing amongst the public safety

  17. Comprehensive Study on Wastages of Supply Chain Information Sharing in Automotive Industries

    Science.gov (United States)

    Sendhil Kumar, R.; Pugazhendhi, S.; Muralidharan, C.; Murali, S.

    2017-03-01

    A supply chain is a very extensive concept, which encompasses many problems and features when it comes to controlling. Now a day’s lean concept is a very common method to several areas, such as service sectors and manufacturing. Applying the lean concept to supply chain management is a very popular study part, it has attracted many industrial practices and researchers with different applications. Information sharing and technology remain one of the key factors of integrating the supply chain members. Current scenario the competition is no longer between the competing companies, but it happens between the supply chains. So the efficiency of the supply chain is very important. And the effective sharing of information can enhance the supply chain efficiency through minimizing the inventories and Information sharing can increase supply chain efficiency by reducing inventories and stabilizing the production. This paper describes and discusses about the seven deadly wastes of supply chain information with the comparative principle of Toyota production system (TPS) principle approach. How the TPS can be applied to supply chain information sharing And lean tool of 5S concept possibility improve the information sharing.

  18. Library Information System Time-Sharing (LISTS) Project. Final Report.

    Science.gov (United States)

    Black, Donald V.

    The Library Information System Time-Sharing (LISTS) experiment was based on three innovations in data processing technology: (1) the advent of computer time-sharing on third-generation machines, (2) the development of general-purpose file-management software and (3) the introduction of large, library-oriented data bases. The main body of the…

  19. Terrorism and nuclear damage coverage

    International Nuclear Information System (INIS)

    Horbach, N. L. J. T.; Brown, O. F.; Vanden Borre, T.

    2004-01-01

    This paper deals with nuclear terrorism and the manner in which nuclear operators can insure themselves against it, based on the international nuclear liability conventions. It concludes that terrorism is currently not covered under the treaty exoneration provisions on 'war-like events' based on an analysis of the concept on 'terrorism' and travaux preparatoires. Consequently, operators remain liable for nuclear damage resulting from terrorist acts, for which mandatory insurance is applicable. Since nuclear insurance industry looks at excluding such insurance coverage from their policies in the near future, this article aims to suggest alternative means for insurance, in order to ensure adequate compensation for innocent victims. The September 11, 2001 attacks at the World Trade Center in New York City and the Pentagon in Washington, DC resulted in the largest loss in the history of insurance, inevitably leading to concerns about nuclear damage coverage, should future such assaults target a nuclear power plant or other nuclear installation. Since the attacks, some insurers have signalled their intentions to exclude coverage for terrorism from their nuclear liability and property insurance policies. Other insurers are maintaining coverage for terrorism, but are establishing aggregate limits or sublimits and are increasing premiums. Additional changes by insurers are likely to occur. Highlighted by the September 11th events, and most recently by those in Madrid on 11 March 2004, are questions about how to define acts of terrorism and the extent to which such are covered under the international nuclear liability conventions and various domestic nuclear liability laws. Of particular concern to insurers is the possibility of coordinated simultaneous attacks on multiple nuclear facilities. This paper provides a survey of the issues, and recommendations for future clarifications and coverage options.(author)

  20. Health information sharing on Facebook: An exploratory study on diabetes mellitus.

    Science.gov (United States)

    AlQarni, Zainab A; Yunus, Faisel; Househ, Mowafa S

    Increasingly, people are using Facebook (FB) to share health information. However, little is known about the type of information sharing and its potential health consequences in the Arabic speaking world. This study attempts to fill this knowledge gap for diabetes mellitus (DM). We conducted a retrospective qualitative FB content analysis using predefined eligibility criteria. The analysis was restricted to diabetes related groups in the Arabic speaking world. The data were collected between June 2010 and December 2015. A total of 55 groups were screened of which seven met the eligibility criteria. We found 6107 posts in Arabic related to DM of which 1551 posts were included for further analysis. There were 458 (30%) FB posts from Egypt with no posts from Somalia, Yemen, Comoros, and Djibouti. The majority of the posts, 863 (56%), were from females. The focus of the posts was on sharing personal experiences (n=423, 27%), raising awareness (n=210, 3.5%), providing spiritual support (n=162, 10.4%), sharing latest research (n=147, 9.5%), and providing education (n=110, 7.1%) on DM. A large number of the posts by people in 40-60 year age group were around finding out diagnosis related information due to limited access to care in their home countries. Patients with DM are increasingly sharing their health information with other FB users. This study will help inform future research with regard to health information sharing and designing appropriate interventions to harness the power of social media in improving public health. Copyright © 2016 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  1. The universal legal framework against nuclear terrorism

    International Nuclear Information System (INIS)

    Gehr, W.

    2007-01-01

    After the events of September 11, the United Nations Security Council adopted Resolution 1373 (2001) which has been called the 'Counter-Terrorism Code' of the world, because it creates legal obligations for all 192 Member States of the United Nations. UN Security Council Resolutions 1373 (2001), 1540 (2004) and 1735 (2006) as well as a defined set of 13 global treaties constitute the universal legal framework against terrorism which must be implemented in a manner consistent with international human rights obligations. Basically, these 13 treaties as well as Resolution 1373 are international criminal law instruments. Within this universal legal framework, the framework against nuclear terrorism is constituted by Resolution 1540, the Convention on the Physical Protection of Nuclear Material (CPPNM) which entered into force in 1987, and the International Convention for the Suppression of Terrorist Bombings which is in force since 2001. These three legal instruments will be supplemented by the International Convention for the Suppression of Acts of Nuclear Terrorism, an amendment to the CPPNM and two Protocols amending the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation and the Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms Located on the Continental Shelf, once these instruments, all of which were adopted in 2005, enter into force. The Terrorism Prevention Branch (TPB) of the United Nations Office on Drugs and Crime (UNODC) assists countries which are in need of legislative assistance for the drafting of appropriate counter-terrorism laws that duly take into account the obligations contained in Resolution 1373, the United Nations sanctions against Al-Qaida and the Taliban as well as in the 13 universal conventions for the prevention and the suppression of terrorism, including the CPPNM and the new International Convention for the Suppression of Acts of Nuclear Terrorism. UNODC/TPB has also

  2. THE ROLE OF LEADERSHIP IN COMMUNITY PARTNERSHIP, ORGANIZATIONAL CHANGES AND DECISION-MAKING PROCESS IN ADDRESSING CRIME ISSUES, AND TERRORISM

    Directory of Open Access Journals (Sweden)

    Ferid Azemi

    2017-09-01

    Full Text Available This research paper explains the role of leadership style in building community partnership and in this way also addressing many crime issues and terrorism. The methods used during this research paper are the deep insight of understanding leadership collaboration and organizational changes through literature review. A qualitative design was applied for face-to-face interview with a high ranking member of Kosovo Police. This interview shed light on the role of leadership style and challenges that are related to police reformation and also organizational changes. Through this paper, police leadership may be viewed differently, and seem to be very complex. Community partnership and shared decision-making process were emphasized during this study. This research paper also focused on integrity, ethics and strategic planning. Community partnership, organizational changes, and shared decision-making process are related to leadership style. Leadership style may have either positive or adverse effect on addressing crime rate and terrorism. Depending on the style leaders implement, certain components such as community partnership, or organizational change or even shared decision-making process may fail to function. This is why leadership style seems to bring some very interesting conclusions on this research.

  3. The Mediating Role of Knowledge Sharing on Information Technology and Innovation

    Directory of Open Access Journals (Sweden)

    Onwika Kaewchur

    2013-12-01

    Full Text Available This study aims to investigate the relationship between information technology, knowledge sharing, and a firm’s innovation. Knowledge sharing as a mediating effect is also simultaneously investigated with regard to the relationship between information technology and a firm’s innovation. In this research, the quantitative method was mainly employed. The data was collected with a survey. A total of 224 respondents from herbal manufacturing companies were included in the research. The results presented in this paper demonstrate that knowledge sharing and information technology can critically influence the organization’s innovation and can play a vital role as a significant success factor in this process.

  4. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  5. What is terrorism and can psychology do anything to prevent it?

    Science.gov (United States)

    Stevens, Michael J

    2005-01-01

    Terrorism has a long history, which continues to unfold, and takes many forms. Notwithstanding these facts, there is no generally accepted definition of terrorism. I set forth the definitional issues that underlie the current debate about terrorism. By comparing terrorism with various forms of violence, I argue that it is plausible to construe terrorism as crime and, in support of this, I demonstrate why terrorism cannot be morally justified. Next, I cluster various immediate and long-term approaches intended to prevent terrorism, highlighting psychologically based strategies, such as behavioral profiling, teaching tolerance and citizenship, modifying media images of terrorism, and building peace. In order to understand and respond more effectively to 21st-century terrorism, I advocate adoption of a multidisciplinary, contextually sensitive approach.

  6. Knowledge sharing and innovation in relationships interorganizational type of information technology outsourcing

    Directory of Open Access Journals (Sweden)

    Roberta Rodrigues Faoro

    2017-04-01

    Full Text Available Introduction: this paper presents an analysis of the sharing of knowledge and innovation in the inter-relationships of the type outsourcing of Information Technology. Objective: analyze the existence of relationship between knowledge sharing and innovation in the inter-relationships of the type of outsourcing information technology (IT. Methodology: research is exploratory, qualitative and using as a strategy the multiple case study, which analyzed 12 companies in IT outsourcing environments, 4 suppliers of IT and IT 8 client companies. Data were collected through semi structured interviews, documentary and direct observation. Results: it can be noted that the sharing of knowledge showed contribute to the existence of innovation in IT outsourcing environment. The suppliers prioritize the codification of shared knowledge, while customers prefer the sharing of knowledge through informal conversations. It was identified that the motives for outsourcing IT may be related to the sharing of knowledge and innovation. Conclusions: this research contributes to the advancement of knowledge about the knowledge and innovation sharing phenomena in outsourcing of IT environments.

  7. Nuclear proliferation and terrorism

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    This section of the book, Part III, has two chapters (9 and 10). Chapter 9, Nuclear Power and Proliferation of Nuclear Weapons, is disucssed under these subjects: nuclear nonproliferation: origins and status; requirements for nuclear weapons manufacture; current nuclear programs and proliferation capabilities; encouraging decisions to forego weapons; arms control; safeguards; attitudes and expectations. Chapter 10, Nuclear Terrorism, discusses these areas: theft of nuclear materials; attacks on nuclear reactors; responding to nuclear terrorism; security and civil liberties

  8. Anonymity versus privacy: Selective information sharing in online cancer communities

    NARCIS (Netherlands)

    Frost, J.H.; Vermeulen, I.E.; Beekers, N.

    2014-01-01

    Background: Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient

  9. Informing Ex Ante Event Studies with Macro-Econometric Evidence on the Structural and Policy Impacts of Terrorism.

    Science.gov (United States)

    Nassios, Jason; Giesecke, James A

    2018-04-01

    Economic consequence analysis is one of many inputs to terrorism contingency planning. Computable general equilibrium (CGE) models are being used more frequently in these analyses, in part because of their capacity to accommodate high levels of event-specific detail. In modeling the potential economic effects of a hypothetical terrorist event, two broad sets of shocks are required: (1) physical impacts on observable variables (e.g., asset damage); (2) behavioral impacts on unobservable variables (e.g., investor uncertainty). Assembling shocks describing the physical impacts of a terrorist incident is relatively straightforward, since estimates are either readily available or plausibly inferred. However, assembling shocks describing behavioral impacts is more difficult. Values for behavioral variables (e.g., required rates of return) are typically inferred or estimated by indirect means. Generally, this has been achieved via reference to extraneous literature or ex ante surveys. This article explores a new method. We elucidate the magnitude of CGE-relevant structural shifts implicit in econometric evidence on terrorist incidents, with a view to informing future ex ante event assessments. Ex post econometric studies of terrorism by Blomberg et al. yield macro econometric equations that describe the response of observable economic variables (e.g., GDP growth) to terrorist incidents. We use these equations to determine estimates for relevant (unobservable) structural and policy variables impacted by terrorist incidents, using a CGE model of the United States. This allows us to: (i) compare values for these shifts with input assumptions in earlier ex ante CGE studies; and (ii) discuss how future ex ante studies can be informed by our analysis. © 2017 Society for Risk Analysis.

  10. Dirty hands : Government torture and terrorism

    NARCIS (Netherlands)

    Daxecker, U.

    2017-01-01

    Existing research suggests that the use of harsh repression can exacerbate the incidence and duration of terrorism. Micro- and macro-level analyses have shown that coercive government responses to terrorism can radicalize sympathizers, increase recruitment, and undermine community support for

  11. Analysing Terrorism from a Systems Thinking Perspective

    Directory of Open Access Journals (Sweden)

    Lukas Schoenenberger

    2014-02-01

    Full Text Available Given the complexity of terrorism, solutions based on single factors are destined to fail. Systems thinking offers various tools for helping researchers and policy makers comprehend terrorism in its entirety. We have developed a semi-quantitative systems thinking approach for characterising relationships between variables critical to terrorism and their impact on the system as a whole. For a better understanding of the mechanisms underlying terrorism, we present a 16-variable model characterising the critical components of terrorism and perform a series of highly focused analyses. We show how to determine which variables are best suited for government intervention, describing in detail their effects on the key variable—the political influence of a terrorist network. We also offer insights into how to elicit variables that destabilise and ultimately break down these networks. Because we clarify our novel approach with fictional data, the primary importance of this paper lies in the new framework for reasoning that it provides.

  12. Sharing Information to Promote a Culture of Safety

    Science.gov (United States)

    Goodrum, Sarah; Woodward, William; Thompson, Andrew J.

    2017-01-01

    Much of the research on school shootings emphasizes the need for peers, not school officials, to share information about students of concern. This qualitative case study examined the information school officials had prior to a school shooting, which left two students dead. The data came from school officials' deposition testimony and school…

  13. IAEA to hold special session on nuclear terrorism

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA this week for an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. The Special Session, which will bring together experts on nuclear terrorism from around the world, will deal with the following issues: The Psychology of terrorism; Intelligence, police and border protection; Guarding nuclear reactors and material from terrorists and thieves; The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices; The threat of nuclear terrorism: Intentional dispersal of radioactive material - Sabotage of fixed installations or transport systems; The Legal Framework: Treaties and Conventions, Laws; Regulations and Codes of Practice; IAEA Nuclear Security and Safety Programmes

  14. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  15. International terrorism in the age of globalization

    OpenAIRE

    Aksoy, Ece

    2002-01-01

    Cataloged from PDF version of article. This thesis analyzes the concept of terrorism in the age of globalization. Terrorism, which has been motivated by ideological, religious and national reasons, has added to its concern issues like inequality, injustice, dissatisfaction and antiglobalist movements, due to development and technology in the world. In order to clarify this shift in the policy, the concepts of terrorism and globalization are first explained as distinct issues...

  16. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.

    Science.gov (United States)

    He, Meilin; Devine, Laura; Zhuang, Jun

    2018-02-01

    The government, private sectors, and others users of the Internet are increasingly faced with the risk of cyber incidents. Damage to computer systems and theft of sensitive data caused by cyber attacks have the potential to result in lasting harm to entities under attack, or to society as a whole. The effects of cyber attacks are not always obvious, and detecting them is not a simple proposition. As the U.S. federal government believes that information sharing on cybersecurity issues among organizations is essential to safety, security, and resilience, the importance of trusted information exchange has been emphasized to support public and private decision making by encouraging the creation of the Information Sharing and Analysis Center (ISAC). Through a decision-theoretic approach, this article provides new perspectives on ISAC, and the advent of the new Information Sharing and Analysis Organizations (ISAOs), which are intended to provide similar benefits to organizations that cannot fit easily into the ISAC structure. To help understand the processes of information sharing against cyber threats, this article illustrates 15 representative information sharing structures between ISAC, government, and other participating entities, and provide discussions on the strategic interactions between different stakeholders. This article also identifies the costs of information sharing and information security borne by different parties in this public-private partnership both before and after cyber attacks, as well as the two main benefits. This article provides perspectives on the mechanism of information sharing and some detailed cost-benefit analysis. © 2017 Society for Risk Analysis.

  17. SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud

    Directory of Open Access Journals (Sweden)

    Davide Albertini

    2014-10-01

    Full Text Available In last few years, Online Social Networks (OSNs have become one of the most used platforms for sharing data (e.g., pictures, short texts on the Internet. Nowadays Facebook and Twitter are the most popular OSN providers, though they implement different social models. However, independently from the social model they implement, OSN platforms have become a widespread repository of personal information. All these data (e.g., profile information, shared elements, users’ likes are stored in a centralized repository that can be exploited for data mining and marketing analysis. With this data collection process, lots of sensitive information are gathered by OSN providers that, in time, have become more and more targeted by malicious attackers. To overcome this problem, in this paper we present an architectural framework that, by means of a Social Application registered in Facebook, allows users to move their data (e.g., relationships, resources outside the OSN realm and to store them in the public Cloud. Given that the public Cloud is not a secure and private environment, our proposal provides users security and privacy guarantees over their data by encrypting the resources and by anonymizing their social graphs. The presented framework enforces Relationship-Based Access Control (ReBAC rules over the anonymized social graph, providing OSN users the possibility to selectively share information and resources as they are used to do in Facebook.

  18. Fuzzy-rule-based Adaptive Resource Control for Information Sharing in P2P Networks

    Science.gov (United States)

    Wu, Zhengping; Wu, Hao

    With more and more peer-to-peer (P2P) technologies available for online collaboration and information sharing, people can launch more and more collaborative work in online social networks with friends, colleagues, and even strangers. Without face-to-face interactions, the question of who can be trusted and then share information with becomes a big concern of a user in these online social networks. This paper introduces an adaptive control service using fuzzy logic in preference definition for P2P information sharing control, and designs a novel decision-making mechanism using formal fuzzy rules and reasoning mechanisms adjusting P2P information sharing status following individual users' preferences. Applications of this adaptive control service into different information sharing environments show that this service can provide a convenient and accurate P2P information sharing control for individual users in P2P networks.

  19. Behavioral, Attitudinal, and Cultural Factors Influencing Interagency Information Sharing

    Science.gov (United States)

    2011-05-01

    Conflict ( Prosocial Behavior ) Cognitive Processes - Shared Team Mental Models, Transactive Memory Action Processes - Team Coordination...information sharing behaviors after the experiment unfolded. To explore this further, an independent sample t -test was conducted, where the difference in...U.S. Army Research Institute for the Behavioral and Social Sciences Research Report 1944 Behavioral , Attitudinal, and Cultural Factors

  20. 31 CFR 50.54 - Payment of Federal share of compensation.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Payment of Federal share of compensation. 50.54 Section 50.54 Money and Finance: Treasury Office of the Secretary of the Treasury TERRORISM... reimbursements to the insurer. (1) Definition of segregated account. For purposes of this section, a segregated...

  1. Towards a European Position on Armed Drones and Targeted Killing: Surveying EU Counter-Terrorism Perspectives

    Directory of Open Access Journals (Sweden)

    Jessica Dorsey

    2015-04-01

    Full Text Available In this Research Paper, Jessica Dorsey and Dr. Christophe Paulussen gauge the extent to which European Union Member States share the position of the United States on armed drones and targeted killings. In doing so, it aims to assist in distilling a common EU position on the use of armed drones and a legal framework for counter-terrorism-related uses of force.

  2. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  3. Implication of information sharing on Bullwhip effects in a toy supply chain

    DEFF Research Database (Denmark)

    Wong, Chee Yew; El-Beheiry, Mohamed; Johansen, John

    2004-01-01

    Coordination of toy supply chains is challenged by volatile and seasonal demand with high forecast errors and bullwhip effects. This paper compares Bullwhip effects in a three-level divergent a toy supply chain between retailers who shared downstream demand information (consumer sales...... using early order commitment has decreased the Bullwhip effect for all supply chain members even if it is applied locally.......) and retailers who did not share. Bullwhip effect is reduced when the shared volume of retailers who shared downstream demand information increased; however, fill rate performance is not improved. Key causes of Bullwhip effect are identified - forecast updating, timeliness of demand signal, limited use of shared...

  4. Estimation of Radiological Terrorism Risk by Administrative Districts

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Suk Hoon; Kim, Ju Youl [Seoul National Univ., Seoul (Korea, Republic of); Yoo, Ho Sik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2008-10-15

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks.

  5. Estimation of Radiological Terrorism Risk by Administrative Districts

    International Nuclear Information System (INIS)

    Kim, Suk Hoon; Kim, Ju Youl; Yoo, Ho Sik

    2008-01-01

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks

  6. Exploring the concepts of privacy and the sharing of sensitive health information.

    Science.gov (United States)

    Asiri, Eman; Asiri, Hanan; Househ, Mowafa

    2014-01-01

    People are increasingly sharing their personal information on social networks such as Facebook. Patients, in particular, join online support groups for specific conditions to get support and share their experience with other members of a social media group. Throughout this process, sensitive health information could be shared by group members as a part of this information exchange and privacy concerns can arise as a result. The purpose of this study is to explore various aspects relating to privacy and the sharing of sensitive health information through social media platforms. Our review found that social media such as Facebook already plays a large role in patients' lives as it helps patients to understand their health conditions and gain support from other people who suffer from the same condition. However, there are major concerns for those patients as their privacy and confidentiality can be harmed by improper use of their posted sensitive health information by governments, hospitals or individuals. More importantly, there is an increased need for laws and legislations that protect and empower patients. We recommend that healthcare organizations collaborate with social media software companies and create educational and awareness campaigns on the impacts of sharing sensitive health information through social media.

  7. 15 CFR 742.19 - Anti-terrorism: North Korea.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: North Korea. 742.19...-CCL BASED CONTROLS § 742.19 Anti-terrorism: North Korea. (a) License Requirements. (1) All items on... anti-terrorism reasons require a license for export or reexport to North Korea. This includes all items...

  8. 31 CFR 50.72 - Establishment of Federal Terrorism Policy Surcharge.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Establishment of Federal Terrorism... TERRORISM RISK INSURANCE PROGRAM Recoupment and Surcharge Procedures § 50.72 Establishment of Federal Terrorism Policy Surcharge. (a) Treasury will establish the Federal Terrorism Policy Surcharge based on the...

  9. 6 CFR 25.4 - Designation of qualified anti-terrorism technologies.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Designation of qualified anti-terrorism... REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...

  10. The Influence of Information Behaviour on Information Sharing across Cultural Boundaries in Development Contexts

    Science.gov (United States)

    Meyer, Hester W. J.

    2009-01-01

    Introduction: Sharing of information across cultural boundaries does not always live up to expectations. Information behaviour is an underlying factor, which can contribute to poor use or non-use of the information or information services at the disposal of indigenous people in a development context. Method: A literature study of information…

  11. War on Terror - war on democracy?

    DEFF Research Database (Denmark)

    Bondebjerg, Ib

    2009-01-01

    En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak......En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak...

  12. Privacy Protection in Personal Health Information and Shared Care Records

    Directory of Open Access Journals (Sweden)

    Roderick L B Neame

    2014-03-01

    Full Text Available Background The protection of personal information privacy has become one of the most pressing security concerns for record keepers. Many institutions have yet to implement the essential infrastructure for data privacy protection and patient control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring has led to the imposition of increasingly significant monetary penalties for failures to protect privacy. Objective  There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information.  This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy.  This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing.Requirements for Privacy  There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers to keep patient information confidential and to share it only with the authorisation of the patient.  To achieve this information storage and retrieval, and communication systems must be appropriately configured. Patients may consult clinicians anywhere and at any time: therefore their data must be available for recipient-driven retrieval under patient control and kept private. 

