WorldWideScience

Sample records for terrorism typology explain

  1. Terrorism and right-wing extremism: the changing face of terrorism and political violence in the 21st century: the virtual community of hatred.

    Science.gov (United States)

    Post, Jerrold M

    2015-04-01

    There are no psychological characteristics or psychopathology that separates terrorists from the general population. Rather it is group dynamics, with a particular emphasis on collective identity that helps explain terrorist psychology. Just as there is a diverse spectrum of terrorisms, so too is there a spectrum of terrorist psychologies. Four waves of terrorism can be distinguished: the Anarchist wave, associated with labor violence in the United States in the late 19th century; the Anti-Colonial wave (nationalist-separatist), with minority groups seeking to be liberated from their colonial masters or from the majority in their country; the New Left wave (social revolutionary); and now the Religious wave. With the communications revolution, a new phenomenon is emerging which may presage a fifth wave: lone wolf terrorists who through the Internet are radicalized and feel they belong to the virtual community of hatred. A typology of lone wolf terrorism is proposed.

  2. Crossing the Rubicon: making a case for refining the classification of Jihadist Terrorism

    OpenAIRE

    Hand, Robert Wayne

    2012-01-01

    This paper posits that our current understanding of Jihadist Terrorism as a monolithic sub-type of Political Terrorism is flawed and that as a result our governments counter this threat with inappropriately-adapted methods. The author argues: (A) There is a sub-type of Jihadist Terrorism that is more consistent with Walter’s ‘Military Terrorism’ or Feldman and Hinojosa’s ‘Guerrilla Warfare’ than within the typology of Political Terrorism; (B) The author-proposed sub-type of ‘War Terrorism’ s...

  3. Socioconomic nature of terrorism

    Directory of Open Access Journals (Sweden)

    Valeriy Petrovich Chichkanov

    2013-12-01

    Full Text Available In the article, the theoretical and methodological foundations of investigation of the  socioeconomic nature of terrorism are considered. Hypothesis of research is the existence of methodological criteria of territory classification on the basis of external and internal terrorism. On the basis of the analysis of theoretical works of national and foreign authors, normative documents of state and international level the genesis of approaches to the understanding of the essence of modern terrorism, its contents, the subject-object relations and manifestation forms is received. As the result, according to the authors’ definition “terrorism” is understood as an ideology connected with deliberate violence or threats against the civilian population or property to influence on the government or the interstate organizations. In the work, the factors of development and spreading of terrorism in the Russian Federation’s regions are allocated and quantitatively proved. Weight parameters of the specified factors are determined. The methodological differentiation of the specified factors on factors of terrorism external (attacks from the outside and an internal form (distribution and realization of radical ideas within the region in the territory is the distinctive feature of the conducted research. During the research, the cluster analysis of a region is carried out to distribute of Russia’s regions according to the typological characteristic of the region of internal and external terrorism. The obtained data are verified in accordance with empirical data, the hypothesis of the existence of methodological criteria of the region classification on the basis of external and internal terrorism is proved.

  4. Crossing the Rubicon: Making a Case for Refining the Classification of Jihadist Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Wayne Hand

    2012-09-01

    Full Text Available This paper posits that our current understanding of Jihadist Terrorism as a monolithic sub-type of Political Terrorism is flawed and that as a result our governments counter this threat with inappropriately-adapted methods.  The author argues: (A There is a 'sub-type' of Jihadist Terrorism that is more consistent with Walter’s ‘Military Terrorism’ or Feldman and Hinojosa’s ‘Guerrilla Warfare’ than within the typology of Political Terrorism; (B The author-proposed sub-type of ‘War Terrorism’ should be accepted, examined, defined, and established; and (C Establishing the author’s sub-type will allow western democracies to devise better counter-terrorism strategies while protecting the civil liberties of their citizens.

  5. A New Typology for State-Sponsored International Terrorism

    Science.gov (United States)

    2011-12-01

    tolerated the stacks of books with “ scary people” on the covers. xiv THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION State sponsorship of...sponsors of terrorism list in August of 1993.133 The explanation of the State Department’s update to the list stated that despite warnings , “the... warning signs, Qaddafi directed his associates to attempt to re- establish communications with the U.S in 1992. At that point, however, the U.S. was not

  6. Conceptualising Terrorism Trend Patterns in Pakistan an Empirical Perspective

    Directory of Open Access Journals (Sweden)

    Muhammad  Feyyaz

    2013-03-01

    Full Text Available Terrorism continues to be viewed conventionally in Pakistan. However, the phenomenon has assumed a structured formation driven by rational choice perspectives. This article attempts to identify distinct trends and patterns of terrorism within prevailing environments of Pakistan. In doing so, it also examines the validity of seasonality dimensions of routine activity theory (use of summer months and earlier days of week for terrorist acts. Eight trends are identified tentatively. Using empirical data and analytical discourse, the findings confirm the assumed trends in terms of their typology, structure, operational system and rallying themes. In addition, the article finds support for the hypothesis of terrorism being a strategic approach rather than an ordinary form of violence. It is further found that changed patterns of violence warrant a revisiting of earlier assumptions regarding the applicability of routine activity theory within the Pakistani context. By implication, the study also suggests a variation of terrorism under different regime types, i.e. military or democratic. 

  7. Terrorism in Pakistan: a behavioral sciences perspective.

    Science.gov (United States)

    Nizami, Asad Tamizuddin; Rana, Mowadat Hussain; Hassan, Tariq Mahmood; Minhas, Fareed Aslam

    2014-01-01

    This article reviews the behavioral science perspectives of terrorism in Pakistan. It can be argued that Pakistan has gained worldwide attention for "terrorism" and its role in the "war against terrorism". The region is well placed geopolitically for economic successes but has been plagued by terrorism in various shapes and forms. A behavioral sciences perspective of terrorism is an attempt to explain it in this part of the world as a complex interplay of historical, geopolitical, anthropological and psychosocial factors and forces. Drawing from theories by Western scholars to explain the behavioral and cognitive underpinnings of a terrorist mind, the authors highlight the peculiarities of similar operatives at individual and group levels. Thorny issues related to the ethical and human right dimensions of the topic are visited from the unique perspective of a society challenged by schisms and divergence of opinions at individual, family, and community levels. The authors have attempted to minimize the political descriptions, although this cannot be avoided entirely, because of the nature of terrorism. Copyright © 2014 John Wiley & Sons, Ltd.

  8. The changing face of terrorism in the 21st century: the communications revolution and the virtual community of hatred.

    Science.gov (United States)

    Post, Jerrold M; McGinnis, Cody; Moody, Kristen

    2014-01-01

    There are no psychological characteristics or psychopathology separating terrorists from the general population. Rather, it is group dynamics, with a particular emphasis on collective identity, that helps to explain terrorist psychology. Just as there is a diverse spectrum of kinds of terrorism, so too is there a spectrum of terrorist psychologies. Some terrorists, those in nationalist-separatist groups, such as Fatah and the IRA, are continuing with the mission of their parents who are dissident to the regime. The opposite generational provenance is seen among social-revolutionary terrorists, such as the Weather Underground and the Red Army Faction in Germany, who are rebelling against their parents' generation, which is loyal to the regime. Four waves of terrorism can be distinguished: the "anarchist wave"; the "anti-colonial wave" (nationalist-separatist), with minority groups seeking to be liberated from their colonial masters or from the majority in their country; the "new left" wave (social-revolutionary); and now the "religious" wave. With the communications revolution, a new phenomenon is emerging which may presage a fifth wave: lone wolf terrorists who through the Internet are radicalized and feel they belong to the virtual community of hatred. A typology of lone wolf terrorism is proposed. Copyright © 2014 John Wiley & Sons, Ltd.

  9. International terrorism in the age of globalization

    OpenAIRE

    Aksoy, Ece

    2002-01-01

    Cataloged from PDF version of article. This thesis analyzes the concept of terrorism in the age of globalization. Terrorism, which has been motivated by ideological, religious and national reasons, has added to its concern issues like inequality, injustice, dissatisfaction and antiglobalist movements, due to development and technology in the world. In order to clarify this shift in the policy, the concepts of terrorism and globalization are first explained as distinct issues...

  10. Irrational Rationality of Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Nalbandov

    2013-12-01

    Full Text Available The present article deals with the ontological problem of applying the rational choice frameworks to the study of terrorism. It testing the application of the rational choice to the “old” (before the end of the Cold War and the “new” (after the end of the Cold War terrorisms. It starts with analyzing the fundamentals of rationality and applies it at two levels: the individual (actors and group (collective via two outlooks: tactical (short-term and strategic (long-term. The main argument of the article is that while the “old” terrorism can be explained by the rational choice theory its “new” version represents a substantial departure from rationality.

  11. Individual differences in relational motives interact with the political context to produce terrorism and terrorism-support.

    Science.gov (United States)

    Thomsen, Lotte; Obaidi, Milan; Sheehy-Skeffington, Jennifer; Kteily, Nour; Sidanius, Jim

    2014-08-01

    The psychology of suicide terrorism involves more than simply the psychology of suicide. Individual differences in social dominance orientation (SDO) interact with the socio-structural, political context to produce support for group-based dominance among members of both dominant and subordinate groups. This may help explain why, in one specific context, some people commit and endorse terrorism, whereas others do not.

  12. The Politics of Terror: Rereading "Harry Potter"

    Science.gov (United States)

    Strimel, Courtney B.

    2004-01-01

    This article claims that J. K. Rowling's "Harry Potter" series, with its use of magic, frightening storylines, and character ambiguity is beneficial to children who are dealing with issues related to terror and terrorism. The author explains that the scenarios presented in Rowling's series teach children strategies for coping with both physical…

  13. Self-Regulation Mediates the Relationship between Learner Typology and Achievement in At - Risk Children

    Science.gov (United States)

    Weed, Keri; Keogh, Deborah; Borkowski, John G.; Whitman, Thomas; Noria, Christine W.

    2010-01-01

    A person-centered approach was used to explore the mediating role of self-regulation between learner typology at age 8 and academic achievement at age 14while controlling for domain-specific achievement in a longitudinal sample of 113 children born to adolescent mothers. Children were classified into one of 5 learner typologies at age 8based on interactive patterns of intellectual, achievement, and adaptive abilities. Typology classification explained significant variance in both reading and mathematics achievement at age 14. A bootstrapping approach confirmed that self-regulation mediated the relationship between typology and reading and mathematical achievement for children from all typologies except those classified as Cognitively and Adaptively Challenged. Implications of person-centered approaches for understanding processes involved with achievement are discussed. PMID:21278904

  14. Terrorism, Anti-Terrorism, and the Copycat Effect

    DEFF Research Database (Denmark)

    Jensen, Thomas

    that an increase in anti-terrorism makes it more likely that cells will plan small rather than large attacks. Furthermore, we see that an increase in anti-terrorism can make a terrorist attack more likely. Analyzing the problem of optimal anti-terrorism we see that the introduction of a copycat effect rationalizes...... an increase in the level of anti-terrorism after a large attack. Using this result we show how the copycat effect changes the dynamic pattern of terrorism attacks and what the long run consequences are...

  15. Sleep Terrors (Night Terrors)

    Science.gov (United States)

    ... terrors or other family members Lead to safety concerns or injury Result in daytime symptoms of excessive sleepiness or problems functioning Continue beyond the teen years or start in adulthood Causes Sleep terrors ...

  16. Legal Challenges of Combating Terrorism: International Humanitarian Law Implications of ‘Signature Strikes’ by Drones.

    OpenAIRE

    Ndi, George

    2015-01-01

    Terrorism has become the main international security challenge of the 21st century. From a historical perspective, terrorism has always been a serious concern for governments and nation states. The modern threat posed by terrorism has a much wider scope because of its international character. The much bigger threat posed by modern terrorism can also be explained by technological innovations and the reliance of terror networks on social networks both to propagate their message and as a recruit...

  17. Aligning flexibility with uncertainty in software development arrangements through a contractual typology

    OpenAIRE

    Lichtenstein, Y.; Finkelstein, L.; Wyss, S.

    2018-01-01

    Purpose\\ud The purpose of this study is to identify a typology of procurement contracts in the context of software development projects that allows firms to align design flexibility with design uncertainty at the project level. The theoretical lenses of contract theory and software engineering are used to explain why the five archetypes in the proposed typology provide gradually increasing levels of design flexibility and to develop hypotheses about the associations between design flexibility...

  18. Patterns of Force: System Strength, Terrorism and Civil War

    DEFF Research Database (Denmark)

    Freytag, Andreas; Meierrieks, Daniel; Münch, Angela

    2010-01-01

    We jointly analyze the genesis of terrorism and civil war, providing a simple conceptual framework to explain why violent opposition groups choose distinct forms of violence (i.e., terrorism and open rebellion). We argue that the distinct modes of violent opposition are chosen by opposition groups...... in response to the strengths and weaknesses of the system they challenge. An empirical test of this hypothesis for 104 countries for 1992 to 2004 indeed shows that the socio-economic strength of a system positively correlates with the likelihood of terrorism, but negatively with the incidence of civil war....... Institutional quality and political participation of opponents reduce the risk of civil war, but do not affect the likelihood of terrorism. We also show that system stability reduces the likelihood of all forms of violent opposition....

  19. Personality Typology in Relation to Muscle Strength

    Science.gov (United States)

    Terracciano, Antonio; Milaneschi, Yuri; Metter, E. Jeffrey; Ferrucci, Luigi

    2011-01-01

    Background Physical inactivity plays a central role in the age-related decline in muscle strength, an important component in the process leading to disability. Personality, a significant determinant of health behaviors including physical activity, could therefore impact muscle strength throughout adulthood and affect the rate of muscle strength decline with aging. Personality typologies combining “high neuroticism” (N≥55), “low extraversion” (Epersonality types. Facet analyses suggest an important role for the N components of depression and hostility. Physical activity level appears to partly explain some of these associations. Conclusion Findings provide support for the notion that the typological approach to personality may be useful in identifying specific personality types at risk of low muscle strength and offer the possibility for more targeted prevention and intervention programs. PMID:21614452

  20. Downscaling European urban-rural typologies

    DEFF Research Database (Denmark)

    Fertner, Christian

    2012-01-01

    Urban-rural typologies are usually very differently defined and case specific, but there are also a few, more widely used typologies at European scale. These typologies are however too coarse to be used in a national or regional context. In this note four typologies from the OECD, DG Regio...

  1. Comparing Civilian Support for Terrorism

    Directory of Open Access Journals (Sweden)

    Srobana Bhattacharya

    2017-06-01

    Full Text Available Terrorism is an extreme form of political violence, that is inherently abhorrent in nature. Yet, it continues to attain enough support to continue and survive. The recent proliferation of Islamic State and its ever increasing domestic and international civilian support base urges immediate attention to this question. While most research holds that provision of public goods by terrorist groups is the primary cause for high levels of civilian support, I argue that, terrorist groups are more interested in resource extraction rather than resource provision. Additionally, these studies pay scant attention to existing resource structure, especially territorial and political control to explain terrorist-civilian interaction. This paper emphasizes the bi-directional nature of this interaction – a. perception of civilians by the terrorist group and b. terrorist group’s perception of the civilians. To analyze levels of civilian support for terrorism, I compare fifteen terrorist groups using qualitative comparative analysis and show how territory, political competition, ethnicity, target selection and organizational structure combine to explain conditions that lead terrorist groups to include or exclude civilian population for support. Based on the variance in support networks of terrorist groups, counter-terrorism policies should also differ. High civilian support indicates the need to use non-military methods to decrease the appeal of terrorist groups. However, terrorist groups with more diffused and multiple support structures need more collaborative and coercive measures to intercept all the possible links to the main group.

  2. Terrorism and disarmament

    International Nuclear Information System (INIS)

    2001-01-01

    underscores the symbiotic relationship between disarmament and counter-terrorism. In the very midst of an unprecedented bio-terrorist attack on the United States, the long-standing chairman of the expert group of the Biological Weapons Convention charged with developing a verification protocol for the Convention, Ambassador Toth (Hungary), relates his vision of how an international verification system could serve as an impediment to future attacks. The Organisation for the Prohibition of Chemical Weapons has been a full-fledged international organization since the Chemical Weapons Convention entered into force in 1997. Its inspection system is the most stringent verification regime to date in a disarmament convention. Mr Berdennikov explains how the Convention and the cooperative effort of the States parties in the verification system is the best coalition against chemical terrorism

  3. Variance, Violence, and Democracy: A Basic Microeconomic Model of Terrorism

    Directory of Open Access Journals (Sweden)

    John A. Sautter

    2010-01-01

    Full Text Available Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this area have only focused on the relationship between terrorists and the government, or amongst terrorists themselves. Central to the interpretation of the terrorist conflict presented here is the idea that voters (or citizens are also one of the important determinants of how a government will respond to acts of terrorism.

  4. Danish building typologies

    DEFF Research Database (Denmark)

    Wittchen, Kim Bjarne; Kragh, Jesper

    The objective of TABULA is to develop a harmonised building typology for European countries. Each national building typology will consist of a set of residential model buildings with characteristic energy-related properties (element areas of the thermal building envelope, U-values, supply system...... efficiencies). The model buildings will each represent a specific construction period of the country in question and a specific building size. Furthermore the number of buildings, flats and the overall floor areas will be given, which are represented by the different building types of the national typologies....

  5. The Effects of Terrorism on Tourism: (Interrelations, Motives & Risks

    Directory of Open Access Journals (Sweden)

    Marco Romagnoli

    2016-11-01

    Full Text Available The article aims at explaining the relationship between terrorism and tourism, and the consequences that the former has on the latter. Untangling this relationship may be a useful tool to understand terrorist goals and motives. The pivotal question to be answered is which effects terrorism has on the tourism industry. In the modern era, terrorism has become an integrated risk, a maybe-to-include package of travelling for tourists. The operating environment for the tourism sector evolved in a huge way after the attacks to the Twin Towers in September of 2001. Terrorism and tourism data have become more and more important since that dramatic episode; both of them are twofold and interconnected with regard to their basic features, namely crossing national borders involving national and international protagonists and both using travel and communication technologies. Terrorists do not act randomly, but they have precise purposes. The article will explain the multiform and multifold ways through which an attack may occur and be better understood. Terrorism crowds the media; it physically hits and psychologically vexes minds. Tourists are an appealing target for terrorists because they are seen as a country’s symbolic ambassadors, while tourism destinations are perfect and visible spots to deploy a terrorist attack. Terrorists are capable of using tourists as the means to get the media’s attention and bombard the world with their message. Risk perception, attitude and preferences are one of the main determinants for a tourist in the destination choice momentum. A potential tourist who negatively conceives a destination as risky may choose to cancel his/her holiday or not even consider it because of security and safety motives.

  6. Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Hagan, Ross F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-29

    This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature.

  7. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  8. A Typology of Continuous Improvement Implementation Processes

    DEFF Research Database (Denmark)

    Rijnders, Sander; Boer, Harry

    2004-01-01

    This article presents a typology of continuous improvement (CI) implementation processes. The typology is based on an empirical study of 26 companies engaged in the implementation of CI. The data underpinning the typology was collected through retrospective interviews guided by a semi-structured ......This article presents a typology of continuous improvement (CI) implementation processes. The typology is based on an empirical study of 26 companies engaged in the implementation of CI. The data underpinning the typology was collected through retrospective interviews guided by a semi...

  9. Typological thinking: Then and now.

    Science.gov (United States)

    Witteveen, Joeri

    2018-05-01

    A popular narrative about the history of modern biology has it that Ernst Mayr introduced the distinction between "typological thinking" and "population thinking" to mark a contrast between a metaphysically problematic and a promising foundation for (evolutionary) biology, respectively. This narrative sometimes continues with the observation that, since the late-20th century, typological concepts have been making a comeback in biology, primarily in the context of evolutionary developmental biology. It is hard to square this narrative with the historical and philosophical literature on the typology/population distinction from the last decade or so. The conclusion that emerges from this literature is that the very distinction between typological thinking and population thinking is a piece of mere rhetoric that was concocted and rehearsed for purely strategic, programmatic reasons. If this is right, it becomes hard to make sense of recent criticisms (and sometimes: espousals) of the purportedly typological underpinnings of certain contemporary research programs. In this article, I offer a way out of this apparent conflict. I show that we can make historical and philosophical sense of the continued accusations of typological thinking by looking beyond Mayr, to his contemporary and colleague George Gaylord Simpson. I show that before Mayr discussed the typology/population distinction as an issue in scientific metaphysics, Simpson introduced it to mark several contrasts in methodology and scientific practice. I argue that Simpson's insightful discussion offers useful resources for classifying and assessing contemporary attributions of typological thinking. © 2018 The Authors. Journal of Experimental Zoology Part B: Molecular and Developmental Evolution published by Wiley Periodicals, Inc.

  10. Terrorism in South Korea.

    Science.gov (United States)

    Wang, Soon Joo; Choi, Jin Tae; Arnold, Jeffrey

    2003-01-01

    South Korea has experienced > 30 suspected terrorism-related events since 1958, including attacks against South Korean citizens in foreign countries. The most common types of terrorism used have included bombings, shootings, hijackings, and kidnappings. Prior to 1990, North Korea was responsible for almost all terrorism-related events inside of South Korea, including multiple assassination attempts on its presidents, regular kidnappings of South Korean fisherman, and several high-profile bombings. Since 1990, most of the terrorist attacks against South Korean citizens have occurred abroad and have been related to the emerging worldwide pattern of terrorism by international terrorist organizations or deranged individuals. The 1988 Seoul Olympic Games provided a major stimulus for South Korea to develop a national emergency response system for terrorism-related events based on the participation of multiple ministries. The 11 September 2001 World Trade Center and Pentagon attacks and the 2001 United States of America (US) anthrax letter attacks prompted South Korea to organize a new national system of emergency response for terrorism-related events. The system is based on five divisions for the response to specific types of terrorist events, involving conventional terrorism, bioterrorism, chemical terrorism, radiological terrorism, and cyber-terrorism. No terrorism-related events occurred during the 2002 World Cup and Asian Games held in South Korea. The emergency management of terrorism-related events in South Korea is adapting to the changing risk of terrorism in the new century.