  13. Terrorism and financial supervision

    Directory of Open Access Journals (Sweden)

    Anatoli van der Krans

    2005-12-01

    Full Text Available This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective, proportional and mutually harmonious. Now that many regulations in this field have been established by intra-national bodies, it is important to examine how these regulations are further elaborated in the respective national systems. This article gives a broad overview of legislative initiatives of the UN, USA, FATF, EU and Council of Europe. The Netherlands for numerous reasons serves as a legal example. It is concluded that measures taken or proposed to avoid or at least reduce the financing of terrorism are quite effective to prevent abuse of the financial system. On the other hand, these measures increase the risk of underground or illegal financing, which is even more difficult to control.

  14. 47 CFR 25.263 - Information sharing requirements for SDARS terrestrial repeater operators.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Information sharing requirements for SDARS terrestrial repeater operators. 25.263 Section 25.263 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.263 Information sharing...

  15. Reducing the risk of nuclear terrorism

    International Nuclear Information System (INIS)

    Hibbs, R.

    2005-01-01

    Full text: The March 2005 'International conference on nuclear security, global directions for the future' noted that nuclear terrorism is one of the greatest threats to society. Eminent members of a multi-national panel stated that there is no one principal activity to reduce the risk of nuclear terrorism and that a combination of activities is required. This paper seeks to identify those activities by analyzing the elements that comprise the risk of nuclear terrorism. For the purpose of the analysis, risk is the product of the probability of a terrorist attack (A p ), the success of a terrorist act (S p ) and the consequence (C) of the attack: R=A p * S p * C. The paper examines each of these three elements of risk with the objective of identifying what we are doing and what else we could be doing to reduce risk. It takes into consideration some historic catastrophes, examines how they might have been prevented or their consequences reduced, and if there are lessons that are applicable to reducing the risk of nuclear terrorism. The paper demonstrates that we have concentrated on only one of the three elements of risk and offer suggestions for diminishing the risk of nuclear terrorism by addressing all the elements. (author)

  16. Information sharing and relationships on social networking sites.

    Science.gov (United States)

    Steijn, Wouter M P; Schouten, Alexander P

    2013-08-01

    This article investigates the relationship between sharing personal information and relationship development in the context of social networking sites (SNSs). Information disclosed on these sites could affect relationships in a different manner compared to more traditional interactions, such as instant messaging or face-to-face interaction. Respondents in the age range of 12 to 83 were surveyed about experiences of relationship development as a consequence of contact through Facebook or Hyves-the most popular Dutch SNSs. Results showed a primarily positive effect of information sharing on SNSs on our relationships. Furthermore, relationship development mainly occurs among acquaintances and friends, and public posts are most strongly related to relationship development. These findings suggest that SNSs might affect relationships in a distinct fashion as acquaintances and friends gain access to public self-disclosures that might normally only be reserved for close friends and family. Overall, this study provides an insight into some of the positive aspects of the public nature of SNSs in contrast with the general negative associations.

  17. The implications of information sharing on bullwhip effects in a toy supply chain

    DEFF Research Database (Denmark)

    Wong, Chee Yew; El-Beheiry, Mohamed Mostafa; Johansen, John

    2007-01-01

    This paper compares actual bullwhip effects provided by retailers who shared downstream demand information and retailers who did not share in a three-level (divergent) toy supply chain. The toy supply chain faces high forecast errors and bullwhip effects due to unpredictable and seasonal demand...... demand information. To reduce the bullwhip effect, two solutions using the shared information are tested. They are a proposed premature replenishment rule and a simple forecast updating mechanism. Both solutions are proven capable in reducing bullwhip effects of the toy supply chain even without...... patterns. The results indicate a reduction of the bullwhip effect and an improvement of the fill rate due to the increase of retailers who shared downstream demand information. This paper also addresses two main causes of the bullwhip effect, which are the supply variability and limited use of the shared...

  18. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    Directory of Open Access Journals (Sweden)

    Asadi NEJMAH

    2015-11-01

    Full Text Available The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the extensive publicity its activity gains in public, through electronic and printed media. In terrorism, a blow to the “soft stomach” of the state (civilians is performed, with the purpose of causing the state to give in to the demands of terrorism operators. In the basis of terrorism is also an objection to the basis of legitimacy of the ruling government, in that it is not capable of guarantying the safety of its citizens and maintain public order. This article presents the attitudes and ways of operation of terrorist organizations and how Western intelligence attempts to thwart, foil and prevent these organizations from casing for destruction and victims in human lives and state.COMBATEREA TERORISMULUI ISLAMIC PRIN WESTERN INTELLIGENCE Chiar de la înfiinţare, statul Israel s-a confruntat, în viaţa de zi cu zi, cu organizaţiile teroriste, care urmăresc să-l distrugă. Actele de terorism, aşa cum reiese din sensul originar al cuvântului – frică, anxietate, teroare, sunt menite să implanteze frica în rândul populaţiei, s-o demoralizeze şi să perturbeze viaţa cotidiană. Uneori teroarea se dovedeşte a fi un act de răzbunare. Prin acte de terorism se dă o lovitură la „stomacul moale” al statului, adică civililor. Actele de terorism sunt comise, de asemenea, pentru a „demonstra” lipsa de legitimitate a statului, incapacitatea lui de a asigura securitatea cetăţenilor săi. În articol sunt specificate modalităţile de func

  19. Gamma-neutron pagers make revolution in combating nuclear terrorism

    International Nuclear Information System (INIS)

    Stavrov, A.; Kagan, L.; Antonovski, A.

    2002-01-01

    Full text: After the events of September 11, 2001 it became quite evident that to combat terrorism, nuclear terrorism including, comprehensive measures able to prevent acts of terrorism are required. One of the important factors that ensure solving this task is technical means that allow early detection of tolls of terrorism. All the aforesaid is especially true for means of detection of radioactive materials. One of the most effective and convenient instruments designed for detection of radioactive materials, including nuclear materials, are gamma-neutron pagers that are instruments of the new generation developed in the last year. These pagers are sensitive, small and rugged monitors designed for detection of special nuclear materials and other radioactive materials by their gamma and/or neutron radiation. This detection is based on a comparison of the radiation intensity of an object and a background. These instruments will immediately inform an individual about the presence of a radioactive source by audible, visual, or vibration alarm. They are easy-to-operate instruments and a user does not need to be an expert in nuclear physics or radiation protection. A pager may be worn in pocket or on a belt ensuring the radiation protection of an individual. This instrument operates in automatic mode during a labor shift. It is provided with a non-volatile memory to store information about a history of operation: date and time when an instrument is turned on/off; the time and radiation levels, gamma and/or neutron, that exceed the alarm threshold; the current values of the count rate, etc. This information can be transmitted to a PC. These instruments can be used as the first level alarming devices at sites where installation of fixed monitors is impossible or inexpedient. Pagers are relatively inexpensive, sensitive and small instruments. Therefore it is advised that each person involved in control of goods transportation, vehicles and people uses such instruments. A

  20. Mental health interventions for children exposed to disasters and terrorism.

    Science.gov (United States)

    Pfefferbaum, Betty; Newman, Elana; Nelson, Summer D

    2014-02-01

    The purpose of this review is to describe interventions used with children who are exposed to disasters and terrorism and to present information about the potential benefits of these interventions. A literature search conducted in January 2013 using relevant databases and literature known to the authors that was not generated by the search yielded a total of 85 studies appropriate for review. Intervention approaches used with children exposed to disasters and terrorism included preparedness interventions, psychological first aid, psychological debriefing, psychoeducation, cognitive behavioral techniques, exposure and narrative techniques, eye movement desensitization and reprocessing, and traumatic grief interventions. The investigation of these interventions is complex, and studies varied in methodological rigor (e.g., sample size, the use of control groups, outcomes measured). Given the limitations in the currently available empirical information, this review integrates the literature, draws tentative conclusions about the current state of knowledge, and suggests future directions for study.

  1. The Dilution of Terrorism - Internship report at the International Center for Terrorism Studies

    OpenAIRE

    Bærentzen, Marc Theis

    2012-01-01

    The focus of this report will be how theory and methodology is a necessary mean for an academic understanding of terrorism, using different theories and examples to substantiate my argument. Terrorism has become a diluted concept that is used in a variety of ways to define violence against civilians. But is this enough to claim that we are dealing with a terrorist threat? In academic work these kind of reflections are important to the drawn conclusion. The problematic issue of an absent metho...

  2. Approaches to Political Violence and Terrorism in former Yugoslavia

    OpenAIRE

    Bieber, Florian

    2003-01-01

    Discusses political violence and terrorism in Yugoslavia caused by ethnic nationalism in the 1990s. Kinds of political conflict; Comparison of political violence with war and terrorism in Yugoslavia; Concept of terrorism and its presence in Southeastern Europe.

  3. Israel's Counter-Terrorism Strategy and its Effectiveness

    National Research Council Canada - National Science Library

    Smith, Jerry D

    2005-01-01

    This thesis analyzes Israeli counter-terrorism strategy and its effectiveness. Because of ongoing suicide attacks from Palestinian and other terrorist organizations, Israel will continue to have an aggressive counter-terrorism strategy...

  4. Why is terrorism a man's business?

    Science.gov (United States)

    Möller-Leimkühler, Anne Maria

    2018-04-01

    Terrorism, whether it is group-related or performed as lone actor terrorism, is a predominantly male phenomenon. Generally and throughout history, young males have been the main protagonists of criminal and political violence.This article aims to contribute, from different perspecives, to the question of what makes young men violent. These include neurobiological aspects, such as sex differences in the brain that predispose males to physical aggression and violence; gender role aspects, with regard to aggression and violence being basic components for demonstrating and reconstructing masculinity; demographic aspects of male youth bulges as potential breeding grounds for terrorism; aspects of group dynamics and identity fusion in the process of radicalization; and psychosocial characteristics of lone actor terrorists, which differ from group-related terrorists.It is concluded that in addition to ideological, political, economic, regional, demographic, or psychosocial causes, experiences of threatened masculinity may be an underlying factor and driving force for terrorism.

  5. Current Issues Concerning Korea’s Anti-Terrorism Programs

    Science.gov (United States)

    2011-06-10

    Terrorism. New York: Columbia University Press, 1998. Laitin, David. Hegemony and Culture : Politics and Religious Change Among the Yoruba . Chicago...such improvements might take. Definitions Terrorism: Definitions of terrorism differ among nations and organizations, because the social and cultural

  6. Center for Civil-Military Relations Counter-Terrorism Fellowship Program

    OpenAIRE

    Shemella, Paul

    2007-01-01

    The advent of more deadly forms of terrorism has challenged all governments to craft responses that stop terrorism while strengthening democracy – and without breeding more terrorism. The era of new terrorism is fraught with paradoxes and dilemmas that require decision-makers to develop a thorough understanding of the threats they face, as well as a comprehensive appreciation for the tools available to them for developing effective responses. No single government can respond effec...

  7. Information Sharing, Cooperative Behaviour and Hotel Performance: A Survey of the Kenyan Hospitality Industry

    Directory of Open Access Journals (Sweden)

    Sammy Odari Namusonge

    2015-10-01

    Full Text Available Information sharing is the life blood of supply chain collaboration. Its role in achieving operational performance of supply chains has been widely acclaimed. However whether information sharing would result in improved performance in the context of the hospitality industry has not been empirically determined. This study sought to find out the role of information sharing on hotel performance when the relationship was mediated by cooperative behaviour. A survey design was employed where proportionate stratified sampling was used to select 50 out of 57 town hotels. Data was collected through the use of questionnaires as well interview guides to the procurement\\supply chain departments of these hotels. Logarithmic transformations were used in conjunction with multiple regression analysis to determine the relationship between information sharing, cooperative behaviour and hotel performance. The study concludes that information sharing in the Kenyan hospitality industry does not directly relate to hotel performance. Its relationship is mediated by cooperative behaviour (trust and attitude with supply chain partners. This suggests that information sharing is essential but insufficient by itself to bring significant performance improvements in hotels in the Kenyan hospitality industry. A possible reason for this is that this collaborative practice is highly dependent on information sharing capability, structure of the information as well as culture. Through quadrant analysis the study identifies and recommends the sharing of information about long term strategic plans and events such as entering new markets and acquiring a new customer base as an area of primary priority for improvement.

  8. Epidemiological patterns of suicide terrorism in the civilian Pakistani population.

    Science.gov (United States)

    Bhatti, Junaid Ahmad; Mehmood, Amber; Shahid, Muhammad; Bhatti, Sajjad Akbar; Akhtar, Umbreen; Razzak, Junaid Abdul

    2011-09-01

    In this study, we assessed the epidemiological patterns of suicide terrorism in the civilian population of Pakistan. Information about suicide terrorism-related events, deaths and injuries was extracted from the South-Asian Terrorism Portal (SATP) for the period from 2002 to October 2009. Of 198 events, civilians were involved in 194 events. Civilians accounted for 74.1% (N = 2017) of those who died and 93.8% (N = 6129) of those who were injured. In nine districts, mortality rates were more than one death per 100,000 inhabitants per year. The yearly trend showed a shift of attack targets from foreigners and sectarian targets in 2002-2005 to security forces or general public in 2006-2009. Attacks on public installations (mosques) or political gatherings resulted in a significantly greater (P ≤ 0.02) number of deaths (22 vs. 8) and injuries (59 vs. 24) per event compared with security installations. These results show that prevention might focus on political negotiation with armed groups and that appropriate measures should be taken to protect mosques and political gatherings.

  9. Political Terrorism: A Mini-Course for High School Social Studies.

    Science.gov (United States)

    Ellington, Lucien

    By participating in the 2-week mini-course, high school students will learn that (1) there is a difference between political terror and other criminal activity; (2) governments as well as nongovernmental groups engage in political terrorism; (3) political terrorism has been present throughout history; (4) political terrorism is a world wide…

  10. Note Taking and Note Sharing While Browsing Campaign Information

    DEFF Research Database (Denmark)

    Robertson, Scott P.; Vatrapu, Ravi; Abraham, George

    2009-01-01

    Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private Notes, and Shared Notes. Note taking significantly influenced the manner in which participants browsed for information...

  11. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam; Beirami, Ahmad; Touri, Behrouz; Shamma, Jeff S.

    2015-01-01

    of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a

  12. 76 FR 19909 - International Terrorism Victim Expense Reimbursement Program

    Science.gov (United States)

    2011-04-11

    ... 1121-AA78 International Terrorism Victim Expense Reimbursement Program AGENCY: Office of Justice... promulgating this interim-final rule for its International Terrorism Victim Expense Reimbursement Program... international terrorism. DATES: Effective date: This interim-final rule is effective April 11, 2011. Comment...

  13. 78 FR 15680 - Information Sharing With Agency Stakeholders: Public Meeting

    Science.gov (United States)

    2013-03-12

    ...] Information Sharing With Agency Stakeholders: Public Meeting AGENCY: Animal and Plant Health Inspection... stakeholders regarding cross-Agency strategic priorities. We are also announcing that APHIS is hosting a public... opportunity for stakeholders to ask questions and share their perspective. DATES: The meeting will be held on...

  14. An Examination of How the Availability of State-backed Terrorism Insurance Programs and Commercial Terrorism Insurance Affects the Operational Decisions of Multinational Companies.

    OpenAIRE

    GREY, William / WJG

    2011-01-01

    This dissertation explores the extent to which the operational decisions of multinational companies (MNCs) are affected by the availability of State-backed terrorism insurance programs and commercial terrorism insurance. The initial hypothesis made is that MNCs will be reluctant to invest in zones or countries with high terrorism or political risks, especially when insurance for these risks may be limited or unavailable. This investigation finds that the availability of State-backed terrorism...

  15. Report of the Project Research on Disaster Reduction using Disaster Mitigating Information Sharing Technology

    Science.gov (United States)

    Suzuki, Takeyasu

    For the purpose of reducing disaster damage by applying information sharing technologies, "the research on disaster reduction using crisis-adaptive information sharing technologies" was carried out from July, 2004 through March 2007, as a three year joint project composed of a government office and agency, national research institutes, universities, lifeline corporations, a NPO and a private company. In this project, the disaster mitigating information sharing platform which is effective to disaster response activities mainly for local governments was developed, as a framework which enables information sharing in disasters. A prototype of the platform was built by integrating an individual system and tool. Then, it was applied to actual local governments and proved to be effective to disaster responses. This paper summarizes the research project. It defines the platform as a framework of both information contents and information systems first and describes information sharing technologies developed for utilization of the platform. It also introduces fields tests in which a prototype of the platform was applied to local governments.

  16. A proposed universal medical and public health definition of terrorism.

    Science.gov (United States)

    Arnold, Jeffrey L; Ortenwall, Per; Birnbaum, Marvin L; Sundnes, Knut Ole; Aggrawal, Anil; Anantharaman, V; Al Musleh, Abdul Wahab; Asai, Yasufumi; Burkle, Frederick M; Chung, Jae Myung; Cruz-Vega, Felipe; Debacker, Michel; Della Corte, Francesco; Delooz, Herman; Dickinson, Garth; Hodgetts, Timothy; Holliman, C James; MacFarlane, Campbell; Rodoplu, Ulkumen; Stok, Edita; Tsai, Ming-Che

    2003-01-01

    The lack of a universally applicable definition of terrorism has confounded the understanding of terrorism since the term was first coined in 18th Century France. Although a myriad of definitions of terrorism have been advanced over the years, virtually all of these definitions have been crisis-centered, frequently reflecting the political perspectives of those who seek to define it. In this article, we deconstruct these previously used definitions of terrorism in order to reconstruct a definition of terrorism that is consequence-centered, medically relevant, and universally harmonized. A universal medical and public health definition of terrorism will facilitate clinical and scientific research, education, and communication about terrorism-related events or disasters. We propose the following universal medical and public definition of terrorism: The intentional use of violence--real or threatened--against one or more non-combatants and/or those services essential for or protective of their health, resulting in adverse health effects in those immediately affected and their community, ranging from a loss of well-being or security to injury, illness, or death.

  17. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    OpenAIRE

    Asadi NEJMAH

    2015-01-01

    The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the ext...

  18. Characterising the UK Terrorist Threat: The Problem with Non-Violent Ideology as a Focus for Counter-Terrorism and Terrorism as the product of ‘Vulnerability’

    Directory of Open Access Journals (Sweden)

    Anthony Richards

    2012-07-01

    Full Text Available This article investigates two particular aspects as to how the terrorist threat in the UK has been characterised, arguing that they both challenge conventional academic wisdom as to how terrorism should be conceptualised. While such conventional wisdom should always be open to challenge, and policymaking perspectives are different to those of academics, these two particular aspects as to how the terrorist threat has been perceived in the UK merit scrutiny, especially as counter-terrorism strategies have been premised on them. They are: i the contemporary and explicit concern with ‘extremist’ but 'non-violent' ideas that are said to be ‘conducive’ to terrorism as a focus for a counter-terrorism response and ii the notion that terrorism has increasingly been seen as the product of ‘vulnerability’. The first, and the main focus of this article, appears to challenge the widely held view within terrorism studies that, when defining terrorism, reference to the cause or the perpetrator is unhelpful because terrorism should first and foremost (and more objectively be seen as a particular 'method' of violence that has been used by a wide variety of actors, regardless of the ideology or the belief systems of its perpetrators. The second aspect – the impetus towards viewing terrorism as the product of vulnerability or individual fallibility - arguably implies a diminished capacity for rational behaviour, which challenges a further commonly held view within terrorism studies: that terrorism entails the use of calculated and rational acts of violence.

  19. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  20. Techniques for cost-effective electric information sharing; Cost balance wo koryoshita denshi joho kyoyuka gijutsu

    Energy Technology Data Exchange (ETDEWEB)

    Shinohara, Y. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-04-01

    The key technology that can effectively support the sharing of each information such as documents, data, and know-how was rearranged to clarify how to utilize it for constructing an electronic information sharing system. The key technology that supports the sharing of electronic information was rearranged from the viewpoint of information gathering, information rearrangement, and information utilization. The reduction in cost for information gathering and rearrangement is indispensable to the promotion of much information sharing. However, each automation method presently causes the deterioration in quality of the rearranged information and the increase in cost for information utilization. To realize a practical electronic information sharing system, it is important to combine the key technologies properly so that the total cost balance of information gathering and information utilization is improved. Therefore, the combination of character recognition by OCR and unpreciseness retrieval, and the complementary combination of automatic document sorting, based on multiple incomplete rearrangement systems, and multiple sorting menus were proposed. 23 refs., 5 figs., 2 tabs.

  1. Roots of terrorism: a reassessment after September 11th

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F.

    2002-01-01

    The brutal terrorist attacks of September 11th, the anthrax attacks that followed and growing knowledge of al Qaeda's pursuit of nuclear, biological and chemical weapons have not only intensified concerns about terrorism but also created doubts about our understanding of terrorism. These attacks were in many ways unprecedented, and ultimately raise the question of the roots or causes of terrorism. Historically and today, there have been divergent views on this question, which reflect philosophical, religious, political, sociological and other differences. These differences are not merely academic, as they can affect our understanding of both the threat and of responses to terrorism in the aftermath of September 11th, Terrorism is too complex and diverse a phenomenon to speak easily of causes. But we may be able to discern the causes of specific acts. Our response to 9/11 and other acts of terrorism will be affected by our understanding of their causes. If 9/11 was caused by US Middle East policies, the response must involve a review of these policies. If it is a backlash against globalization, the response must address the realities underlying anti-globalization sentiments. Addressing causes will not in any case end terrorism, and addressing the wrong causes will be counterproductive. Actions to reduce those conditions that create support for terrorism and aid its recruitment, which need to be clearly identified, are critical in any counterterrorism strategy. So we must understand the reasons for terrorism and, in particular, for the attacks of September 11th.T his paper will look at the question of the roots of terrorism and then look to the specific case of 911 and its aftermath, with a special view to the impact of globalization.

  2. Terrorism and the adolescent: a review.

    Science.gov (United States)

    Abo, Alyssa; Zalsman, Gil

    2003-01-01

    In recent years suicide bombings have became a part of life in Israel. Adolescents seem to be more vulnerable to the issues of life and death since they have to choose psychologically whether to live or die ("the fourth organizer"). The reaction to terrorism in this age group is unique. After September 11th, a great interest on the subject has arisen in the United States and some new data has been gathered. One of the important messages is that terrorism does not simply equal trauma. The aim of this article is to review current literature on emotional reaction, impact, and therapeutic strategies to terrorism in the adolescent population.

  3. Information And Data-Sharing Plan of IPY China Activity

    Science.gov (United States)

    Zhang, X.; Cheng, W.