  11. A Taxonomy of Terror - About the Effect of Different Kinds of Terror on Risk Perceptions

    OpenAIRE

    Wolff, Katharina; Larsen, Svein

    2016-01-01

    Terrorism is an increasing problem; still, research systematically investigating the impact of varying kinds of terrorism is scarce. The present investigation uses hypothetical scenarios to look at effects of diverging sorts of terrorism on risk perceptions in a student- and a tourist sample. Two characteristics of terrorism were varied systematically: frequency (whether terrorism hits a destination where terrorism is frequent or infrequent) and degree of organization (whether terrorism is co...

  12. A Typology to Explain Changing Social Networks Post Stroke.

    Science.gov (United States)

    Northcott, Sarah; Hirani, Shashivadan P; Hilari, Katerina

    2018-05-08

    Social network typologies have been used to classify the general population but have not previously been applied to the stroke population. This study investigated whether social network types remain stable following a stroke, and if not, why some people shift network type. We used a mixed methods design. Participants were recruited from two acute stroke units. They completed the Stroke Social Network Scale (SSNS) two weeks and six months post stroke and in-depth interviews 8-15 months following the stroke. Qualitative data was analysed using Framework Analysis; k-means cluster analysis was applied to the six-month data set. Eighty-seven participants were recruited, 71 were followed up at six months, and 29 completed in-depth interviews. It was possible to classify all 29 participants into one of the following network types both prestroke and post stroke: diverse; friends-based; family-based; restricted-supported; restricted-unsupported. The main shift that took place post stroke was participants moving out of a diverse network into a family-based one. The friends-based network type was relatively stable. Two network types became more populated post stroke: restricted-unsupported and family-based. Triangulatory evidence was provided by k-means cluster analysis, which produced a cluster solution (for n = 71) with comparable characteristics to the network types derived from qualitative analysis. Following a stroke, a person's social network is vulnerable to change. Explanatory factors for shifting network type included the physical and also psychological impact of having a stroke, as well as the tendency to lose contact with friends rather than family.

  13. [Essentialism and typological thinking in biological systematics].

    Science.gov (United States)

    Vasil'eva, L N

    2003-01-01

    In biological literature, essentialism and typological thinking are believed to be incompatible with evolutionary ideas. At present, the same considerations underlay the claims to abandon the Linnaean hierarchy, or the fundamental classificatory structure rooted in essentialism. This paper suggests to reconsider the negative views of Plato's typology and Aristotle's essentialism following the narrow interpretations that have nothing to do with the classification of living beings. Plato's theory of 'ideas' (or 'forms') is the basis of classificatory theory; it provided such concepts as 'species', 'genus', 'essence', 'dichotomous division' but the development of this theory in the framework of moral and esthetic values could not be beneficial to biology. Aristotle's essentialism is more complicated and exists in two forms; one of these, or classificatory essentialism, is a modification of Plato's typology; another one, or organismal essentialism, represents the shift of 'essence' from the world of relations between objects to the realm of particular things, where the concept of essence lost its basic meaning. It is senseless to look for unreal 'type of an organism' ('essence of a thing') but precisely this kind of essentialism is attractive for biologists and philosophers. Organismal essentialism is the underlying basis of so-called 'individuality thesis' that is used as a weapon against classificatory essentialism. The same thesis is associated with an extensional vision of taxa that also explains the criticism of Linnaean hierarchy, while the latter is the intentional structure and the first tool suggested for the rank coordination of many unequal taxa.

  14. Terrorism as Communication.

    Science.gov (United States)

    Decker, Warren; Rainey, Daniel

    Terrorism has become not merely a political act, but a carefully designed and rhetorically sophisticated attempt at communication. What role should the communication scholar play in the investigation of terrorism? Specifically, there are six areas within which the communication scholar may actively contribute to an understanding of terrorism as…

  15. Understanding Contemporary Terrorism.

    Science.gov (United States)

    Mitchell, Thomas H.

    1989-01-01

    Discusses the issue of terrorism as it exists today and examines progress that has been made toward understanding its dimensions. Suggests how this subject can be explored in the classroom. Dispels misconceptions about terrorism by defining the term, and examines some causes of terrorism and strategies employed by terrorists. (KO)

  16. Homegrown terrorism; the known unknown

    OpenAIRE

    Hinkkainen, Kaisa

    2012-01-01

    Homegrown terrorism has attracted significant attention following the 2004 Madrid and 2005 London bombings. Homegrown terrorism is usually thought to be a new phenomenon, with few observed events, and inherently distinct from transnational terrorism or the old domestic terrorism in Europe. However, little research has so far examined the alleged distinctiveness of homegrown terrorism empirically. I argue that homegrown terrorism shares many similarities with domestic and international terrori...

  17. Types, typologies, arguments

    OpenAIRE

    Plantin, Christian

    2017-01-01

    The concept of arguments schemes is fundamental for argumentation studies; but its implementation is not obvious. The first section of this contribution briefly starts from the concepts of argument scheme, typology of arguments schemes, and the foundational catalogue of 28 topoi from Aristotle's Rhetoric. The application of the "topical method" is first based on the knowledge of typologies of arguments, and then on the precise features defining an argument type. The practical question that re...

  18. Terrorism Research Centres: 100 Institutes, Programs and Organisations in the Field of Terrorism, Counter-Terrorism, Radicalisation and Asymmetric Warfare Studies

    Directory of Open Access Journals (Sweden)

    Benjamin Freedman

    2010-12-01

    Full Text Available Who is doing research – academic and otherwise – on terrorism? The field of terrorism research is broad and ever-expanding. Governments sponsor intelligence-driven analytical research agencies. Commercial intelligence firms like Jane’s, sell their research to corporate and governmental clients. There are think tanks likeRAND, which work closely with government agencies. An increasing number of universities house terrorism research centres, the oldest one being the Centre for the Study of Terrorism and Political Violence at the University of St. Andrews. Then there are virtual networks, such as the Terrorism Research Initiative (TRI, that try to create synergies between a wide array of researchers and topics.

  19. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  20. Containing Terrorism: A Dynamic Model

    Directory of Open Access Journals (Sweden)

    Giti Zahedzadeh

    2017-06-01

    Full Text Available The strategic interplay between counterterror measures and terror activity is complex. Herein, we propose a dynamic model to depict this interaction. The model generates stylized prognoses: (i under conditions of inefficient counterterror measures, terror groups enjoy longer period of activity but only if recruitment into terror groups remains low; high recruitment shortens the period of terror activity (ii highly efficient counterterror measures effectively contain terror activity, but only if recruitment remains low. Thus, highly efficient counterterror measures can effectively contain terrorism if recruitment remains restrained. We conclude that the trajectory of the dynamics between counterterror measures and terror activity is heavily altered by recruitment.

  1. How terrorism news reports increase prejudice against outgroups: A terror management account

    NARCIS (Netherlands)

    Das, E.; Bushman, B.J.; Bezemer, M.D.; Kerkhof, P.; Vermeulen, I.E.

    2009-01-01

    Three studies tested predictions derived from terror management theory (TMT) about the effects of terrorism news on prejudice. Exposure to terrorism news should confront receivers with thoughts about their own death, which, in turn, should increase prejudice toward outgroup members. Non-Muslim

  2. Defining Terrorism.

    Science.gov (United States)

    Hoffman, Bruce

    1986-01-01

    Notes the lack of a concise meaning for the word terrorism. Develops a working definition which states that terrorism is the deliberate creation and exploitation of fear through violence or the threat of violence in the attainment of political objectives. (JDH)

  3. Terrorism as a process: a critical review of Moghaddam's "Staircase to Terrorism".

    Science.gov (United States)

    Lygre, Ragnhild B; Eid, Jarle; Larsson, Gerry; Ranstorp, Magnus

    2011-12-01

    This study reviews empirical evidence for Moghaddam's model "Staircase to Terrorism," which portrays terrorism as a process of six consecutive steps culminating in terrorism. An extensive literature search, where 2,564 publications on terrorism were screened, resulted in 38 articles which were subject to further analysis. The results showed that while most of the theories and processes linked to Moghaddam's model are supported by empirical evidence, the proposed transitions between the different steps are not. These results may question the validity of a linear stepwise model and may suggest that a combination of mechanisms/factors could combine in different ways to produce terrorism. © 2011 The Authors. Scandinavian Journal of Psychology © 2011 The Scandinavian Psychological Associations.

  4. Nuclear Terrorism and its Confrontation

    International Nuclear Information System (INIS)

    Al Barody, M.M.

    2006-01-01

    The whole world first knew nuclear terrorism during the second world war through the use of excessive violence that to terror exercised by one country against another, as was carried out by USA when it exploded two nuclear bombs over Hiroshima and Nagasaki t the end of the war. there are numerous types of nuclear terrorism that can be performed by individuals or organized groups for achieving political or social objectives. the definition of the term t errorism i s correlated with u sing means capable of creating a case of public dnger . that property exists in all types of direct or indirect nuclear terrorism . the present study is divided into two chapters. Chapter one deals with nuclear terrorism and consists of two sections , the first deals with the identification of the nature of nuclear terrorism an the second deals with organize nuclear terrorism on the international level. Chapter two deals with the confrontation of nuclear terrorism in two sections. the first deals with the role of the state in combating against nuclear terrorism nd the second deals with combating against nuclear terrorism on the international level. while internally it is confronted through promulgation of legislations that deal with the protection against nuclear terrorism as well as the national legal instruments for protection of nuclear materials and installation and combating illicit trafficking of nuclear materials, confrontation of nuclear terrorism on the international level is carried out through the promulgation of international convention such as that on suppression of actions of nuclear terrorism which shall be opened for signature on sept.14 -2005 according to the recommendation the general assembly of the united nations in its 59 t h session

  5. 77 FR 74685 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2012-12-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and...: Comments that include trade secrets, confidential commercial or financial information, Chemical-terrorism...

  6. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    Directory of Open Access Journals (Sweden)

    Chao-Chen Lin

    2017-10-01

    Full Text Available This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on terrorism and face the danger from it.

  7. Terrorism as Media Event

    Directory of Open Access Journals (Sweden)

    2012-07-01

    Full Text Available Proving that terrorism should be seen as a media event (as defined by Dayan and Katzafter 9/11 and treated accordingly. We have turned to the work of Dayan and Katz and GeorgeGerbner’s for a definition of media events and of violence in the mass media. This paper is ahermeneutical interpretation of the concept of terrorism and its relation to communication. We haveput forward a better understanding of the complex concept of terrorism and its definitions in the massmedia context. Terrorism nowadays should always be defined within its inherent relation with themedia. The article is the first to define terrorism as media evenit in Dayan and Katz’s terms.

  8. 31 CFR 594.311 - Terrorism.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism. 594.311 Section 594.311... ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.311 Terrorism. The term terrorism means an activity that: (a) Involves a violent act or an act...

  9. On Welfare and Terror: Social Welfare Policies and Political-Economic Roots of Terrorism

    Science.gov (United States)

    Burgoon, Brian

    2006-01-01

    This article argues that social welfare policies may reduce international and domestic terrorism. Social policies likely affect terrorism in offsetting ways but, on balance, should diminish preferences for terrorism by reducing economic insecurity, inequality, poverty, and religious-political extremism. Thus, countries with more generous welfare…

  10. Process Segmentation Typology in Czech Companies

    Directory of Open Access Journals (Sweden)

    Tucek David

    2016-03-01

    Full Text Available This article describes process segmentation typology during business process management implementation in Czech companies. Process typology is important for a manager’s overview of process orientation as well as for a manager’s general understanding of business process management. This article provides insight into a process-oriented organizational structure. The first part analyzes process segmentation typology itself as well as some original results of quantitative research evaluating process segmentation typology in the specific context of Czech company strategies. Widespread data collection was carried out in 2006 and 2013. The analysis of this data showed that managers have more options regarding process segmentation and its selection. In terms of practicality and ease of use, the most frequently used method of process segmentation (managerial, main, and supportive stems directly from the requirements of ISO 9001. Because of ISO 9001:2015, managers must now apply risk planning in relation to the selection of processes that are subjected to process management activities. It is for this fundamental reason that this article focuses on process segmentation typology.

  11. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    OpenAIRE

    Chao-Chen Lin

    2017-01-01

    This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on te...

  12. [Typology of incarcerated intimate partner aggressors].

    Science.gov (United States)

    Loinaz, Ismael; Echeburúa, Enrique; Torrubia, Rafael

    2010-02-01

    Typology of incarcerated intimate partner aggressors. People who engage in intimate partner violence do not constitute a homogeneous group. Many studies in the Anglo-Saxon countries back the possibility of differentiating several subtypes of aggressors, but there are differences among them. One of the main applications of these typologies is the adaptation of the treatments to the subjects' characteristics. The aim of the present pilot study was to empirically establish a typology of batterers in Spain. The sample of 50 convicted violent intimate partner offenders was obtained from the Brians-2 penitentiary (Barcelona). Self-esteem, anger, cognitive distortions, and personality disorders were evaluated, as well as the frequency and type of violence. The results suggest the existence of two subtypes, distinguishable on the basis of the predictive dimensions, and so, partially confirm the typological proposals.

  13. Epidemiology of terror-related versus non-terror-related traumatic injury in children.

    Science.gov (United States)

    Aharonson-Daniel, Limor; Waisman, Yehezkel; Dannon, Yehuda L; Peleg, Kobi

    2003-10-01

    In the past 2 years hundreds of children in Israel have been injured in terrorist attacks. There is a paucity of data on the epidemiology of terror-related trauma in the pediatric population and its effect on the health care system. The objective of this study was to review the accumulated Israeli experience with medical care to young victims of terrorism and to use the knowledge obtained to contribute to the preparedness of medical personnel for future events. Data on all patients who were younger than 18 years and were hospitalized from October 1, 2000, to December 31, 2001, for injuries sustained in a terrorist attack were obtained from the Israel National Trauma Registry. The parameters evaluated were patient age and sex, diagnosis, type, mechanism and severity of injury, interhospital transfer, stay in intensive care unit, duration of hospitalization, and need for rehabilitation. Findings were compared with the general pediatric population hospitalized for non-terror-related trauma within the same time period. During the study period, 138 children were hospitalized for a terror-related injury and 8363 for a non-terror-related injury. The study group was significantly older (mean age: 12.3 years [standard deviation: 5.1] v 6.9 years [standard deviation: 5.3]) and sustained proportionately more penetrating injuries (54% [n = 74] vs 9% [n = 725]). Differences were also noted in the proportion of internal injuries to the torso (11% in the patients with terror-related trauma vs 4% in those with non-terror-related injuries), open wounds to the head (13% vs 6%), and critical injuries (Injury Severity Score of 25+; 25% vs 3%). The study group showed greater use of intensive care unit facilities (33% vs 8% in the comparison group), longer median hospitalization time (5 days vs 2 days), and greater need for rehabilitative care (17% vs 1%). Terror-related injuries are more severe than non-terror-related injuries and increase the demand for acute care in children.

  14. Framework for Analyzing the Future Threat of WMD Terrorism

    Directory of Open Access Journals (Sweden)

    James J.F. Forest

    2012-01-01

    Full Text Available This article examines theories of practical and strategic constraints that collectively explain why so few terrorist groups in history have crossed (or attempted to cross the WMD threshold. From this analysis, it becomes clear that a terrorist group's deliberations about WMD can be influenced (positively or negatively by a variety of factors. Our projections of the future WMD terrorism threat must therefore account for changes in the kinds of practical and strategic constraints that could lead to an increased willingness and/or capability of a group to pursue these kinds of weapons. Further, there are ways in which governments can influence a terrorist group's decision-making and thus have a direct impact on the future evolution of the WMD terrorism threat.

  15. The Origin of the United Nations "Global Counter-Terrorism System"

    Directory of Open Access Journals (Sweden)

    William B. Messmer

    2010-11-01

    Full Text Available Este artículo explica los orígenes de sistema global antiterrorista de las Naciones Unidas. Nosotros argüimos que tres factores determinan las características de un sistema descentralizado y de estados centralizados. El primero es la reacción de la ONU contra los ataques terroristas del 11 de septiembre de 2001. El segundo factor es la cada vez mayor relevancia de las redes de gobierno transnacional. La tercera fuerza son los intereses y los asuntos del Consejo de Seguridad permanente, que últimamente determina la arquitectura del sistema.9/11, United Nations, Security Council, transnacional governance networks,counter-terrorism system.___________________________ABSTRACT:This article explains the origins of the United Nations’ global counter-terrorism system. We argue that three factors shaped the system’s decentralized and state-centered characteristics. The first is the UN’s reactions to terrorism prior to the attacks of 11 September 2001. The second factor is the growing relevance of transnational governance networks. The third force is the interests and concerns of the Security Council’s permanent representative interests, which ultimately shaped the system’s architecture.Keywords: 9/11; United Nations; Security Council; transnacional governance networks; counter-terrorism system

  16. The role of warning behaviors in threat assessment: an exploration and suggested typology.

    Science.gov (United States)

    Reid Meloy, J; Hoffmann, Jens; Guldimann, Angela; James, David

    2012-01-01

    The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. Copyright © 2011 John Wiley & Sons, Ltd.

  17. Terrorism and Investigation Strategies

    OpenAIRE

    Muhammad Mustofa

    2005-01-01

    This paper discussed that, for successful implementation of the strategies in investigating terrorism, besides requiring professional skilled investigators, there are some additional requirements that need to be fulfilled. Effective and long term prevention of terrorism should be directed towards producing good social welfare and to minimize every condition that may be conducive to the emergence of terrorism, such as discrimination and marginalization.

  18. Systematic review of type-specific pathophysiological symptoms of Sasang typology

    Directory of Open Access Journals (Sweden)

    Yoo Ri Han

    2016-06-01

    Full Text Available Previous studies on the Sasang typology have focused on the differential diagnosis of each Sasang type with type-specific pathophysiological symptoms (TSPS. The purpose of this study was to elucidate the latent physiological mechanism related to these clinical indicators. We searched six electronic databases for articles published from 1990 to 2015 using the Sasang typology-related keywords, and found and analyzed 35 such articles. The results were summarized into six TSPS categories: perspiration, temperature preference, sleep, defecation, urination, and susceptibility to stress. The Tae-Eum and So-Eum types showed contrasting features with TSPS, and the So-Yang type was in the middle. The Tae-Eum type has good digestive function, regular bowel movement and defecation, high sleep quality, and low susceptibility to stress and cold. The Tae-Eum type has relatively large volumes of sweat and feels fresh after sweating; however, the urine is highly concentrated. These clinical features might be related to the biopsychological traits of the Tae-Eum type, including a low trait anxiety level and high ponderal and body mass indices. This study used the autonomic reactivity hypothesis for explaining the pathophysiological predispositions in the Sasang typology. The Tae-Eum and So-Eum Sasang types have a low threshold in parasympathetic and sympathetic activation, respectively. This study provides a foundation for integrating traditional Korean personalized medicine and Western biomedicine.

  19. Behavioural aspects of terrorism.

    Science.gov (United States)

    Leistedt, Samuel J

    2013-05-10

    Behavioural and social sciences are useful in collecting and analysing intelligence data, understanding terrorism, and developing strategies to combat terrorism. This article aims to examine the psychopathological concepts of terrorism and discusses the developing roles for behavioural scientists. A systematic review was conducted of studies investigating behavioural aspects of terrorism. These studies were identified by a systematic search of databases, textbooks, and a supplementary manual search of references. Several fundamental concepts were identified that continue to influence the motives and the majority of the behaviours of those who support or engage in this kind of specific violence. Regardless of the psychological aspects and new roles for psychiatrists, the behavioural sciences will continue to be called upon to assist in developing better methods to gather and analyse intelligence, to understand terrorism, and perhaps to stem the radicalisation process. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  20. Relative Risk Appraisal, the September 11 Attacks, and Terrorism-Related Fears

    Science.gov (United States)

    Marshall, Randall D.; Bryant, Richard A.; Amsel, Lawrence; Suh, Eun Jung; Cook, Joan M.; Neria, Yuval

    2013-01-01

    There are now replicated findings that posttraumatic stress disorder (PTSD) symptoms related to the September 11, 2001, attacks occurred in large numbers of persons who did not fit the traditional definition of exposure to a traumatic event. These data are not explained by traditional epidemiologic “bull’s eye” disaster models, which assume the psychological effects are narrowly, geographically circumscribed, or by existing models of PTSD onset. In this article, the authors develop a researchable model to explain these and other terrorism-related phenomena by synthesizing research and concepts from the cognitive science, risk appraisal, traumatic stress, and anxiety disorders literatures. They propose the new term relative risk appraisal to capture the psychological function that is the missing link between the event and subjective response in these and other terrorism-related studies to date. Relative risk appraisal highlights the core notion from cognitive science that human perception is an active, multidimensional process, such that for unpredictable societal threats, proximity to the event is only one of several factors that influence behavioral responses. Addressing distortions in relative risk appraisal effectively could reduce individual and societal vulnerability to a wide range of adverse economic and ethnopolitical consequences to terrorist attacks. The authors present ways in which these concepts and related techniques can be helpful in treating persons with September 11– or terrorism-related distress or psychopathology. PMID:17516775

  1. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  2. Universal patterns underlying ongoing wars and terrorism

    OpenAIRE

    Spagat, M; Johnson, N. F; Restrepo, J. A; Becerra, O; Bohórquez, J. C; Restrepo, E. M; Zarama, R

    2006-01-01

    we report a remarkable universality in the patterns of violence in three high profile ongoing wars, and in global terrorism. Our results suggest that these quite different conflict arenas currently feature a common type of enemy, i.e. the various insurgent forces are beginning to operate in a similar way regardles of their underlying idealogies, motivations and the terrain in which they operate. We provide a microscopic theory to explain our main observations. This theory treats the insurgent...

  3. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law

    Directory of Open Access Journals (Sweden)

    Enver BUÇAJ

    2017-03-01

    Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism pheromone in line with principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none-European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in context of cyber-attacks events in attempt to establish legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber-attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.

  4. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law

    Directory of Open Access Journals (Sweden)

    Enver Buçaj

    2017-03-01

    Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism phenomena in line with the principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in the context of cyber attacks events in attempt to establish a legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.

  5. Fighting terrorism in Africa: Benchmarking policy harmonization

    Science.gov (United States)

    Asongu, Simplice A.; Tchamyou, Vanessa S.; Minkoua N., Jules R.; Asongu, Ndemaze; Tchamyou, Nina P.

    2018-02-01

    This study assesses the feasibility of policy harmonization in the fight against terrorism in 53 African countries with data for the period 1980-2012. Four terrorism variables are used, namely: domestic, transnational, unclear and total terrorism dynamics. The empirical evidence is based on absolute beta catch-up and sigma convergence estimation techniques. There is substantial absence of catch-up. The lowest rate of convergence in terrorism is in landlocked countries for regressions pertaining to unclear terrorism (3.43% per annum for 174.9 years) while the highest rate of convergence is in upper-middle-income countries in domestic terrorism regressions (15.33% per annum for 39.13 years). After comparing results from the two estimation techniques, it is apparent that in the contemporary era, countries with low levels of terrorism are not catching-up their counterparts with high levels of terrorism. As a policy implication, whereas some common policies may be feasibly adopted for the fight against terrorism, the findings based on the last periodic phase (2004-2012) are indicative that country-specific policies would better pay-off in the fight against terrorism than blanket common policies. Some suggestions of measures in fighting transnational terrorism have been discussed in the light of an anticipated surge in cross-national terrorism incidences in the coming years.

  6. Workplace Preparedness for Terrorism

    National Research Council Canada - National Science Library

    Ursano, Robert J

    2006-01-01

    Comprehensive workplace preparedness for terrorism must address and integrate the psychological and behavioral aspects of terrorism preparedness and response in order to address issues of human continuity...

  7. Psychiatry and terrorism.

    Science.gov (United States)

    Stoddard, Frederick J; Gold, Joel; Henderson, Schuyler W; Merlino, Joseph P; Norwood, Ann; Post, Jerrold M; Shanfield, Stephen; Weine, Stevan; Katz, Craig L

    2011-08-01

    Terrorism has dominated the domestic and international landscape since 9/11. Like other fields, psychiatry was not well prepared. With the 10th anniversary of the 9/11 attack approaching, it is timely to consider what can be done to prepare before the next event. Much has been learned to provide knowledge and resources. The roles of psychiatrists are challenged by what is known of the causes of, consequences of, and responses to terrorism. Reflecting on knowledge from before and since 9/11 introduces concepts, how individuals become terrorists, how to evaluate the psychiatric and behavioral effects of terrorism, and how to expand treatments, behavioral health interventions, public policy initiatives, and other responses for its victims. New research, clinical approaches, and policy perspectives inform strategies to reduce fear and cope with the aftermath. This article identifies the psychiatric training, skills and services, and ethical considerations necessary to prevent or reduce terrorism and its tragic consequences and to enhance resilience.

  8. Anti-Romani Terrorism in Europe

    Directory of Open Access Journals (Sweden)

    Mareš Miroslav

    2016-12-01

    Full Text Available This article analyzes terrorism against the Roma in Europe. It identifies acts of terrorism in violence that targets the largest stateless nation on the continent and categorizes this terrorism according to current research methods. Focusing on events in both Western and Eastern Europe, the article analyses and compares the most significant terrorist acts against the Roma of recent years. It concludes that anti-Romani terrorism is heterogeneous in terms of tactics, strategies, and ideological justification, yet can usually be subsumed into the broadly conceived category of far-right terrorism. The variety of attacks suggests that terrorist acts are an offshoot of the broad spectrum of anti-Romani activity, and are influenced by contemporary trends in inter-ethnic violence.

  9. Modern terrorism: concept and approach analysis

    OpenAIRE

    CHAIKA ALEXANDER VIKTOROVICH

    2015-01-01

    The problem of modern terrorism as an image of counterculture environment is considered. The analysis of concepts and approaches of foreign and native authors, specialists of terrorism problem research was conducted. Separate features of the modern terrorism are considered and emphasized. The author drew conceptual conclusions on the basis of dialectical approach to modern terrorism counterculture phenomenon research.

  10. Countering Terrorist Financing: A Case Study of the Kurdistan Workers Party (PKK)

    Science.gov (United States)

    2014-12-01

    and Typology,” 464. 70 Faruk Ekmekci, “Terrorism as War by Other Means: National Security and State Support for Terrorism,” Revista Brasileira de...09546553.2011.651182. Ekmekci, Faruk. “Terrorism as War by Other Means: National Security and State Support for Terrorism.” Revista Brasileira de

  11. Against CBRN terrorism

    International Nuclear Information System (INIS)

    Inoue, Tadao

    2016-01-01

    Although CBRN (Chemical, Biological, Radiological, Nuclear) terrorism has seldom happened in recent terrorist attacks, a large number of victims would appear leading to disastrous situation if it arises. This paper discussed what CBRN terrorism is, why terrorists are interested in these weapons, and how to deal with these cases, with reference to the lessons learnt from the Tokyo subway sarin event, which occurred in Japan. It also outlined the features of CBRN terrorism and protective measures against it. CBRN terrorism is the terror activity using unusual weapons and agents such as chemicals, biological agents, radioactive substances, and nuclear weapons. As the reasons why terrorists are interested in CBRN weapons, there are such factors that raw materials are easy to obtain, manufacturing is not difficult, weapons are easy to transport, and indiscriminate and mass slaughter is possible when used. From the lessons from the Tokyo subway sarin event, the Tokyo Fire Department has been engaging in the following items: (1) strengthening knowledge and skills, (2) introduction of detection equipment, (3) construction and strengthening of decontamination system, (4) collaboration among firefighting - police - SDF - medical institutions, and (5) enhancing and strengthening organizational structure. Although protective measures vary depending on the type of chemical agent, biological agent, etc., it is important to prepare in daily life for detoxification, decontamination, evacuation, etc. (A.O.)

  12. Creoles are typologically distinct from non-creoles

    DEFF Research Database (Denmark)

    Bakker, Peter; Daval-Markussen, Aymeric; Plag, Ingo

    2011-01-01

    In creolist circles, there has been a long-standing debate whether creoles differ structurally from non-creole languages and thus would form a special class of languages with specific typological properties. This debate about the typological status of creole languages has severely suffered from...... a lack of systematic empirical study. This paper presents for the first time a number of large-scale empirical investigations of the status of creole languages as a typological class on the basis of different and well-balanced samples of creole and non-creole languages. Using statistical modeling...... (multiple regression) and recently developed computational tools of quantitative typology (phylogenetic trees and networks), this paper provides robust evidence that creoles indeed form a structurally distinguishable subgroup within the world’s languages. The findings thus seriously challenge approaches...

  13. “I Have a Dream”: A Typology of Social Change Goals

    Directory of Open Access Journals (Sweden)

    Joseph Sweetman

    2013-12-01

    Full Text Available To date, there is little in the way of theorizing or empirical work on the imagined endpoint of political action aimed at social change – the type of “dream” those engaged in action are attempting to bring into fruition. We suggest that previous approaches have focused narrowly on one type of social change – amelioration of collective grievances. In contrast, we argue that social change is much richer and imaginative than this narrow focus suggests. In the present article we draw on key constructs in social psychology (e.g., goals, efficacy, legitimacy, identity, social system, and social value in order to develop a typology of social change goals. In doing so, we explain why people might support one type of social change (e.g., revolution versus others (e.g., separatism or amelioration. The typology is used to discuss future directions for research and to highlight the implications for psychological (and broader approaches to social change.

  14. Inuit Sign Language: a contribution to sign language typology

    NARCIS (Netherlands)

    Schuit, J.; Baker, A.; Pfau, R.

    2011-01-01

    Sign language typology is a fairly new research field and typological classifications have yet to be established. For spoken languages, these classifications are generally based on typological parameters; it would thus be desirable to establish these for sign languages. In this paper, different

  15. Terrorism Prevention: How Does Special Operations Fit In?

    Science.gov (United States)

    2005-06-17

    controlled” (Risko 2004, 1). Of particular note in an Amazon review, a summary of this book: “Mr. Pillar explains the methods for answering the terrorist... Aurora . 2004. Meet Your Professor. Spring. Internet course on-line. Available from http://www.ccaurora.edu/crj259/ crjprofintro1.htm. Internet...Counterterrorism: Military and Economic Options. Article 4 of an internet course on Terrorism in Spring 2004 from The Community College of Aurora , offered by

  16. Defining and Distinguishing Secular and Religious Terrorism

    Directory of Open Access Journals (Sweden)

    Heather S. Gregg

    2014-04-01

    Full Text Available Religious terrorism is typically characterised as acts of unrestrained, irrational and indiscriminant violence, thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from traditional terrorism; investigate three goals of religious terrorism (fomenting the apocalypse, creating a religious government, and establishing a religiously pure state; consider the role of leadership and target selection of religious terrorists; and, finally, suggest a range of counterterrorism strategies based on these observations.

  17. Sign language typology: The contribution of rural sign languages

    NARCIS (Netherlands)

    de Vos, C.; Pfau, R.

    2015-01-01

    Since the 1990s, the field of sign language typology has shown that sign languages exhibit typological variation at all relevant levels of linguistic description. These initial typological comparisons were heavily skewed toward the urban sign languages of developed countries, mostly in the Western

  18. Transitivizing-detransitivizing typology and language family history

    Directory of Open Access Journals (Sweden)

    Grünthal Riho

    2016-12-01

    Full Text Available The transitivizing/detransitivizing typology of Nichols et al. 2004 also proves useful to historical linguistics. We focus on language families of northern Eurasia, chiefly the three oldest families (Indo-European, Uralic, Nakh-Daghestanian, some of their daughter branches aged about 2000-3000 years, and one younger family for which we have data on enough daughters to support a family phylogeny (Tungusic. We use the 18-pair wordlist of Nichols et al. 2004, which typologizes each pair of verbs depending on which of the two is derived. We make some improvements in the coding of grammatical properties and the typologization of pairs. NeighborNet trees based on this information reveal family-wide linguistic geography and areal trends. Adding minimal information about the cognacy or non-cognacy of the roots of the wordlist items produces Neighbor- Net trees which approximate well the known phylogeny of the family. Thus very small closed data sets, collected originally for typology, yield rich information about language family history - strikingly, a mere 18 verbs (9 pairs, coded for morphological type and cognacy, yield a very good genealogical tree - while historical methods have also improved the typology.

  19. 31 CFR 596.310 - Terrorism List Government.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  20. Violation of human rights to combat terrorism.

    OpenAIRE

    2012-01-01

    LL.B. No one definition of terrorism has gained universal acceptance. The lack of agreement on a definition of terrorism has been a major obstacle to meaningful international countermeasures to combat terrorism. There are 12 International Conventions related to terrorism and an explicit definition is still missing. Many states have tried to define terrorism and none of these definitions has been implemented, either by the United Nations or these states. There are many International Convent...

  1. New trends in terrorism : the use of social media, cyber-terrorism, the role of open-source intelligence and the cases of rightwing extremism and lone wolf terrorism

    OpenAIRE

    Καραδήμα, Σοφία

    2016-01-01

    Terrorism has existed almost as long as humanity, and has appeared in various forms, creating new and evolving trends, making the definition of terrorism even more difficult to define. The purpose of this thesis is to examine the new trends in terrorism after the terrorist attacks of 9/11, as well as attempting to find the factors that facilitate the emergence and/or recurrence of trends in terrorism, by examining the related Literature, creating case studies and providing supp...

  2. 78 FR 16698 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2013-03-18

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and... notice is also soliciting comments concerning the Information Collection Request, Chemical Facility Anti...

  3. Global initiatives to prevent nuclear terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    The fight against nuclear and radiological terrorism - someone to blow up a nuclear weapon or spread radioactive material as a 'dirty bomb' that act of terrorism - is one of the most serious threats to international security. The Global Initiative to prevent nuclear terrorism is a Norwegian-sponsored initiative that is aimed directly at combating terrorism by non-state actors. NRPA follow up Norwegian measures, including in Kazakhstan, and verifies that they are implemented and functioning as intended. (AG)

  4. Understanding Terrorism from an Economic perspective

    OpenAIRE

    Haldar, Tanushree

    2013-01-01

    Terrorism has emerged as a major threat to the contemporary society. Nation States are reliant on their counter-terrorism laws for checking terrorism and deterring terrorists. To understand the effectiveness of these counter terrorism laws, it is important to first understand the behaviour of terrorists, so as to comprehend what actions can dissuade terrorist’s behaviour and decision to propagate violence. This paper will first look at behaviour of terrorist in decision making from an economi...

  5. Gender Imbalance and Terrorism in Developing Countries.

    Science.gov (United States)

    Younas, Javed; Sandler, Todd

    2017-03-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results.

  6. Terrorism and financial supervision

    NARCIS (Netherlands)

    Krans, Anatoli van der

    2005-01-01

    This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective,

  7. Terrorism in Canada.

    Science.gov (United States)

    Kollek, Daniel

    2003-01-01

    This paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses. Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.

  8. A Fear Management Approach to Counter-Terrorism

    Directory of Open Access Journals (Sweden)

    Tinka Veldhuis

    2012-02-01

    Full Text Available Spreading fear is the essence of terrorism. Terrorists exploit fear by terrorising the target audience into concessions. Understanding how feelings of fear influence the way people feel, think and act is therefore an important starting point to explore how individuals and societies can learn how to cope with fear of terrorism. In this Policy Brief, Research Fellows Prof. Dr. Edwin Bakker and Dr. Tinka Veldhuis explore the dynamics of fear in response to terrorism, and emphasise the importance of integrating initiatives to manage fear of terrorism and reduce its negative consequences into overarching counter-terrorism strategies. It argues that societies can benefit greatly from promoting resilience and a fear management approach to counter-terrorism.

  9. Female terrorism : a review

    NARCIS (Netherlands)

    Jacques, Karen; Taylor, Paul J.

    2009-01-01

    The sharp growth in the number of publications examining female involvement in terrorism has produced a valuable but un-integrated body of knowledge spread across many disciplines. In this paper, we bring together 54 publications on female terrorism and use qualitative and quantitative analyses to

  10. Introduction to Teaching About Terrorism.

    Science.gov (United States)

    Totten, Sam

    1986-01-01

    Provides an historical and conceptual framework for understanding contemporary terrorism. Includes quotations from government officials, syndicated columnists, and scholars regarding terrorism and its effects on society. (JDH)

  11. Gender Imbalance and Terrorism in Developing Countries

    Science.gov (United States)

    Younas, Javed

    2016-01-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results. PMID:28232755

  12. The normalisation of terror: the response of Israel's stock market to long periods of terrorism.

    Science.gov (United States)

    Peleg, Kobi; Regens, James L; Gunter, James T; Jaffe, Dena H

    2011-01-01

    Man-made disasters such as acts of terrorism may affect a society's resiliency and sensitivity to prolonged physical and psychological stress. The Israeli Tel Aviv stock market TA-100 Index was used as an indicator of reactivity to suicide terror bombings. After accounting for factors such as world market changes and attack severity and intensity, the analysis reveals that although Israel's financial base remained sensitive to each act of terror across the entire period of the Second Intifada (2000-06), sustained psychological resilience was indicated with no apparent overall market shift. In other words, we saw a 'normalisation of terror' following an extended period of continued suicide bombings. The results suggest that investors responded to less transitory global market forces, indicating sustained resilience and long-term market confidence. Future studies directly measuring investor expectations and reactions to man-made disasters, such as terrorism, are warranted. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  13. Terrorism: some philosophical and ethical dilemmas

    OpenAIRE

    Stojanov, Trajce; Unsal, Zeynep

    2017-01-01

    Philosophers weren`t thinking a lot about terrorism before the terrorist attacks in the United States on 11 September 2001. Or even when they were thinking the main concern was how to deal with terrorism. But after this attack terrorism was high on the philosophical agenda mainly manifested as an ethical problem. The key concern was: can terrorism be morally justified? That is the issue we are dealing in this paper too. But, the answer of this question largely depends on the treatment of t...

  14. How to fight terrorism? Political and strategic aspects.

    Science.gov (United States)

    Vad, Erich

    2018-04-01

    "Fighting terrorism is like eating soup with a fork" (Shimon Peres). Peres's quote symbolically captures the key problem of countering terrorism. 9/11 proved to be a hallmark in the global perception of modern terrorism. The following questions form the framework of the present essay: What is the essence of modern terrorism? How did it develop during the past two decades? Who are the key players within the terror framework? What are the root causes for global terrorism? How are we to deal appropriately with the global phenomenon of terrorism? Are there any solutions (short-, medium-, long-term) to terrorism? If yes, where do we have to look for them? The underlying essay provides a strategic overview of antiterrorism policy that is based on the author's years-long experience as a high-level expert and advisor within the security policy framework. For this reason, citations are expressly not included. The key target audience comprises laypersons interested in the phenomenon of global terrorism and its social interplay.

  15. Islamist Suicide Terrorism and Erich Fromm’s Social Psychology of Modern Times

    Directory of Open Access Journals (Sweden)

    Emad El-Din Aysha

    2017-02-01

    Full Text Available Mainstream social science has struggled to explain the appeal of suicide terrorism to so many Muslim youths, relying as it does on standard socio-economic indicators and research meant to identify suicidal tendencies. The existential emphasis is missing. This commentary is inspired by the work of clinical psychologist Erich Fromm (1900-1980 and his investigation of the social psychology of modernity, as well as how this intermingles with existential fears related to mortality (death-related fears and the passage of time (the end of the world or apocalypse. Modernity, explained Fromm, makes one feel small, insignificant and isolated in the larger scheme of things. This demands a violent response, often involving self-sacrifice, to reassert the balance, which allows Islamists to take advantage of death-related anxieties and exaggerate the sense of confrontation with the world through apocalyptic prophecies. Current psychological research on death and studies of terrorism and religious extremism both confirm many of Fromm’s findings and expand on them. In this commentary I argue that the religion of Islam, far from being a source of suicide terrorism, has historically restrained both suicidal tendencies and political violence directed at civilians, but it is the slow yet sure encroachment of modernity that has eroded these theological and communitarian defences. Other problems, such as household politics, gender roles, and theological teachings concerning death likewise feed this process, as documented by Arabic researchers in contexts other than political violence.

  16. Terrorism as Genocide: Killing with “Intent”

    Directory of Open Access Journals (Sweden)

    Ashlie Perry

    2012-07-01

    Full Text Available It is plausible that terrorism can manifest itself as a form of genocide. Using Raphael Lemkin’s definition of genocide and the UN Genocide Convention’s definition of genocide, non-state and state terrorism are assessed as a form of genocide. Commonalities found in the definitions of both genocide and terrorism supports the argument. The psychology of terrorism and Lemkin’s psychology of genocide describe similar motivations of perpetrators. The September 11th attacks and the U.S. invasion of Iraq are used as case studies to illustrate that terrorism can result in genocide or genocidal acts. Framing acts of terrorism as genocide allows for prosecution in international courts and brings a new perspective to the concept of killing with intent.

  17. Explaining the unexplainable: designing a national strategy on classroom communication concerning the 22 July terror attack in Norway.

    Science.gov (United States)

    Schultz, Jon-Håkon; Langballe, Ase; Raundalen, Magne

    2014-01-01

    In the context of crisis and disasters, school-aged children are a vulnerable group with fewer coping resources than adults. The school is a key arena for preventive interventions; teachers can be given a key role in large-scale school-based interventions following a man-made or natural disaster. This paper describes a practical example of designing a school-based population-level intervention. The preventive measures were delivered as a national communication strategy between teachers and pupils aged 6-19 concerning the terror attack on 22 July 2011 in Norway. The strategy is based on principles from international research. The presentation contributes to the discussion of defining the teacher's role in school-based crisis interventions and dealing with high-intensity media coverage of war, terror, and catastrophes. THE PRESENTATION PROVIDES EDUCATIONAL AND PSYCHOLOGICAL PERSPECTIVES ON HOW TEACHERS CAN TAKE AN ACTIVE ROLE IN HELPING PUPILS TO DEAL WITH SUCH EVENTS THROUGH TWO APPROACHES: the therapeutic approach, to restore calm and feelings of safety; and the educational approach, to foster reflection and deeper understanding.

  18. Sleep Terrors in Twins

    OpenAIRE

    J Gordon Millichap

    2008-01-01

    In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  19. Breaking the Waves: How the Phenomenon of European Jihadism Militates Against the Wave Theory of Terrorism

    Directory of Open Access Journals (Sweden)

    Proshyn Denys

    2015-12-01

    Full Text Available David Rapoport’s Wave theory of terrorism is one of the most oftencited theories in the literature on terrorist violence. Rapoport is praised for having provided researchers with a universal instrument which allows them to explain the origin and transformation of various historical types of terrorism by applying to them the concept of global waves of terrorist violence driven by universal political impulses. This article, testing the Wave theory against the recent phenomenon of homegrown jihadism in Europe, uncovers this theory’s fundamental weaknesses and questions its real academic and practical value.

  20. Nuclear terrorism: Facts and fiction

    International Nuclear Information System (INIS)

    Kamp, K.H.