    2007-12-01

    Polar Data-Sharing is an effective resolution to global system and polar science problems and to interdisciplinary and sustainable study, as well as an important means to deal with IPY scientific heritages and realize IPY goals. Corresponding to IPY Data-Sharing policies, Information and Data-Sharing Plan was listed in five sub-plans of IPY Chinese Programme launched in March, 2007,they are Scientific research program of the Prydz Bay, Amery Ice Shelf and Dome A transects(short title:'PANDA'), the Arctic Scientific Research Expedition Plan, International Cooperation Plan, Information and Data-Sharing Plan, Education and Outreach. China, since the foundation of Antarctic Zhongshan Station in 1989, has carried out systematic scientific expeditions and researches in Larsemann Hills, Prydz Bay and the neighbouring sea areas, organized 14 Prydz Bay oceanographic investigations, 3 Amery Ice Shelf expeditions, 4 Grove Mountains expeditions and 5 inland ice cap scientific expeditions. 2 comprehensive oceanographic investigations in the Arctic Ocean were conducted in 1999 and 2003, acquired a large amount of data and samples in PANDA section and fan areas of Pacific Ocean in the Arctic Ocean. A mechanism of basic data submitting ,sharing and archiving has been gradually set up since 2000. Presently, Polar Science Database and Polar Sample Resource Sharing Platform of China with the aim of sharing polar data and samples has been initially established and began to provide sharing service to domestic and oversea users. According to IPY Chinese Activity, 2 scientific expeditions in the Arctic Ocean, 3 in the South Ocean, 2 at Amery Ice Shelf, 1 on Grove Mountains and 2 inland ice cap expeditions on Dome A will be carried out during IPY period. According to the experiences accumulated in the past and the jobs in the future, the Information and Data- Sharing Plan, during 2007-2010, will save, archive, and provide exchange and sharing services upon the data obtained by scientific

  4. Design of a Business-to-Government Information Sharing Architecture Using Business Rules

    NARCIS (Netherlands)

    Van Engelenburg, S.H.; Janssen, M.F.W.H.A.; Klievink, A.J.

    2016-01-01

    Information sharing between businesses and government agencies is of vital importance, yet business are often reluctant to share information, e.g. as it might be misused. Taking this into account is however often overlooked in the design of software architectures. In this research we apply a design

  5. The Mega-Terrorism - The Challenge of the Third Millennium

    Directory of Open Access Journals (Sweden)

    Daniel Andrișan

    2011-06-01

    Full Text Available The aim of this article is to describe the "new face" of terrorism in the twenty-first centuryindicating the transition to mass destruction weapons (nuclear terrorism, chemical, biological, toethnic-religious terrorism, the occurrence of massive gray area phenomena of terrorism and how thisphenomenon became a strategic weapon. Mega-terrorism has been existing, at a conceptual level,ever since the 70’s, when the experts of this phenomenon tried to find a semantic cover for thesituations that certain organizations, groups or terrorist or extremist sections would get someWeapons of Mass Destruction Systems. Actually, the 11th of September tragedy proves that megaterrorismrepresents the premeditated destruction, the lack of negotiations, of a tactical goal that wasto be accomplished by means of a threat. The mega-terrorism actors do not intend to get themselvesknown to the public, do not require anything, do not see the threat as means or device to reach theirpurpose. The 21 st century mega-terrorism simple logic is materialized in the systemic destroying ofthe enemy, no longer representing a political power or a government, but an entire ‘disobeying’,‘corrupted’, ‘unfaithful’ population indifferent to the mega-terrorist actors’ desires. New dimensionagainst mega-terrorism determines not only a rethinking of how to combat it, but also the realizationof a conceptual legal framework and measures established to materialize the political decision.

  6. 31 CFR 50.51 - Adjustments to the Federal share of compensation.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Adjustments to the Federal share of compensation. 50.51 Section 50.51 Money and Finance: Treasury Office of the Secretary of the Treasury TERRORISM... and the insurer's recoveries for insured losses from other sources shall not be greater than the...

  7. The age of terrorism: to the problem statement

    Directory of Open Access Journals (Sweden)

    I. V. Yevtyagina

    2014-04-01

    Full Text Available In the present article analyzes the problem of terrorism. Historical essay on the topic helps clarify the concept of the term «terrorism», as well as its causes. The existing classification of terrorism reveals the different types and ways of influencing people by terrorists to achieve their goals. The author suggests the age classification, namely, adult and adolescence terrorism. Discussed in detail adolescence terrorism. The possible reasons for solutions to the problems teenagers violently. On the example of the terrorist act in Moscow school number 263 attempts to analyze the causal relationships aggressive behavior among adolescents in relation to their peers and teachers. Author shows the factors influencing the formation of the propensity to aggression (the terrorist behavior: the crisis of spirituality and morality, reducing cultural awareness, conflict resolution based on adults imitation, striving for leadership, using aggression, the substitution of the present reality of the computer world, acceptance of immoral behavior for conventional norm, plenty of scenes of cruelty and violence in the media, national intolerance. Also in the article are recommendations to prevent teenage terrorism, emphasizes the need for joint activities of the school psychologist, teachers, children and their parents.

  8. Terrorism in Peru.

    Science.gov (United States)

    Barrientos Hernandez, Dora H; Church, Adam L

    2003-01-01

    Two major domestic terrorist groups have plagued Peru over the past 20 years, the Sendero Luminoso or "Shining Path" (SL) and the Revolutionary Movement Túpac Amaru (MRTA). On 28 August 2003, the Peruvian Truth and Reconciliation Commission reported that an estimated 69,280 persons were killed in the internal conflict in Peru from 1980 to 2000. Most of the victims were farmers (56%), most attacks occurred in rural settings (79%), and the SL was responsible for most of the deaths (54%). Aggressive anti-terrorism efforts by police and military during this period, often at the expense of basic human rights, also contributed to this large burden of terrorism on Peru. During the 1990s, terrorist attacks in Peru had spread to its urban areas. On 17 December 1996, 22 members of MRTA took over the Japanese ambassador's residence in Lima, holding 72 hostages until the grounds were stormed by Peruvian special forces on 23 April 1997. Until recently, emergency planning and preparedness for terrorism-related events in Peru were largely underdeveloped. In the last five years, Peru has taken two key steps towards developing a mature emergency response system, with the establishment of the country's first emergency medicine residency training program and the construction of the first dedicated trauma center in Lima.

  9. 16 CFR 313.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Limits on sharing account number information... REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 313.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on...

  10. 12 CFR 40.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Limits on sharing account number information... OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 40.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on disclosure of...

  11. The boomerang affect of the war on terror

    Directory of Open Access Journals (Sweden)

    Carolin Goerzig

    2010-11-01

    Full Text Available Este artículo escruta las reacciones legislativas a los atentados en la ciudad de Oklahoma y los de Londres en 2005 para intentar descifrar como la legislación antiterrorista ha sustancialmente bloqueado estos ataques. Se intenta mostrar como la resistencia de los gobiernos y los ejecutivos aprueba índices críticos en las leyes antiterroristas. A la luz de una reciente encuesta sobre legislación antiterrorista mundial, los casos donde la legislación antiterrorista ha sido bloqueada ha llegado a ser verdaderamente crítica. A este fin, este artículo se pregunta por qué la legislación antiterrorista se bloquea cuando esto sucede. Para responder a esta cuestión, se han testado tres variables: la composición de los gobiernos, la opinión pública-basada en los niveles de terror en sus medios, y el nivel de acuerdos ejecutivos. Para testar estas variables, se han evaluado dos casos: la evolución de la legislación antiterrorista antes de los ataques de la ciudad de Oklahoma en 1995 y antes de los atentados de Londres de 2005. En la evaluación de los casos, los debates legislativos y ejecutivos han ocurrido antes de los ataques terroristas examinados y luego se han comparado los dos casos con el Reino Unido en 1974 y los Estados Unidos en 2001 cuando la legislación antiterrorista inicia su camino. Este artículo concluye que el nivel de acuerdos ejecutivos y la composición de los gobiernos tiene el mayor poder de explicación en determinadas decisiones antiterroristas que llevarán a secundar la legislación antiterrorista o no.Palabras clave: ataques terroristas a Londres, legislación antiterrorista, Estados Unidos, Reino Unido___________________________ABSTRACT:The goal of the war on terror is to prevent a new 9/11. In order to achieve this, the preemptive strike has been introduced to tackle the terrorism risk. However, this precisely leads to the increasing unpredictability of terrorism and hence the likelihood of a new 9

  12. American Jihadist Terrorism: Combating a Complex Threat

    Science.gov (United States)

    2010-12-07

    Goodnough, and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/2009/10/22/us...Abby Goodnough and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/ 2009/10/22/us...July 8, 2009); Tony Allen-Mills, “FBI ‘Lured Dimwits’ into Terror Plot,” The Sunday Times, London, May 24, 2009, http://www.timesonline.co.uk/tol/news

  13. Online Resources Related to Children Affected by War, Terrorism, and Disaster

    Science.gov (United States)

    Masse, Anna L.

    2009-01-01

    This article provides a collection of websites related to children affected by war, terrorism, and disaster. These online resources are intended to provide information about various organizations and their efforts to improve the lives of children in crisis around the world.

  14. THE ROLE OF INFORMATION SHARING IN SUPPLY CHAIN MANAGEMENT: THE SECURESCM APPROACH

    OpenAIRE

    ERNESTO DAMIANI; FULVIO FRATI; ROMARIC TCHOKPON

    2011-01-01

    Information sharing plays a role of paramount importance in modern supply chain environments. In fact, the elements that compose the chain need to share information about sensitive aspects of their business in order to build more accurate and profitable supply plans. In this paper, we describe how the increasing of information released increases the overall economic results of the whole chain, and how this information can be protected, exploiting secure computation techniques, to reduce the r...

  15. 12 CFR 216.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Limits on sharing account number information... GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Limits on Disclosures § 216.12 Limits on sharing account number information for marketing purposes. (a) General...

  16. 12 CFR 573.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Limits on sharing account number information..., DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 573.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on disclosure of...

  17. 12 CFR 332.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Limits on sharing account number information... REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 332.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on...

  18. Dismantling Terrorism: Developing Actionable Solutions for Today's Plague of Violence

    National Research Council Canada - National Science Library

    Scott, Frances K

    2007-01-01

    .... The bibliography is divided into the following sections: causes and origins of terrorism, geographical distribution of terrorist groups, terrorist financing, terrorist groups and networks, the psychology of terrorism, prevention of terrorism, remedies...

  19. Terror in time: extending culturomics to address basic terror management mechanisms.

    Science.gov (United States)

    Dechesne, Mark; Bandt-Law, Bryn

    2018-04-11

    Building on Google's efforts to scan millions of books, this article introduces methodology using a database of annual word frequencies of the 40,000 most frequently occurring words in the American literature between 1800 and 2009. The current paper uses this methodology to replicate and identify terror management processes in historical context. Variation in frequencies of word usage of constructs relevant to terror management theory (e.g. death, worldview, self-esteem, relationships) are investigated over a time period of 209 years. Study 1 corroborated previous TMT findings and demonstrated that word use of constructs related to death and of constructs related to patriotism and romantic relationships significantly co-vary over time. Study 2 showed that the use of the word "death" most strongly co-varies over time with the use of medical constructs, but also co-varies with the use of constructs related to violence, relationships, religion, positive sentiment, and negative sentiment. Study 3 found that a change in the use of death related words is associated with an increase in the use of fear related words, but not in anxiety related words. Results indicate that the described methodology generates valuable insights regarding terror management theory and provide new perspectives for theoretical advances.

  20. Individual differences in relational motives interact with the political context to produce terrorism and terrorism-support.

    Science.gov (United States)

    Thomsen, Lotte; Obaidi, Milan; Sheehy-Skeffington, Jennifer; Kteily, Nour; Sidanius, Jim

    2014-08-01

    The psychology of suicide terrorism involves more than simply the psychology of suicide. Individual differences in social dominance orientation (SDO) interact with the socio-structural, political context to produce support for group-based dominance among members of both dominant and subordinate groups. This may help explain why, in one specific context, some people commit and endorse terrorism, whereas others do not.

  1. Probabilistic risk analysis and terrorism risk.

    Science.gov (United States)

    Ezell, Barry Charles; Bennett, Steven P; von Winterfeldt, Detlof; Sokolowski, John; Collins, Andrew J

    2010-04-01

    Since the terrorist attacks of September 11, 2001, and the subsequent establishment of the U.S. Department of Homeland Security (DHS), considerable efforts have been made to estimate the risks of terrorism and the cost effectiveness of security policies to reduce these risks. DHS, industry, and the academic risk analysis communities have all invested heavily in the development of tools and approaches that can assist decisionmakers in effectively allocating limited resources across the vast array of potential investments that could mitigate risks from terrorism and other threats to the homeland. Decisionmakers demand models, analyses, and decision support that are useful for this task and based on the state of the art. Since terrorism risk analysis is new, no single method is likely to meet this challenge. In this article we explore a number of existing and potential approaches for terrorism risk analysis, focusing particularly on recent discussions regarding the applicability of probabilistic and decision analytic approaches to bioterrorism risks and the Bioterrorism Risk Assessment methodology used by the DHS and criticized by the National Academies and others.

  2. EU’s Role in Fighting Terrorism

    Directory of Open Access Journals (Sweden)

    Jana Maftei

    2009-06-01

    Full Text Available International terrorism, a phenomenon with constant development, is today acertainty and has dramatically marked the beginning of this century and millennium. Thisproblem has reached a global dimension and it represents a concern to the entire internationalcommunity. Over the time, numerous international and regional regulations have been framed, inorder to prevent and combat terrorism. The European Union condemns terrorist acts andrecognizes the central role of the United Nations, in fighting against terrorism and promotingsecurity, as well as the contribution of the new NATO in what concerns the defense and securitypromotion. Europe has to act more firmly in order to consolidate the defense against terrorismand the European Union’s borders. At the same time, the European Union considers that only aconcerted and firm action from all the states and the major actors on the international scenewould lead to the identification of the solutions which can contribute to the efficient fight againstterrorism and, by these means, provide for the international peace and security. The proportion ofthe danger terrorism represents has turned the fight against this phenomenon in an internationalcommunity’s desideratum.

  3. On immorality of terrorism and war

    Directory of Open Access Journals (Sweden)

    Čičovački Predrag

    2003-01-01

    Full Text Available The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable moral implications with regards to the treatment of other human beings, a further common and troubling implication of terrorism and war consists in the fact that dehumanization of others leads also to a dehumanization of ourselves. .

  4. Terrorism and Other Threats to Civilization

    Science.gov (United States)

    Garwin, Richard L.

    2014-07-01

    In the Seminars on Planetary Emergencies, we have for more than a decade had a strong focus on terrorism, and, indeed, on megaterrorism. We realized early that there was much that could be achieved to mitigate the consequences of terrorists' acts, and so our original PMP, ably chaired by Kamal, was split into PMP-MTA (Mitigation of Terrorists Acts) and PMP-Motivation of Terrorism. Clearly, terrorism doesn't just happen, but is performed by people, either relatively spontaneously or in an organized fashion. I will not presume to report on the considerations and accomplishments of our colleagues, chaired by John Alderdice, who have studied terrorist motivations and worked hard to eliminate such motivations...

  5. The Czech National Action Plan on Combating Terrorism: Political and Legal Point of Outcome in Responding to CBRNE-Terrorism

    International Nuclear Information System (INIS)

    Matousek, J.

    2007-01-01

    After the events of September 2001 starting new era in the global terrorism, pursuant to the UN Security Council Resolutions 1368, 1373, and 1377 (2001), new security threats were identified and needs to fight against international terrorism were stressed. In the Czech Republic, a complex approach and broad institutional co-operation including inputs of scientific research (including authors involvement) to analyse endangered critical infrastructures and respective countermeasures had led to strengthening national measures in implementing respective international agreements dealing with WMD non-proliferation under deepening the co-operation within EU and NATO. The concrete complex programme of harmonised effort of all state organs in combating international terrorism resulted in the Czech National Action Plan on Combating Terrorism (2002). This (yearly updated) binding political document (issued by the Czech Government) identifies threats to all sectors of society and contains agreed harmonised active measures to be undertaken by involved organisations and institutions in all aspects of prevention, repression, protection, rescue and recovery for cases of terrorist attacks. The contents and respective measures are presented and discussed in detail with special emphasis on the aspects of CBRNE terrorism and role of Integrated Rescue System.(author)

  6. Information Sharing: Practices That Can Benefit Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    2001-01-01

    .... Information sharing and coordination are key elements in developing comprehensive and practical approaches to defending against computer-based, or cyber, attacks, which could threaten the national welfare...

  7. Management of the Extreme Events: Countering International Terrorism

    Directory of Open Access Journals (Sweden)

    Dr. Cristian Barna

    2011-12-01

    Full Text Available After the terrorism attacks of September 11, 2001, there is recognition by both the public and private sectors that one needs to rethink our strategy for dealing with these low probability but extreme consequence events. September 11, 2001 attacks against the United States raised numerous questions related to counter-terrorism, foreign policy, as well as national security in the United States and abroad. They also raised the fundamental question of who should pay for losses due to terrorism.The question of who should pay for terrorism risk prevention and sustainable coverage within a country is likely to be seen first as a matter of collective responsibility that each country has to consider – a societal choice

  8. Issues of terrorism on the internet in the wave of democratization of post-reform Indonesia: A semiotic analysis

    Directory of Open Access Journals (Sweden)

    Aceng Ruhendi Saifullah

    2016-01-01

    Full Text Available The discourse of terrorism is a global issue but tends to be interpreted as controversial. This study sought to dismantle the controversy of meanings through the analysis of signs and meanings, with a view to explore and demonstrate the wave of democratization that took place in post-reform era in Indonesia. This study was a case study using readers’ responses to terrorism issues provided by cyber media on the Internet. It also rests primarily on the semiotic theory of Peirce and the concept of democratization of Huntington. The results showed that participation, freedom of expression, and equal power relations occurred in the interactive discourse in the cyber news media in the form of a dialogue between the responders, the media, and the debate among the responders. Responders tended to argue that signs and meanings are constructed by the media and to interpret information about terrorism as "political engineering" which was expressed by means of emotive tone. Meanwhile, the media tended to construct a "political imagery" which was expressed in a confrontational way, and the resources tended to understand it as "noise level of political elite ", which was expressed in a persuasive manner. Such differences occurred due to the factors of media context that tended to be "convivial" and the context of the communication situation on the Internet that tends to show "discretion". Based on these findings, this study concluded that interactive discourse in the Internet can be formulated as a democratic forum as the meaning making of the text is no longer dominated by media and the sources of information, but tend to be shared with the public. However, in terms of discourse process, interactive discourse in cyber media tends to be anarchic because the tone of interaction tends to be little, the relationship patterns tend to center on and be dominated by responders, the identities of responders tend to be anonymous, and linguistic expressions of the

  9. Boundaries of the Battlefield: A Critical Look at the Legal Paradigms and Rules in Countering Terrorism

    Directory of Open Access Journals (Sweden)

    Jessica Dorsey

    2013-04-01

    Full Text Available This Research Paper is a detailed report from the two-day symposium entitled The Boundaries of the Battlefield: A Critical Look at the Legal Paradigms and Rules in Countering Terrorism, which was convened in The Hague in January 2013. The conference covered a range of issues that are relevant in debates about using force in counter-terrorism operations against non-state actors. Specifically, this Paper elaborates on a number of key questions raised during the conference; these relate to the temporal and geographical limitations of armed conflict, the interplay between international humanitarian law and international human rights law, as well as the use of drones, the law enforcement approach to counter-terrorism and the possible need for a new framework for countering terrorism. The authors, Jessica Dorsey and Dr. Christophe Paulussen, supplement participants’ debates with detailed background information and theoretical discussions.

  10. Classification of Information Threats to Modern Society

    Directory of Open Access Journals (Sweden)

    А -АВ Таран

    2009-06-01

    One of the main problems in the struggle against criminality, including against cyber terrorism in the information society is that it is difficult to find the guilty person and estimate the scale of aftermaths of a crime. Thus, one can say that any state is not able to withstand by itself efficiently information terrorism and cyber terrorism, only efficient international cooperation is possible.

  11. Health implications of radiological terrorism: Perspectives from Israel

    Directory of Open Access Journals (Sweden)

    Hagby Moti

    2009-01-01

    simulated casualties that will follow the evacuation route from point zero to the ED. Knowledge and exercise will reduce terror (fear from radiation and help the community as a whole better cope with such an event. This article will review the general information of radiation types, their biological damage, clinical appearance and general concepts of nuclear event planning, focusing on medical response and focus on the Israeli perspective.

  12. The Politics of Terrorism: Power, Legitimacy, and Violence

    Directory of Open Access Journals (Sweden)

    Richard A. Couto

    2010-03-01

    Full Text Available This paper examines and juxtaposes discourses about terrorism, violence, and political leadership. It presents generalizations about terrorism—a form of political violence by, for, and against the state—and politics and violence based on the theories of Max Weber and Hannah Arendt. The stark contrasts drawn from these theories include power as non-violent strength (Arendt versus power as violence-dependent (Weber and the struggle for legitimacy between different agents (states and individuals as well as terrorism by, for, and against the state. This reframing of power leads to judging a lack of power where there is violence, and the presence of power where one observes non-violence. An examination of political and criminal violence leads to questions about deliberate and purposeful violence, indirect and structural violence that has political consequences, and their relationship to terrorism. It expands the application of terrorism to include indirect structural violence by indicating its relationship to direct violence, not only in traditionally-viewed terrorist action but in the ignored terror of, for example, inner cities. Terrorism has many forms by many actors. To synthesize the results of these lines of reasoning leads to a conclusion with considerable implications for politics and for political leadership. The politics of terrorism suggest a central counter-terrorist approach: de-politicizing the violence of terrorists whenever possible and using the authority and power of the state to institutionalize it as criminal violence. This, in turn, also means politicizing other forms of violence, such as capital punishment, and their indirect and structural forms, such as the inner city.

  13. 75 FR 72871 - Survey of Information Sharing Practices With Affiliates

    Science.gov (United States)

    2010-11-26

    ... minimize the burden of the information collection on respondents, including through the use of information... completed by financial institutions and other persons that are creditors or users of consumer reports. The Agencies will use the Survey responses to prepare a report to Congress on the information sharing practices...

  14. Defining and Theorizing Terrorism: A Global Actor-Centered Approach

    Directory of Open Access Journals (Sweden)

    Omar Lizardo

    2015-08-01

    Full Text Available Arriving at a consensual definition of the phenomenon of terrorism has been a particularly difficult undertaking. Some definitions are either too specific or too vague, concentrating on some essential “terrorist” aspect of the actions, strategies, or types of non-state organizations that engage in terrorism. In this paper I draw on global approaches from international relations and world systems theories to propose a definition of terrorism that skirts these issues by concentrating on terrorist actors rather than terrorist behavior. I argue that this approach has several advantages, including the dissolution of several empirical and analytical problems produced by more essentialist definitions, and the location of terrorism within a two dimensional continuum of collective-violence phenomena in the international system which discloses important theoretical insights. I proceed to examine the characteristics of terrorism by comparing it with other forms of violence in the international system. I propose that terrorism may be part of the cycles and trends of unrest in the world system, responding to the same broad families of global dynamics as other forms of system-level conflict.

  15. An Inter-Personal Information Sharing Model Based on Personalized Recommendations

    Science.gov (United States)

    Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji

    In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated

  16. Sharing Health Information and Influencing Behavioral Intentions: The Role of Health Literacy, Information Overload, and the Internet in the Diffusion of Healthy Heart Information.

    Science.gov (United States)

    Crook, Brittani; Stephens, Keri K; Pastorek, Angie E; Mackert, Michael; Donovan, Erin E

    2016-01-01

    Low health literacy remains an extremely common and problematic issue, given that individuals with lower health literacy are more likely to experience health challenges and negative health outcomes. In this study, we use the first three stages of the innovation-decision process found in the theory of diffusion of innovations (Rogers, 2003). We incorporate health literacy into a model explaining how perceived health knowledge, information sharing, attitudes, and behavior are related. Results show that health information sharing explains 33% of the variance in behavioral intentions, indicating that the communicative practice of sharing information can positively impact health outcomes. Further, individuals with high health literacy tend to share less information about heart health than those with lower health literacy. Findings also reveal that perceived heart-health knowledge operates differently than health literacy to predict health outcomes.