    1994-01-01

    The study tries to assess the risk of nuclear terrorism in the light of recent developments in the area of nuclear weapons proliferation, and to develop suggestions of how to cope with existing challenges. First of all the term of ''nuclear terrorism'' is defined and differentiated from other forms of nuclear crimes. In a second step the attempt is made to compile the findings and assessments of the past on the problem of nuclear terrorism. Since, as a rule, a threat potential is composed of 'intentions' and 'capabilities', a third part is dedicated to terrorist intentions and studies the degree of probability of terrorists considering nuclear weapons an appropriate means for their aims. In connection with 'capabilities' it is scrutinized whether terrorist groups will be able at all to procure, design or initiate nuclear warheads. This leads to the question as to which consequences result from nuclear safety shortcomings - in particular in Russia - with a view to nuclear terrorism. Based on the preceding considerations, several proposals for coping with the danger of nuclear terrorism are made. (orig./HP) [de

  1. Terrorism Risk Insurance: An Overview

    National Research Council Canada - National Science Library

    Webel, Baird

    2005-01-01

    .... Addressing this problem, Congress enacted the Terrorism Risk Insurance Act of 2002 (TRIA) to create a temporary program to share future insured terrorism losses with the property-casualty insurance industry and policyholders...

  2. Definitions of Cyber Terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an

  3. Sleep Terrors in Twins

    Directory of Open Access Journals (Sweden)

    J Gordon Millichap

    2008-12-01

    Full Text Available In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  4. An Mobility Typology of US Cities

    Science.gov (United States)

    KC, B.; Stewart, R.; King, A. W.

    2017-12-01

    Urban mobility is a pressing problem and one growing with urbanization. Urban mobility, for example, accounts for 28 % of all CO2 emissions from road transport and restrictions in urban mobility have economic and social consequences. Occupational flow, movement to and from work, plays a vital role in shaping urban mobility patterns and is dependent on urban infrastructures as well as the geographical distribution of households and occupations. Urban mobility varies among different population subgroups such as race, age, and income in complex multivariate patterns. To explore and quantify these patterns, we use multivariate clustering to build a typology of urban mobility for the Metropolitan Statistical Areas of the United States using the occupational flow data from US Census Bureau's Longitudinal Employer-Household Dynamics- Origin-Destination Employment Statistics. We use characteristics such as work radius, connectivity, and number of jobs for different population subgroups such as income, age, and industry to define the typology, objectively classifying metropolitan areas with similar mobility patterns as belonging to the same mobility type. The mobility typology addresses whether urban areas with similar transportation infrastructure have similar mobility patterns. Additionally, similarities and differences in the mobility typology of the demographic groups provides valuable insights into overall mobility experience which can help transportation planners design equitable and sustainable transportation infrastructures.

  5. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...

  6. A Four-Dimensional Product Innovativeness Typology

    DEFF Research Database (Denmark)

    Rosenø, Axel

    2005-01-01

    ) typology with four newproduct types; Leonard-Barton's (1995) five product types; and Veryzer's (1998a)four types in a two-by-two matrix.Interestingly, these two meta-perspectives on product innovativeness (i.e. 1. new tothe market and/or new to the company and 2. technological and/or marketnewness...... discontinuous newproduct projects (Song & Montoya-Weiss 1998; Atuahene-Gima 1995; Veryzer 1998a;Lynn et al. 1996; O'Connor 1998; Rice et al. 1998). By looking at both these types ofnew product development projects, empirical observations are likely to be morerealistic than those of studies that do...... the dichotomous view and, thereby, lend themselves to a more finegrainedstudy of innovation management practices for different types of newproduct projects.In fact, various innovativeness typologies exist that include more than two producttypes. Notably, the typology by Booz, Allen & Hamilton (1982)2 introduces...

  7. A comprehensive typology for mainstreaming urban green infrastructure

    Science.gov (United States)

    Young, Robert; Zanders, Julie; Lieberknecht, Katherine; Fassman-Beck, Elizabeth

    2014-11-01

    During a National Science Foundation (US) funded "International Greening of Cities Workshop" in Auckland, New Zealand, participants agreed an effective urban green infrastructure (GI) typology should identify cities' present stage of GI development and map next steps to mainstream GI as a component of urban infrastructure. Our review reveals current GI typologies do not systematically identify such opportunities. We address this knowledge gap by developing a new typology incorporating political, economic, and ecological forces shaping GI implementation. Applying this information allows symmetrical, place-based exploration of the social and ecological elements driving a city's GI systems. We use this information to distinguish current levels of GI development and clarify intervention opportunities to advance GI into the mainstream of metropolitan infrastructure. We employ three case studies (San Antonio, Texas; Auckland, New Zealand; and New York, New York) to test and refine our typology.

  8. Body and Terror: Women’s Bodies as Victims and Perpetrators of Terror

    Directory of Open Access Journals (Sweden)

    Parvin Sultana

    2014-07-01

    Full Text Available Bodies are vulnerable because they are intrinsically linked to death. Bodies are social and they are embedded with meaning. They cannot be extracted from their specific contexts. The nation is also often equated with body politic. As a result individual bodies become the site of security/ insecurity depending on the social location of bodies. Within this discourse, this article tries to locate the bodies of women. It will look at the bodies of women as victims of terror as well as perpetrators of terror. It will try to understand if in these differentiated roles, women are able to break away from stereotypes or are still caught in heteronormative narratives. Keywords: Body, Suicide Bombers, Victims, Ethnic Conflict, Terrorism.

  9. The enigma of lone wolf terrorism: an assessment

    NARCIS (Netherlands)

    Spaaij, R.

    2010-01-01

    Lone wolf terrorism remains an ambiguous and enigmatic phenomenon. The boundaries of lone wolf terrorism are fuzzy and arbitrary. This article aims to define and analyze the main features and patterns of lone wolf terrorism in fifteen countries. Lone wolf terrorism is shown to be more prevalent in

  10. Defining and Distinguishing Traditional and Religious Terrorism

    OpenAIRE

    Gregg, Heather S.

    2014-01-01

    The article of record may be found at: http://dx.doi.org/10.1080/23296151.2016.1239978 thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from tr...

  11. Mass Media and Terrorism: Deconstructing the Relationship

    OpenAIRE

    Prayudi, Prayudi

    2008-01-01

    Issue of terrorism came to surface in this early twenty first century through a number ofacts violence that have killed hundreds and injured thousands of people. At the same time, theseevents have been dominated the mass media contents. Principally, mass media and issue ofterrorism are inseparable. This paper examines the relationship between mass media and terrorism.It is done through the deconstruction of the concept of terrorism and how terrorism isunderstood as a communicational process. ...

  12. Nuclear and Radiological Terrorism

    International Nuclear Information System (INIS)

    Cizmek, A.

    2003-01-01

    Radiological and nuclear terrorism is widely considered as a major if not ultimate terrorist threat for modern societies. Highly industrialized countries could be extremely sensitive to terrorist aggressions of this kind. Nuclear terrorism is often associated with nuclear proliferation. Strictly speaking, nuclear proliferation deals with the spread of nuclear weapons into states which doesn't posses them. But proliferation can also be understood as the spread of radioactive material or even nuclear explosives into the hands of non-state organizations, such as sub national terrorist or criminal organizations as well as any kind of extreme groups for sabotage, blackmail or any other destabilization or destruction purposes. New driving factors for nuclear terrorism which 'help' terrorists are: the consequence of the break down of the Soviet Union and 'easy' radioactive smuggling and black market. What is 'New terrorism'? In analyzing the treat, one has to start by posing several crucial questions such as 'do such groups or individuals have the skill to complete their aim'? 'Who are these groups and individuals', 'how they can be categorized', 'what is their motivation'? If analysis of the 'new terrorism' is one side of the coin, the other is just as daunting. Who, what, when, where and how would be targeted by 'new terrorism'? Although there are existing different reasons (religious and political/social), mainly the target is civilian population. In many instances the aim is to exert either political or economic pressure on authorities or both. Police, ambulance - first call response teams - local, regional and national authorities have a hard task still ahead of them. The upside is that industrialized nations have acknowledged the need to reassess where we are and what the risk is. The bottom line has to be 'who is likely to want to resort to such methods and what the likelihood of them succeeding would be. (author)

  13. Terrorism, Hegel, Honneth

    Directory of Open Access Journals (Sweden)

    Sinkwan Cheng

    2015-07-01

    Full Text Available My essay begins by analyzing how Hegel and Honneth’s theory of recognition would seem to lend support to insurgent terrorists’ struggle for the right to self-determination. Insurgent terrorism often looks like a concretization of what Honneth calls the moral protest of the oppressed launched against the dominating powers. Insurgent terrorism also bears affinity to the politics of recognition in the sense that it challenges the legitimacy and authority of the forces owned by the state, and seeks to gain public recognition instead for the legitimacy of their own cause. Precisely because what matters uppermost to terrorists is the gaining of recognition for their cause as just, terrorists are eager to seize the mass media as a means of spreading their ideas. My essay will end, however, by pointing out major differences between insurgent terrorism on the one hand, and Hegel and Honneth on the other.

  14. Terrorism in Colombia.

    Science.gov (United States)

    Paredes Zapata, Gabriel Darío

    2003-01-01

    Colombia is a poor country that has been plagued by ongoing violence for more than 120 years. During the 1940s, subversive terrorist groups emerged in rural areas of the country when criminal groups came under the influence of Communism, and were later transformed into contemporary groups, such as the Ejercito de Liberacion Nacional (ELN) or National Liberation Army and Fuerzas Armadas Revolucionares de Colombia (FARC) or Revolutionary Armed Forces of Colombia). Paramilitary terrorist groups emerged in response to subversive groups and were later transformed into contemporary groups, such as the Autodefensas Unidas de Colombia (AUC) or United Self-Defense Forces of Colombia. Terrorism has placed an enormous burden on modern Colombia. From 1995 to 2002, 9,435 people were killed by terrorism-related events, of which 5,864 were killed by subversive terrorist activities and 3,571 were killed by paramilitary terrorist activities. In 2002, at least nineteen attacks produced 10 or more casualties, of which 18 were bombings. In 2002, terrorists killed at least 12 mayors, 71 legislators, and internally displaced 300,000 persons from their homes. Since terrorist groups in Colombia are typically supported by drug manufacturing and trafficking, it has been difficult at times to distinguish violence due to terrorism from violence due to illicit drug trafficking. Terrorism has also had a major adverse effect on the economy, with restricted travel, loss of economic resources, and lack of economic investment. In addition to political, military, and commercial targets, terrorists have specifically targeted healthcare infrastructure and personnel. At the national and local levels, much emergency planning and preparedness has taken place for terrorism-related events. The Centro Regulador de Urgencias (CRU) or Emergency Regulation Center in Bogota plays a major role in coordinating local prehospital and hospital emergency response in the capital city and the national level where

  15. Typological Analysis of Buying Actions

    Directory of Open Access Journals (Sweden)

    Nicolae Teodorescu

    2008-02-01

    Full Text Available The typology of buyers and buying actions contracts are specific categories of consumer behaviour, determining group buyers and buying actions in classes, to fragment the markets. Market fragmentation through buyer typoligy and/or segmentation is presently characterized by a multitude of theoretical approaches and are especially generated by the common practice in the respective business. These two concepts are used for the same purpose, the essential difference being their starting point: the segmentation fragments the markets as a whole, while the typology of the buyer and of buying actions generate classifications starting from individual cases.

  16. Review and expectations of terror attack emergency rescue

    Directory of Open Access Journals (Sweden)

    De-wen WANG

    2012-03-01

    Full Text Available Ten years of anti-terror struggle since the 9/11 event has indicated adequately that terrorism is a global problem and international danger. Likewise, anti-terror emergency rescue is also an important task which will influence the safety and benefit of every country all over the world. This paper reviews the main progress and result of international anti-terror struggle in the last ten years, and also introduces the new characteristic of the international anti-terror activity. Besides that, this paper also brings forward the further consideration about the anti-terror emergency medical rescue and the researches remaining to be carried out. The latter includes: (1 to further perfect the high-efficient medical rescue command organization; (2 to further perfect the emergency medical rescue prearranged scheme; (3 to further perfect the construction of rescue system and rescue base after various types of terror attack; (4 to further promote the anti-terror consciousness in the public, and pay more attention to the prevention and investigation of the psychological disaster; (5 to further carry out the basic investigation on emergency medical rescue after various terror attack injuries (for example the types and characteristics of new injuries, pathophysiology and prevention and treatment of stress-psychological effect induced by terror attack, new high-efficient medical rescue measure and equipments, and so on.

  17. Latin America: Terrorism Issues

    National Research Council Canada - National Science Library

    Sullivan, Mark P

    2005-01-01

    .... In its annual report on worldwide terrorism, the State Department highlights threats in Colombia, Peru, and the tri-border region of Argentina, Brazil, and Paraguay. The State Department also has designated four terrorist groups (three in Colombia and one in Peru) as Foreign Terrorist Organizations, and Cuba has been listed as a state sponsor of terrorism since 1982.

  18. Perception of Risk and Terrorism-Related Behavior Change: Dual Influences of Probabilistic Reasoning and Reality Testing

    Science.gov (United States)

    Denovan, Andrew; Dagnall, Neil; Drinkwater, Kenneth; Parker, Andrew; Clough, Peter

    2017-01-01

    The present study assessed the degree to which probabilistic reasoning performance and thinking style influenced perception of risk and self-reported levels of terrorism-related behavior change. A sample of 263 respondents, recruited via convenience sampling, completed a series of measures comprising probabilistic reasoning tasks (perception of randomness, base rate, probability, and conjunction fallacy), the Reality Testing subscale of the Inventory of Personality Organization (IPO-RT), the Domain-Specific Risk-Taking Scale, and a terrorism-related behavior change scale. Structural equation modeling examined three progressive models. Firstly, the Independence Model assumed that probabilistic reasoning, perception of risk and reality testing independently predicted terrorism-related behavior change. Secondly, the Mediation Model supposed that probabilistic reasoning and reality testing correlated, and indirectly predicted terrorism-related behavior change through perception of risk. Lastly, the Dual-Influence Model proposed that probabilistic reasoning indirectly predicted terrorism-related behavior change via perception of risk, independent of reality testing. Results indicated that performance on probabilistic reasoning tasks most strongly predicted perception of risk, and preference for an intuitive thinking style (measured by the IPO-RT) best explained terrorism-related behavior change. The combination of perception of risk with probabilistic reasoning ability in the Dual-Influence Model enhanced the predictive power of the analytical-rational route, with conjunction fallacy having a significant indirect effect on terrorism-related behavior change via perception of risk. The Dual-Influence Model possessed superior fit and reported similar predictive relations between intuitive-experiential and analytical-rational routes and terrorism-related behavior change. The discussion critically examines these findings in relation to dual-processing frameworks. This

  19. Perception of Risk and Terrorism-Related Behavior Change: Dual Influences of Probabilistic Reasoning and Reality Testing.

    Science.gov (United States)

    Denovan, Andrew; Dagnall, Neil; Drinkwater, Kenneth; Parker, Andrew; Clough, Peter

    2017-01-01

    The present study assessed the degree to which probabilistic reasoning performance and thinking style influenced perception of risk and self-reported levels of terrorism-related behavior change. A sample of 263 respondents, recruited via convenience sampling, completed a series of measures comprising probabilistic reasoning tasks (perception of randomness, base rate, probability, and conjunction fallacy), the Reality Testing subscale of the Inventory of Personality Organization (IPO-RT), the Domain-Specific Risk-Taking Scale, and a terrorism-related behavior change scale. Structural equation modeling examined three progressive models. Firstly, the Independence Model assumed that probabilistic reasoning, perception of risk and reality testing independently predicted terrorism-related behavior change. Secondly, the Mediation Model supposed that probabilistic reasoning and reality testing correlated, and indirectly predicted terrorism-related behavior change through perception of risk. Lastly, the Dual-Influence Model proposed that probabilistic reasoning indirectly predicted terrorism-related behavior change via perception of risk, independent of reality testing. Results indicated that performance on probabilistic reasoning tasks most strongly predicted perception of risk, and preference for an intuitive thinking style (measured by the IPO-RT) best explained terrorism-related behavior change. The combination of perception of risk with probabilistic reasoning ability in the Dual-Influence Model enhanced the predictive power of the analytical-rational route, with conjunction fallacy having a significant indirect effect on terrorism-related behavior change via perception of risk. The Dual-Influence Model possessed superior fit and reported similar predictive relations between intuitive-experiential and analytical-rational routes and terrorism-related behavior change. The discussion critically examines these findings in relation to dual-processing frameworks. This

  20. Perception of Risk and Terrorism-Related Behavior Change: Dual Influences of Probabilistic Reasoning and Reality Testing

    Directory of Open Access Journals (Sweden)

    Andrew Denovan

    2017-10-01

    Full Text Available The present study assessed the degree to which probabilistic reasoning performance and thinking style influenced perception of risk and self-reported levels of terrorism-related behavior change. A sample of 263 respondents, recruited via convenience sampling, completed a series of measures comprising probabilistic reasoning tasks (perception of randomness, base rate, probability, and conjunction fallacy, the Reality Testing subscale of the Inventory of Personality Organization (IPO-RT, the Domain-Specific Risk-Taking Scale, and a terrorism-related behavior change scale. Structural equation modeling examined three progressive models. Firstly, the Independence Model assumed that probabilistic reasoning, perception of risk and reality testing independently predicted terrorism-related behavior change. Secondly, the Mediation Model supposed that probabilistic reasoning and reality testing correlated, and indirectly predicted terrorism-related behavior change through perception of risk. Lastly, the Dual-Influence Model proposed that probabilistic reasoning indirectly predicted terrorism-related behavior change via perception of risk, independent of reality testing. Results indicated that performance on probabilistic reasoning tasks most strongly predicted perception of risk, and preference for an intuitive thinking style (measured by the IPO-RT best explained terrorism-related behavior change. The combination of perception of risk with probabilistic reasoning ability in the Dual-Influence Model enhanced the predictive power of the analytical-rational route, with conjunction fallacy having a significant indirect effect on terrorism-related behavior change via perception of risk. The Dual-Influence Model possessed superior fit and reported similar predictive relations between intuitive-experiential and analytical-rational routes and terrorism-related behavior change. The discussion critically examines these findings in relation to dual

  1. Family Environments and Adaptation: A Clinically Applicable Typology.

    Science.gov (United States)

    Billings, Andrew G.; Moos, Rudolf H.

    1982-01-01

    Presents a typology of family environments based on multidimensional assessments of a representative sample of community families. Identified seven family types. Found family differences in environmental stressors and coping resources affected family members' levels of functioning. Discusses clinical and research applications of the typology.…

  2. Bringing the State Back into Terrorism Studies

    OpenAIRE

    Blakeley, Ruth

    2007-01-01

    Orthodox terrorism studies tend to focus on the activities of illiberal nonstate actors against the liberal democratic states in the North. It thus excludes state terrorism, which is one of a number of repressive tools that great powers from the North have used extensively in the global South in\\ud the service of foreign policy objectives. I establish the reasons for the absence of state terrorism from orthodox accounts of terrorism and argue that critical–normative approaches could help to o...

  3. The 'war on terror"and international law

    NARCIS (Netherlands)

    Duffy, Helen

    2013-01-01

    The thesis analyses international law and practice in relation to terrorism and counter-terrorism in the post 9/11 environment. It finds terrorism to be a term of acute and wide-ranging political significance yet one which is not defined under generally accepted treaty or customary international

  4. Globální terorismus a jeho psychologické aspekty

    OpenAIRE

    Fajmonová, Veronika

    2009-01-01

    This bachalor thesis concentrates on the phenomenon of terrorism and its psychological aspects. In the first third we speak about the definition of terrorism, terrorism as a communicating process, typology of terrorism and its evolution. The second and third part of the thesis deal with the psychology of terrorism -- especially with explanation why people commit terroristic acts, what their motivational factors are, what the group dynamics is about and if suicide terrorist are suicidal.

  5. The Changing Nonlinear Relationship between Income and Terrorism

    Science.gov (United States)

    Enders, Walter; Hoover, Gary A.

    2014-01-01

    This article reinvestigates the relationship between real per capita gross domestic product (GDP) and terrorism. We devise a terrorism Lorenz curve to show that domestic and transnational terrorist attacks are each more concentrated in middle-income countries, thereby suggesting a nonlinear income–terrorism relationship. Moreover, this point of concentration shifted to lower income countries after the rising influence of the religious fundamentalist and nationalist/separatist terrorists in the early 1990s. For transnational terrorist attacks, this shift characterized not only the attack venue but also the perpetrators’ nationality. The article then uses nonlinear smooth transition regressions to establish the relationship between real per capita GDP and terrorism for eight alternative terrorism samples, accounting for venue, perpetrators’ nationality, terrorism type, and the period. Our nonlinear estimates are shown to be favored over estimates using linear or quadratic income determinants of terrorism. These nonlinear estimates are robust to additional controls. PMID:28579636

  6. Creating adaptive farm typologies using Naive Bayesian classification

    NARCIS (Netherlands)

    Paas, Wim; Groot, Jeroen C.J.

    2017-01-01

    The applicability of statistical typologies that capture farming systems diversity in innovation and development projects would increase if their adaptability would be enhanced, so that newly encountered farms can be classified and used to update the typology. In this paper we propose Naïve

  7. Potential for nuclear terrorism: a discussion

    International Nuclear Information System (INIS)

    Kellen, K.