  17. A dynamical model of terrorism

    Directory of Open Access Journals (Sweden)

    Firdaus Udwadia

    2006-01-01

    Full Text Available This paper develops a dynamical model of terrorism. We consider the population in a given region as being made up of three primary components: terrorists, those susceptible to both terrorist and pacifist propaganda, and nonsusceptibles, or pacifists. The dynamical behavior of these three populations is studied using a model that incorporates the effects of both direct military/police intervention to reduce the terrorist population, and nonviolent, persuasive intervention to influence the susceptibles to become pacifists. The paper proposes a new paradigm for studying terrorism, and looks at the long-term dynamical evolution in time of these three population components when such interventions are carried out. Many important features—some intuitive, others not nearly so—of the nature of terrorism emerge from the dynamical model proposed, and they lead to several important policy implications for the management of terrorism. The different circumstances in which nonviolent intervention and/or military/police intervention may be beneficial, and the specific conditions under which each mode of intervention, or a combination of both, may be useful, are obtained. The novelty of the model presented herein is that it deals with the time evolution of terrorist activity. It appears to be one of the few models that can be tested, evaluated, and improved upon, through the use of actual field data.

  18. Ownership as an Issue in Data and Information Sharing: a philosophically based review

    Directory of Open Access Journals (Sweden)

    Dennis Hart

    2002-11-01

    Full Text Available It has long been an aim of information management and information systems development to enable more effective and efficient data and information sharing within organisations. A commonplace assertion has been that data and information belong, or should belong, to the organisation as a whole as opposed to any individual or stakeholder within it. Nevertheless, despite the potential benefits of data and information sharing within organisations, efforts to achieve it have typically run into more difficulty than expected and have frequently been less successful than the technological capabilities would, at least prima facie, allow. This paper is based on the proposition that perceptions of ownership can have an important influence on data and information sharing behaviour, and explores philosophical theories of ownership and property with the aim of better understanding the origins of such behaviour. It is further proposed that what are here called “implicit” theories of information ownership on the part of different individuals or parties within an organisation can lead to varying perceptions as to who is the legitimate owner of particular data or information, and that this view is illuminating of the difficulties that have often been experienced in trying to achieve effective organisational data and information sharing.

  19. Discussing Terrorism: A Pupil-Inspired Guide to UK Counter-Terrorism Policy Implementation in Religious Education Classrooms in England

    Science.gov (United States)

    Quartermaine, Angela

    2016-01-01

    My research into pupils' perceptions of terrorism and current UK counter-terrorism policy highlights the need for more detailed and accurate discussions about the implementation of the educational aims, in particular those laid out by the Prevent Strategy. Religious education (RE) in England is affected by these aims, specifically the challenging…

  20. Public Trust in Health Information Sharing: A Measure of System Trust.

    Science.gov (United States)

    Platt, Jodyn E; Jacobson, Peter D; Kardia, Sharon L R

    2018-04-01

    To measure public trust in a health information sharing in a broadly defined health system (system trust), inclusive of health care, public health, and research; to identify individual characteristics that predict system trust; and to consider these findings in the context of national health initiatives (e.g., learning health systems and precision medicine) that will expand the scope of data sharing. Survey data (n = 1,011) were collected in February 2014. We constructed a composite index of four dimensions of system trust-competency, fidelity, integrity, and trustworthiness. The index was used in linear regression evaluating demographic and psychosocial predictors of system trust. Data were collected by GfK Custom using a nationally representative sample and analyzed in Stata 13.0. Our findings suggest the public's trust may not meet the needs of health systems as they enter an era of expanded data sharing. We found that a majority of the U.S. public does not trust the organizations that have health information and share it (i.e., the health system) in one or more dimensions. Together, demographic and psychosocial factors accounted for ~18 percent of the observed variability in system trust. Future research should consider additional predictors of system trust such as knowledge, attitudes, and beliefs to inform policies and practices for health data sharing. © Health Research and Educational Trust.

  1. A Criminal Law Approach to Terrorism in Brazil

    Science.gov (United States)

    2014-12-01

    2 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram Como Age a Rede do Terror Islamico no Brasil” [Exclusive: Documents from CIA, FBI...exclusivo-documentos-da-cia-fbi-e-pf-mostram-como-age-a- rede - do-terror-islamico-no-brasil. 3 Ibid. 4 Brazilian Federal Government,” Legislacao/Lei 7170/83...60 Ibid. 61 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram como Age a Rede do Terror Islamico no Brasil.” April

  2. On the origin of domestic and international terrorism

    OpenAIRE

    Kis-Katos, Krisztina; Liebert, Helge; Schulze, Günther G.

    2010-01-01

    We analyze the determinants of the origin of domestic and international terrorism in a large panel data set of 159 countries spanning from 1970 to 2007. We show that terror increases with GDP per capita, a higher POLITY score measuring a more open and competitive political system and experiences of domestic conflict, anarchy and regime transitions. Our evidence thus contradicts the notion that terrorism is rooted in economic deprivation or that strongly autocratic regimes breed more terrorist...

  3. Sustainable Regulation of Information Sharing with Electronic Data Interchange by a Trust-Embedded Contract

    Directory of Open Access Journals (Sweden)

    Guanghua Han

    2017-06-01

    Full Text Available This paper studies the risks in demand information sharing applications by electronic soft-orders using electronic data interchange (EDI systems in e-commerce and aims to suggest a sustainable regulation mechanism with a trust-embedded contract. In a supply chain with one retailer and one supplier, the retailer solicits private forecasted demand and places soft-orders via EDI to the supplier. To ensure abundant supply, the retailer has an incentive to inflate her soft-orders, which potentially harms the credible information sharing and sustainability of business cooperation. Normally, the degree to which the supplier relies on the retailer’s order information is specified by trust, which is evaluated according to the retailer’s reputation and supplier’s intuition in this study. Based on standard game theory, we find that both the retailer’s order and the quantity of supplier prepared materials are independent of the retailer’s forecast. Therefore, EDI based information sharing in e-commerce without a regulation mechanism leads to inefficient demand information sharing. Since both the supplier and retailer are proved to faces huge of potential profit losses due to the failure of information sharing, the commerce by EDI based information sharing is full of risk and unsustainable. Therefore, a regulation mechanism that leaded by the retailer is proposed to establish ‘win-win’ sustainable cooperation. Numerical experiments highlight the value of trust, the impact of reputation and intuition in decisions, and the effectiveness of the regulation mechanism by a cost-sharing contract.

  4. Privacy protection for personal health information and shared care records.

    Science.gov (United States)

    Neame, Roderick L B

    2014-01-01

    The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.

  5. BIOLOGICAL TERRORISM: THE NOTION, ESSENCE AND MAIN AREAS OF COUNTER

    Directory of Open Access Journals (Sweden)

    Julia Sarankina

    2016-10-01

    Full Text Available The article issued theoretical and practice problems of combating terrorism in current conditions, in particular, analyzes the concept of bio-terrorism as a form of terrorism, we investigate its nature, characteristics, and also referred to the major directions of countering.

  6. Security Guards and Counter-terrorism: Tourism and Gaps in Terrorism Prevention

    Directory of Open Access Journals (Sweden)

    Luke Howie

    2014-11-01

    Full Text Available Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terrorism preparedness exists. I argue that protecting tourism destinations is only possible if consideration is given the effectiveness of security guards and understanding that their well-being will impact upon their ability to deliver security. I want to draw attention to the often ignored social role of security guards. On 9/11, 42 security guards died whilst helping save the lives of thousands. They performed their jobs admirably, despite being low-paid, under-appreciated workers. In this paper I explore the social role of security guards in the context of tourism security. By drawing on representations of security guards in popular culture and reports on the state of the security guard industry. I argue that the lack of attention on the quality and well-being of guards is a significant black-spot in tourism security and terrorism preparedness.

  7. The human rights and the terrorism

    Directory of Open Access Journals (Sweden)

    Hamidreza Rafiei Fanood

    2016-12-01

    Full Text Available Regarding Human rights has been emphasized by governments through universal declaration human rights and its violations faced the global reaction in any case. From this perspective; the necessity of observing human rights against terrorism has been emphasized by many resolutions of the General Assembly, the Security Council and many regional resolutions. But, today especially after the September 11 events and America unilateral attacks by resorting to human rights and of course by considering the lack of international agreement on the norms, strategies and principles of human rights, the campaign against terrorism has started on the basis of its obligations, regardless to existing norms. So it would be said that today; the war against terrorism more than any other terrorist attacks threatens the security and human rights. However, human rights framework has never prevented effective and legitimate actions to the terrorist attacks. In other words; in the human right framework, there is no conflict with the campaign against terrorism, it emphasizes on identifying and fighting and even it guarantees the effectiveness of such a fight. As a result, Human rights violations at the expense of security, certainly associated with the destruction of both.

  8. Terrorism and anti-terror legislation - the terrorised legislator? A comparison of counter-terrorism legislation and its implications on human rights in the legal systems of the United Kingdom, Spain, Germany, and France

    NARCIS (Netherlands)

    Oehmichen, Anna

    2009-01-01

    The thesis deals with the history of terrorism and counter-terrorism legislation, focussing on the legislation in the UK, Spain, Germany and France, in the last 30 years, and analysing its compatibility with national and European human rights standards.

  9. 17 CFR 160.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-04-01

    ....12 Limits on sharing account number information for marketing purposes. (a) General prohibition on... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Limits on sharing account number information for marketing purposes. 160.12 Section 160.12 Commodity and Securities Exchanges...

  10. Religiosity and reactions to terrorism.

    Science.gov (United States)

    Adamczyk, Amy; LaFree, Gary

    2015-05-01

    Although many of the world's most serious outbreaks of conflict and violence center on religion, social science research has had relatively little to say about religion's unique role in shaping individuals' attitudes about these events. In this paper we investigate whether Americans' religious beliefs play a central role in shaping attitudes toward the continuing threat of terrorism and their willingness to assist officials in countering these perceived threats. Our analysis of an original data collection of almost 1600 Americans shows that more religious respondents are more likely to express concerns about terrorism. However, this relationship is mediated by their level of conservatism. We also find that more religious respondents are more likely to claim that they will assist government officials in countering terrorism. This relationship remained even after accounting for conservatism, and people's general willingness to help police solve crimes like breaking and entering. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. Mass trauma: disasters, terrorism, and war.

    Science.gov (United States)

    Chrisman, Allan K; Dougherty, Joseph G

    2014-04-01

    Disasters, war, and terrorism expose millions of children globally to mass trauma with increasing frequency and severity. The clinical impact of such exposure is influenced by a child's social ecology, which is understood in a risk and resilience framework. Research findings informed by developmental systems theory and the related core principles of contemporary developmental psychopathology are reviewed. Their application to the recent recommendations for interventions based on evolving public health models of community resilience are discussed along with practical clinical tools for individual response. Published by Elsevier Inc.

  12. 75 FR 30106 - Terrorism Risk Insurance Program; Litigation Management Submissions

    Science.gov (United States)

    2010-05-28

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Litigation Management Submissions... U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program Office is seeking comments... or by mail (if hard copy, preferably an original and two copies) to: Terrorism Risk Insurance Program...

  13. 75 FR 58468 - Terrorism Risk Insurance Program; Program Loss Reporting

    Science.gov (United States)

    2010-09-24

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Program Loss Reporting AGENCY: Departmental Offices, Terrorism Risk Insurance Program Office, Treasury. ACTION: Notice and request for... 1995, Public Law 104-13 (44 U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program...

  14. 76 FR 79114 - Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-Information Sharing Environment...

    Science.gov (United States)

    2011-12-21

    ...] Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-- Information Sharing Environment (ISE... titled, ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting (SAR... exempts portions of the ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting...

  15. Improbable Success: Risk Communication and the Terrorism Hazard

    Science.gov (United States)

    2010-03-01

    never aspired to be anything more than a bureaucratic construct partnered with the media. It has taken years to fully understand the unintended...terrorism plan. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP /(3273BD3F76A7A5DEDA E36942A54D7D90)~National+Counter-Terrorism+Plan+- +Alert+System...Australian Government National Security. (2009a). National Counter-Terrorism Alert System Fact Sheet. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP

  16. The Need for a United Nations Global Counter-Terrorism Coordinator

    Directory of Open Access Journals (Sweden)

    Howard Stoffer

    2013-08-01

    Full Text Available The case for a high level United Nations (UN Counter-Terrorism Coordinator position within the UN system has become increasingly urgent in 2013. This need has diluted some Member State reticence to creating a new Assistant Secretary-General position that would supervise and manage the existing counter-terrorism structures in the UN system. A Coordinator would have a basic responsibility to keep track of all of the activities of many formal inter-governmental organisations operating at the international, regional and sub-regional level and would also work closely with national counter-terrorism focal points. In this Policy Brief, Dr. Howard Stoffer reviews the debate among Security Council and Fifth Committee members about the efficacy of establishing a senior UN Global Counter-Terrorism Coordinator. He argues that the creation of such a position could lead to a restructuring of the UN counter-terrorism architecture as well as its funding within the UN budget and among donors. The position would eventually make the UN overall counter-terrorism effort, under the UN Global Counter-Terrorism Strategy, a stronger, more effective and more efficient process with measurable impact on the ground among Member States.

  17. Research on Visual Analysis Methods of Terrorism Events

    Science.gov (United States)

    Guo, Wenyue; Liu, Haiyan; Yu, Anzhu; Li, Jing

    2016-06-01

    Under the situation that terrorism events occur more and more frequency throughout the world, improving the response capability of social security incidents has become an important aspect to test governments govern ability. Visual analysis has become an important method of event analysing for its advantage of intuitive and effective. To analyse events' spatio-temporal distribution characteristics, correlations among event items and the development trend, terrorism event's spatio-temporal characteristics are discussed. Suitable event data table structure based on "5W" theory is designed. Then, six types of visual analysis are purposed, and how to use thematic map and statistical charts to realize visual analysis on terrorism events is studied. Finally, experiments have been carried out by using the data provided by Global Terrorism Database, and the results of experiments proves the availability of the methods.

  18. Development and validation of the coping with terror scale.

    Science.gov (United States)

    Stein, Nathan R; Schorr, Yonit; Litz, Brett T; King, Lynda A; King, Daniel W; Solomon, Zahava; Horesh, Danny

    2013-10-01

    Terrorism creates lingering anxiety about future attacks. In prior terror research, the conceptualization and measurement of coping behaviors were constrained by the use of existing coping scales that index reactions to daily hassles and demands. The authors created and validated the Coping with Terror Scale to fill the measurement gap. The authors emphasized content validity, leveraging the knowledge of terror experts and groups of Israelis. A multistep approach involved construct definition and item generation, trimming and refining the measure, exploring the factor structure underlying item responses, and garnering evidence for reliability and validity. The final scale comprised six factors that were generally consistent with the authors' original construct specifications. Scores on items linked to these factors demonstrate good reliability and validity. Future studies using the Coping with Terror Scale with other populations facing terrorist threats are needed to test its ability to predict resilience, functional impairment, and psychological distress.

  19. 78 FR 64145 - 30-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-10-25

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Chief Information... Title of Information Collection: Housing Finance Agency Risk- Sharing Program. OMB Approval Number: 2502... sharing with State and local housing finance agencies (HFAs). Under this program, HUD provides full...

  20. Information Sharing in the Field of Design Research

    Science.gov (United States)

    Pilerot, Ola

    2015-01-01

    Introduction: This paper reports on an extensive research project which aimed at exploring information sharing activities in a scholarly context. The paper presents and synthesises findings from a literature review and three qualitative case studies. The empirical setting is a geographically distributed Nordic network of design scholars. Method:…

  1. Sharing Law Enforcement and Intelligence Information: The Congressional Role

    National Research Council Canada - National Science Library

    Best Jr., Richard A

    2007-01-01

    Almost all assessments of the attacks of September 11, 2001, have concluded that U.S. intelligence and law enforcement agencies had failed to share information that might have provided advance warning of the plot...

  2. El cine de terror español

    OpenAIRE

    Gómez Llorente, Tatiana

    2015-01-01

    La autora comienza haciendo un estudio del cine de terror desde sus inicios, sus subgéneros, mecanimos utilizados para provocar el miedo en el espectador para finalmente centrarse en el cine de terror español a través de cinco películas representativas del género.

  3. Youth, Terrorism and Education: Britain's Prevent Programme

    Science.gov (United States)

    Thomas, Paul

    2016-01-01

    Since the 7/7 bombings of July 2005, Britain has experienced a domestic terror threat posed by a small minority of young Muslims. In response, Britain has initiated "Prevent," a preventative counter-terrorism programme. Building on previous, general critiques of Prevent, this article outlines and critically discusses the ways in which…

  4. Knowledge-Sharing Intention among Information Professionals in Nigeria: A Statistical Analysis

    Science.gov (United States)

    Tella, Adeyinka

    2016-01-01

    In this study, the researcher administered a survey and developed and tested a statistical model to examine the factors that determine the intention of information professionals in Nigeria to share knowledge with their colleagues. The result revealed correlations between the overall score for intending to share knowledge and other…

  5. Information-sharing tendency on Twitter and time evolution of tweeting

    Science.gov (United States)

    Kwon, H. W.; Kim, H. S.; Lee, K.; Choi, M. Y.

    2013-03-01

    While topics on Twitter may be categorized according to their predictability and sustainability, some topics have characteristics depending on the time scale. Here we propose a good measure for the transition of sustainability, which we call the information-sharing tendency, and find that the unpredictability on Twitter is provoked by the exposure of Twitter users to external environments, e.g., mass media and other social network services. In addition, it is demonstrated that the numbers of articles and comments on on-line newspapers serve as plausible measures of exposure. From such measures of exposure, the time evolution of tweeting can be described, when the information-sharing tendency is known.

  6. Thermodynamical quantum information sharing

    International Nuclear Information System (INIS)

    Wiesniak, M.; Vedral, V.; Brukner, C.

    2005-01-01

    Full text: Thermodynamical properties fully originate from classical physics and can be easily measured for macroscopic systems. On the other hand, entanglement is a widely spoken feature of quantum physics, which allows to perform certain task with efficiency unavailable with any classical resource. Therefore an interesting question is whether we can witness entanglement in a state of a macroscopic sample. We show, that some macroscopic properties, in particular magnetic susceptibility, can serve as an entanglement witnesses. We also study a mutual relation between magnetic susceptibility and magnetisation. Such a complementarity exhibits quantum information sharing between these two thermodynamical quantities. Magnetization expresses properties of individual spins, while susceptibility might reveal non-classical correlations as a witness. Therefore, a rapid change of one of these two quantities may mean a phase transition also in terms of entanglement. The complementarity relation is demonstrated by an analytical solution of an exemplary model. (author)

  7. A Study of Terrorism Emergency Preparedness Policies in School Districts

    Science.gov (United States)

    Umoh, Emmanuel

    2013-01-01

    The threat of terrorism is a concern in public facilities including schools. This study focused on school districts in a southwestern state. Terrorism emergency preparedness policies are well-documented as measures to protect students and staff in school districts from terrorism threats and vulnerabilities. However, those threats and…

  8. 12 CFR 716.12 - Limits on sharing of account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Limits on sharing of account number information... REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 716.12 Limits on sharing of account number information for marketing purposes. (a) General prohibition on...

  9. Modeling a Strategy for the War on Terrorism

    National Research Council Canada - National Science Library

    Henderson, Darral

    2002-01-01

    .... This paper discusses a strategy for conducting the war on terrorism in terms of a system and how that strategy must be adjusted over the long-term to compensate for fluctuating components of the war on terrorism...

  10. Nuclear terrorism

    International Nuclear Information System (INIS)

    2002-01-01

    Recent reports of alleged terrorist plans to build a 'dirty bomb' have heightened longstanding concerns about nuclear terrorism. This briefing outlines possible forms of attack, such as: detonation of a nuclear weapon; attacks involving radioactive materials; attacks on nuclear facilities. Legislation addressing these risks and the UK's strategy for coping with them are also considered

  11. The Politics of Terror: Rereading "Harry Potter"

    Science.gov (United States)

    Strimel, Courtney B.

    2004-01-01

    This article claims that J. K. Rowling's "Harry Potter" series, with its use of magic, frightening storylines, and character ambiguity is beneficial to children who are dealing with issues related to terror and terrorism. The author explains that the scenarios presented in Rowling's series teach children strategies for coping with both physical…

  12. Terrorism and poverty: double trouble for macroeconomic ...

    African Journals Online (AJOL)

    This article investigates poverty and terrorism as allies in hindering economic growth in African countries. This study uses data for 22 African countries from 1970 to 2013 i.e. 44 years. Data for terrorism, poverty and national income is taken from GTD and WDI. Panel cointegration techniques of dynamic fixed effect, mean ...

  13. Terrorism as a Social and Legal Phenomenon

    Science.gov (United States)

    Serebrennikova, Anna; Mashkova, Yekaterina

    2017-01-01

    This article examines the concept of terrorism as a social and legal phenomenon, its international legal and criminal-legal characteristics. Highlighted are the main aspects of cooperation of the states and the international community to counter terrorist activities. Terrorism as a social phenomenon is determined by paragraph 1 of article 3 of the…

  14. 30 CFR 280.73 - Will MMS share data and information with coastal States?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS share data and information with coastal States? 280.73 Section 280.73 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE... Data Requirements Protections § 280.73 Will MMS share data and information with coastal States? (a) We...

  15. Perceived coping & concern predict terrorism preparedness in Australia

    Directory of Open Access Journals (Sweden)

    Stevens Garry

    2012-12-01

    Full Text Available Abstract Background In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Methods Adults in New South Wales (NSW completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI in 2010 (N=2038. Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Results Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR=2.07, p=0.001 learning evacuation plans (AOR=1.61, p=0.05, establishing emergency contact plans (AOR=2.73, p Conclusion The findings of this study suggest that terrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and

  16. On the Concept and Definition of Terrorism Risk.

    Science.gov (United States)

    Aven, Terje; Guikema, Seth

    2015-12-01

    In this article, we provide some reflections on how to define and understand the concept of terrorism risk in a professional risk assessment context. As a basis for this discussion we introduce a set of criteria that we believe should apply to any conceptualization of terrorism risk. These criteria are based on both criteria used in other areas of risk analysis and our experience with terrorism risk analysis. That is, these criteria offer our perspective. We show that several of the suggested perspectives and definitions have weaknesses in relation to these criteria. A main problem identified is the idea that terrorism risk can be conceptualized as a function of probability and consequence, not as a function of the interactions between adaptive individuals and organizations. We argue that perspectives based solely on probability and consequence should be used cautiously or not at all because they fail to reflect the essential features of the concept of terrorism risk, the threats and attacks, their consequences, and the uncertainties, all in the context of adaptation by the adversaries. These three elements should in our view constitute the main pillars of the terrorism risk concept. From this concept we can develop methods for assessing the risk by identifying a set of threats, attacks, and consequence measures associated with the possible outcome scenarios together with a description of the uncertainties and interactions between the adversaries. © 2015 Society for Risk Analysis.

  17. Systems Approach to Terrorism: Countering the Terrorist Training Subsystem

    Science.gov (United States)

    2006-12-01

    37 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich, (Washington D.C.: Woodrow...52 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich (Washington D.C.: Woodrow Wilson Center...Hitler?” in Mass Hate: the Global Rise of Genocide and Terror (New York , London: Plennium Press), p.165 55 Albert Bandura p.45 56 Ibid. 32 As

  18. Knowledge sharing and innovation in relationships interorganizational type of information technology outsourcing

    OpenAIRE

    Roberta Rodrigues Faoro; Mírian Oliveira; Marcelo Faoro de Abreu

    2017-01-01

    Introduction: this paper presents an analysis of the sharing of knowledge and innovation in the inter-relationships of the type outsourcing of Information Technology. Objective: analyze the existence of relationship between knowledge sharing and innovation in the inter-relationships of the type of outsourcing information technology (IT). Methodology: research is exploratory, qualitative and using as a strategy the multiple case study, which analyzed 12 companies in IT outsourci...