    1987-01-01

    Because there has never been an incident of nuclear terrorism, the author is reduced to informed speculation. The past cannot be used to extrapolate into the future. For terrorists as for nations, the domain of nuclear attack represents are unprecedented quantum leap, one that groups think carefully about. Terrorists will consider many factors, including the public climate, because they are not psychotics operating in a vacuum (though groups may include psychotic individuals). Rather, they are people involved in a reciprocal political and psychological relationship with the rest of the world. In reaching some assessment of the potential for nuclear terrorism, there is an immense number of variables to deal with, beginning with the many types of terrorists and terrorism, including nuclear. They can, however, look at individual terrorist groups - a their compositions, capabilities, motivations, and modus operandi - and reach some conclusions. The author first looks at the possible forms nuclear terrorism might take and at the severity of the consequences. A strict distinction must be made between nuclear terrorism where nuclear things are the means (for example, a nuclear device) and nuclear terrorism where nuclear things are the target (for example, nuclear power stations), or where they are both such as a nuclear weapon thrown at a nuclear power station. 2 tables

  8. British torture in the 'war on terror'.

    Science.gov (United States)

    Blakeley, Ruth; Raphael, Sam

    2017-06-01

    Despite long-standing allegations of UK involvement in prisoner abuse during counterterrorism operations as part of the US-led 'war on terror', a consistent narrative emanating from British government officials is that Britain neither uses, condones nor facilitates torture or other cruel, inhuman or degrading treatment and punishment. We argue that such denials are untenable. We have established beyond reasonable doubt that Britain has been deeply involved in post-9/11 prisoner abuse, and we can now provide the most detailed account to date of the depth of this involvement. We argue that it is possible to identify a peculiarly British approach to torture in the 'war on terror', which is particularly well-suited to sustaining a narrative of denial. To explain the nature of UK involvement, we argue that it can be best understood within the context of how law and sovereign power have come to operate during the 'war on terror'. We turn here to the work of Judith Butler, and explore the role of Britain as a 'petty sovereign', operating under the state of exception established by the US executive. UK authorities have not themselves suspended the rule of law so overtly; indeed, they have repeatedly insisted on their commitment to it. Nevertheless, they have been able to construct a rhetorical, legal and policy 'scaffold' that has enabled them to demonstrate at least procedural adherence to human rights norms while, at the same time, allowing UK officials to acquiesce in the arbitrary exercise of sovereignty over individuals who are denied any access to appropriate representation or redress in compliance with the rule of law.

  9. Terrorism, forgiveness and restorative justice

    NARCIS (Netherlands)

    Pemberton, A.

    2014-01-01

    This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly

  10. Animal rights and environmental terrorism

    Directory of Open Access Journals (Sweden)

    Steve Cooke

    2013-09-01

    Full Text Available Many paradigmatic forms of animal rights and environmental activism have been classed as terrorism both in popular discourse and in law. This paper argues that the labelling of many violent forms of direct action carried out in the name of animal rights or environmentalism as ‘terrorism’ is incorrect. Furthermore, the claim is also made that even those acts which are correctly termed as terrorism are not necessarily wrongful acts. The result of this analysis is to call into question the terms of public debate and the legitimacy of anti-terrorism laws targeting and punishing radical activism.

  11. The failure of international action against terrorism.

    Science.gov (United States)

    Suter, Keith

    2006-01-01

    Progress on the so-called 'War on Terrorism' is slow. There is no agreed definition of terrorism and no consistent government policy in respect of it. Consideration of terrorism ignores the role of some governments in what could be regarded as terrorist activity, often with the connivance of others for reasons of political expediency. The special case of suicide terrorism is discussed in detail. It is concluded that the world is now exposed to a new form of warfare, and that even with new military thinking this could continue for perhaps decades to come.

  12. Pathological responses to terrorism.

    Science.gov (United States)

    Yehuda, Rachel; Bryant, Richard; Marmar, Charles; Zohar, Joseph

    2005-10-01

    Many important gains have been made in understanding PTSD and other responses to trauma as a result of neuroscience-based observations. Yet there are many gaps in our knowledge that currently impede our ability to predict those who will develop pathologic responses. Such knowledge is essential for developing appropriate strategies for mounting a mental health response in the aftermath of terrorism and for facilitating the recovery of individuals and society. This paper reviews clinical and biological studies that have led to an identification of pathologic responses following psychological trauma, including terrorism, and highlights areas of future-research. It is important to not only determine risk factors for the development of short- and long-term mental health responses to terrorism, but also apply these risk factors to the prediction of such responses on an individual level. It is also critical to consider the full spectrum of responses to terrorism, as well as the interplay between biological and psychological variables that contribute to these responses. Finally, it is essential to remove the barriers to collecting data in the aftermath of trauma by creating a culture of education in which the academic community can communicate to the public what is and is not known so that survivors of trauma and terrorism will understand the value of their participation in research to the generation of useful knowledge, and by maintaining the acquisition of knowledge as a priority for the government and those involved in the immediate delivery of services in the aftermath of large-scale disaster or trauma.

  13. Terror.com

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    En stor del af terrorens formål er at skabe frygt. Frygt for gentagelse af terror handlinger og dermed opnåelsen af en psykologisk effekt på mennesker eller grupper af mennesker med henblik på at ændre deres holdninger eller adfærd. Et af de primære midler til at opnå denne psykologiske effekt er......, udover terror handlingerne selv, propaganda som opfølgning på terrorhandlinger for at forøge effekten af disse. Eller propaganda som slet og ret har til formål at skabe frygt og usikkerhed. Traditionelt set har meget af spredningen af terrorpropaganda beroet på, at medierne omtalte terrorhandlingerne og...

  14. Optimal Physical Protection against Nuclear Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Doyoung; Kim, ChangLak [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2014-10-15

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  15. Optimal Physical Protection against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Lee, Doyoung; Kim, ChangLak

    2014-01-01

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  16. Basic Research Needs for Countering Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, W.; Michalske, T.; Trewhella, J.; Makowski, L.; Swanson, B.; Colson, S.; Hazen, T.; Roberto, F.; Franz, D.; Resnick, G.; Jacobson, S.; Valdez, J.; Gourley, P.; Tadros, M.; Sigman, M.; Sailor, M.; Ramsey, M.; Smith, B.; Shea, K.; Hrbek, J.; Rodacy, P.; Tevault, D.; Edelstein, N.; Beitz, J.; Burns, C.; Choppin, G.; Clark, S.; Dietz, M.; Rogers, R.; Traina, S.; Baldwin, D.; Thurnauer, M.; Hall, G.; Newman, L.; Miller, D.; Kung, H.; Parkin, D.; Shuh, D.; Shaw, H.; Terminello, L.; Meisel, D.; Blake, D.; Buchanan, M.; Roberto, J.; Colson, S.; Carling, R.; Samara, G.; Sasaki, D.; Pianetta, P.; Faison, B.; Thomassen, D.; Fryberger, T.; Kiernan, G.; Kreisler, M.; Morgan, L.; Hicks, J.; Dehmer, J.; Kerr, L.; Smith, B.; Mays, J.; Clark, S.

    2002-03-01

    To identify connections between technology needs for countering terrorism and underlying science issues and to recommend investment strategies to increase the impact of basic research on efforts to counter terrorism.

  17. Islamic Law and Terrorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Ramlani Lina Sinaulan

    2016-03-01

    Full Text Available Jihād and terrorism are not the same. In the context of sharia that implementation of the jihād has parameters measured with a layer of ethics based on the commands Al Quran and the Hadith of Prophet and the explanation the Ulama. Muslims in Indonesia views that the essentially not much different from the views on jihād and terror in other Islamic countries, especially the Middle East. In the context of Islamic law, jihād has multi spectral studies, but none of these studies that equate the meaning of jihād with terrorism, or none of them agreed that acts of terror as has been demonstrated by radical groups that are part of the concept Islam.

  18. 15 CFR 742.9 - Anti-terrorism: Syria.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Syria. 742.9 Section... BASED CONTROLS § 742.9 Anti-terrorism: Syria. (a) License requirements. (1) If AT Column 1 of the... required for export and reexport to Syria for anti-terrorism purposes. (2) The Secretary of State has...

  19. Terror and Wellbeing

    DEFF Research Database (Denmark)

    Raffnsøe, Sverre

    Currently, terrorism provokes a widespread feeling of insecurity and global reactions to the terrorist attacks. This is not simply because it poses a substantial threat to society and to the lives of individual citizens. The relatively rare incidents of terrorism cause emotional overreaction...... because they challenge and intensify the contract that supersaturates today's society.In the welfare society one can observe the existence of a diffuse but widespread social contract, which has become the single most cohesive element in the social fabric. According the terms of this contract, we agree...

  20. Disaster Metrics: A Comprehensive Framework for Disaster Evaluation Typologies.

    Science.gov (United States)

    Wong, Diana F; Spencer, Caroline; Boyd, Lee; Burkle, Frederick M; Archer, Frank

    2017-10-01

    Introduction The frequency of disasters is increasing around the world with more people being at risk. There is a moral imperative to improve the way in which disaster evaluations are undertaken and reported with the aim of reducing preventable mortality and morbidity in future events. Disasters are complex events and undertaking disaster evaluations is a specialized area of study at an international level. Hypothesis/Problem While some frameworks have been developed to support consistent disaster research and evaluation, they lack validation, consistent terminology, and standards for reporting across the different phases of a disaster. There is yet to be an agreed, comprehensive framework to structure disaster evaluation typologies. The aim of this paper is to outline an evolving comprehensive framework for disaster evaluation typologies. It is anticipated that this new framework will facilitate an agreement on identifying, structuring, and relating the various evaluations found in the disaster setting with a view to better understand the process, outcomes, and impacts of the effectiveness and efficiency of interventions. Research was undertaken in two phases: (1) a scoping literature review (peer-reviewed and "grey literature") was undertaken to identify current evaluation frameworks and typologies used in the disaster setting; and (2) a structure was developed that included the range of typologies identified in Phase One and suggests possible relationships in the disaster setting. No core, unifying framework to structure disaster evaluation and research was identified in the literature. The authors propose a "Comprehensive Framework for Disaster Evaluation Typologies" that identifies, structures, and suggests relationships for the various typologies detected. The proposed Comprehensive Framework for Disaster Evaluation Typologies outlines the different typologies of disaster evaluations that were identified in this study and brings them together into a single

  1. Art, Terrorism and the Negative Sublime

    Directory of Open Access Journals (Sweden)

    Arnold Berleant

    2009-01-01

    Full Text Available The range of the aesthetic has expanded to cover not only a wider range of objects and situations of daily life but also to encompass the negative. This includes terrorism, whose aesthetic impact is central to its use as a political tactic. The complex of positive and negative aesthetic values in terrorism are explored, introducing the concept of the sublime as a negative category to illuminate the analysis and the distinctive aesthetic of terrorism.

  2. A Typology of Workaholics with Implications for Counselors.

    Science.gov (United States)

    Robinson, Bryan E.

    2000-01-01

    Presents a brief review of the research on workaholism and the family and offers a typology of workaholism that more adequately portrays the various work styles of workaholics. This typology, based on level of work initiation and completion, denotes 4 types of workaholics: relentless, bulimic, attention-deficit, and savoring. (Contains 18…

  3. Cultures of Violence and Acts of Terror: Applying a Legitimation-Habituation Model to Terrorism

    Science.gov (United States)

    Mullins, Christopher W.; Young, Joseph K.

    2012-01-01

    Although uniquely positioned to provide insight into the nature and dynamics of terrorism, overall the field of criminology has seen few empirically focused analyses of this form of political violence. This article seeks to add to the understanding of terror through an exploration of how general levels of violence within a given society influence…

  4. An analysis of a typology of family health nursing practice.

    Science.gov (United States)

    Macduff, Colin

    2006-01-01

    In this article, Colin Macduff analyses the construction and testing of a typology of family health nursing practice. Following a summary of relevant methods and findings from two linked empirical research studies, more detailed analysis of the conceptual foundations, nature and purpose of the typology is presented. This process serves to exemplify and address some of the issues highlighted in the associated article that reviews the use of typologies within nursing.

  5. 15 CFR 742.8 - Anti-terrorism: Iran.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Iran. 742.8 Section... BASED CONTROLS § 742.8 Anti-terrorism: Iran. (a) License Requirements. (1) A license is required for anti-terrorism purposes to export or reexport to Iran any item for which AT column 1 or AT column 2 is...

  6. 15 CFR 742.10 - Anti-terrorism: Sudan.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Sudan. 742.10 Section...-CCL BASED CONTROLS § 742.10 Anti-terrorism: Sudan. (a) License requirements. (1) If AT column 1 or AT... ECCN, a license is required for export to Sudan for anti-terrorism purposes. 1 AT column 1 refers to...

  7. Empirical scaling law connecting persistence and severity of global terrorism

    Science.gov (United States)

    Gao, Jianbo; Fang, Peng; Liu, Feiyan

    2017-09-01

    Terrorism and counterterrorism have both been evolving rapidly. From time to time, there have been debates on whether the new terrorism is evolutionary or revolutionary. Such debate often becomes more heated after major terrorist activities, such as the terrorist attacks on September 11, 2001 and the November 13, 2015 coordinated Paris terror attack. Using country-wide terrorism data since 1970, we show that there exist scaling laws governing the continuity and persistence of world-wide terrorism, with the long-term scaling parameter for each country closely related to its yearly global terrorism index. This suggests that the new terrorism is more accurately considered evolutionary. It is further shown that the imbalance in the seesaw of terrorism and counterterrorism is not only responsible for the scaling behavior found here, but also provides new means of quantifying the severity of the global terrorism.

  8. Night Terrors in Children

    OpenAIRE

    Feferman, Irv

    1988-01-01

    Night terrors are a bizarre sleep disorder that affects young children. The child partially awakes during the night agitated, afraid and terrified, and cannot be consoled. These events, which may be related to emotional turmoil, are self-limiting. Psychiatric evaluation is indicated in certain cases, and drug therapy is almost never necessary. Parents should be reassured that night terrors are not dangerous and do not reflect any serious pathology.

  9. Responding to nuclear terrorism. Chapter 3. Combating radiological terrorism - A multi-faceted challenge

    International Nuclear Information System (INIS)

    Wolf, A.; Yaar, I.

    2006-01-01

    In the twentieth century, radioactive sources have become extensively used in everyday life. These sources, in the hand of terror organizations, can become a threat to the security of civilized nations, causing severe disruption to normal life. On of the main challenges of the civilized world is to keep ahead of the terrorist organizations and take appropriate preventive measures in order to prevent and reduce to minimum the impact of their actions. In order to succeed, a joint and comprehensive effort has to be undertaken to address the scientific, technological, organizational, sociological, psychological and educational aspects of the radiological terrorism threat. In this paper, some of the main activities required for preventing radiological terror events, and the way in which a modular response plan can be prepared are discussed

  10. The Development of a United Nations Counter-Terrorism Policy: A pragmatic approach to the problem of a definition of Terrorism

    OpenAIRE

    Turney-Harris, Latasha

    2014-01-01

    The primary object of this thesis is to propose a pragmatic solution to the legitimacy problems associated with the absence of a definition of Terrorism within United Nations Counter Terrorism Policy. It contends that the attempts to draft such a definition within the Ad Hoc Committee on Terrorism have now come to a political standstill and are unlikely to result in a strong legal definition of terrorism. Any outcome is likely to be a political compromise in nature. This thesis therefore ...

  11. Terrorism and the behavioral sciences.

    Science.gov (United States)

    Schouten, Ronald

    2010-01-01

    Terrorism has existed for millennia and is a phenomenon well-known to many parts of the world. Americans were forced to recognize this phenomenon, and our vulnerability to it, by two sets of events in 2001: the attacks on New York City and Washington, DC, and the anthrax mailings that followed shortly thereafter. Psychiatry, psychology, and other behavioral and social sciences have been looked to for assistance in collecting and analyzing intelligence data, understanding terrorism, and developing strategies to combat terrorism. In addition to reviewing areas in which the behavioral sciences have made contributions in addressing this problem, this article discusses the developing roles for behavioral scientists in this field.

  12. Terror Operations: Case Studies in Terrorism (U.S. Army TRADOC G2 Handbook No. 1.01)

    Science.gov (United States)

    2007-07-25

    terrorism topics. Unless stated otherwise, masculine nouns or pronouns do not refer exclusively to men. Proponent Statement. Headquarters, U.S. Army...Economic and political disruptions can have profound global consequences. Sources of instability within the region include hegemony , terrorism

  13. Domestic Violence as Everyday Terrorism

    DEFF Research Database (Denmark)

    Cooper-Cunningham, Dean

    2016-01-01

    Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society.......Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society....

  14. 75 FR 45563 - Terrorism Risk Insurance Program; Final Netting

    Science.gov (United States)

    2010-08-03

    ... DEPARTMENT OF THE TREASURY 31 CFR Part 50 RIN 1505-AC24 Terrorism Risk Insurance Program; Final... Title I of the Terrorism Risk Insurance Act of 2002 (``TRIA'' or ``the Act''), as amended by the Terrorism Risk Insurance Extension Act of 2005 (``Extension Act'') and the Terrorism Risk Insurance Program...

  15. FATF in Combating the Financing of Terrorism

    Directory of Open Access Journals (Sweden)

    Kristina Slavikovna Melkumyan

    2014-01-01

    Full Text Available The article examines the FATF specific approach to the problem of terrorism financing. The FATF essence, content of the activity and influence levers are also analyzed within the article. It is shown that the FATF has reviewed the problem of terrorism financing in the broadest perspective, having engaged simultaneously and consistently mechanisms for combating money laundering and terrorism financing. The Task Force has greatly contributed to building of the world counter-terrorism financing system through forming the legal and institutional basis as well as through interaction with all the possible participants and actors of world politics in this area. Moreover, the FATF has succeeded in geographical expansion of the FATF influence from the original 16 to187 jurisdictions by promotion of FATF-style regional bodies establishment. Particular attention is drawn to the unique features of the FATF Recommendations in comparison with the earlier issued sources of international law, which define the international counter-terrorism financing regime. The author believes that one of the advantages of the FATF as an institute within the counter-terrorism financing system among others is the informal status of the FATF, which provides its flexibility and high ability to respond quickly and in a timely manner to evolving nature of money laundering and terrorism financing as well as emerging threats.

  16. [Terrorism and human behavior].

    Science.gov (United States)

    Leistedt, S J

    2018-04-01

    Theories of religion are essential for understanding current trends in terrorist activities. The aim of this work is to clarify religion's role in facilitating terror and outline in parallel with recent theoretical developments on terrorism and human behaviour. Several databases were used such as PubCentral, Scopus, Medline and Science Direct. The search terms "terrorism", "social psychology", "religion", "evolution", and "cognition" were used to identify relevant studies in the databases. This work examines, in a multidimensional way, how terrorists employ these features of religion to achieve their goals. In the same way, it describes how terrorists use rituals to conditionally associate emotions with sanctified symbols that are emotionally evocative and motivationally powerful, fostering group solidarity, trust, and cooperation. Religious beliefs, including promised rewards in the afterlife, further serve to facilitate cooperation by altering the perceived payoffs of costly actions, including suicide bombing. The adolescent pattern of brain development is unique, and young adulthood presents an ideal developmental stage to attract recruits and enlist them in high-risk behaviors. This work offers insights, based on this translational analysis, concerning the links between religion, terrorism and human behavior. Copyright © 2017 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  17. Environmental terrorism

    International Nuclear Information System (INIS)

    Zirschky, J.

    1988-01-01

    Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts

  18. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  19. Nuclear terrorism and reality

    International Nuclear Information System (INIS)

    St Sauver, J.E.

    1983-01-01

    Unlike conventional terrorist violence, bona-fide nuclear terrorism is a self-publicizing phenomenon. It is a public event by the very scope of its impact. Apocalyptic and catastrophically destructive, a nuclear explosion is the ideal instrument of mass terror. Rational nuclear insurgents would not inform authorities that a nuclear device is about to be detonated. Advance warning of an impending nuclear explosion would reduce the maximum potential effectiveness of any response to such an event

  20. Entering the Black Hole: The Taliban, Terrorism, and Organised Crime

    Directory of Open Access Journals (Sweden)

    Matthew D. Phillips

    2014-09-01

    Full Text Available 'Cooperation and imitation among crime and terror groups in recent years has given rise to a crime-terror nexus. A linear conceptualisation of a crime-terror spectrum, suggests that complete convergence of crime and terror in a failed state can give rise to a ‘black hole.’ Theoretical models of the crime-terror nexus, however, do not specify the means by which a crime-terror group enters this black hole state, yet others do not. Using the Taliban movement as a case study, this article presents a theoretical extension of black hole theory, using organisation-level characteristics to merge black hole theory with the crime-terror continuum.'

  1. A methodology for modeling regional terrorism risk.

    Science.gov (United States)

    Chatterjee, Samrat; Abkowitz, Mark D

    2011-07-01

    Over the past decade, terrorism risk has become a prominent consideration in protecting the well-being of individuals and organizations. More recently, there has been interest in not only quantifying terrorism risk, but also placing it in the context of an all-hazards environment in which consideration is given to accidents and natural hazards, as well as intentional acts. This article discusses the development of a regional terrorism risk assessment model designed for this purpose. The approach taken is to model terrorism risk as a dependent variable, expressed in expected annual monetary terms, as a function of attributes of population concentration and critical infrastructure. This allows for an assessment of regional terrorism risk in and of itself, as well as in relation to man-made accident and natural hazard risks, so that mitigation resources can be allocated in an effective manner. The adopted methodology incorporates elements of two terrorism risk modeling approaches (event-based models and risk indicators), producing results that can be utilized at various jurisdictional levels. The validity, strengths, and limitations of the model are discussed in the context of a case study application within the United States. © 2011 Society for Risk Analysis.

  2. Terrorism and nuclear damage coverage

    International Nuclear Information System (INIS)

    Horbach, N. L. J. T.; Brown, O. F.; Vanden Borre, T.