  19. International Terrorism and Mental Health: Recent Research and Future Directions

    Science.gov (United States)

    Fischer, Peter; Ai, Amy L.

    2008-01-01

    International terrorism has become a major global concern. Several studies conducted in North America and Europe in the aftermath of terrorist attacks reveal that international terrorism represents a significant short-term and long-term threat to mental health. In the present article, the authors clarify the concept and categories of terrorism and…

  20. Making Sense of Information Sharing in E-Government Inter-Organizational Collaborations: A Malaysian Perspective

    Science.gov (United States)

    Harold, Dolly Amy

    2011-01-01

    Information sharing is a fundamental goal of information systems (IS). Yet information sharing, although critical and much acclaimed, is complex in terms of its concepts and implementation. How to leverage this phenomenon while implementing an IS is discussed at length in the literature. Both academics and practitioners in IS are striving to…

  1. Research on Cost Information Sharing and Channel Choice in a Dual-Channel Supply Chain

    Directory of Open Access Journals (Sweden)

    Huihui Liu

    2016-01-01

    Full Text Available Many studies examine information sharing in an uncertain demand environment in a supply chain. However there is little literature on cost information sharing in a dual-channel structure consisting of a retail channel and a direct sales channel. Assuming that the retail sale cost and direct sale cost are random variables with a general distribution, the paper investigates the retailer’s choice on cost information sharing in a Bertrand competition model. Based on the equilibrium outcome of information sharing, the manufacturer’s channel choice is discussed in detail. Our paper provides several interesting conclusions. In both single- and dual-channel structures, the retailer has little motivation to share its private cost information which is verified to be valuable for the manufacturer. When the cost correlation between the two channels increases, our analyses show that the manufacturer’s profit improves. However, when channel choice is involved, the value of information could play a different role. The paper finds that a dual-channel structure can benefit the manufacturer only when the cost correlation is sufficiently low. In addition, if the cost correlation is weak, the cost fluctuation will bring out the advantage of a dual-channel structure and adding a new direct channel will help in risk pooling.

  2. ADDRESSING THE SPECTRE OF CYBER TERRORISM: A COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2012-08-01

    Full Text Available This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.

  3. Reframing domestic violence as torture or terrorism

    Directory of Open Access Journals (Sweden)

    Marcus Isabel

    2014-01-01

    Full Text Available This paper focuses on the analysis of the phenomenon of domestic violence and the distinctive features for which is it may be recognized as a specific form of torture and/or terrorism at home. The author provides an overview of the scientific debate among feminist authors on this conception which has given rise to an innovative approach to understanding the concept of domestic violence. Underscoring the substantive similarity of domestic violence with the acts of torture and/or terrorism, the author urges for state action arguing that domestic violence as a form of gender-based violence should be approached by applying the same logic and strategies which are employed in response to traditional torture and terrorism.

  4. Information sharing with rural family caregivers during care transitions of hip fracture patients

    Directory of Open Access Journals (Sweden)

    Jacobi Elliott

    2014-06-01

    Full Text Available Introduction: Following hip fracture surgery, patients often experience multiple transitions through different care settings, with resultant challenges to the quality and continuity of patient care. Family caregivers can play a key role in these transitions, but are often poorly engaged in the process. We aimed to: (1 examine the characteristics of the family caregivers’ experience of communication and information sharing and (2 identify facilitators and barriers of effective information sharing among patients, family caregivers and health care providers.Methods: Using an ethnographic approach, we followed 11 post-surgical hip fracture patients through subsequent care transitions in rural Ontario; in-depth interviews were conducted with patients, family caregivers (n = 8 and health care providers (n = 24.Results: Priority areas for improved information sharing relate to trust and respect, involvement, and information needs and expectations; facilitators and barriers included prior health care experience, trusting relationships and the rural setting.Conclusion: As with knowledge translation, effective strategies to improve information sharing and care continuity for older patients with chronic illness may be those that involve active facilitation of an on-going partnership that respects the knowledge of all those involved.

  5. Information sharing with rural family caregivers during care transitions of hip fracture patients

    Directory of Open Access Journals (Sweden)

    Jacobi Elliott

    2014-06-01

    Full Text Available Introduction: Following hip fracture surgery, patients often experience multiple transitions through different care settings, with resultant challenges to the quality and continuity of patient care. Family caregivers can play a key role in these transitions, but are often poorly engaged in the process. We aimed to: (1 examine the characteristics of the family caregivers’ experience of communication and information sharing and (2 identify facilitators and barriers of effective information sharing among patients, family caregivers and health care providers. Methods: Using an ethnographic approach, we followed 11 post-surgical hip fracture patients through subsequent care transitions in rural Ontario; in-depth interviews were conducted with patients, family caregivers (n = 8 and health care providers (n = 24. Results: Priority areas for improved information sharing relate to trust and respect, involvement, and information needs and expectations; facilitators and barriers included prior health care experience, trusting relationships and the rural setting. Conclusion: As with knowledge translation, effective strategies to improve information sharing and care continuity for older patients with chronic illness may be those that involve active facilitation of an on-going partnership that respects the knowledge of all those involved.

  6. 76 FR 4750 - Survey of Information Sharing Practices With Affiliates

    Science.gov (United States)

    2011-01-26

    ... information by means of a Survey to be completed by financial institutions and other persons that are creditors or users of consumer reports. The OTS will use the Survey responses to prepare a report to Congress on the information sharing practices by financial institutions, creditors, or users of consumer...

  7. 75 FR 75725 - Survey of Information Sharing Practices With Affiliates

    Science.gov (United States)

    2010-12-06

    ... to minimize the burden of the information collection on respondents, including through the use of... by financial institutions and other persons that are creditors or users of consumer reports. The OTS will use the Survey responses to prepare a report to Congress on the information sharing practices by...

  8. Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?

    Science.gov (United States)

    Elbakidze, L; Jin, Y H

    2015-08-01

    Using transnational terrorism data from 1980 to 2000, this study empirically examines the relationships between frequency of participation in transnational terrorism acts and economic development and education improvement. We find an inverse U-shaped association between the frequency of various nationals acting as perpetrators in transnational terrorism acts and per capita income in their respective home countries. As per capita incomes increase from relatively low levels, frequencies of participation in transnational terrorism increase. However, at sufficiently higher levels of per capita income, further increase in per capita income is negatively associated with the rate of participation in transnational terrorism. Education improvement from elementary to secondary is positively correlated with frequency of participation in transnational terrorism events, whereas further improvement from secondary to tertiary level is negatively correlated with participation in transnational terrorism. We also find that citizens of countries with greater openness to international trade, lower degree of income inequality, greater economic freedom, larger proportion of population with tertiary education, and less religious prevalence participate in transnational terrorism events less frequently. © 2015 Society for Risk Analysis.

  9. Sharing for Health: A Study of Chinese Adolescents' Experiences and Perspectives on Using Social Network Sites to Share Health Information.

    Science.gov (United States)

    Zhang, Ni; Teti, Michele; Stanfield, Kellie; Campo, Shelly

    2017-07-01

    This exploratory qualitative study examines Chinese adolescents' health information sharing habits on social network sites. Ten focus group meetings with 76 adolescents, ages 12 to 17 years, were conducted at community-based organizations in Chicago's Chinatown. The research team transcribed the recording and analyzed the transcripts using ATLAS.ti. Chinese adolescents are using different social network sites for various topics of health information including food, physical activity, and so on. Adolescents would share useful and/or interesting health information. Many adolescents raised credibility concerns regarding health information and suggested evaluating the information based on self-experience or intuition, word-of-mouth, or information online. The findings shed lights on future intervention using social network sites to promote health among Chinese adolescents in the United States. Future interventions should provide adolescents with interesting and culturally sensitive health information and educate them to critically evaluate health information on social network sites.

  10. Technical considerations in nuclear terrorism

    International Nuclear Information System (INIS)

    Velardo, G.

    2007-01-01

    Nuclear terrorism is an evil application of nuclear energy, in the same way that chemical and biological terrorism could be considered as the evil side of chemistry and biology. This paper presents two effects of nuclear terrorism. First, dirty bombs or radioactive bombs or radiological dispersion devices (RDDs), and second, crude atom bombs or improvised nuclear devices (INDs). The paper analyses as well the probabilities of an attack, its biological effects and nuclear risk. Experiments carried out so far indicate that the lethal effects produced by RDDs are likely the same that the effects produced by the chemical explosive used in the bomb. These type of bombs are rather bounded to generate panic and have implicit a high cost of decontamination. It will be described the measures to be adopted. INDs will be also considered. Uranium INDs by gun-method are more feasible to be made. They can be disassembled and their components transported to the target place. Plutonium INDs by the implosion-method are complex and required high precision technology. Their disassembly is very difficult

  11. Lessons from History for Counter- Terrorism Strategic Communications

    NARCIS (Netherlands)

    Ingram, H.J.; Reed, A.G.

    2016-01-01

    Drawing on the Counter-terrorism Strategic Communication (CTSC) Project’s research paper “A Brief History of Propaganda during Conflict“, this Policy Brief lays out the key policy-relevant lessons for developing effective counter-terrorism strategic communications. It presents a framework of

  12. Turkish Elementary School Students' Perceptions of Local and Global Terrorism

    Science.gov (United States)

    Aricak, Tolga; Bekci, Banu; Siyahhan, Sinem; Martinez, Rebecca

    2008-01-01

    Introduction: Historically, terrorism has occurred in various regions of the world and has been considered a local problem until the September, 11 terrorist attacks on the United States in 2001. After 9/11, terrorism has become a global concern. The definition of terrorism has changed from a violent act of a group of local people against their…

  13. Public health and terrorism preparedness: cross-border issues.

    Science.gov (United States)

    Olson, Debra; Leitheiser, Aggie; Atchison, Christopher; Larson, Susan; Homzik, Cassandra

    2005-01-01

    On December 15, 2003, the Centers for Public Health Preparedness at the University of Minnesota and the University of Iowa convened the "Public Health and Terrorism Preparedness: Cross-Border Issues Roundtable." The purpose of the roundtable was to gather public health professionals and government agency representatives at the state, provincial, and local levels to identify unmet cross-border emergency preparedness and response needs and develop strategies for addressing these needs. Representatives from six state and local public health departments and three provincial governments were invited to identify cross-border needs and issues using a nominal group process. The result of the roundtable was identification of the needs considered most important and most doable across all the focus groups. The need to collaborate on and exchange plans and protocols among agencies was identified as most important and most doable across all groups. Development of contact protocols and creation and maintenance of a contact database was also considered important and doable for a majority of groups. Other needs ranked important across the majority of groups included specific isolation and quarantine protocols for multi-state responses; a system for rapid and secure exchange of information; specific protocols for sharing human resources across borders, including emergency credentials for physicians and health care workers; and a specific protocol to coordinate Strategic National Stockpile mechanisms across border communities.

  14. The Concept of Information Sharing Behaviors in Complex Organizations: Research in Latvian Enterprises

    Directory of Open Access Journals (Sweden)

    Andrejs Cekuls

    2016-12-01

    Full Text Available The purpose of this paper is to explore the factors influencing behaviors of information sharing in complex organizations. Evaluation of the previous studies on provision of information turnover process and the role of organizational culture in competitive intelligence of business environment in Latvia indicated the trends that employees of Latvian enterprises lack incentive to share information. Tasks of the study were to research the basis of the review of scientific sources and study aspects influencing habits of information sharing in complex organizations. For this particular study, the focus group is selected as the most appropriate data collection method for high-quality research. To find out individuals' opinions and attitudes two focus group discussions were carried out. Members from various industries and with different employment period were included in discussion groups. In aggregate, opinions of the employees from 41 different companies were summarized regarding the aspects affecting the process of information sharing in organizations. Results of researches show that that influence the sharing of information are closely related to the values: interpersonal trust, organizational trust, and organizational identification, support, fairness etc. Results of discussions showed that it is important for a manager to be aware of the factors affecting the performance of the organization. To identify the need for changes, a manager should follow events in the environment and analyze the extent, to which they affect the performance of the organization. Complexity science suggests that maturity to changes emerges when the system is far from balance, but the tension makes to accept changes.

  15. A Preliminary Investigation into the Information Sharing Behavior of Social Media Users after a Natural Disaster

    Science.gov (United States)

    Maruyama, Yukiko

    2016-01-01

    The paper provides the results of a preliminary investigation into the information sharing behavior of social media users after a natural disaster. The results indicate that users shared information that they thought victims would find useful. On the other hand, they reported that they usually do not or never share information considered useful to…

  16. Federal R and D Reductions, Market Share, and Aerospace Information Usage

    Science.gov (United States)

    Rocker, JoAnne; Roncaglia, George

    2000-01-01

    Reductions in federally funded research have a rippling effect over the entire aerospace industry. The decline in federal R&D spending in aerospace in recent years coincides with declines in U.S. aerospace market share, One of the lesser-understood factors in the declining U.S. market share may be the differing ways and intensity with which the U.S. and its competitors approach another trend, the increasing availability of large amounts of aerospace research information on the World Wide Web. The U.S. has been a pioneer in making research information available in electronic form, and the international community has long been a heavy consumer of that information. In essence, the U.S. contributes to the research efforts of its competitors, thus contributing to foreign aerospace consortiums efforts to gain market share in the aerospace industry, This may be a cautionary note to the U.S. aerospace industry to consider the use of R&D output in its own development and strategy because the foreign competition is using the U.S. scientific and technical literature.

  17. International terrorism, a new challenge to modern Western society

    International Nuclear Information System (INIS)

    Hochleitner, E.

    2002-01-01

    Full text: The attacks of 9/11 against the WTC and the Pentagon have made western society aware of the threat potential, which international terrorism presents to the open and democratic societies of the West. The new international terrorism is substantially different from the traditional form terrorism, which our societies has experienced in the past. The arms of traditional terrorism were bombs and guns and the victims were mostly clearly defined targets and its political and ideological motives were known. The terrorists assumed responsibility and there was an interest and scope for political negotiation. Terrorist groups had a vertical structure with a hierarchy. The new international terrorism is organized in a horizontal way and its structure is amorphous. Terrorist groups act in an autonomous way and linked by a rather loose network. International terrorism makes full use of modern communication systems and seek to equip themselves with the best armament available including WMDs, provided they can get hold of them. Their target are no longer individuals, but the modern western society. They aim at a maximum number of victims in order to get maximum media attention and to destabilize the targeted society. The motives of terrorist groups are religious or ideological. A terrorist attack represents for those terrorists a religious, nearly sacral act, including self sacrifice. Today, the main challenge for the open, democratic and modern society represents the network of Islamic Fundamentalists. Islamic terrorism has been active mainly in Islamic countries with the aim to overthrow westernized forms of government, mainly in Egypt and Algeria. In the early 1990's, the network of Islamic terror groups has been built up and the al-Qaida was formed. AI-Qaida is a network of Islamic terror groups and a platform for co-operation and support of Islamic cells. It provides training, arms, finances, etc.. AI-Qaida supported the Taliban regime, which provided it with a

  18. Climate change on Twitter: Content, media ecology and information sharing behaviour.

    Science.gov (United States)

    Veltri, Giuseppe A; Atanasova, Dimitrinka

    2017-08-01

    This article presents a study of the content, use of sources and information sharing about climate change analysing over 60,000 tweets collected using a random week sample. We discuss the potential for studying Twitter as a communicative space that is rich in different types of information and presents both new challenges and opportunities. Our analysis combines automatic thematic analysis, semantic network analysis and text classification according to psychological process categories. We also consider the media ecology of tweets and the external web links that users shared. In terms of content, the network of topics uncovered presents a multidimensional discourse that accounts for complex causal links between climate change and its consequences. The media ecology analysis revealed a narrow set of sources with a major role played by traditional media and that emotionally arousing text was more likely to be shared.

  19. Share and share alike? Social information and interaction style in coordination of shared use

    NARCIS (Netherlands)

    Niemantsverdriet, Karin; van de Werff, T.C.F.; van Essen, H.A.; Eggen, J.H.

    2018-01-01

    Interfaces are commonly designed from the perspective of individual users, even though most of the systems we use in everyday life are in fact shared. We argue that more attention is needed for system sharing, especially because interfaces are known to influence coordination of shared use. In this

  20. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  1. The Mission Partner Environment: Challenges To Multinational Information Sharing

    Science.gov (United States)

    2016-02-15

    four regional commands (Africa Command, Central Command, European Command, and Pacific Command). On behalf of their powerful 4-star combatant...nations, and the U.S. DoD’s Assistant Secretary of Defense ( ASD ) for Networks and Information Integration (NII).12 While this arrangement attempted to...leadership to seek a more coherent and enduring approach to information sharing. As ISAF expanded operations throughout the country, it added more

  2. Tourism and Terror: a Case Study: Israel 1948-2012

    Directory of Open Access Journals (Sweden)

    Erik H. Cohen

    2014-11-01

    Full Text Available Israel is a popular tourist destination which has by afflicted by varying levels of terrorism against civilians over the course of its history. A longitudinal analysis of data pertaining to tourism and terrorism is undertaken to examine how terrorism affects patterns of tourism. It is found that on the macro-level, tourism to Israel continues to grow although it experiences periodic declines corresponding with times of high terrorist activity. National and religious subpopulations of tourists react differently terrorism at the destination. Overall, Jews are proportionally more likely than non-Jews to continue to visit Israel during times of conflict, but this varies among Diaspora communities. Moreover, among US Jewish tourist, the strongly religious populations represented a greater percentage of visitors during years of high terrorism. This preliminary analysis explores how internal structural features of the Jewish community (such as Jewish educational settings and family ties to Israelis, external factors of the home country (such as anti-Semitism or the economic situation and national and cultural value orientation affect tourism patterns. The impact of these factors on tourism deserves continued research.

  3. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. The roots of terrorism: A reassessment after September 11th

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F.

    2002-01-01

    The brutal terrorist attacks of September 11th, the anthrax attacks that followed and growing knowledge of al Qaeda's pursuit of nuclear, biological and chemical weapons have not only intensified concerns about terrorism but also created doubts about our understanding of terrorism. These attacks were in many ways unprecedented, and ultimately raise the question of the roots or causes of terrorism. Historically and today, there have been divergent views on this question, which reflect philosophical, religious, political and other differences. These differences are not merely academic, as they can affect our understanding of both the threat and of responses to terrorism in the aftermath of September 1 1 th. Terrorism is too complex and diverse a phenomenon to speak easily of causes. But we may be able to discern the causes of specific acts. Our response to 9/11 and other acts of terrorism will be affected by our understanding of their causes, as well as by possible political requirements to address widespread perceptions of causes. If 9/11 was caused by Islamic radicalism, the near-term response must be to ensure the terrorists are defeated and pose no fiuther danger. In the longer term, education is critical. If the attacks were caused by US Middle East policies, the response should involve a review of those policies. This may or may not result in changes to policy, public diplomacy, etc. If the attacks were a backlash against globalization, the response must address the realities underlying anti-globalization sentiments. Addressing causes (real and perceived) will not in any case end terrorism, and addressing the wrong causes can be counterproductive. Actions to reduce those conditions that create support for terrorism and aid its recruitment effort are critical to any counterterrorism strategy. For this reason alone, we must do everything possible to understand the reasons terrorism may be undertaken, including the attacks of September 1 1 th. This paper will

  5. Simple probabilistic method for relative risk evaluation of nuclear terrorism events

    International Nuclear Information System (INIS)

    Zhang Songbai; Wu Jun

    2006-01-01

    On the basis of the event-tree and probability analysis methods, a probabilistic method of nuclear terrorism risk was built, and the risk of terrorism events was analyzed. With the statistical data for and hypothetical data for relative events, the relative probabilities of the four kinds of nuclear terrorism events were obtained, as well as the relative risks of these four kinds of nuclear terrorism events were calculated by using this probabilistic method. The illustrated case show that the descending sequence of damages from the four kinds of nuclear terrorism events for single event is as following: nuclear explosive and improvised nuclear explosive, nuclear facility attacked, and 'dirty bomb'. Under the hypothetical condition, the descending sequence of possibilities for the four kinds of nuclear terrorism events is as following: 'dirty bomb', nuclear facility attacked, improvised nuclear explosive and nuclear explosive, but the descending sequence of risks is as following: 'dirty bomb', improvised nuclear explosive, nuclear facility attacked, and nuclear explosive . (authors)

  6. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  7. Incentives for knowledge sharing: impact of organisational culture and information technology

    Science.gov (United States)

    Lyu, Hongbo; Zhang, Zuopeng Justin

    2017-10-01

    This research presents and examines an analytical model of knowledge management in which organisational culture dynamically improves with knowledge-sharing and learning activities within organisations. We investigate the effects of organisational incentives and the level of information technology on the motivation of knowledge sharing. We derive a linear incentive reward structure for knowledge sharing under both homogeneous and heterogeneous conditions. In addition, we show how the organisational culture and the optimum linear sharing reward change with several crucial factors, and summarise three sets of methods (strong IT support, congruent organisational culture, and effective employee assessment) to complement the best linear incentive. Our research provides valuable insights for practitioners in terms of implementing knowledge-management initiatives.

  8. Guarding EU-wide Counter-terrorism Policing: The Struggle for Sound Parliamentary Scrutiny of Europol

    Directory of Open Access Journals (Sweden)

    Claudia Hillebrand

    2011-12-01

    Full Text Available Since the terrorist attacks in New York and Washington, DC (2001, Madrid (2004 and London (2005, the European Union (EU has stepped up its efforts to develop new instruments and reinforce existing ones to fight terrorism jointly. One of the key aspects of the EU-wide fight against terrorism and serious crime is the facilitation and enforcement of information and intelligence exchange among law enforcement authorities and, to a limited extent, security and intelligence services. This article examines how far the EU’s commitment to democracy, accountability and transparency is actually fulfilled with respect to its efforts at fighting terrorism by drawing on the example of the activities of the European Police Office (Europol. Taking the European Parliament (EP and National Parliaments (NPs, but also inter-parliamentary forums, into account, the article analyses how, and to what extent, mechanisms of democratic accountability and, in particular, parliamentary scrutiny are in place to hold EU-wide counter-terrorism actors, such as Europol, to account. This is a particularly timely question given that Europol’s parliamentary scrutiny procedures are currently subject to considerable changes due to the change in its legal mandate as of 1 January 2010 and the entry into force of the Lisbon Treaty.

  9. Terror Medicine As Part of the Medical School Curriculum

    Directory of Open Access Journals (Sweden)

    Leonard A Cole

    2014-09-01

    Full Text Available Terror medicine, a field related to emergency and disaster medicine, focuses on medical issues ranging from preparedness to psychological manifestations specifically associated with terrorist attacks. Calls to teach aspects of the subject in American medical schools surged after the 2001 jetliner and anthrax attacks. Although the threat of terrorism persists, terror medicine is still addressed erratically if at all in most medical schools. This paper suggests a template for incorporating the subject throughout a 4-year medical curriculum. The instructional framework culminates in a short course for fourth year students, such as one recently introduced at Rutgers New Jersey Medical School, Newark, NJ. The proposed 4-year Rutgers curriculum serves as a model that could assist other medical schools contemplating the inclusion of terror medicine in pre-clerkship and clerkship training.

  10. Patterns of Force: System Strength, Terrorism and Civil War

    DEFF Research Database (Denmark)

    Freytag, Andreas; Meierrieks, Daniel; Münch, Angela

    2010-01-01

    We jointly analyze the genesis of terrorism and civil war, providing a simple conceptual framework to explain why violent opposition groups choose distinct forms of violence (i.e., terrorism and open rebellion). We argue that the distinct modes of violent opposition are chosen by opposition groups...... in response to the strengths and weaknesses of the system they challenge. An empirical test of this hypothesis for 104 countries for 1992 to 2004 indeed shows that the socio-economic strength of a system positively correlates with the likelihood of terrorism, but negatively with the incidence of civil war....... Institutional quality and political participation of opponents reduce the risk of civil war, but do not affect the likelihood of terrorism. We also show that system stability reduces the likelihood of all forms of violent opposition....

  11. On immorality of terrorism and war

    OpenAIRE

    Čičovački Predrag

    2003-01-01

    The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others) who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable mora...

  12. 28 CFR 501.3 - Prevention of acts of violence and terrorism.

    Science.gov (United States)

    2010-07-01

    ... deterring future acts of violence or terrorism; (ii) That communications between the inmate and attorneys or... terrorism. 501.3 Section 501.3 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION SCOPE OF RULES § 501.3 Prevention of acts of violence and terrorism. (a) Upon...

  13. Conceptualising Terrorism: International Offence or Domestic Governance Tool?

    DEFF Research Database (Denmark)

    Aksenova, Marina

    2015-01-01

    This article argues that terrorism does not belong within the realm of international criminal law. On the surface, it is the lack of internationally agreed definition of terrorism and its domestic law origins that set it apart from the notions of crimes against humanity, war crimes and genocide...

  14. Information sharing for consumption tax purposes : An empirical analysis

    NARCIS (Netherlands)

    Ligthart, Jenny E.

    The paper studies the determinants of information sharing between Swedish tax authorities and 14 EU tax authorities for value-added tax (VAT) purposes. It is shown that trade-related variables (such as the partner country's net trade position and population size), reciprocity, and legal arrangements

  15. Collecting and Connecting the Dots: Leveraging Technology to Enhance the Collection of Information and the Dissemination of Intelligence

    Science.gov (United States)

    2009-09-01

    Terrorism Task Force (JTTF), Joint, Terrorism Analysis Center (JTAC), domestic intelligence 16. PRICE CODE 17. SECURITY CLASSIFICAT ION OF REPORT...on the event and share this with law enforcement partners.  A second case involved a suspicious m ale at a local Starbucks . The m ale was wearing

  16. Producing 'internal suspect bodies': divisive effects of UK counter-terrorism measures on Muslim communities in Leeds and Bradford.

    Science.gov (United States)

    Abbas, Madeline-Sophie

    2018-04-06

    Research on UK government counter-terrorism measures has claimed that Muslims are treated as a 'suspect community'. However, there is limited research exploring the divisive effects that membership of a 'suspect community' has on relations within Muslim communities. Drawing from interviews with British Muslims living in Leeds or Bradford, I address this gap by explicating how co-option of Muslim community members to counter extremism fractures relations within Muslim communities. I reveal how community members internalize fears of state targeting which precipitates internal disciplinary measures. I contribute the category of 'internal suspect body' which is materialized through two intersecting conditions within preventative counter-terrorism: the suspected extremist for Muslims to look out for and suspected informer who might report fellow Muslims. I argue that the suspect community operates through a network of relations by which terrors of counter-terrorism are reproduced within Muslim communities with divisive effects. © London School of Economics and Political Science 2018.

  17. Perceived coping & concern predict terrorism preparedness in Australia.

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Jones, Alison L; Barr, Margo; Raphael, Beverley

    2012-12-27

    In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Adults in New South Wales (NSW) completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI) in 2010 (N=2038). Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR)=2.07, p=0.001) learning evacuation plans (AOR=1.61, p=0.05), establishing emergency contact plans (AOR=2.73, pterrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and incident-specific preparedness and could form an integral element of community resilience strategies

  18. Incentive Mechanism Model Design for Sharing of Information Resources in Rural Areas

    OpenAIRE

    Gao, Xirong; Shan, Lingling

    2013-01-01

    In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theory method; establish corresponding incentive mechanism model (It is divided into positive incentive model and negative incentive model, and only when the two models guarantee each other and are used at the same time can they be effective). Based on this, we put forward the institu...

  19. 31 CFR 594.305 - Information or informational materials.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.305 Information or informational materials. (a) For purposes of this...

  20. TOURISM AND TERRORISM: A WORLDWIDE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Cristina Elena ALBU

    2016-03-01

    Full Text Available We live in a society marked by major changes in the tourism field. Tourist destinations make all possible efforts to best promote their tourist offer and attract as different tourist categories as there might be. However, these tourist destinations are sometimes associated with terrorist attacks that can turn a famous tourist area into a highly avoided one. Terrorism may be permanently detrimental to a tourist destination on both social and economic levels. The purpose of this paper is to highlight the impact that terrorist attacks have on tourism around the globe. The research method used for the achievement of this article is documentary research. Through the proportions and forms that it has taken, terrorism has become one of the more and more active and threatening calamities that affect the international community. For some organizations, terrorism has become a means of solving their political, cultural and religious problems, taking tourism as a niche through which they can carry out their targets.

  1. A qualitative analysis of information sharing for children with medical complexity within and across health care organizations.

    Science.gov (United States)

    Quigley, Laura; Lacombe-Duncan, Ashley; Adams, Sherri; Hepburn, Charlotte Moore; Cohen, Eyal

    2014-06-30

    Children with medical complexity (CMC) are characterized by substantial family-identified service needs, chronic and severe conditions, functional limitations, and high health care use. Information exchange is critically important in high quality care of complex patients at high risk for poor care coordination. Written care plans for CMC are an excellent test case for how well information sharing is currently occurring. The purpose of this study was to identify the barriers to and facilitators of information sharing for CMC across providers, care settings, and families. A qualitative study design with data analysis informed by a grounded theory approach was utilized. Two independent coders conducted secondary analysis of interviews with parents of CMC and health care professionals involved in the care of CMC, collected from two studies of healthcare service delivery for this population. Additional interviews were conducted with privacy officers of associated organizations to supplement these data. Emerging themes related to barriers and facilitators to information sharing were identified by the two coders and the research team, and a theory of facilitators and barriers to information exchange evolved. Barriers to information sharing were related to one of three major themes; 1) the lack of an integrated, accessible, secure platform on which summative health care information is stored, 2) fragmentation of the current health system, and 3) the lack of consistent policies, standards, and organizational priorities across organizations for information sharing. Facilitators of information sharing were related to improving accessibility to a common document, expanding the use of technology, and improving upon a structured communication plan. Findings informed a model of how various barriers to information sharing interact to prevent optimal information sharing both within and across organizations and how the use of technology to improve communication and access to

  2. 174 THE MORALITY OF SUICIDE TERRORISM AND BOKO HARAM ...

    African Journals Online (AJOL)

    User

    philosophically consider the moral implication of suicide terrorism with particular .... define terrorism is political rather than theoretical. Brian Berkey (2010) is of ..... elements of relativism to the concept of morality because an. Islamic cleric who ...

  3. Racionalidad del terror

    Directory of Open Access Journals (Sweden)

    Sauquillo, Julián

    2012-06-01

    Full Text Available Contemporary terrorism is not an ancestral, irrational, oriental, phenomenon. Nor is it a fanatical reaction of the religions that vindicate a backward society as against the developed societies of the first world. The terrorism of today is a thoroughly modern phenomenon: one of the worst monstrosities of modern society, supplied with rational planning of objectives. A captious interpretation of the Islamic religion endows terrorism with a universal projection among the multitudinous audience of the discontented with the might of that diffuse power that we know as the developed Western world. Al Qaeda does not hesitate to present its war against the West as «a war without quarter» lasting until the infidel Christians are eliminated and the world is subjugated to Islam In the meantime, in a similar conflictive sense, the theoretical campaign of Samuel Huntington across the entire planet responds with a paradigmatic post-cold war, capable of inflaming the international conflict, in a sense no less belligerent with the Anti-Occident than that employed by the radical Imams. As has been pointed out by Amartya Sen, to give priority in this way to the religious identity, the response of the West to international terrorism in calling it «islamic terrorism» is very clumsy, as it magnifies the importance of the religious authorities in detriment to governmental ways and means in the solving of problems.

    El terrorismo contemporáneo no es un fenómeno ancestral, irracional y oriental. Tampoco es una reacción fanática de las religiones que reivindican una sociedad atrasada frente a las sociedades desarrolladas del primer mundo. El terrorismo actual es un fenómeno plenamente moderno: uno de los peores engendros de la sociedad moderna, dotado de una planificación racional de objetivos. Una interpretación capciosa de la religión islámica dota al terrorismo de una proyección universal entre la numerosa audiencia de descontentos con el poder

  4. Information Re-Sharing on Social Network Sites in the Age of Fake News

    Directory of Open Access Journals (Sweden)

    Mehrdad Koohikamali

    2017-10-01

    This study has important practical implications for SNS users and providers alike. Ensuring that information available on SNS is of high quality is critical to maintaining a healthy user base. Findings: Results indicate that attitude toward using SNSs and intention to re-share infor-mation on SNSs is influenced by perceived information quality (enjoyment, rele-vance, and reliability. Also, risk-taking propensity and enjoyment influence the intention to re-share information on SNSs in a positive direction. Future Research: In the dynamic context of SNSs, the role played by quality of information is changing. Understanding changes in quality of information by conducting longitudinal studies and experiments and including the role of habits is necessary.

  5. The study of the attitude to terrorism in a gender context

    Directory of Open Access Journals (Sweden)

    Zhanserikova D. A.

    2017-12-01

    Full Text Available the concept of terrorism today is a very diverse phenomenon. Modern terrorism has recently acquired features of a global problem that requires close attention of the international community. It is well known that any society facing this problem will eventually change its attitude to this phenomenon. The article has discussed the questions concerning the formation of the attitude to terrorism and revealed empirical indicators of male and female attitude to terrorism. The results of the study allow to predict people's reactions to this negative phenomenon.

  6. Fair Shares and Sharing Fairly: A Survey of Public Views on Open Science, Informed Consent and Participatory Research in Biobanking.

    Directory of Open Access Journals (Sweden)

    Yann Joly

    Full Text Available Biobanks are important resources which enable large-scale genomic research with human samples and data, raising significant ethical concerns about how participants' information is managed and shared. Three previous studies of the Canadian public's opinion about these topics have been conducted. Building on those results, an online survey representing the first study of public perceptions about biobanking spanning all Canadian provinces was conducted. Specifically, this study examined qualitative views about biobank objectives, governance structure, control and ownership of samples and data, benefit sharing, consent practices and data sharing norms, as well as additional questions and ethical concerns expressed by the public.Over half the respondents preferred to give a one-time general consent for the future sharing of their samples among researchers. Most expressed willingness for their data to be shared with the international scientific community rather than used by one or more Canadian institutions. Whereas more respondents indicated a preference for one-time general consent than any other model of consent, they constituted less than half of the total responses, revealing a lack of consensus among survey respondents regarding this question. Respondents identified biobank objectives, governance structure and accountability as the most important information to provide participants. Respondents' concerns about biobanking generally centred around the control and ownership of biological samples and data, especially with respect to potential misuse by insurers, the government and other third parties. Although almost half the respondents suggested that these should be managed by the researchers' institutions, results indicate that the public is interested in being well-informed about these projects and suggest the importance of increased involvement from participants. In conclusion, the study discusses the viability of several proposed models for

  7. Fair Shares and Sharing Fairly: A Survey of Public Views on Open Science, Informed Consent and Participatory Research in Biobanking.

    Science.gov (United States)

    Joly, Yann; Dalpé, Gratien; So, Derek; Birko, Stanislav

    2015-01-01

    Biobanks are important resources which enable large-scale genomic research with human samples and data, raising significant ethical concerns about how participants' information is managed and shared. Three previous studies of the Canadian public's opinion about these topics have been conducted. Building on those results, an online survey representing the first study of public perceptions about biobanking spanning all Canadian provinces was conducted. Specifically, this study examined qualitative views about biobank objectives, governance structure, control and ownership of samples and data, benefit sharing, consent practices and data sharing norms, as well as additional questions and ethical concerns expressed by the public. Over half the respondents preferred to give a one-time general consent for the future sharing of their samples among researchers. Most expressed willingness for their data to be shared with the international scientific community rather than used by one or more Canadian institutions. Whereas more respondents indicated a preference for one-time general consent than any other model of consent, they constituted less than half of the total responses, revealing a lack of consensus among survey respondents regarding this question. Respondents identified biobank objectives, governance structure and accountability as the most important information to provide participants. Respondents' concerns about biobanking generally centred around the control and ownership of biological samples and data, especially with respect to potential misuse by insurers, the government and other third parties. Although almost half the respondents suggested that these should be managed by the researchers' institutions, results indicate that the public is interested in being well-informed about these projects and suggest the importance of increased involvement from participants. In conclusion, the study discusses the viability of several proposed models for informed consent

  8. Risk-based decision making for terrorism applications.

    Science.gov (United States)

    Dillon, Robin L; Liebe, Robert M; Bestafka, Thomas

    2009-03-01

    This article describes the anti-terrorism risk-based decision aid (ARDA), a risk-based decision-making approach for prioritizing anti-terrorism measures. The ARDA model was developed as part of a larger effort to assess investments for protecting U.S. Navy assets at risk and determine whether the most effective anti-terrorism alternatives are being used to reduce the risk to the facilities and war-fighting assets. With ARDA and some support from subject matter experts, we examine thousands of scenarios composed of 15 attack modes against 160 facility types on two installations and hundreds of portfolios of 22 mitigation alternatives. ARDA uses multiattribute utility theory to solve some of the commonly identified challenges in security risk analysis. This article describes the process and documents lessons learned from applying the ARDA model for this application.

  9. Variance, Violence, and Democracy: A Basic Microeconomic Model of Terrorism

    Directory of Open Access Journals (Sweden)

    John A. Sautter

    2010-01-01

    Full Text Available Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this area have only focused on the relationship between terrorists and the government, or amongst terrorists themselves. Central to the interpretation of the terrorist conflict presented here is the idea that voters (or citizens are also one of the important determinants of how a government will respond to acts of terrorism.

  10. Differentiating the threat of radiological/nuclear terrorism: Motivations and constraints

    Energy Technology Data Exchange (ETDEWEB)

    Post, J M [Elliott School of International Affairs, George Washington University, Washington, DC (United States)

    2001-07-01

    Full text: Reviewing the spectrum of terrorist groups in terms of motivation, incentives and constraints, for nearly all groups, nuclear terrorism could be highly counter-productive. The constraints are particularly severe for large-scale mass casualty terrorism for groups that are concerned with their constituents--social revolutionary and nationalist separatist terrorists--although discriminate low level attacks are possible. Right-wing extremists, including individuals who are members of the right-wing virtual community of hatred, represent a distinct danger for low level discriminate attacks against their targets. Religious fundamentalist terrorist groups represent a particular threat, because they are not trying to influence the West but to expel Western modernizing influences. Moreover, they believe that their acts of violence are given sacred significance. The severe constraints against catastrophic terrorism for most groups argues for continuing to protect against the greatest danger - conventional terrorism - and to devote significantly increased resources to monitoring more closely the groups at greatest risk for nuclear terrorism. (author)

  11. Study on the standardization of hospital information system for medical image information sharing

    International Nuclear Information System (INIS)

    Kim, Seon Chil; Kwon, Su Ja

    2001-01-01

    As the adoption of PACS and hospital information system among university hospitals and hospital level institutions grows bigger, the need of sharing and transferring medical information among medical institutions is rising. For the medical information, which is saved in the hospital medical system, to be transferred within the same hospital, domestic, or foreign medical institutions, a standard protocol is necessary. But realistically, most of the domestic hospitals do not abide by H7L which is the HIS standard and so, information transferring is not possible as of present. As such, the purpose of this research is to implement the information between HIS and PACS to an international standard by constructing HL7 messages through HL7 Interface, which will eventually make possible information transferring between different hospitals. Our research team has developed a method which will make the PACS equip hospitals that do not follow HL7 standard which will make possible to transfer information between HIS and PACS through HL7 Message. By constructing message files, which follow the form of HL7 Message in the HL7 Interface, they can be transferred to PACS through the ftp protocol. The realization of the HIS/OCS Interface through HL7 enables data transferring between domestic and foreign medical institutions possible by implementing the international standard in the PACS and HIS data transferring process. The HL7 that our research team has developed made patient data transfer between medical institutions possible. The Interface is for a specific system model and in order for the data transfer between different systems to be realized, interfaces that are fit for each system must be needed. If the Interface is improvised and implemented to each hospital's information system, the data sharing among medical institutions can be broadened

  12. Terrorism-related fear and avoidance behavior in a multiethnic urban population.

    Science.gov (United States)

    Eisenman, David P; Glik, Deborah; Ong, Michael; Zhou, Qiong; Tseng, Chi-Hong; Long, Anna; Fielding, Jonathan; Asch, Steven

    2009-01-01

    We sought to determine whether groups traditionally most vulnerable to disasters would be more likely than would be others to perceive population-level risk as high (as measured by the estimated color-coded alert level) would worry more about terrorism, and would avoid activities because of terrorism concerns. We conducted a random digit dial survey of the Los Angeles County population October 2004 through January 2005 in 6 languages. We asked respondents what color alert level the country was under, how often they worry about terrorist attacks, and how often they avoid activities because of terrorism. Multivariate regression modeled correlates of worry and avoidance, including mental illness, disability, demographic factors, and estimated color-coded alert level. Persons who are mentally ill, those who are disabled, African Americans, Latinos, Chinese Americans, Korean Americans, and non-US citizens were more likely to perceive population-level risk as high, as measured by the estimated color-coded alert level. These groups also reported more worry and avoidance behaviors because of concerns about terrorism. Vulnerable populations experience a disproportionate burden of the psychosocial impact of terrorism threats and our national response. Further studies should investigate the specific behaviors affected and further elucidate disparities in the disaster burden associated with terrorism and terrorism policies.

  13. Night Terrors (For Parents)

    Science.gov (United States)

    ... you tried. A night terror is a sleep disruption that seems similar to a nightmare , but is ... to: reduce your child's stress create a bedtime routine that's simple and relaxing make sure your child ...

  14. 31 CFR 595.306 - Information and informational materials.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.306 Information and informational materials. (a)(1) For purposes of this part...

  15. Information sought, information shared: exploring performance and image enhancing drug user-facilitated harm reduction information in online forums.

    Science.gov (United States)

    Tighe, Boden; Dunn, Matthew; McKay, Fiona H; Piatkowski, Timothy

    2017-07-21

    There is good evidence to suggest that performance and image enhancing drug (PIED) use is increasing in Australia and that there is an increase in those using PIEDs who have never used another illicit substance. Peers have always been an important source of information in this group, though the rise of the Internet, and the increased use of Internet forums amongst substance consumers to share harm reduction information, means that PIED users may have access to a large array of views and opinions. The aim of this study was to explore the type of information that PIED users seek and share on these forums. An online search was conducted to identify online forums that discussed PIED use. Three discussion forums were included in this study: aussiegymjunkies.com, bodybuildingforums.com.au, and brotherhoodofpain.com. The primary source of data for this study was the 'threads' from the online forums. Threads were thematically analysed for overall content, leading to the identification of themes. One hundred thirty-four threads and 1716 individual posts from 450 unique avatars were included in this analysis. Two themes were identified: (1) personal experiences and advice and (2) referral to services and referral to the scientific literature. Internet forums are an accessible way for members of the PIED community to seek and share information to reduce the harms associated with PIED use. Forum members show concern for both their own and others' use and, where they lack information, will recommend seeking information from medical professionals. Anecdotal evidence is given high credence though the findings from the scientific literature are used to support opinions. The engagement of health professionals within forums could prove a useful strategy for engaging with this population to provide harm reduction interventions, particularly as forum members are clearly seeking further reliable information, and peers may act as a conduit between users and the health and medical

  16. Managing terror: differences between Jews and Arabs in Israel.

    Science.gov (United States)

    Somer, Eli; Maguen, Shira; Or-Chen, Keren; Litz, Brett T

    2009-04-01

    Using telephone surveys, we examined exposure to terror, coping, and mental health response in randomly selected Jewish-Israelis (n = 100) and Arab-Israelis (n = 100) living in five Israeli cities affected by terrorism. Jewish-Israelis and Arab-Israelis were randomly selected for study participation and completed telephone surveys in May 2002, following an extended string of terror attacks and hostilities. Although terrorism is designed to target Jewish-Israelis, the rates of exposure were similar in the two groups. Arab-Israelis reported using a wider array of coping strategies, yet also endorsed more frequent PTSD and more severe depression symptoms than Jewish-Israelis. We examined a variety of demographic, ethnic, and religious predictors of different coping styles and found varying results. For example, acceptance coping was best predicted by Arab-Israeli ethnicity, being female, greater religiosity, and lower education. Predictors of mental health response to terror were also examined, with Arab-Israeli ethnicity, being female, adaptation coping and collaborative coping best predicting PTSD and depression symptoms. Arab-Israelis may not have the same access to overarching sources of patriotic support that are readily available to their Jewish compatriots, and civilian and economic inequity experienced by the Arab minority may add to a sense of diminished resources. Our findings justify outreach efforts to overlooked minorities at risk for posttraumatic distress. Women seem to be at particular risk for the development of mental health symptoms following terrorism, which should also be noted for outreach purposes.

  17. The Double-Edged Effects of Social Media Terror Communication

    DEFF Research Database (Denmark)

    Nickel, Sandro

    2014-01-01

    This paper connects the effects of social media on terror/anti-terror communication with dynamics and consequences of surveillance. Citizens become via social media more independent from mass media and more interconnected. This is also valid when citizens engage in terror/anti-terror communication...... that social media contribute to extending surveillance: by being a temptation for intelligence services, by not resisting state authorities and via constructing threat perceptions among populations which in effect deliver security politicians ‘windows of opportunity’ in order to implement ever more....... However, via social media citizens also become targets of the ‘collect-it-all’ surveillance, which was revealed to the global public in 2013. I argue that due to such surveillance some citizens might start to censor themselves and that surveillance inflicts with a number of human rights. I further argue...

  18. The Evolution of Regional Counterterrorism Centers Within a National Counterterrorism Network: Is It Time to Fuse More Than Information?

    Science.gov (United States)

    2007-03-01

    suggests that the JTTF or FIG has become a vestigial organ . In nature, vestigial organs are structures that were useful in ancestral species but...assets, along with the resources of key private sector groups into one unified organism would eliminate information sharing barriers, and will ensure...inspection of the effectiveness of the pre and post 9/11 counter- terrorism structures to ensure that our counterterrorism and Homeland Security organisms

  19. THE IMAGE OF PIRACY AND MARITIME TERRORISM. THE MEDIA AS A TOOL FOR ITS DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Piotr Gawliczek

    2016-10-01

    Full Text Available The subject of the article was the issue of shaping the image of piracy and maritime terrorism. Emphasis was put on the media, including those using information and communication technologies. The answers to problem questions were sought: (1 Who and why forms that image (2 what tools are used for its construction. The article presents the trends and development tendencies of the analyzed phenomena, based on the report of the United Nations Conference on Trade and Development (UNCTAD. Furthermore, the results of surveys, conducted among students of military academies, on perception of piracy and maritime terrorism, are cited.