    2004-01-01

    This paper deals with nuclear terrorism and the manner in which nuclear operators can insure themselves against it, based on the international nuclear liability conventions. It concludes that terrorism is currently not covered under the treaty exoneration provisions on 'war-like events' based on an analysis of the concept on 'terrorism' and travaux preparatoires. Consequently, operators remain liable for nuclear damage resulting from terrorist acts, for which mandatory insurance is applicable. Since nuclear insurance industry looks at excluding such insurance coverage from their policies in the near future, this article aims to suggest alternative means for insurance, in order to ensure adequate compensation for innocent victims. The September 11, 2001 attacks at the World Trade Center in New York City and the Pentagon in Washington, DC resulted in the largest loss in the history of insurance, inevitably leading to concerns about nuclear damage coverage, should future such assaults target a nuclear power plant or other nuclear installation. Since the attacks, some insurers have signalled their intentions to exclude coverage for terrorism from their nuclear liability and property insurance policies. Other insurers are maintaining coverage for terrorism, but are establishing aggregate limits or sublimits and are increasing premiums. Additional changes by insurers are likely to occur. Highlighted by the September 11th events, and most recently by those in Madrid on 11 March 2004, are questions about how to define acts of terrorism and the extent to which such are covered under the international nuclear liability conventions and various domestic nuclear liability laws. Of particular concern to insurers is the possibility of coordinated simultaneous attacks on multiple nuclear facilities. This paper provides a survey of the issues, and recommendations for future clarifications and coverage options.(author)

  3. Typology of double-tract units in multi family dwellings

    Directory of Open Access Journals (Sweden)

    Alfirević Đorđe

    2015-01-01

    Full Text Available The double-tract unit is a rather rare typological shape in residential architecture in the world, and this is why it has not been explored extensively in the field of habitology, although it is known that the first examples of double-tract units in multi- family dwellings were implemented back in XIX century. Every attempt at typology depends on the angle of analysis of a given subject, as well as the selection and hierarchy of the criteria and categorization of individual elements. This makes it hard to tell whether it is feasible to establish universal typology for all architectural patterns. Typology of residential types in architecture is mostly set according to current patterns (most often, only those that were executed. However, since the shape of double-tract unit is quite rare in the world, in most cases it was not even recorded, and even when it was, it was most often included as part of some other category or terminological definition. The aim of this paper is to outline the typology for the double-tract units in multi-family dwellings with an overview of current, established patterns (designed and executed, but also those which could yet be taken into consideration.

  4. The universal legal framework against nuclear terrorism

    International Nuclear Information System (INIS)

    Gehr, W.

    2007-01-01

    After the events of September 11, the United Nations Security Council adopted Resolution 1373 (2001) which has been called the 'Counter-Terrorism Code' of the world, because it creates legal obligations for all 192 Member States of the United Nations. UN Security Council Resolutions 1373 (2001), 1540 (2004) and 1735 (2006) as well as a defined set of 13 global treaties constitute the universal legal framework against terrorism which must be implemented in a manner consistent with international human rights obligations. Basically, these 13 treaties as well as Resolution 1373 are international criminal law instruments. Within this universal legal framework, the framework against nuclear terrorism is constituted by Resolution 1540, the Convention on the Physical Protection of Nuclear Material (CPPNM) which entered into force in 1987, and the International Convention for the Suppression of Terrorist Bombings which is in force since 2001. These three legal instruments will be supplemented by the International Convention for the Suppression of Acts of Nuclear Terrorism, an amendment to the CPPNM and two Protocols amending the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation and the Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms Located on the Continental Shelf, once these instruments, all of which were adopted in 2005, enter into force. The Terrorism Prevention Branch (TPB) of the United Nations Office on Drugs and Crime (UNODC) assists countries which are in need of legislative assistance for the drafting of appropriate counter-terrorism laws that duly take into account the obligations contained in Resolution 1373, the United Nations sanctions against Al-Qaida and the Taliban as well as in the 13 universal conventions for the prevention and the suppression of terrorism, including the CPPNM and the new International Convention for the Suppression of Acts of Nuclear Terrorism. UNODC/TPB has also

  5. Typology reconfigured: from the metaphysics of essentialism to the epistemology of representation.

    Science.gov (United States)

    Love, Alan C

    2009-06-01

    The goal of this paper is to encourage a reconfiguration of the discussion about typology in biology away from the metaphysics of essentialism and toward the epistemology of classifying natural phenomena for the purposes of empirical inquiry. First, I briefly review arguments concerning 'typological thinking', essentialism, species, and natural kinds, highlighting their predominantly metaphysical nature. Second, I use a distinction between the aims, strategies, and tactics of science to suggest how a shift from metaphysics to epistemology might be accomplished. Typological thinking can be understood as a scientific tactic that involves representing natural phenomena using idealizations and approximations, which facilitates explanation, investigation, and theorizing via abstraction and generalization. Third, a variety of typologies from different areas of biology are introduced to emphasize the diversity of this representational reasoning. One particular example is used to examine how there can be epistemological conflict between typology and evolutionary analysis. This demonstrates that alternative strategies of typological thinking arise due to the divergent explanatory goals of researchers working in different disciplines with disparate methodologies. I conclude with several research questions that emerge from an epistemological reconfiguration of typology.

  6. Sustainable operations management: A typological approach

    Directory of Open Access Journals (Sweden)

    Lawrence Michael Corbett

    2009-07-01

    Full Text Available This paper discusses the nature of sustainability and sustainable development as they relate to operations management. It proposes a typology for sustainable operations management that is based on the life cycle stages of a product and the three dimensions of corporate social responsibility. The aim is to show how this typology development could provide a useful approach to integrating the diverse strands of sustainability in operations, using industrial ecology and carbon neutrality as examples. It does this by providing a focused subset of environmental concerns for an industrial ecology approach, and some research propositions for the issue of carbon neutrality.

  7. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  8. Grene and Hull on types and typological thinking in biology.

    Science.gov (United States)

    Honenberger, Phillip

    2015-04-01

    Marjorie Grene (1910-2009) and David Hull (1935-2010) were among the most influential voices in late twentieth-century philosophy of biology. But, as Grene and Hull pointed out in published discussions of one another's work over the course of nearly forty years, they disagreed strongly on fundamental issues. Among these contested issues is the role of what is sometimes called "typology" and "typological thinking" in biology. In regard to taxonomy and the species problem, Hull joined Ernst Mayr's construal of typological thinking as a backward relic of pre-Darwinian science that should be overcome. Grene, however, treated the suspicion of typological thinking that characterized Hull's views, as well as those of other architects of the New Evolutionary Synthesis, as itself suspicious and even unsustainable. In this paper I review three debates between Grene and Hull bearing on the question of the validity of so-called typological thinking in biology: (1) a debate about the dispensability of concepts of "type" within evolutionary theory, paleontology, and taxonomy; (2) a debate about whether species can be adequately understood as individuals, and thereby independently of those forms of thinking Hull and Mayr had construed as "typological"; and (3) a debate about the prospects of a biologically informed theory of human nature. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. What is terrorism and can psychology do anything to prevent it?

    Science.gov (United States)

    Stevens, Michael J

    2005-01-01

    Terrorism has a long history, which continues to unfold, and takes many forms. Notwithstanding these facts, there is no generally accepted definition of terrorism. I set forth the definitional issues that underlie the current debate about terrorism. By comparing terrorism with various forms of violence, I argue that it is plausible to construe terrorism as crime and, in support of this, I demonstrate why terrorism cannot be morally justified. Next, I cluster various immediate and long-term approaches intended to prevent terrorism, highlighting psychologically based strategies, such as behavioral profiling, teaching tolerance and citizenship, modifying media images of terrorism, and building peace. In order to understand and respond more effectively to 21st-century terrorism, I advocate adoption of a multidisciplinary, contextually sensitive approach.

  10. Developing a typology of organisational forms of cooperative purchasing

    NARCIS (Netherlands)

    Schotanus, Fredo; Telgen, Jan

    2007-01-01

    This paper develops a typology for purchasing groups. In the typology, five main forms of cooperative purchasing are distinguished based on seven main dimensions. The forms are positioned in a matrix according to two distinguishing dimensions. These two dimensions are the ‘influence by all members

  11. Nuclear proliferation and terrorism

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    This section of the book, Part III, has two chapters (9 and 10). Chapter 9, Nuclear Power and Proliferation of Nuclear Weapons, is disucssed under these subjects: nuclear nonproliferation: origins and status; requirements for nuclear weapons manufacture; current nuclear programs and proliferation capabilities; encouraging decisions to forego weapons; arms control; safeguards; attitudes and expectations. Chapter 10, Nuclear Terrorism, discusses these areas: theft of nuclear materials; attacks on nuclear reactors; responding to nuclear terrorism; security and civil liberties

  12. Dirty hands : Government torture and terrorism

    NARCIS (Netherlands)

    Daxecker, U.

    2017-01-01

    Existing research suggests that the use of harsh repression can exacerbate the incidence and duration of terrorism. Micro- and macro-level analyses have shown that coercive government responses to terrorism can radicalize sympathizers, increase recruitment, and undermine community support for

  13. Analysing Terrorism from a Systems Thinking Perspective

    Directory of Open Access Journals (Sweden)

    Lukas Schoenenberger

    2014-02-01

    Full Text Available Given the complexity of terrorism, solutions based on single factors are destined to fail. Systems thinking offers various tools for helping researchers and policy makers comprehend terrorism in its entirety. We have developed a semi-quantitative systems thinking approach for characterising relationships between variables critical to terrorism and their impact on the system as a whole. For a better understanding of the mechanisms underlying terrorism, we present a 16-variable model characterising the critical components of terrorism and perform a series of highly focused analyses. We show how to determine which variables are best suited for government intervention, describing in detail their effects on the key variable—the political influence of a terrorist network. We also offer insights into how to elicit variables that destabilise and ultimately break down these networks. Because we clarify our novel approach with fictional data, the primary importance of this paper lies in the new framework for reasoning that it provides.

  14. IAEA to hold special session on nuclear terrorism

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA this week for an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. The Special Session, which will bring together experts on nuclear terrorism from around the world, will deal with the following issues: The Psychology of terrorism; Intelligence, police and border protection; Guarding nuclear reactors and material from terrorists and thieves; The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices; The threat of nuclear terrorism: Intentional dispersal of radioactive material - Sabotage of fixed installations or transport systems; The Legal Framework: Treaties and Conventions, Laws; Regulations and Codes of Practice; IAEA Nuclear Security and Safety Programmes

  15. Confronting the risks of terrorism: making the right decisions

    International Nuclear Information System (INIS)

    John Garrick, B.; Hall, James E.; Kilger, Max; McDonald, John C.; O'Toole, Tara; Probst, Peter S.; Rindskopf Parker, Elizabeth; Rosenthal, Robert; Trivelpiece, Alvin W.; Van Arsdale, Lee A.; Zebroski, Edwin L.

    2004-01-01

    This report offers a methodology for assessing, quantitatively, the risks of terrorism. The purpose of the methodology is to support effective decision making to combat terrorism. The emphasis is on terrorist attacks that could have catastrophic consequences. The perspective taken is that in order to make the right decisions about combating terrorism, their needs to be a systematic means of assessing the likelihood of such attacks. A process of implementation of the decisions resulting from risk assessment is essential. That process includes (1) an understanding of the nature of the threat, (2) an information system linked directly to 'intelligence' on terrorism, and (3) organizational structures that can take timely, coordinated, and effective actions. There must also be sound evidence that the methodology can be successfully applied. A description of the nature of terrorism, a terrorism risk assessment methodology, information requirements to fight terrorism, and recommendations for successful implementation is what this report is about

  16. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  17. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  18. Estimation of Radiological Terrorism Risk by Administrative Districts

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Suk Hoon; Kim, Ju Youl [Seoul National Univ., Seoul (Korea, Republic of); Yoo, Ho Sik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2008-10-15

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks.

  19. Estimation of Radiological Terrorism Risk by Administrative Districts

    International Nuclear Information System (INIS)

    Kim, Suk Hoon; Kim, Ju Youl; Yoo, Ho Sik

    2008-01-01

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks

  20. 15 CFR 742.19 - Anti-terrorism: North Korea.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: North Korea. 742.19...-CCL BASED CONTROLS § 742.19 Anti-terrorism: North Korea. (a) License Requirements. (1) All items on... anti-terrorism reasons require a license for export or reexport to North Korea. This includes all items...

  1. Data composition and taxonomic resolution in macroinvertebrate stream typology

    NARCIS (Netherlands)

    Verdonschot, P.F.M.

    2006-01-01

    In the EU water framework directive (WFD) a typological framework is defined for assessing the ecological quality of water bodies in the future. The aim of this study was to test the effect of data composition and taxonomic resolution on this typology. The EU research projects AQEM and STAR provided

  2. 31 CFR 50.72 - Establishment of Federal Terrorism Policy Surcharge.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Establishment of Federal Terrorism... TERRORISM RISK INSURANCE PROGRAM Recoupment and Surcharge Procedures § 50.72 Establishment of Federal Terrorism Policy Surcharge. (a) Treasury will establish the Federal Terrorism Policy Surcharge based on the...

  3. 6 CFR 25.4 - Designation of qualified anti-terrorism technologies.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Designation of qualified anti-terrorism... REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...

  4. Elder-Abuse Offenders: A Typology.

    Science.gov (United States)

    Ramsey-Klawsnik, Holly

    2000-01-01

    Addresses some of the perplexing issues involved in understanding and responding to elder-abuse offenders. Offers a typology of offenders to elucidate the dynamics when people mistreat the elderly. (Contains 13 references.) (Author)

  5. War on Terror - war on democracy?

    DEFF Research Database (Denmark)

    Bondebjerg, Ib

    2009-01-01

    En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak......En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak...

  6. Terrorism and financial supervision

    Directory of Open Access Journals (Sweden)

    Anatoli van der Krans

    2005-12-01

    Full Text Available This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective, proportional and mutually harmonious. Now that many regulations in this field have been established by intra-national bodies, it is important to examine how these regulations are further elaborated in the respective national systems. This article gives a broad overview of legislative initiatives of the UN, USA, FATF, EU and Council of Europe. The Netherlands for numerous reasons serves as a legal example. It is concluded that measures taken or proposed to avoid or at least reduce the financing of terrorism are quite effective to prevent abuse of the financial system. On the other hand, these measures increase the risk of underground or illegal financing, which is even more difficult to control.

  7. Reducing the risk of nuclear terrorism

    International Nuclear Information System (INIS)

    Hibbs, R.

    2005-01-01

    Full text: The March 2005 'International conference on nuclear security, global directions for the future' noted that nuclear terrorism is one of the greatest threats to society. Eminent members of a multi-national panel stated that there is no one principal activity to reduce the risk of nuclear terrorism and that a combination of activities is required. This paper seeks to identify those activities by analyzing the elements that comprise the risk of nuclear terrorism. For the purpose of the analysis, risk is the product of the probability of a terrorist attack (A p ), the success of a terrorist act (S p ) and the consequence (C) of the attack: R=A p * S p * C. The paper examines each of these three elements of risk with the objective of identifying what we are doing and what else we could be doing to reduce risk. It takes into consideration some historic catastrophes, examines how they might have been prevented or their consequences reduced, and if there are lessons that are applicable to reducing the risk of nuclear terrorism. The paper demonstrates that we have concentrated on only one of the three elements of risk and offer suggestions for diminishing the risk of nuclear terrorism by addressing all the elements. (author)

  8. Deriving a Typology of Web 2.0 Learning Technologies

    Science.gov (United States)

    Bower, Matt

    2016-01-01

    This paper presents the methods and outcomes of a typological analysis of Web 2.0 technologies. A comprehensive review incorporating over 2000 links led to identification of over 200 Web 2.0 technologies that were suitable for learning and teaching purposes. The typological analysis involved development of relevant Web 2.0 dimensions, grouping…

  9. The Dilution of Terrorism - Internship report at the International Center for Terrorism Studies

    OpenAIRE

    Bærentzen, Marc Theis

    2012-01-01

    The focus of this report will be how theory and methodology is a necessary mean for an academic understanding of terrorism, using different theories and examples to substantiate my argument. Terrorism has become a diluted concept that is used in a variety of ways to define violence against civilians. But is this enough to claim that we are dealing with a terrorist threat? In academic work these kind of reflections are important to the drawn conclusion. The problematic issue of an absent metho...

  10. Approaches to Political Violence and Terrorism in former Yugoslavia

    OpenAIRE

    Bieber, Florian

    2003-01-01

    Discusses political violence and terrorism in Yugoslavia caused by ethnic nationalism in the 1990s. Kinds of political conflict; Comparison of political violence with war and terrorism in Yugoslavia; Concept of terrorism and its presence in Southeastern Europe.

  11. Israel's Counter-Terrorism Strategy and its Effectiveness

    National Research Council Canada - National Science Library

    Smith, Jerry D

    2005-01-01

    This thesis analyzes Israeli counter-terrorism strategy and its effectiveness. Because of ongoing suicide attacks from Palestinian and other terrorist organizations, Israel will continue to have an aggressive counter-terrorism strategy...

  12. Why is terrorism a man's business?

    Science.gov (United States)

    Möller-Leimkühler, Anne Maria

    2018-04-01

    Terrorism, whether it is group-related or performed as lone actor terrorism, is a predominantly male phenomenon. Generally and throughout history, young males have been the main protagonists of criminal and political violence.This article aims to contribute, from different perspecives, to the question of what makes young men violent. These include neurobiological aspects, such as sex differences in the brain that predispose males to physical aggression and violence; gender role aspects, with regard to aggression and violence being basic components for demonstrating and reconstructing masculinity; demographic aspects of male youth bulges as potential breeding grounds for terrorism; aspects of group dynamics and identity fusion in the process of radicalization; and psychosocial characteristics of lone actor terrorists, which differ from group-related terrorists.It is concluded that in addition to ideological, political, economic, regional, demographic, or psychosocial causes, experiences of threatened masculinity may be an underlying factor and driving force for terrorism.

  13. Current Issues Concerning Korea’s Anti-Terrorism Programs

    Science.gov (United States)

    2011-06-10

    Terrorism. New York: Columbia University Press, 1998. Laitin, David. Hegemony and Culture : Politics and Religious Change Among the Yoruba . Chicago...such improvements might take. Definitions Terrorism: Definitions of terrorism differ among nations and organizations, because the social and cultural

  14. Center for Civil-Military Relations Counter-Terrorism Fellowship Program

    OpenAIRE

    Shemella, Paul

    2007-01-01

    The advent of more deadly forms of terrorism has challenged all governments to craft responses that stop terrorism while strengthening democracy – and without breeding more terrorism. The era of new terrorism is fraught with paradoxes and dilemmas that require decision-makers to develop a thorough understanding of the threats they face, as well as a comprehensive appreciation for the tools available to them for developing effective responses. No single government can respond effec...

  15. Political Terrorism: A Mini-Course for High School Social Studies.

    Science.gov (United States)

    Ellington, Lucien

    By participating in the 2-week mini-course, high school students will learn that (1) there is a difference between political terror and other criminal activity; (2) governments as well as nongovernmental groups engage in political terrorism; (3) political terrorism has been present throughout history; (4) political terrorism is a world wide…

  16. 76 FR 19909 - International Terrorism Victim Expense Reimbursement Program

    Science.gov (United States)

    2011-04-11

    ... 1121-AA78 International Terrorism Victim Expense Reimbursement Program AGENCY: Office of Justice... promulgating this interim-final rule for its International Terrorism Victim Expense Reimbursement Program... international terrorism. DATES: Effective date: This interim-final rule is effective April 11, 2011. Comment...

  17. An Examination of How the Availability of State-backed Terrorism Insurance Programs and Commercial Terrorism Insurance Affects the Operational Decisions of Multinational Companies.

    OpenAIRE

    GREY, William / WJG

    2011-01-01

    This dissertation explores the extent to which the operational decisions of multinational companies (MNCs) are affected by the availability of State-backed terrorism insurance programs and commercial terrorism insurance. The initial hypothesis made is that MNCs will be reluctant to invest in zones or countries with high terrorism or political risks, especially when insurance for these risks may be limited or unavailable. This investigation finds that the availability of State-backed terrorism...

  18. A proposed universal medical and public health definition of terrorism.

    Science.gov (United States)

    Arnold, Jeffrey L; Ortenwall, Per; Birnbaum, Marvin L; Sundnes, Knut Ole; Aggrawal, Anil; Anantharaman, V; Al Musleh, Abdul Wahab; Asai, Yasufumi; Burkle, Frederick M; Chung, Jae Myung; Cruz-Vega, Felipe; Debacker, Michel; Della Corte, Francesco; Delooz, Herman; Dickinson, Garth; Hodgetts, Timothy; Holliman, C James; MacFarlane, Campbell; Rodoplu, Ulkumen; Stok, Edita; Tsai, Ming-Che

    2003-01-01

    The lack of a universally applicable definition of terrorism has confounded the understanding of terrorism since the term was first coined in 18th Century France. Although a myriad of definitions of terrorism have been advanced over the years, virtually all of these definitions have been crisis-centered, frequently reflecting the political perspectives of those who seek to define it. In this article, we deconstruct these previously used definitions of terrorism in order to reconstruct a definition of terrorism that is consequence-centered, medically relevant, and universally harmonized. A universal medical and public health definition of terrorism will facilitate clinical and scientific research, education, and communication about terrorism-related events or disasters. We propose the following universal medical and public definition of terrorism: The intentional use of violence--real or threatened--against one or more non-combatants and/or those services essential for or protective of their health, resulting in adverse health effects in those immediately affected and their community, ranging from a loss of well-being or security to injury, illness, or death.

  19. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    OpenAIRE

    Asadi NEJMAH

    2015-01-01

    The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the ext...

  20. Characterising the UK Terrorist Threat: The Problem with Non-Violent Ideology as a Focus for Counter-Terrorism and Terrorism as the product of ‘Vulnerability’

    Directory of Open Access Journals (Sweden)

    Anthony Richards

    2012-07-01

    Full Text Available This article investigates two particular aspects as to how the terrorist threat in the UK has been characterised, arguing that they both challenge conventional academic wisdom as to how terrorism should be conceptualised. While such conventional wisdom should always be open to challenge, and policymaking perspectives are different to those of academics, these two particular aspects as to how the terrorist threat has been perceived in the UK merit scrutiny, especially as counter-terrorism strategies have been premised on them. They are: i the contemporary and explicit concern with ‘extremist’ but 'non-violent' ideas that are said to be ‘conducive’ to terrorism as a focus for a counter-terrorism response and ii the notion that terrorism has increasingly been seen as the product of ‘vulnerability’. The first, and the main focus of this article, appears to challenge the widely held view within terrorism studies that, when defining terrorism, reference to the cause or the perpetrator is unhelpful because terrorism should first and foremost (and more objectively be seen as a particular 'method' of violence that has been used by a wide variety of actors, regardless of the ideology or the belief systems of its perpetrators. The second aspect – the impetus towards viewing terrorism as the product of vulnerability or individual fallibility - arguably implies a diminished capacity for rational behaviour, which challenges a further commonly held view within terrorism studies: that terrorism entails the use of calculated and rational acts of violence.

  1. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  2. Roots of terrorism: a reassessment after September 11th

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F.

    2002-01-01

    The brutal terrorist attacks of September 11th, the anthrax attacks that followed and growing knowledge of al Qaeda's pursuit of nuclear, biological and chemical weapons have not only intensified concerns about terrorism but also created doubts about our understanding of terrorism. These attacks were in many ways unprecedented, and ultimately raise the question of the roots or causes of terrorism. Historically and today, there have been divergent views on this question, which reflect philosophical, religious, political, sociological and other differences. These differences are not merely academic, as they can affect our understanding of both the threat and of responses to terrorism in the aftermath of September 11th, Terrorism is too complex and diverse a phenomenon to speak easily of causes. But we may be able to discern the causes of specific acts. Our response to 9/11 and other acts of terrorism will be affected by our understanding of their causes. If 9/11 was caused by US Middle East policies, the response must involve a review of these policies. If it is a backlash against globalization, the response must address the realities underlying anti-globalization sentiments. Addressing causes will not in any case end terrorism, and addressing the wrong causes will be counterproductive. Actions to reduce those conditions that create support for terrorism and aid its recruitment, which need to be clearly identified, are critical in any counterterrorism strategy. So we must understand the reasons for terrorism and, in particular, for the attacks of September 11th.T his paper will look at the question of the roots of terrorism and then look to the specific case of 911 and its aftermath, with a special view to the impact of globalization.

  3. Terrorism and the adolescent: a review.

    Science.gov (United States)

    Abo, Alyssa; Zalsman, Gil

    2003-01-01

    In recent years suicide bombings have became a part of life in Israel. Adolescents seem to be more vulnerable to the issues of life and death since they have to choose psychologically whether to live or die ("the fourth organizer"). The reaction to terrorism in this age group is unique. After September 11th, a great interest on the subject has arisen in the United States and some new data has been gathered. One of the important messages is that terrorism does not simply equal trauma. The aim of this article is to review current literature on emotional reaction, impact, and therapeutic strategies to terrorism in the adolescent population.

  4. The Mega-Terrorism - The Challenge of the Third Millennium

    Directory of Open Access Journals (Sweden)

    Daniel Andrișan

    2011-06-01

    Full Text Available The aim of this article is to describe the "new face" of terrorism in the twenty-first centuryindicating the transition to mass destruction weapons (nuclear terrorism, chemical, biological, toethnic-religious terrorism, the occurrence of massive gray area phenomena of terrorism and how thisphenomenon became a strategic weapon. Mega-terrorism has been existing, at a conceptual level,ever since the 70’s, when the experts of this phenomenon tried to find a semantic cover for thesituations that certain organizations, groups or terrorist or extremist sections would get someWeapons of Mass Destruction Systems. Actually, the 11th of September tragedy proves that megaterrorismrepresents the premeditated destruction, the lack of negotiations, of a tactical goal that wasto be accomplished by means of a threat. The mega-terrorism actors do not intend to get themselvesknown to the public, do not require anything, do not see the threat as means or device to reach theirpurpose. The 21 st century mega-terrorism simple logic is materialized in the systemic destroying ofthe enemy, no longer representing a political power or a government, but an entire ‘disobeying’,‘corrupted’, ‘unfaithful’ population indifferent to the mega-terrorist actors’ desires. New dimensionagainst mega-terrorism determines not only a rethinking of how to combat it, but also the realizationof a conceptual legal framework and measures established to materialize the political decision.

  5. The age of terrorism: to the problem statement

    Directory of Open Access Journals (Sweden)

    I. V. Yevtyagina

    2014-04-01

    Full Text Available In the present article analyzes the problem of terrorism. Historical essay on the topic helps clarify the concept of the term «terrorism», as well as its causes. The existing classification of terrorism reveals the different types and ways of influencing people by terrorists to achieve their goals. The author suggests the age classification, namely, adult and adolescence terrorism. Discussed in detail adolescence terrorism. The possible reasons for solutions to the problems teenagers violently. On the example of the terrorist act in Moscow school number 263 attempts to analyze the causal relationships aggressive behavior among adolescents in relation to their peers and teachers. Author shows the factors influencing the formation of the propensity to aggression (the terrorist behavior: the crisis of spirituality and morality, reducing cultural awareness, conflict resolution based on adults imitation, striving for leadership, using aggression, the substitution of the present reality of the computer world, acceptance of immoral behavior for conventional norm, plenty of scenes of cruelty and violence in the media, national intolerance. Also in the article are recommendations to prevent teenage terrorism, emphasizes the need for joint activities of the school psychologist, teachers, children and their parents.

  6. Terrorism in Peru.

    Science.gov (United States)

    Barrientos Hernandez, Dora H; Church, Adam L

    2003-01-01

    Two major domestic terrorist groups have plagued Peru over the past 20 years, the Sendero Luminoso or "Shining Path" (SL) and the Revolutionary Movement Túpac Amaru (MRTA). On 28 August 2003, the Peruvian Truth and Reconciliation Commission reported that an estimated 69,280 persons were killed in the internal conflict in Peru from 1980 to 2000. Most of the victims were farmers (56%), most attacks occurred in rural settings (79%), and the SL was responsible for most of the deaths (54%). Aggressive anti-terrorism efforts by police and military during this period, often at the expense of basic human rights, also contributed to this large burden of terrorism on Peru. During the 1990s, terrorist attacks in Peru had spread to its urban areas. On 17 December 1996, 22 members of MRTA took over the Japanese ambassador's residence in Lima, holding 72 hostages until the grounds were stormed by Peruvian special forces on 23 April 1997. Until recently, emergency planning and preparedness for terrorism-related events in Peru were largely underdeveloped. In the last five years, Peru has taken two key steps towards developing a mature emergency response system, with the establishment of the country's first emergency medicine residency training program and the construction of the first dedicated trauma center in Lima.

  7. Sociolinguistic Typology and Sign Languages.

    Science.gov (United States)

    Schembri, Adam; Fenlon, Jordan; Cormier, Kearsy; Johnston, Trevor

    2018-01-01

    This paper examines the possible relationship between proposed social determinants of morphological 'complexity' and how this contributes to linguistic diversity, specifically via the typological nature of the sign languages of deaf communities. We sketch how the notion of morphological complexity, as defined by Trudgill (2011), applies to sign languages. Using these criteria, sign languages appear to be languages with low to moderate levels of morphological complexity. This may partly reflect the influence of key social characteristics of communities on the typological nature of languages. Although many deaf communities are relatively small and may involve dense social networks (both social characteristics that Trudgill claimed may lend themselves to morphological 'complexification'), the picture is complicated by the highly variable nature of the sign language acquisition for most deaf people, and the ongoing contact between native signers, hearing non-native signers, and those deaf individuals who only acquire sign languages in later childhood and early adulthood. These are all factors that may work against the emergence of morphological complexification. The relationship between linguistic typology and these key social factors may lead to a better understanding of the nature of sign language grammar. This perspective stands in contrast to other work where sign languages are sometimes presented as having complex morphology despite being young languages (e.g., Aronoff et al., 2005); in some descriptions, the social determinants of morphological complexity have not received much attention, nor has the notion of complexity itself been specifically explored.

  8. Sociolinguistic Typology and Sign Languages

    Science.gov (United States)

    Schembri, Adam; Fenlon, Jordan; Cormier, Kearsy; Johnston, Trevor

    2018-01-01

    This paper examines the possible relationship between proposed social determinants of morphological ‘complexity’ and how this contributes to linguistic diversity, specifically via the typological nature of the sign languages of deaf communities. We sketch how the notion of morphological complexity, as defined by Trudgill (2011), applies to sign languages. Using these criteria, sign languages appear to be languages with low to moderate levels of morphological complexity. This may partly reflect the influence of key social characteristics of communities on the typological nature of languages. Although many deaf communities are relatively small and may involve dense social networks (both social characteristics that Trudgill claimed may lend themselves to morphological ‘complexification’), the picture is complicated by the highly variable nature of the sign language acquisition for most deaf people, and the ongoing contact between native signers, hearing non-native signers, and those deaf individuals who only acquire sign languages in later childhood and early adulthood. These are all factors that may work against the emergence of morphological complexification. The relationship between linguistic typology and these key social factors may lead to a better understanding of the nature of sign language grammar. This perspective stands in contrast to other work where sign languages are sometimes presented as having complex morphology despite being young languages (e.g., Aronoff et al., 2005); in some descriptions, the social determinants of morphological complexity have not received much attention, nor has the notion of complexity itself been specifically explored. PMID:29515506

  9. Sociolinguistic Typology and Sign Languages

    Directory of Open Access Journals (Sweden)

    Adam Schembri

    2018-02-01

    Full Text Available This paper examines the possible relationship between proposed social determinants of morphological ‘complexity’ and how this contributes to linguistic diversity, specifically via the typological nature of the sign languages of deaf communities. We sketch how the notion of morphological complexity, as defined by Trudgill (2011, applies to sign languages. Using these criteria, sign languages appear to be languages with low to moderate levels of morphological complexity. This may partly reflect the influence of key social characteristics of communities on the typological nature of languages. Although many deaf communities are relatively small and may involve dense social networks (both social characteristics that Trudgill claimed may lend themselves to morphological ‘complexification’, the picture is complicated by the highly variable nature of the sign language acquisition for most deaf people, and the ongoing contact between native signers, hearing non-native signers, and those deaf individuals who only acquire sign languages in later childhood and early adulthood. These are all factors that may work against the emergence of morphological complexification. The relationship between linguistic typology and these key social factors may lead to a better understanding of the nature of sign language grammar. This perspective stands in contrast to other work where sign languages are sometimes presented as having complex morphology despite being young languages (e.g., Aronoff et al., 2005; in some descriptions, the social determinants of morphological complexity have not received much attention, nor has the notion of complexity itself been specifically explored.

  10. The boomerang affect of the war on terror

    Directory of Open Access Journals (Sweden)

    Carolin Goerzig

    2010-11-01

    Full Text Available Este artículo escruta las reacciones legislativas a los atentados en la ciudad de Oklahoma y los de Londres en 2005 para intentar descifrar como la legislación antiterrorista ha sustancialmente bloqueado estos ataques. Se intenta mostrar como la resistencia de los gobiernos y los ejecutivos aprueba índices críticos en las leyes antiterroristas. A la luz de una reciente encuesta sobre legislación antiterrorista mundial, los casos donde la legislación antiterrorista ha sido bloqueada ha llegado a ser verdaderamente crítica. A este fin, este artículo se pregunta por qué la legislación antiterrorista se bloquea cuando esto sucede. Para responder a esta cuestión, se han testado tres variables: la composición de los gobiernos, la opinión pública-basada en los niveles de terror en sus medios, y el nivel de acuerdos ejecutivos. Para testar estas variables, se han evaluado dos casos: la evolución de la legislación antiterrorista antes de los ataques de la ciudad de Oklahoma en 1995 y antes de los atentados de Londres de 2005. En la evaluación de los casos, los debates legislativos y ejecutivos han ocurrido antes de los ataques terroristas examinados y luego se han comparado los dos casos con el Reino Unido en 1974 y los Estados Unidos en 2001 cuando la legislación antiterrorista inicia su camino. Este artículo concluye que el nivel de acuerdos ejecutivos y la composición de los gobiernos tiene el mayor poder de explicación en determinadas decisiones antiterroristas que llevarán a secundar la legislación antiterrorista o no.Palabras clave: ataques terroristas a Londres, legislación antiterrorista, Estados Unidos, Reino Unido___________________________ABSTRACT:The goal of the war on terror is to prevent a new 9/11. In order to achieve this, the preemptive strike has been introduced to tackle the terrorism risk. However, this precisely leads to the increasing unpredictability of terrorism and hence the likelihood of a new 9

  11. American Jihadist Terrorism: Combating a Complex Threat

    Science.gov (United States)

    2010-12-07

    Goodnough, and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/2009/10/22/us...Abby Goodnough and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/ 2009/10/22/us...July 8, 2009); Tony Allen-Mills, “FBI ‘Lured Dimwits’ into Terror Plot,” The Sunday Times, London, May 24, 2009, http://www.timesonline.co.uk/tol/news

  12. Design typology and design organisation

    DEFF Research Database (Denmark)

    Andreasen, Mogens Myrup; Wognum, N.; McAloone, Timothy Charles

    2002-01-01

    research society has recognised normative procedural models of designing as being a reasonable answer to the question: How do designing proceed? The reasoning behind the models, from which the design methodology model by [Pahl & Beitz 1995], may be seen as a characteristic one, was a mix of human problem......The idea of focusing upon the creation of a design typology was articulated by [Andreasen & Wognum 2000] and detailed by [Andreasen & Wognum 2001]. The aim was to propose a typology, which could serve as identification of design types and design research contributions. For a long period the design...... solving-, design management-, and artefact nature-reasoning. Critique has been raised to that type of models as being neither explanatory nor instructive. If we accept these models as merely being pragmatically "stepping-stone" explanations of what happens during designing, it is interesting to observe...

  13. Terrorism and its centuries challenges

    Directory of Open Access Journals (Sweden)

    Jonida Drogu

    2018-03-01

    Full Text Available The goal of this article is to portray how to better understand the epistemic differences of terminology used for terrorism and how people’s lives have been and are still affected by this undefined violence. By collecting some diary information from 20people about their perception about terrorism attaches we will analyze some of overall countries and Saudi Arabia’s commitment in fighting this century’s challenge. Fighting radical religious beliefs in the Kingdom is an immense challenge. The true Islamic faith is in large contrast to those individuals and entities whose actions are centered on the intentional misrepresentation or the degradation of the teachings of Islam. The base of this data will indicate the progress within Saudi Arabia, its position in the world prospect and its impact in society since it remains a robust construction even now days, even thought, a lot has been done. The first signs provided in this analysis start with the beginning of the new century, when a strong attack happened just days before it began. Some important indicators such as terrorism founding, or money charities caused many changes in Saudi Arabia as a leading power, in the war against terrorism in Middle East.

  14. The Network Form of Implementing Educational Programs: Differences and Typology

    Science.gov (United States)

    Sobolev, Alexandr Borisovich

    2016-01-01

    The article describes peculiarities of implementation and major differences in network educational programs, currently introduced in Russia. It presents a general typology of models and forms for implementing interaction between educational institutions of Russia, including teacher institutes and federal universities, as well as a typology of…

  15. Dismantling Terrorism: Developing Actionable Solutions for Today's Plague of Violence

    National Research Council Canada - National Science Library

    Scott, Frances K

    2007-01-01

    .... The bibliography is divided into the following sections: causes and origins of terrorism, geographical distribution of terrorist groups, terrorist financing, terrorist groups and networks, the psychology of terrorism, prevention of terrorism, remedies...

  16. Terror in time: extending culturomics to address basic terror management mechanisms.

    Science.gov (United States)

    Dechesne, Mark; Bandt-Law, Bryn

    2018-04-11

    Building on Google's efforts to scan millions of books, this article introduces methodology using a database of annual word frequencies of the 40,000 most frequently occurring words in the American literature between 1800 and 2009. The current paper uses this methodology to replicate and identify terror management processes in historical context. Variation in frequencies of word usage of constructs relevant to terror management theory (e.g. death, worldview, self-esteem, relationships) are investigated over a time period of 209 years. Study 1 corroborated previous TMT findings and demonstrated that word use of constructs related to death and of constructs related to patriotism and romantic relationships significantly co-vary over time. Study 2 showed that the use of the word "death" most strongly co-varies over time with the use of medical constructs, but also co-varies with the use of constructs related to violence, relationships, religion, positive sentiment, and negative sentiment. Study 3 found that a change in the use of death related words is associated with an increase in the use of fear related words, but not in anxiety related words. Results indicate that the described methodology generates valuable insights regarding terror management theory and provide new perspectives for theoretical advances.

  17. [Terrorism, public health and health services].

    Science.gov (United States)

    Arcos González, Pedro; Castro Delgado, Rafael; Cuartas Alvarez, Tatiana; Pérez-Berrocal Alonso, Jorge

    2009-01-01

    Today the terrorism is a problem of global distribution and increasing interest for the international public health. The terrorism related violence affects the public health and the health care services in an important way and in different scopes, among them, increase mortality, morbidity and disability, generates a context of fear and anxiety that makes the psychopathological diseases very frequent, seriously alters the operation of the health care services and produces important social, political and economic damages. These effects are, in addition, especially intense when the phenomenon takes place on a chronic way in a community. The objective of this paper is to examine the relation between terrorism and public health, focusing on its effects on public health and the health care services, as well as to examine the possible frames to face the terrorism as a public health concern, with special reference to the situation in Spain. To face this problem, both the public health systems and the health care services, would have to especially adapt their approaches and operational methods in six high-priority areas related to: (1) the coordination between the different health and non health emergency response agencies; (2) the reinforcement of the epidemiological surveillance systems; (3) the improvement of the capacities of the public health laboratories and response emergency care systems to specific types of terrorism as the chemical or biological terrorism; (3) the mental health services; (4) the planning and coordination of the emergency response of the health services; (5) the relations with the population and mass media and, finally; (6) a greater transparency in the diffusion of the information and a greater degree of analysis of the carried out health actions in the scope of the emergency response.

  18. Probabilistic risk analysis and terrorism risk.

    Science.gov (United States)

    Ezell, Barry Charles; Bennett, Steven P; von Winterfeldt, Detlof; Sokolowski, John; Collins, Andrew J

    2010-04-01

    Since the terrorist attacks of September 11, 2001, and the subsequent establishment of the U.S. Department of Homeland Security (DHS), considerable efforts have been made to estimate the risks of terrorism and the cost effectiveness of security policies to reduce these risks. DHS, industry, and the academic risk analysis communities have all invested heavily in the development of tools and approaches that can assist decisionmakers in effectively allocating limited resources across the vast array of potential investments that could mitigate risks from terrorism and other threats to the homeland. Decisionmakers demand models, analyses, and decision support that are useful for this task and based on the state of the art. Since terrorism risk analysis is new, no single method is likely to meet this challenge. In this article we explore a number of existing and potential approaches for terrorism risk analysis, focusing particularly on recent discussions regarding the applicability of probabilistic and decision analytic approaches to bioterrorism risks and the Bioterrorism Risk Assessment methodology used by the DHS and criticized by the National Academies and others.

  19. EU’s Role in Fighting Terrorism

    Directory of Open Access Journals (Sweden)

    Jana Maftei

    2009-06-01

    Full Text Available International terrorism, a phenomenon with constant development, is today acertainty and has dramatically marked the beginning of this century and millennium. Thisproblem has reached a global dimension and it represents a concern to the entire internationalcommunity. Over the time, numerous international and regional regulations have been framed, inorder to prevent and combat terrorism. The European Union condemns terrorist acts andrecognizes the central role of the United Nations, in fighting against terrorism and promotingsecurity, as well as the contribution of the new NATO in what concerns the defense and securitypromotion. Europe has to act more firmly in order to consolidate the defense against terrorismand the European Union’s borders. At the same time, the European Union considers that only aconcerted and firm action from all the states and the major actors on the international scenewould lead to the identification of the solutions which can contribute to the efficient fight againstterrorism and, by these means, provide for the international peace and security. The proportion ofthe danger terrorism represents has turned the fight against this phenomenon in an internationalcommunity’s desideratum.

  20. On immorality of terrorism and war

    Directory of Open Access Journals (Sweden)

    Čičovački Predrag

    2003-01-01

    Full Text Available The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable moral implications with regards to the treatment of other human beings, a further common and troubling implication of terrorism and war consists in the fact that dehumanization of others leads also to a dehumanization of ourselves. .

  1. Terrorism and Other Threats to Civilization

    Science.gov (United States)

    Garwin, Richard L.

    2014-07-01

    In the Seminars on Planetary Emergencies, we have for more than a decade had a strong focus on terrorism, and, indeed, on megaterrorism. We realized early that there was much that could be achieved to mitigate the consequences of terrorists' acts, and so our original PMP, ably chaired by Kamal, was split into PMP-MTA (Mitigation of Terrorists Acts) and PMP-Motivation of Terrorism. Clearly, terrorism doesn't just happen, but is performed by people, either relatively spontaneously or in an organized fashion. I will not presume to report on the considerations and accomplishments of our colleagues, chaired by John Alderdice, who have studied terrorist motivations and worked hard to eliminate such motivations...

  2. Who Is Doing Well? A Typology of Newly Homeless Adolescents

    Science.gov (United States)

    Milburn, Norweeta; Liang, Li-Jung; Lee, Sung-Jae; Rotheram-Borus, Mary Jane; Rosenthal, Doreen; Mallett, Shelley; Lightfoot, Marguerita; Lester, Patricia

    2009-01-01

    There is growing evidence to support developing new typologies for homeless adolescents. Current typologies focus on the risks associated with being homeless, with less consideration of the positive attributes of homeless adolescents. The authors examined both risk and protective factors in a sample of newly homeless adolescents. Using cluster…

  3. The Czech National Action Plan on Combating Terrorism: Political and Legal Point of Outcome in Responding to CBRNE-Terrorism

    International Nuclear Information System (INIS)

    Matousek, J.