  20. Soft power as a means of fighting international terrorism: a case study of Nigeria’s “Boko Haram”

    Directory of Open Access Journals (Sweden)

    Ilesanmi Abiodun Bakare

    2016-12-01

    Full Text Available The recent rise in global terrorism is alarming, but it also reaffirms the failure of our purely hard military approach to counter the phenomenon. This paper analyzes soft power as a means to combating terrorism, with the role of education, religion and international cooperation. The case of Boko Haram, the militant Islamist group operating in Northern Nigeria, is analyzed. This group has been attracting increasing levels of attention. The group is becoming ever more daring and violent. It is unlikely that Boko Haram will be defeated totally through military means. “Soft Power” will play a crucial role in our ability to attract the moderates and deny the extremists new recruits. Islamic education is viewed as a key instrument of these “soft power” counter-terrorism strategy. Islamic education refers to the totality of the upbringing of an individual within the content and context of Islam. The Almajiri system of education in Nigeria is analyzed in the article. Besides education, international cooperation is analyzed with the special focus on Moroccan experience of learning of Sunni Maliki jurisprudence and Achaari theology. The author underlines that many African countries requested Morocco to share its experiences in the education of Imams and signed several cooperation agreements.

  1. The Design of Individual Knowledge Sharing Platform Based on Blog for Online Information Literacy Education

    Science.gov (United States)

    Qun, Zeng; Xiaocheng, Zhong

    Knowledge sharing means that an individual, team and organization share the knowledge with other members of the organization in the course of activities through the various ways. This paper analyzes the obstacle factors in knowledge sharing based on the technical point, and chooses the Blog technology to build a platform for improving knowledge sharing between individuals. The construction of the platform is an important foundation for information literacy education, and it also can be used to achieve online information literacy education. Finally, it gives a detailed analysis of its functions, advantages and disadvantages.

  2. Freedom of expression and the Ethiopian anti-terrorism proclamation

    African Journals Online (AJOL)

    Freedom of expression and the Ethiopian anti-terrorism proclamation: a comparative analysis. ... Though surveillance and interception undermine democracy, a mere suspicion of terrorism gives the National Intelligence and Security Service a power to conduct surveillance or intercept any type of communications.

  3. Militarized Maneuver Terrorism

    Science.gov (United States)

    2015-06-12

    striking the heart of the Indian tourism market and creating a siege in the Taj Mahal, it was certain to create a theater of terror. A drama played out... sport facilities, malls, movie theaters, and more. Grossman argues that American society has put forth enormous effort preparing and preventing harm to

  4. Sharing Hydrologic Data with the CUAHSI Hydrologic Information System (Invited)

    Science.gov (United States)

    Tarboton, D. G.; Maidment, D. R.; Zaslavsky, I.; Horsburgh, J. S.; Whiteaker, T.; Piasecki, M.; Goodall, J. L.; Valentine, D. W.; Whitenack, T.

    2009-12-01

    The CUAHSI Hydrologic Information System (HIS) is an internet based system to support the sharing of hydrologic data consisting of databases connected using the internet through web services as well as software for data discovery, access and publication. The HIS is founded upon an information model for observations at stationary points that supports its data services. A data model, the CUAHSI Observations Data Model (ODM), provides community defined semantics needed to allow sharing information from diverse data sources. A defined set of CUAHSI HIS web services allows for the development of data services, which scale from centralized data services which support access to National Datasets such as the USGS National Water Information System (NWIS) and EPA Storage and Retrieval System (STORET), in a standard way; to distributed data services which allow users to establish their own server and publish their data. User data services are registered to a central HIS website, and they become searchable and accessible through the centralized discovery and data access tools. HIS utilizes both an XML and relational database schema for transmission and storage of data respectively. WaterML is the XML schema used for data transmission that underlies the machine to machine communications, while the ODM is implemented as relational database model for persistent data storage. Web services support access to hydrologic data stored in ODM and communicate using WaterML directly from applications software such as Excel, MATLAB and ArcGIS that have Simple Object Access Protocol (SOAP) capability. A significant value of web services derives from the capability to use them from within a user’s preferred analysis environment, using community defined semantics, rather than requiring a user to learn new software. This allows a user to work with data from national and academic sources, almost as though it was on their local disk. Users wishing to share or publish their data through CUAHSI

  5. Dynamism and the erosion of procedural safeguards in international governance of terrorism

    NARCIS (Netherlands)

    N.T. Ali (Nathanael)

    2015-01-01

    markdownabstractAbstract Contemporary international governance of terrorism reflects a conceptualisation of terrorism as a global public problem that both affects and needs to be responded to by all sectors of global society. Consequently, counter-terrorism has taken the form of proactive risk

  6. Lessons from History for Counter-Terrorism Strategic Communications

    Directory of Open Access Journals (Sweden)

    Haroro J. Ingram

    2016-06-01

    Full Text Available Drawing on the Counter-terrorism Strategic Communication (CTSC Project’s research paper “A Brief History of Propaganda during Conflict“, this Policy Brief lays out the key policy-relevant lessons for developing effective counter-terrorism strategic communications. It presents a framework of interrelated macro-, mezzo- and micro-level considerations for maximizing the efficacy of not just a strategic communications campaign but message design. Historical examples are drawn upon to illustrate their practical application. The Policy Brief concludes by analysing four key strategic-policy principles arguing that a counter-terrorism strategic communications campaign is more likely to be successful if it is based on the cumulative effects of a multidimensional messaging strategy.

  7. Sharing Family Life Information Through Video Calls and Other Information and Communication Technologies and the Association With Family Well-Being: Population-Based Survey

    OpenAIRE

    Shen, Chen; Wang, Man Ping; Chu, Joanna TW; Wan, Alice; Viswanath, Kasisomayajula; Chan, Sophia Siu Chee; Lam, Tai Hing

    2017-01-01

    Background The use of information and communication technologies (ICTs) for information sharing among family members is increasing dramatically. However, little is known about the associated factors and the influence on family well-being. Objective The authors investigated the pattern and social determinants of family life information sharing with family and the associations of different methods of sharing with perceived family health, happiness, and harmony (3Hs) in Hong Kong, where mobile p...

  8. Journals Supporting Terrorism Research: Identification and Investigation into Their Impact on the Social Sciences

    Science.gov (United States)

    Bullis, Daryl R.; Irving, Richard D.

    2013-01-01

    A citation analysis of two preeminent terrorism journals ("Terrorism and Political Violence" and "Studies in Conflict and Terrorism") was used to identify 37 additional social science journals of significant importance to terrorism research. Citation data extracted from the "Web of Science" database was used to…

  9. 78 FR 65696 - 30-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-11-01

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Chief Information... Information Collection: Housing Finance Agency Risk- Sharing Program. OMB Approval Number: 2502-0500. Type of... housing finance agencies (HFAs). Under this program, HUD provides full mortgage insurance on multifamily...

  10. 6 CFR 25.6 - Procedures for designation of qualified anti-terrorism technologies.

    Science.gov (United States)

    2010-01-01

    ...-terrorism technologies. 25.6 Section 25.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.6 Procedures for designation of qualified anti-terrorism technologies. (a) Application Procedure. Any person, firm or other...

  11. Report on the trainings for terrorism. Document on present state of affairs

    International Nuclear Information System (INIS)

    Noda, Kimio; Saito, Toru; Hukumoto, Masahiro

    2001-12-01

    A series of attacks on America by terrorism on September 11, 2001 gave us a terrible shock. Two types of training against the act of terrorism had been held in Tokai Works of the Japan Nuclear Cycle Development Institute (JNC) to grasp the present situation of JNC Tokai Works and improve the countermeasure against the terrorism. The first training was for the incendiarism and the second one was for the injury. Consequently the revealed points to be improved were the followings. (1) Keeping a sense of crisis. The countermeasure against terrorism should be instructed and trained to realize the sense of crisis, that is, uncertainty of the time and the kind of terrorism. (2) Organization of the structure against the terrorism. The structure for the contingency should to organized to strengthen the guard structure by forming the pursuit team, the guard team and so on constituted by JNC's staff members. (3) Preparation of equipments against the terrorism. The coloring ball, club, two-pronged weapon, shield, knifeproof vest and so on should be provided the guards of to strengthen the countermeasure before the police's arrival. (4) Preparation and announcement of manuals. The manuals against terrorism for the ordinary stuff members should be prepared and used in the training to make the ordinary stuff's countermeasure more effective. (author)

  12. Catching Seriously Bad Dudes: US Counter-terrorism strategies

    Czech Academy of Sciences Publication Activity Database

    Bernardyová, Alžběta

    2008-01-01

    Roč. 6, č. 7-8 (2008), s. 34-38 ISSN 1214-1720 R&D Projects: GA ČR GA407/07/1395 Institutional research plan: CEZ:AV0Z70280505 Keywords : terrorism * counter- terrorism * US * 9/11 Subject RIV: AD - Politology ; Political Sciences http://www.socioweb.cz/upl/editorial/download/156_socioweb_7_08.pdf

  13. The evolution of extreme cooperation via shared dysphoric experiences.

    Science.gov (United States)

    Whitehouse, Harvey; Jong, Jonathan; Buhrmester, Michael D; Gómez, Ángel; Bastian, Brock; Kavanagh, Christopher M; Newson, Martha; Matthews, Miriam; Lanman, Jonathan A; McKay, Ryan; Gavrilets, Sergey

    2017-03-14

    Willingness to lay down one's life for a group of non-kin, well documented historically and ethnographically, represents an evolutionary puzzle. Building on research in social psychology, we develop a mathematical model showing how conditioning cooperation on previous shared experience can allow individually costly pro-group behavior to evolve. The model generates a series of predictions that we then test empirically in a range of special sample populations (including military veterans, college fraternity/sorority members, football fans, martial arts practitioners, and twins). Our empirical results show that sharing painful experiences produces "identity fusion" - a visceral sense of oneness - which in turn can motivate self-sacrifice, including willingness to fight and die for the group. Practically, our account of how shared dysphoric experiences produce identity fusion helps us better understand such pressing social issues as suicide terrorism, holy wars, sectarian violence, gang-related violence, and other forms of intergroup conflict.

  14. Shared Decision Making: The Need For Patient-Clinician Conversation, Not Just Information.

    Science.gov (United States)

    Hargraves, Ian; LeBlanc, Annie; Shah, Nilay D; Montori, Victor M

    2016-04-01

    The growth of shared decision making has been driven largely by the understanding that patients need information and choices regarding their health care. But while these are important elements for patients who make decisions in partnership with their clinicians, our experience suggests that they are not enough to address the larger issue: the need for the patient and clinician to jointly create a course of action that is best for the individual patient and his or her family. The larger need in evidence-informed shared decision making is for a patient-clinician interaction that offers conversation, not just information, and care, not just choice. Project HOPE—The People-to-People Health Foundation, Inc.

  15. Nightmares and Night Terrors

    Science.gov (United States)

    ... able to tell you what happened in the dream and why it was scary. Your child may have trouble going back to sleep. Your child might have the same dream again on other nights. What are night terrors? ...

  16. Nuclear terrorism and legal protection of environment

    International Nuclear Information System (INIS)

    Ahmad-zada, Z.; Aliev, D.

    2003-01-01

    Full text: For the last years the terrorism has significantly changed. If 20-30 years ago terrorists would kidnap famous politicians or hijack planes, but at this stage they switched to massive destruction of innocent people. Now the problem of struggle against nuclear terrorism becomes very actual problem. The nuclear terrorism is meant as an opportunity of accomplishment of act of terrorism with use of the nuclear weapon, or accomplishment of explosions on atomic power stations and other objects of an atomic energy. Threats to nuclear objects become more and more often and appreciable. In the world there were some similar cases of threat to nuclear objects from the part of terrorists, and also cases of use by terrorists of nuclear, chemical and bacteriological substances. These cases testify to real threat of use by terrorists of the weapon of mass destruction. It is natural, that accomplishment of acts of terrorism on these objects can lead to ecological catastrophe and can put an irreparable loss to an environment and process of social development. Up to the middle of sixtieth years of twentieth century protection of an environment was not put forward as an independent political problem, and its scientific substantiation has not been developed enough as a diversified, complex, global problem. Only dynamical development in seventieth - eightieth years of scientific bases of global problems has allowed to allocate the rules of law concerning to protection of an environment, into special group. International legal protection of ecology was precisely allocated now in system of the general international law as independent, specific sphere of regulation. The principle of inadmissibility of radioactive pollution of environment covers both military, and peace area of use of nuclear power. Formation and the statement of this special principle of International law of the Environment takes place in two ways - contractual and usual, with observance by the states of

  17. Patterns in response to chronic terrorism threats: A construct of emotional, cognitive, and behavioral responses among Israeli citizens.

    Science.gov (United States)

    Cohen-Louck, Keren; Saka, Yael

    2017-10-01

    Israeli citizens are exposed to unpredictable and chronic terrorism threats that significantly jeopardize their personal sense of safety. The purpose of the present study is to present how Israeli discourse is structured with regard to emotional, cognitive, and behavioral responses to chronic terrorism threats and to understand the range of responses as well as map the risk and protective factors of this existential threat. Semistructured in-depth interviews were conducted with 40 Israeli adults (22 women and 18 men). Qualitative analysis revealed three patterns of responses to ongoing terrorism: emotional, cognitive, and behavioral. Emotional responses include fear, worry, sense of empathy, and detachment. Cognitive responses include situational assessment and pursuit of solutions, the use of traumatic imagining, beliefs in fate and luck, and optimism. Behavioral responses include looking for information, alertness, and habituation. The findings also revealed another response, which combines cognitive and behavioral responses. Some of the responses are innovative and unique to the threat of terrorism. Mapping the responses revealed mental health risk factors, as well as protective factors that can help structure personal and national resilience. These findings have implications on the treatment and prevention of personal and social pathologies, and how to effectively cope with terrorism threats. Copyright © 2016 John Wiley & Sons, Ltd.

  18. Terrorism, war, and peace

    Directory of Open Access Journals (Sweden)

    JÜRGEN STOLZENBER

    2006-01-01

    Full Text Available The article tries first to analyse the different use of the concept of war made by George W. Bush with reference to the terrorist attack of 09/11 and to the invasion of Afghanistan. In order to do this, the paper will start from an analysis of the concept of terrorism itself and from the question whether terrorist acts can be designed as acts of war. It turns secondly to the more philosophical aspects of the question of terrorism, war and peace, starting from questions about the applicability of just war theories to the so called “war on terrorism” and discussing finally what is called “The Kantian Project”, that is the Kantian arguments for the establishment of “eternal peace” among the states of the world.

  19. Product Bundling and Shared Information Goods: A Pricing Exercise

    Science.gov (United States)

    Morrison, William G.

    2016-01-01

    In this article, the author describes an exercise in which two pricing problems (product bundling and the sharing of digital information goods) can be understood using the same analytical approach. The exercise allows students to calculate the correct numerical answers with relative ease, while the teaching plan demonstrates the importance of the…

  20. Capturing information needs of care providers to support knowledge sharing and distributed decision making.

    Science.gov (United States)

    Rogers, M; Zach, L; An, Y; Dalrymple, P

    2012-01-01

    This paper reports on work carried out to elicit information needs at a trans-disciplinary, nurse-managed health care clinic that serves a medically disadvantaged urban population. The trans-disciplinary model provides a "one-stop shop" for patients who can receive a wide range of services beyond traditional primary care. However, this model of health care presents knowledge sharing challenges because little is known about how data collected from the non-traditional services can be integrated into the traditional electronic medical record (EMR) and shared with other care providers. There is also little known about how health information technology (HIT) can be used to support the workflow in such a practice. The objective of this case study was to identify the information needs of care providers in order to inform the design of HIT to support knowledge sharing and distributed decision making. A participatory design approach is presented as a successful technique to specify requirements for HIT applications that can support a trans-disciplinary model of care. Using this design approach, the researchers identified the information needs of care providers working at the clinic and suggested HIT improvements to integrate non-traditional information into the EMR. These modifications allow knowledge sharing among care providers and support better health decisions. We have identified information needs of care providers as they are relevant to the design of health information systems. As new technology is designed and integrated into various workflows it is clear that understanding information needs is crucial to acceptance of that technology.

  1. Three Essays on Law Enforcement and Emergency Response Information Sharing and Collaboration: An Insider Perspective

    Science.gov (United States)

    Treglia, Joseph V.

    2013-01-01

    This dissertation identifies what may be done to overcome barriers to information sharing among federal, tribal, state, and local law enforcement agencies and emergency responders. Social, technical, and policy factors related to information sharing and collaboration in the law enforcement and emergency response communities are examined. This…

  2. Integration of Social Sciences in Terrorism Modelling: Issues, Problems and Recommendations

    National Research Council Canada - National Science Library

    Resnyansky, L

    2007-01-01

    ...; terrorists behaviour; the structure of terrorist organisations and networks; terrorism threat; and influence strategies and actions directed towards terrorism threat anticipation and minimisation.

  3. Conceptualising Terrorism Trend Patterns in Pakistan an Empirical Perspective

    Directory of Open Access Journals (Sweden)

    Muhammad  Feyyaz

    2013-03-01

    Full Text Available Terrorism continues to be viewed conventionally in Pakistan. However, the phenomenon has assumed a structured formation driven by rational choice perspectives. This article attempts to identify distinct trends and patterns of terrorism within prevailing environments of Pakistan. In doing so, it also examines the validity of seasonality dimensions of routine activity theory (use of summer months and earlier days of week for terrorist acts. Eight trends are identified tentatively. Using empirical data and analytical discourse, the findings confirm the assumed trends in terms of their typology, structure, operational system and rallying themes. In addition, the article finds support for the hypothesis of terrorism being a strategic approach rather than an ordinary form of violence. It is further found that changed patterns of violence warrant a revisiting of earlier assumptions regarding the applicability of routine activity theory within the Pakistani context. By implication, the study also suggests a variation of terrorism under different regime types, i.e. military or democratic. 

  4. Putting the Focus Back on the Patient: How Privacy Concerns Affect Personal Health Information Sharing Intentions.

    Science.gov (United States)

    Abdelhamid, Mohamed; Gaia, Joana; Sanders, G Lawrence

    2017-09-13

    Health care providers are driven by greater participation and systemic cost savings irrespective of benefits to individual patients derived from sharing Personal Health Information (PHI). Protecting PHI is a critical issue in the sharing of health care information systems; yet, there is very little literature examining the topic of sharing PHI electronically. A good overview of the regulatory, privacy, and societal barriers to sharing PHI can be found in the 2009 Health Information Technology for Economic and Clinical Health Act. This study investigated the factors that influence individuals' intentions to share their PHI electronically with health care providers, creating an understanding of how we can represent a patient's interests more accurately in sharing settings, instead of treating patients like predetermined subjects. Unlike privacy concern and trust, patient activation is a stable trait that is not subject to change in the short term and, thus, is a useful factor in predicting sharing behavior. We apply the extended privacy model in the health information sharing context and adapt this model to include patient activation and issue involvement to predict individuals' intentions. This was a survey-based study with 1600+ participants using the Health Information National Trends Survey (HINTS) data to validate a model through various statistical techniques. The research method included an assessment of both the measurement and structural models with post hoc analysis. We find that privacy concern has the most influence on individuals' intentions to share. Patient activation, issue involvement, and patient-physician relationship are significant predictors of sharing intention. We contribute to theory by introducing patient activation and issue involvement as proxies for personal interest factors in the health care context. Overall, this study found that although patients are open to sharing their PHI, they still have concerns over the privacy of their PHI

  5. Global Media and Public Affairs Communications in a New Era of Defense: The War Against Terrorism

    National Research Council Canada - National Science Library

    Tasista, Michele

    2002-01-01

    The Sept. 11, 2001, terrorist attacks and subsequent conflict in Afghanistan culminated a 30-year escalation of terrorism and efforts to counter it, an undeclared war that has unfolded principally on the information battlefield...

  6. The European fight against terrorism financing: Professional fields and new governing practices

    NARCIS (Netherlands)

    Wesseling, M.

    2013-01-01

    Combating the financing of terrorism has been a core component of the global War on Terror that began after the 9/11 terrorist attacks. This book shows how the fight against terrorism financing has taken shape and become important in Europe. An examination of two case studies - the EU’s Third

  7. Terrorism and Political Violence in Africa: Contemporary Trends in a Shifting Terrain

    Directory of Open Access Journals (Sweden)

    James J.F. Forest

    2011-09-01

    Full Text Available In 1994, Martha Crenshaw’s edited volume Terrorism in Africa made clear how terrorism – generally defined as a tactic that uses violence or the threat of violence as a coercive strategy to cause fear and political intimidation – was a feature within resistance movements, military coups, political assassinations, and various intra- and inter-state wars that have affected most African states at some point during the continent’s transition to independence and subsequent post-colonial period.  Crenshaw further noted that terrorism was not “an isolated phenomenon” for African states or the region more broadly [1]. This description remains salient today: terrorism has been a global phenomenon for many decades, and Africa has not been unscathed by it. Terrorism is just one of several types of political violence that states and their citizens, in Africa and elsewhere, have had to grapple with. In fact, from a macro perspective, terrorism may not be universally seen as the most important security challenge faced by African states and their citizens. Famine, drought, endemic poverty, diseases and other natural and man-made disasters that undermine human security have also been at the forefront of recent policy discussions on Africa among Western governments and international aid organizations. It is thus necessary to place terrorism within the broader terrain of Africa’s security challenges, before examining the historical trends and specific examples discussed in this Special Issue of Perspectives on Terrorism.

  8. Analysis of Information Sharing Mechanism in the Food Industry Green Supply Chain Management and Operation Process

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    In order to effectively address the issues of environmental pollution and food safety in food industry,the green supply chain management should be used in the food industry.However,information sharing is the basis of supply chain management.For this purpose,on the basis of describing the connotation of food industry green supply chain management,the paper introduces the contents and the effects of information sharing mode in detail.It focuses on the barriers of the implementation of information-sharing mechanisms in the food industry green supply chain management and operation process and analyzes the necessity of using information sharing mechanism among the members of the food industry green supply chain management mode by game theory,so as to strengthen the competitiveness of enterprises through supply chain management.

  9. Determinants of quality of shared sanitation facilities in informal settlements: case study of Kisumu, Kenya

    Directory of Open Access Journals (Sweden)

    Sheillah Simiyu

    2017-01-01

    Full Text Available Abstract Background Shared facilities are not recognised as improved sanitation due to challenges of maintenance as they easily can be avenues for the spread of diseases. Thus there is need to evaluate the quality of shared facilities, especially in informal settlements, where they are commonly used. A shared facility can be equated to a common good whose management depends on the users. If users do not work collectively towards keeping the facility clean, it is likely that the quality may depreciate due to lack of maintenance. This study examined the quality of shared sanitation facilities and used the common pool resource (CPR management principles to examine the determinants of shared sanitation quality in the informal settlements of Kisumu, Kenya. Methods Using a multiple case study design, the study employed both quantitative and qualitative methods. In both phases, users of shared sanitation facilities were interviewed, while shared sanitation facilities were inspected. Shared sanitation quality was a score which was the dependent variable in a regression analysis. Interviews during the qualitative stage were aimed at understanding management practices of shared sanitation users. Qualitative data was analysed thematically by following the CPR principles. Results Shared facilities, most of which were dirty, were shared by an average of eight households, and their quality decreased with an increase in the number of households sharing. The effect of numbers on quality is explained by behaviour reflected in the CPR principles, as it was easier to define boundaries of shared facilities when there were fewer users who cooperated towards improving their shared sanitation facility. Other factors, such as defined management systems, cooperation, collective decision making, and social norms, also played a role in influencing the behaviour of users towards keeping shared facilities clean and functional. Conclusion Apart from hardware factors, quality

  10. Paramilitary Terrorism: A Neglected Threat

    National Research Council Canada - National Science Library

    Tallen, Jr, George W

    2007-01-01

    Fixation upon WMD terrorism, reinforced by the recurring need to manage the consequences of other manmade or natural disasters, has conditioned the homeland security community to focus upon prevention...

  11. Can I help you? Information sharing in online discussion forums by people living with a long-term condition

    Directory of Open Access Journals (Sweden)

    Carol S Bond

    2016-11-01

    Full Text Available Background Peer-to-peer health care is increasing, especially amongst people living with a long-term condition. How information is shared is, however, sometimes of concern to health care professionals. Objective This study explored what information is being shared on health-related discussion boards and identified the approaches people used to signpost their peers to information. Methods This study was conducted using a qualitative content analysis methodology to explore information shared on discussion boards for people living with diabetes. Whilst there is debate about the best ethical lens to view research carried out on data posted on online discussion boards, the researchers chose to adopt the stance of treating this type of information as “personal health text”, a specific type of research data in its own right. Results Qualitative content analysis and basic descriptive statistics were used to analyse the selected posts. Two major themes were identified: ‘Information Sharing from Experience’ and ‘Signposting Other Sources of Information’. Conclusions People were actively engaging in information sharing in online discussion forums, mainly through direct signposting. The quality of the information shared was important, with reasons for recommendations being given. Much of the information sharing was based on experience, which also brought in information from external sources such as health care professionals and other acknowledged experts in the field. With the rise in peer-to-peer support networks, the nature of health knowledge and expertise needs to be redefined. People online are combining external information with their own personal experiences and sharing that for others to take and develop as they wish.

  12. Terrorism

    International Nuclear Information System (INIS)

    Rossnagel, A.

    1990-01-01

    The NPT should prevent the proliferation of nuclear weapons, as a contribution to the worldpeace. This aim is also threatened today by the nuclear actions of states and subnational groups. Such actions have occured in the past and are expected in the future. States and specific terrorist groups are able to acquire specific nuclear material by theft and to assault nuclear plants and transport. The main constraint, the deficit of motivation, could be dropped in the future for many reasons. Therefore nuclear terrorism is a 'real threat to civilization' and its probability is increasing. (orig.) [de

  13. Terrorism and mental health in the rural Midwest.

    Science.gov (United States)

    Hawley, Suzanne R; Ablah, Elizabeth; Hawley, Gary C; Cook, David J; Orr, Shirley A; Molgaard, Craig A

    2006-01-01

    Since the terrorist attacks of 11 September 2001, the amount of terrorism preparedness training has increased substantially. However, gaps continue to exist in training for the mental health casualties that result from such events. Responders must be aware of the mental health effects of terrorism and how to prepare for and buffer these effects. However, the degree to which responders possess or value this knowledge has not been studied. Multi-disciplinary terrorism preparedness training for healthcare professionals was conducted in Kansas in 2003. In order to assess knowledge and attitudes related to mental health preparedness training, post-test surveys were provided to 314 respondents 10 months after completion of the training. Respondents returned 197 completed surveys for an analysis response rate of 63%. In general, the results indicated that respondents have knowledge of and value the importance of mental health preparedness issues. The respondents who reported greater knowledge or value of mental health preparedness also indicated significantly higher ability levels in nationally recognized bioterrorism competencies (p mental health components to be incorporated into terrorism preparedness training. Further studies to determine the most effective mental health preparedness training content and instruction modalities are needed.

  14. The Dilemma of Porous Borders: Uganda’s Experience in Combating Terrorism

    Science.gov (United States)

    2017-01-10

    burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA...that laxity in immigration control, poor remuneration , and corruption among security officials at border stations complicates the challenge of porous...Special Branch was disbanded and PATU placed under a newly created Directorate of Counter Terrorism. Since then, a

  15. The Concept of (Global Terrorism and Conspiracy Theory as Media Discourse

    Directory of Open Access Journals (Sweden)

    Neda Radulović

    2016-09-01

    Full Text Available Despite the urgency and growing interest in a subject, there is no unifying definition of terrorism. A large number of studies could be seen as integral part of ‘counter-terrorism’ strategies- as set of practices to prevent and defeat terrorism. Lisa Stampnitzky’s research looked into the discourse of terrorism experts and argued that the concept of terrorism is a social construct, thus revealing further structure that facilitated it. Aim of this paper is to compare the concept of terrorism as media discourse- a form of legitimate expert interpretation, with conspiracy theory as a form of illegitimate, para-institutional form of interpretation. Noting the commonplaces of the two: defined as an afterthought, both being designated and not self-described notions, featuring a plot that precedes the event- this paper will look at these discourses, the way they relate to (and intersect each other, and try to trace their manifestations.

  16. The Relationship Between Posttraumatic Growth and Psychosocial Variables in Survivors of State Terrorism and Their Relatives.

    Science.gov (United States)

    Cárdenas-Castro, Manuel; Faúndez-Abarca, Ximena; Arancibia-Martini, Héctor; Ceruti-Mahn, Cristián

    2017-08-01

    The present study explores reports of growth in survivors and family members of victims of state terrorism ( N = 254) in Chile from 1973 to 1990. The results indicate the presence of reports of posttraumatic growth ( M = 4.69) and a positive and statistically significant correlation with variables related to the life impact of the stressful events ( r = .46), social sharing of emotions ( r = .32), deliberate rumination ( r = .37), positive reappraisal ( r = .35), reconciliation ( r = .39), spiritual practices ( r = .33), and meaning in life ( r = .51). The relationship between growth and forgiveness is not statistically significant. The variables that best predict posttraumatic growth are positive reappraisal (β = .28), life impact (β = .24), meaning in life β = .23), and reconciliation (β = .20). The forward-method hierarchical model indicates that these variables are significant predictors of growth levels, R 2 = .53, F(8, 210) = 30.08, p state terrorism manage to grow after these experiences, and the redefinition of meaning in life and the positive reappraisal of the traumatic experiences are the elements that make it possible to create a new narrative about the past.

  17. Why Communication and Performance are Key in Countering Terrorism

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-02-01

    Full Text Available In this Research Paper, Research Fellow Prof. Dr. Beatrice de Graaf emphasises the importance of effective communication and performance in the fight against terrorism and the fear it aims to induce. Essentially, terrorists and states are conducting “influence warfare”, a battle to convince and persuade the different target audiences to rally behind them. In this battle of perceptions, the different government agencies need to be aware of the often implicit and unwittingly produced “stories” they tell to counter those narrated by the terrorists. It is crucial to take in consideration the fact that combating terrorism is a form of communication, as much as terrorism is itself.

  18. An Experimental Study of the Effect of Shared Information on Pilot/Controller Re-Route Negotiation

    Science.gov (United States)

    Farley, Todd C.; Hansman, R. John

    1999-01-01

    Air-ground data link systems are being developed to enable pilots and air traffic controllers to share information more fully. The sharing of information is generally expected to enhance their shared situation awareness and foster more collaborative decision making. An exploratory, part-task simulator experiment is described which evaluates the extent to which shared information may lead pilots and controllers to cooperate or compete when negotiating route amendments. The results indicate an improvement in situation awareness for pilots and controllers and a willingness to work cooperatively. Independent of data link considerations, the experiment also demonstrates the value of providing controllers with a good-quality weather representation on their plan view displays. Observed improvements in situation awareness and separation assurance are discussed. It is argued that deployment of this relatively simple, low-risk addition to the plan view displays be accelerated.

  19. Epistemological failures : everyday terrorism in the west

    OpenAIRE

    Gentry, Caron Eileen

    2016-01-01

    This article attempts to problematize the disparate level of attention paid to similar violences globally, whereby violence against women in the developing world is seen as a security concern to the West and yet violence against women in the West is minimized or ignored. It will do this first by demonstrating that everyday violences, better known as everyday terrorism, in the West are subjugated knowledges within Terrorism Studies. To demonstrate this, Half the Sky, Sex and World Peace, and T...

  20. Terrorism: Supplement to the Second Edition. A Selected Bibliography.

    Science.gov (United States)

    Boston, Guy D.

    The annotated bibliography describes 85 materials related to terrorism which were collected by the National Criminal Reference Service. Although no consensus exists on the definition of terrorism, the term is interpreted in this document to include both illegal and destructive acts against society and governments and violent means undertaken to…

  1. 239 Inter-Agency Cooperation in Combating Terrorism in Nigeria ...

    African Journals Online (AJOL)

    User

    In recent times, terrorism has become one of the most dangerous threats to .... groups or clandestine agents, usually intended to influence an audience”. (ITSR ... terrorist attacks on the World Trade Center in New York and the Pentagon ..... Books. Imobighe, T.A. (2006b). “Combating Terrorism in Africa: An Integrated.

  2. Lone-actor Terrorism and Impulsivity.

    Science.gov (United States)

    Meloy, J Reid; Pollard, Jeffrey W

    2017-11-01

    In some recent cases of lone-actor terrorism, there is evidence the subject acted impulsively, often in response to a triggering event which contained a loss and humiliation. Evidence suggests the subjects acted precipitously, despite planning and preparation carried out in the preceding weeks or months, and their attacks failed to include the often considerable preparation that had been done. The pathway became a runway. The authors recommend the traditional assessment of impulsivity in persons of concern for lone acts of terrorism, as well as other proximal warning behaviors for targeted violence. Both indirect and direct assessment guidelines are proposed, with an emphasis upon self-report, psychological testing, collateral data gathering, and historical records. © 2017 American Academy of Forensic Sciences.

  3. The share of sales for secondary information in the sales for scientific and technical information in the Federal Republic of Germany

    International Nuclear Information System (INIS)

    Bernhardt, U.; Jungjohann, K.

    1978-07-01

    This final report of an empirical research about the expenditures and sales for Secondary Information (SI) as a share of Scientific and Technical Information (STI) in 1974 is furthermore concerned with: the quantity of SI and STI; the share of information free of charge; a specification for information products, individual information services and magnetic tape services; a differentiation for several areas in the market (institutions for information and documentation, libraries, publishers and privat users); the evaluation of the development for expenditures and sales till 1980. The methods of raising the relevant data comprised questionnaires and verbal interviews, case studies and the analysis of statistical literature. In the second phase of research questionnaires were sent to experts for a final evaluation of results. The important results are: The expenditures in the institutional sector and in libraries for SI in 1974 amount to 80 million DM and in the privat sector to about 117 million DM. The share of SI in STI amounts 8 percent. The sales for SI in the institutions for information and documentation reached 38 million DM. (orig.) [de

  4. Implications of the War On Terror for Khyber Pukhtunkhwa, Pakistan

    Directory of Open Access Journals (Sweden)

    Manzoor Ahmad

    2010-09-01

    Full Text Available The US-led War on Terror in Afghanistan conducted for the aim of eliminating Al- Qaeda and Osama-bin-Laden has brought about enormous economic, social and political changes in the region. Pakistan’s role as a front-line state in the War on Terror has had profound implications for its domestic politics and foreign policy. Pakistan not only took a U-turn on its Afghanistan policy, but also had to crack down on internal extremism and terrorism. Several military operations were carried out against the so- called terrorist factions in tribal areas and some other parts of the North West Frontier Province (NWFP, renamed as Khyber Pukhtunkhwa (KPK under the 18th Amendment to the Constitution of 1973 of Pakistan. With a majority Pashtun population, KPK has been a target of the War on Terror due to its social structure, cultural restraints and the religion of its inhabitants on the boundary with Afghanistan. The socio-cultural similarities and geographical proximity with Afghanistan have made it a sanctuary for Al-Qaeda members. The War on Terror in KPK has had negative political, economic and social repercussions for the region and thus has created hatred among the Pashtuns. This paper is an attempt to analyze the factors which made the Pashtuns of this area prone to militancy. It will analyze the political, economic and social implications of the War on Terror for KPK in general and its Pashtun population in particular.

  5. A Heuristic Design Information Sharing Framework for Hard Discrete Optimization Problems

    National Research Council Canada - National Science Library

    Jacobson, Sheldon H

    2007-01-01

    .... This framework has been used to gain new insights into neighborhood structure designs that allow different neighborhood functions to share information when using the same heuristic applied to the same problem...

  6. VALIDATION GUIDELINES FOR LABORATORIES PERFORMING FORENSIC ANALYSIS OF CHEMICAL TERRORISM

    Science.gov (United States)

    The Scientific Working Group on Forensic Analysis of Chemical Terrorism (SWGFACT) has developed the following guidelines for laboratories engaged in the forensic analysis of chemical evidence associated with terrorism. This document provides a baseline framework and guidance for...

  7. Extending Current Theories of Cross-Boundary Information Sharing and Integration: A Case Study of Taiwan e-Government

    Science.gov (United States)

    Yang, Tung-Mou

    2011-01-01

    Information sharing and integration has long been considered an important approach for increasing organizational efficiency and performance. With advancements in information and communication technologies, sharing and integrating information across organizations becomes more attractive and practical to organizations. However, achieving…

  8. Setting the agenda of a counter-terrorism strategic policy model

    Directory of Open Access Journals (Sweden)

    Emilia Ferone

    2018-03-01

    Full Text Available The aim of this paper is to present a functional model to fight terrorism from macro perspective through a “Strategic Policy Model” (SPM. The focus on legal order within the practices of Sociology of Law and Criminology is pivotal in order to reframe terrorism within a viable SPM. In “The Counterterrorism Handbook”, written by Bolz, Dudonis, and Schulz (2005, terrorism, at its very basic level, is defined as “an action that the urban guerrilla must execute with the greatest cold bloodedness, calmness and decision”. They further go on to provide a more scholarly definition: “the calculated use of violence to attain goals which are political, religious or ideological in nature. Terrorism involves a criminal act that is often symbolic in nature and intended to influence an audience beyond the immediate victims”.

  9. Measures against radiation disaster/terrorism and radiation emergency medical assistance team

    International Nuclear Information System (INIS)

    Tominaga, Takako; Akashi, Makoto

    2016-01-01

    The probability of occurrence of radiological terrorism and disaster in Japan is not low. For this reason, preparations for coping with the occurrence of radiological terrorism should be an urgent issue. This paper describes the radiation medical system and the threat of radiological terrorism and disaster in Japan, and introduces the Radiation Emergency Medical Assistance Team (REMAT), one of the radiation accident/disaster response organizations at the National Institute of Radiological Sciences. Radiation exposure medical systems in Japan are constructed only in the location of nuclear facilities and adjacent prefectures. These medical systems have been developed only for the purpose of medical correspondence at the time of nuclear disaster, but preparations are not made by assuming measures against radiological terrorism. REMAT of the National Institute of Radiological Sciences is obligated to dispatch persons to the requesting prefecture to support radiation medical care in case of nuclear disaster or radiation accident. The designation of nuclear disaster orientated hospitals in each region, and the training of nuclear disaster medical staffing team were also started, but preparations are not enough. In addition to enhancing and strengthening experts, specialized agencies, and special forces dealing with radiological terrorism, it is essential to improve regional disaster management capacity and terrorism handling capacity. (A.O.)

  10. Lessons on Policing Terrorism: Studying Police Effectiveness in Italy and Germany

    Science.gov (United States)

    2011-12-01

    Germany GF Guardie di Finanza INPOL Electronic Police Information System (Germany) JTTF Joint Terrorism Task Force Kripo Kriminalpolizei LMI...In the case of the Carabinieri and Guardie di Finanza , there may be missions and operations in which their direction comes from the Interior...Minister and Defense Minister respectively. This makes sense in tactical terms as the Guardie di Finanza includes border and customs police and the

  11. Terrorism reports: The tip of the iceberg.

    Science.gov (United States)

    Ellenberg, Eytan; Taragin, Mark; Bar-On, Zvia; Cohen, Osnat; Ostfeld, Ishay

    2017-01-01

    Medical impact of terror is a public health issue as the threat is growing all over the world. Our objective was to compare the number of injured and incidents in the three different databases and reports [Global Terrorism Database (GTD), Israeli Security Agency (ISA) and National Insurance Institute (NII)] in Israel. Retrospective study. Analyses of three different databases (GTD, ISA and NII) and basic comparison. The victims reimbursed for medical expenses are the largest population. The number of injured as described by GTD and ISA database are less important. The 2010-2013 years are marked by more incidents recognized in Israel vs GTD assessment (except in 2014). The number of victims being reimbursed for medical and mental health services is radically different from the GTD and the ISA reports. Public Health specialists should be advised of this phenomenon to deliver their right approach (including mental health) to growing threat and develop new definition of victim of terror.

  12. Nuclear Law: A Key Against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Cardozo, P.

    2004-01-01

    The role of the legal instruments in the war against nuclear terrorism. Control of radioactive sources. Elements of Nuclear Law: Definition: it is the body of special legislation that regulates the pacific uses of nuclear energy and the conduct of the persons engaged in activities related to fissionable materials and ionizing radiation . Objective: to provide a legal framework in order to protect individuals , property and the environment against the harmful effects of the use of nuclear energy and ionising radiation. Principles of nuclear energy legislation: safety principle, exclusively operator responsibility, authorization, independence of the regulatory body, inspections and enforcement, nuclear damage compensation, international cooperation. National regulatory infrastructure. Establishment of special law in Emergency Preparedness for nuclear or radiological disaster. IAEA Conventions. Transportation of nuclear material. IAEA regulations on radioactive material. Compensation for nuclear damage. Nuclear safety, security and terrorism. International and domestic instruments. Anti terrorism acts. International agreements on Safety Cooperation. (Author)

  13. Social Technologies and Informal Knowledge Sharing within and across Organizations

    Science.gov (United States)

    Jarrahi, Mohammad Hosein

    2013-01-01

    This doctoral dissertation is focused on both empirical and conceptual contributions relative to the roles social technologies play in informal knowledge sharing practices, both within and across organizations. Social technologies include (a) traditional social technologies (e.g., email, phone and instant messengers), (b) emerging social…

  14. Gender, education and terrorism

    Czech Academy of Sciences Publication Activity Database

    Malečková, Jitka; Stanišić, Dragana

    2014-01-01

    Roč. 5, č. 1 (2014), s. 40-65 ISSN 1759-5673 R&D Projects: GA ČR(CZ) GAP402/12/0510; GA MŠk(CZ) 7E08090 Institutional support: RVO:67985998 Keywords : international terrorism * women's education * public opinion Subject RIV: AH - Economics

  15. Protecting facilities against terrorism and sabotage. Is Jamaica prepared to deal with this potential threat?

    International Nuclear Information System (INIS)

    Powell, E.D.

    2001-01-01

    courts of the land. Our airports, oil refinery and some utility facilities are located in close proximity to the sea. This is very accessible to attack from the sea. Our other essential facilities are not as easily accessed as they are located inland and may be more difficult to access. All these facilities have security protection, but none is equipped to deal with any level of terrorism. No security equipment currently being used has the capability to combat, detect and or prevent any terrorist attacks or acts of sabotage. The nation needs to expand resources to set up units to focus on this potential threat. This unit should focus on analysis of threats from: terrorism; the proliferation of weapons of mass destruction; vulnerabilities attended on increasing economic and societal dependence on information technologies. There is a wide variety of novel attacks available to the terrorist today; it would be advised that the unit, through constant training and workshops, be aware of as many of these attack methods as possible. There should be collaboration between several entities to analyze and plan for the potential threats. The army and police forces will have to be complemented by scientists who have expert knowledge on this subject area. Experts could be drawn from: i. Information and communications centers; ii. Banking and finance entities; iii. Utility entities; iv. Environment protection agencies; v. Land, air and sea transportation agencies; vi. Fire services; vii. Law enforcement agencies; viii. Defense (army and police); ix. Health services; x. Oil and gas refineries; xi. Disaster preparedness program. This group would examine issues such as: How to reduce the vulnerabilities of their institutions to terrorist attacks (threat/vulnerability management); How to respond to terrorist acts? Guideline or rules to follow when faced with the problem of terrorism (crisis management); How to deal with the aftermath of terrorist attacks, including providing essential aids

  16. Combatting Domestic Terrorism: A Strategic Approach for the Twenty-First Century

    National Research Council Canada - National Science Library

    Sienrukos, John

    1999-01-01

    .... In order to reach sound, strategic recommendations for combating terrorism, the author will begin with some background on terrorism, review the various definitions as defined by the Department...

  17. Crossing the Rubicon: Making a Case for Refining the Classification of Jihadist Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Wayne Hand

    2012-09-01

    Full Text Available This paper posits that our current understanding of Jihadist Terrorism as a monolithic sub-type of Political Terrorism is flawed and that as a result our governments counter this threat with inappropriately-adapted methods.  The author argues: (A There is a 'sub-type' of Jihadist Terrorism that is more consistent with Walter’s ‘Military Terrorism’ or Feldman and Hinojosa’s ‘Guerrilla Warfare’ than within the typology of Political Terrorism; (B The author-proposed sub-type of ‘War Terrorism’ should be accepted, examined, defined, and established; and (C Establishing the author’s sub-type will allow western democracies to devise better counter-terrorism strategies while protecting the civil liberties of their citizens.

  18. Achieving DoD's Net Centric Vision of Information Sharing While Overcoming Cultural Biases to Control Information

    National Research Council Canada - National Science Library

    Shaw, Paul M

    2008-01-01

    .... A culture change from a "need to know' to a "need to share" is the desired end state. This culture change is in contrast to known organizational and individual cultural biases to control information...

  19. Sharing Family Life Information Through Video Calls and Other Information and Communication Technologies and the Association With Family Well-Being: Population-Based Survey.

    Science.gov (United States)

    Shen, Chen; Wang, Man Ping; Chu, Joanna Tw; Wan, Alice; Viswanath, Kasisomayajula; Chan, Sophia Siu Chee; Lam, Tai Hing

    2017-11-23

    The use of information and communication technologies (ICTs) for information sharing among family members is increasing dramatically. However, little is known about the associated factors and the influence on family well-being. The authors investigated the pattern and social determinants of family life information sharing with family and the associations of different methods of sharing with perceived family health, happiness, and harmony (3Hs) in Hong Kong, where mobile phone ownership and Internet access are among the most prevalent, easiest, and fastest in the world. A territory-wide population-based telephone survey was conducted from January to August 2016 on different methods of family life information (ie, information related to family communication, relationships with family members, emotion and stress management) sharing with family members, including face-to-face, phone, instant messaging (IM), social media sites, video calls, and email. Family well-being was assessed by three single items on perceived family health, happiness, and harmony, with higher scores indicating better family well-being. Adjusted prevalence ratios were used to assess the associations of sociodemographic factors with family life information sharing, and adjusted beta coefficients for family well-being. Of 2017 respondents, face-to-face was the most common method to share family life information (74.45%, 1502/2017), followed by IM (40.86%, 824/2017), phone (28.10%, 567/2017), social media sites (11.91%, 240/2017), video calls (5.89%, 119/2017), and email (5.48%, 111/2017). Younger age and higher education were associated with the use of any (at least one) method, face-to-face, IM, and social media sites for sharing family life information (all P for trend face-to-face, and IM (all P for trend face-to-face (beta=0.62, 95% CI 0.45-0.80) and video calls (beta=0.34, 95% CI 0.04-0.65). The combination of face-to-face and video calls was most strongly associated with a higher level of

  20. Misuse Case Driven Development of Secure Information Sharing for Coalition Environment

    National Research Council Canada - National Science Library

    Baek, Seung S

    2007-01-01

    .... This thesis uses misuse cases to identify such misuses of a sharing system. We show that an appropriate distributed role-based access control model imposed upon information brokers can prevent enumerate misuse cases...