    2007-01-01

    After the events of September 2001 starting new era in the global terrorism, pursuant to the UN Security Council Resolutions 1368, 1373, and 1377 (2001), new security threats were identified and needs to fight against international terrorism were stressed. In the Czech Republic, a complex approach and broad institutional co-operation including inputs of scientific research (including authors involvement) to analyse endangered critical infrastructures and respective countermeasures had led to strengthening national measures in implementing respective international agreements dealing with WMD non-proliferation under deepening the co-operation within EU and NATO. The concrete complex programme of harmonised effort of all state organs in combating international terrorism resulted in the Czech National Action Plan on Combating Terrorism (2002). This (yearly updated) binding political document (issued by the Czech Government) identifies threats to all sectors of society and contains agreed harmonised active measures to be undertaken by involved organisations and institutions in all aspects of prevention, repression, protection, rescue and recovery for cases of terrorist attacks. The contents and respective measures are presented and discussed in detail with special emphasis on the aspects of CBRNE terrorism and role of Integrated Rescue System.(author)

  4. Typology in pollination biology: Lessons from an historical critique

    Directory of Open Access Journals (Sweden)

    Andreas Erhardt

    2011-03-01

    Full Text Available Typological schemes that describe putative floral adaptations for pollinators have played a central role in pollination biology. In 1882 the prominent German botanist and Darwinist Hermann Müller commented critically on a precursor of modern versions of such “pollination syndromes” that had been developed by his Italian colleague Federico Delpino. Delpino also was a self-proclaimed Darwinist, but in fact adhered to teleology—explanation beyond nature. As a consequence he viewed his typology as reflecting a deeper ideal and thus as rigidly true, and rejected as unimportant any visitors to flowers that it did not predict. Although Müller also classified flowers as to pollinators, he considered such schemes to be fallible, and pondered what diversity and variation in floral visitors might mean. Müller’s comments, which we translate here, are of interest given that appeals to teleology have resurfaced from time to time in discussions of pollination syndromes, and more importantly because his warning against taking typological schemes too literally remains valid. Typology is a useful tool in biology, including pollination biology, but care must be taken that it does not replace nature as perceived reality.

  5. Personality heterogeneity in PTSD: distinct temperament and interpersonal typologies.

    Science.gov (United States)

    Thomas, Katherine M; Hopwood, Christopher J; Donnellan, M Brent; Wright, Aidan G C; Sanislow, Charles A; McDevitt-Murphy, Meghan E; Ansell, Emily B; Grilo, Carlos M; McGlashan, Thomas H; Shea, M Tracie; Markowitz, John C; Skodol, Andrew E; Zanarini, Mary C; Morey, Leslie C

    2014-03-01

    Researchers examining personality typologies of posttraumatic stress disorder (PTSD) have consistently identified 3 groups: low pathology, internalizing, and externalizing. These groups have been found to predict functional severity and psychiatric comorbidity. In this study, we employed Latent Profile Analysis to compare this previously established typology, grounded in temperament traits (negative emotionality; positive emotionality; constraint), to a novel typology rooted in interpersonal traits (dominance; warmth) in a sample of individuals with PTSD (n = 155). Using Schedule for Nonadaptive and Adaptive Personality (SNAP) traits to create latent profiles, the 3-group temperament model was replicated. Using Interpersonal Circumplex (IPC) traits to create latent profiles, we identified a 4-group solution with groups varying in interpersonal style. These models were nonredundant, indicating that the depiction of personality variability in PTSD depends on how personality is assessed. Whereas the temperament model was more effective for distinguishing individuals based on distress and comorbid disorders, the interpersonal model was more effective for predicting the chronicity of PTSD over the 10 year course of the study. We discuss the potential for integrating these complementary temperament and interpersonal typologies in the clinical assessment of PTSD. 2014 APA

  6. Management of the Extreme Events: Countering International Terrorism

    Directory of Open Access Journals (Sweden)

    Dr. Cristian Barna

    2011-12-01

    Full Text Available After the terrorism attacks of September 11, 2001, there is recognition by both the public and private sectors that one needs to rethink our strategy for dealing with these low probability but extreme consequence events. September 11, 2001 attacks against the United States raised numerous questions related to counter-terrorism, foreign policy, as well as national security in the United States and abroad. They also raised the fundamental question of who should pay for losses due to terrorism.The question of who should pay for terrorism risk prevention and sustainable coverage within a country is likely to be seen first as a matter of collective responsibility that each country has to consider – a societal choice

  7. Psychological profile of sasang typology: a systematic review.

    Science.gov (United States)

    Chae, Han; Park, Soo Hyun; Lee, Soo Jin; Kim, Myoung-Geun; Wedding, Danny; Kwon, Young-Kyu

    2009-09-01

    A systematic review of studies related to the psychological characteristics of Sasang types was conducted with the goal of delineating generalizable psychological profiles based on Sasang typology, a traditional Korean medical typology with medical herbs and acupuncture that is characterized as personalized medicine. Journal articles pertaining to Sasang typology were collected using five electronic database systems in Korea and in the USA. As a result, 64 potentially relevant studies were identified and 21 peer-reviewed research articles that employed psychometric inventories were included. Beginning with the use of the Minnesota Multiphasic Personality Inventory in 1992, Myers-Briggs Type Indicator, NEO-Personality Inventory, Temperament and Character Inventory and other personality assessment tools were employed in the identified studies. Because data synthesis could not be carried out due to the heterogeneity of the studies, the present review article sought to delineate the mutual relevance of the studies based on research results pertaining to the correlation between the aforementioned psychological assessment instruments. Results of the review indicate that two super-factors, Extraversion and Neuroticism, serve as the foundation in regards to delineating personality constructs, such that the So-Yang type scored high on the Extraversion dimension and low on the Neuroticism dimension, while the So-Eum type scored low on the Extraversion dimension and high on the Neuroticism dimension. The present systematic review indicates that Sasang typology shares similarities with the Western psychological tradition.

  8. The Politics of Terrorism: Power, Legitimacy, and Violence

    Directory of Open Access Journals (Sweden)

    Richard A. Couto

    2010-03-01

    Full Text Available This paper examines and juxtaposes discourses about terrorism, violence, and political leadership. It presents generalizations about terrorism—a form of political violence by, for, and against the state—and politics and violence based on the theories of Max Weber and Hannah Arendt. The stark contrasts drawn from these theories include power as non-violent strength (Arendt versus power as violence-dependent (Weber and the struggle for legitimacy between different agents (states and individuals as well as terrorism by, for, and against the state. This reframing of power leads to judging a lack of power where there is violence, and the presence of power where one observes non-violence. An examination of political and criminal violence leads to questions about deliberate and purposeful violence, indirect and structural violence that has political consequences, and their relationship to terrorism. It expands the application of terrorism to include indirect structural violence by indicating its relationship to direct violence, not only in traditionally-viewed terrorist action but in the ignored terror of, for example, inner cities. Terrorism has many forms by many actors. To synthesize the results of these lines of reasoning leads to a conclusion with considerable implications for politics and for political leadership. The politics of terrorism suggest a central counter-terrorist approach: de-politicizing the violence of terrorists whenever possible and using the authority and power of the state to institutionalize it as criminal violence. This, in turn, also means politicizing other forms of violence, such as capital punishment, and their indirect and structural forms, such as the inner city.

  9. Defining and Theorizing Terrorism: A Global Actor-Centered Approach

    Directory of Open Access Journals (Sweden)

    Omar Lizardo

    2015-08-01

    Full Text Available Arriving at a consensual definition of the phenomenon of terrorism has been a particularly difficult undertaking. Some definitions are either too specific or too vague, concentrating on some essential “terrorist” aspect of the actions, strategies, or types of non-state organizations that engage in terrorism. In this paper I draw on global approaches from international relations and world systems theories to propose a definition of terrorism that skirts these issues by concentrating on terrorist actors rather than terrorist behavior. I argue that this approach has several advantages, including the dissolution of several empirical and analytical problems produced by more essentialist definitions, and the location of terrorism within a two dimensional continuum of collective-violence phenomena in the international system which discloses important theoretical insights. I proceed to examine the characteristics of terrorism by comparing it with other forms of violence in the international system. I propose that terrorism may be part of the cycles and trends of unrest in the world system, responding to the same broad families of global dynamics as other forms of system-level conflict.

  10. A dynamical model of terrorism

    Directory of Open Access Journals (Sweden)

    Firdaus Udwadia

    2006-01-01

    Full Text Available This paper develops a dynamical model of terrorism. We consider the population in a given region as being made up of three primary components: terrorists, those susceptible to both terrorist and pacifist propaganda, and nonsusceptibles, or pacifists. The dynamical behavior of these three populations is studied using a model that incorporates the effects of both direct military/police intervention to reduce the terrorist population, and nonviolent, persuasive intervention to influence the susceptibles to become pacifists. The paper proposes a new paradigm for studying terrorism, and looks at the long-term dynamical evolution in time of these three population components when such interventions are carried out. Many important features—some intuitive, others not nearly so—of the nature of terrorism emerge from the dynamical model proposed, and they lead to several important policy implications for the management of terrorism. The different circumstances in which nonviolent intervention and/or military/police intervention may be beneficial, and the specific conditions under which each mode of intervention, or a combination of both, may be useful, are obtained. The novelty of the model presented herein is that it deals with the time evolution of terrorist activity. It appears to be one of the few models that can be tested, evaluated, and improved upon, through the use of actual field data.

  11. Discussing Terrorism: A Pupil-Inspired Guide to UK Counter-Terrorism Policy Implementation in Religious Education Classrooms in England

    Science.gov (United States)

    Quartermaine, Angela

    2016-01-01

    My research into pupils' perceptions of terrorism and current UK counter-terrorism policy highlights the need for more detailed and accurate discussions about the implementation of the educational aims, in particular those laid out by the Prevent Strategy. Religious education (RE) in England is affected by these aims, specifically the challenging…

  12. A Criminal Law Approach to Terrorism in Brazil

    Science.gov (United States)

    2014-12-01

    2 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram Como Age a Rede do Terror Islamico no Brasil” [Exclusive: Documents from CIA, FBI...exclusivo-documentos-da-cia-fbi-e-pf-mostram-como-age-a- rede - do-terror-islamico-no-brasil. 3 Ibid. 4 Brazilian Federal Government,” Legislacao/Lei 7170/83...60 Ibid. 61 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram como Age a Rede do Terror Islamico no Brasil.” April

  13. On the origin of domestic and international terrorism

    OpenAIRE

    Kis-Katos, Krisztina; Liebert, Helge; Schulze, Günther G.

    2010-01-01

    We analyze the determinants of the origin of domestic and international terrorism in a large panel data set of 159 countries spanning from 1970 to 2007. We show that terror increases with GDP per capita, a higher POLITY score measuring a more open and competitive political system and experiences of domestic conflict, anarchy and regime transitions. Our evidence thus contradicts the notion that terrorism is rooted in economic deprivation or that strongly autocratic regimes breed more terrorist...

  14. BIOLOGICAL TERRORISM: THE NOTION, ESSENCE AND MAIN AREAS OF COUNTER

    Directory of Open Access Journals (Sweden)

    Julia Sarankina

    2016-10-01

    Full Text Available The article issued theoretical and practice problems of combating terrorism in current conditions, in particular, analyzes the concept of bio-terrorism as a form of terrorism, we investigate its nature, characteristics, and also referred to the major directions of countering.

  15. Security Guards and Counter-terrorism: Tourism and Gaps in Terrorism Prevention

    Directory of Open Access Journals (Sweden)

    Luke Howie

    2014-11-01

    Full Text Available Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terrorism preparedness exists. I argue that protecting tourism destinations is only possible if consideration is given the effectiveness of security guards and understanding that their well-being will impact upon their ability to deliver security. I want to draw attention to the often ignored social role of security guards. On 9/11, 42 security guards died whilst helping save the lives of thousands. They performed their jobs admirably, despite being low-paid, under-appreciated workers. In this paper I explore the social role of security guards in the context of tourism security. By drawing on representations of security guards in popular culture and reports on the state of the security guard industry. I argue that the lack of attention on the quality and well-being of guards is a significant black-spot in tourism security and terrorism preparedness.

  16. The human rights and the terrorism

    Directory of Open Access Journals (Sweden)

    Hamidreza Rafiei Fanood

    2016-12-01

    Full Text Available Regarding Human rights has been emphasized by governments through universal declaration human rights and its violations faced the global reaction in any case. From this perspective; the necessity of observing human rights against terrorism has been emphasized by many resolutions of the General Assembly, the Security Council and many regional resolutions. But, today especially after the September 11 events and America unilateral attacks by resorting to human rights and of course by considering the lack of international agreement on the norms, strategies and principles of human rights, the campaign against terrorism has started on the basis of its obligations, regardless to existing norms. So it would be said that today; the war against terrorism more than any other terrorist attacks threatens the security and human rights. However, human rights framework has never prevented effective and legitimate actions to the terrorist attacks. In other words; in the human right framework, there is no conflict with the campaign against terrorism, it emphasizes on identifying and fighting and even it guarantees the effectiveness of such a fight. As a result, Human rights violations at the expense of security, certainly associated with the destruction of both.

  17. Terrorism and anti-terror legislation - the terrorised legislator? A comparison of counter-terrorism legislation and its implications on human rights in the legal systems of the United Kingdom, Spain, Germany, and France

    NARCIS (Netherlands)

    Oehmichen, Anna

    2009-01-01

    The thesis deals with the history of terrorism and counter-terrorism legislation, focussing on the legislation in the UK, Spain, Germany and France, in the last 30 years, and analysing its compatibility with national and European human rights standards.

  18. A typology of cross-border patient mobility.

    Science.gov (United States)

    Glinos, Irene A; Baeten, Rita; Helble, Matthias; Maarse, Hans

    2010-11-01

    Based on systematic observation and analysis of available evidence, we propose a typology of cross-border patient mobility (rather than the so-called 'medical tourism') defined as the movement of a patient travelling to another country to seek planned health care. The typology is constructed around two dimensions based on the questions 'why do patients go abroad for planned health care?' and 'how is care abroad paid for?' Four types of patient motivations and two funding types have been identified. Combined in a matrix, they make eight possible scenarios of patient mobility each illustrated with international examples. Copyright © 2010 Elsevier Ltd. All rights reserved.

  19. An organizational typology for self-help groups.

    Science.gov (United States)

    Schubert, M A; Borkman, T J

    1991-10-01

    Those investigating the nature and functioning of self-help groups have been handicapped by the lack of a conceptual framework to bridge the diversity among such groups as well as to clarify the boundaries between consumer-owned and professionally owned groups. This paper describes a typology that classifies local units of these groups in terms of differences and similarities in their organizational structures. Rooted in organizational theory, it has two dimensions: external dependence upon resources and internal extent of experiential authority. Using it, the authors identified five types of groups, referred to as Unaffiliated, Federated, Affiliated, Hybrid, and Managed. The typology was validated with actual groups.

  20. Religiosity and reactions to terrorism.

    Science.gov (United States)

    Adamczyk, Amy; LaFree, Gary

    2015-05-01

    Although many of the world's most serious outbreaks of conflict and violence center on religion, social science research has had relatively little to say about religion's unique role in shaping individuals' attitudes about these events. In this paper we investigate whether Americans' religious beliefs play a central role in shaping attitudes toward the continuing threat of terrorism and their willingness to assist officials in countering these perceived threats. Our analysis of an original data collection of almost 1600 Americans shows that more religious respondents are more likely to express concerns about terrorism. However, this relationship is mediated by their level of conservatism. We also find that more religious respondents are more likely to claim that they will assist government officials in countering terrorism. This relationship remained even after accounting for conservatism, and people's general willingness to help police solve crimes like breaking and entering. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Understanding and Teaching the Semantics of Terrorism: An Alternative Perspective.

    Science.gov (United States)

    Long, Kenneth J.

    1990-01-01

    Critiques conventional definitions of terrorism. Advocates sensitizing students to the semantics of terrorism and teaching skepticism of leaders who manipulate such concepts. Recommends using historical case studies to clarify issues, inform students about state and state-sponsored terrorism, and challenge students' preconceptions. Includes a…

  2. 75 FR 30106 - Terrorism Risk Insurance Program; Litigation Management Submissions

    Science.gov (United States)

    2010-05-28

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Litigation Management Submissions... U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program Office is seeking comments... or by mail (if hard copy, preferably an original and two copies) to: Terrorism Risk Insurance Program...

  3. 75 FR 58468 - Terrorism Risk Insurance Program; Program Loss Reporting

    Science.gov (United States)

    2010-09-24

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Program Loss Reporting AGENCY: Departmental Offices, Terrorism Risk Insurance Program Office, Treasury. ACTION: Notice and request for... 1995, Public Law 104-13 (44 U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program...

  4. A Typology of Marital Quality of Enduring Marriages in Israel

    Science.gov (United States)

    Cohen, Orna; Geron, Yael; Farchi, Alva

    2010-01-01

    This article presents a typology of enduring marriages of Israeli couples married for at least 40 years. Based on the view that marital quality is a multidimensional phenomenon, the typology is derived from a cluster analysis of responses of husbands and wives in 51 couples to the ENRICH scale items. Three types of enduring marriages were found:…

  5. Improbable Success: Risk Communication and the Terrorism Hazard

    Science.gov (United States)

    2010-03-01

    never aspired to be anything more than a bureaucratic construct partnered with the media. It has taken years to fully understand the unintended...terrorism plan. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP /(3273BD3F76A7A5DEDA E36942A54D7D90)~National+Counter-Terrorism+Plan+- +Alert+System...Australian Government National Security. (2009a). National Counter-Terrorism Alert System Fact Sheet. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP

  6. On the interaction of Linguistic Typology and Functional Grammar

    DEFF Research Database (Denmark)

    Rijkhoff, J.

    2002-01-01

    of adjectives as a distinct word class. Conversely it will be shown that facts from many different languages have played an important role in the development of a layered model of the noun phrase in Functional Grammar and how currently these facts are used to test hypotheses concerning parallels between NPs...... empirical research in a wide variety of languages as practiced in the context of linguistic typology and one particular theory, Simon Dik's theory of Functional Grammar. In my view, the relationship between Functional Grammar and linguistic typology is an excellent example of the fruitful combination...... of theory driven data collection and data driven hypothesis formation. Furthermore, typological facts do not only serve to confirm the theory of Functional Grammar, but they also serve as a heuristics for an extension of the theory.Research conducted within the wider theoretical framework of Dik...

  7. The race for Muslim hearts and minds : a social movement analysis of the U.S. war on terror and popular support in the Muslim world

    OpenAIRE

    Dumas, James M.

    2010-01-01

    According to conventional wisdom winning hearts and minds is one of the most important goals for defeating terrorism. However, despite repeated claims about U.S. efforts to build popular support as part of the war on terror during the first seven years after 9/11, a steady stream of polls and surveys delivered troubling news. Using a counterinsurgency and social movement informed approach, I explain why the United States performed poorly in the race for Muslim hearts and minds, with a specifi...

  8. The Need for a United Nations Global Counter-Terrorism Coordinator

    Directory of Open Access Journals (Sweden)

    Howard Stoffer

    2013-08-01

    Full Text Available The case for a high level United Nations (UN Counter-Terrorism Coordinator position within the UN system has become increasingly urgent in 2013. This need has diluted some Member State reticence to creating a new Assistant Secretary-General position that would supervise and manage the existing counter-terrorism structures in the UN system. A Coordinator would have a basic responsibility to keep track of all of the activities of many formal inter-governmental organisations operating at the international, regional and sub-regional level and would also work closely with national counter-terrorism focal points. In this Policy Brief, Dr. Howard Stoffer reviews the debate among Security Council and Fifth Committee members about the efficacy of establishing a senior UN Global Counter-Terrorism Coordinator. He argues that the creation of such a position could lead to a restructuring of the UN counter-terrorism architecture as well as its funding within the UN budget and among donors. The position would eventually make the UN overall counter-terrorism effort, under the UN Global Counter-Terrorism Strategy, a stronger, more effective and more efficient process with measurable impact on the ground among Member States.

  9. Research on Visual Analysis Methods of Terrorism Events

    Science.gov (United States)

    Guo, Wenyue; Liu, Haiyan; Yu, Anzhu; Li, Jing

    2016-06-01

    Under the situation that terrorism events occur more and more frequency throughout the world, improving the response capability of social security incidents has become an important aspect to test governments govern ability. Visual analysis has become an important method of event analysing for its advantage of intuitive and effective. To analyse events' spatio-temporal distribution characteristics, correlations among event items and the development trend, terrorism event's spatio-temporal characteristics are discussed. Suitable event data table structure based on "5W" theory is designed. Then, six types of visual analysis are purposed, and how to use thematic map and statistical charts to realize visual analysis on terrorism events is studied. Finally, experiments have been carried out by using the data provided by Global Terrorism Database, and the results of experiments proves the availability of the methods.

  10. Development and validation of the coping with terror scale.

    Science.gov (United States)

    Stein, Nathan R; Schorr, Yonit; Litz, Brett T; King, Lynda A; King, Daniel W; Solomon, Zahava; Horesh, Danny

    2013-10-01

    Terrorism creates lingering anxiety about future attacks. In prior terror research, the conceptualization and measurement of coping behaviors were constrained by the use of existing coping scales that index reactions to daily hassles and demands. The authors created and validated the Coping with Terror Scale to fill the measurement gap. The authors emphasized content validity, leveraging the knowledge of terror experts and groups of Israelis. A multistep approach involved construct definition and item generation, trimming and refining the measure, exploring the factor structure underlying item responses, and garnering evidence for reliability and validity. The final scale comprised six factors that were generally consistent with the authors' original construct specifications. Scores on items linked to these factors demonstrate good reliability and validity. Future studies using the Coping with Terror Scale with other populations facing terrorist threats are needed to test its ability to predict resilience, functional impairment, and psychological distress.

  11. Health administrative data can be used to define a shared care typology for people with HIV.

    Science.gov (United States)

    Kendall, Claire E; Younger, Jaime; Manuel, Douglas G; Hogg, William; Glazier, Richard H; Taljaard, Monica

    2015-11-01

    Building on an existing theoretical shared primary care/specialist care framework to (1) develop a unique typology of care for people living with human immunodeficiency virus (HIV) in Ontario, (2) assess sensitivity of the typology by varying typology definitions, and (3) describe characteristics of typology categories. Retrospective population-based observational study from April 1, 2009, to March 31, 2012. A total of 13,480 eligible patients with HIV and receiving publicly funded health care in Ontario. We derived a typology of care by linking patients to usual family physicians and to HIV specialists with five possible patterns of care. Patient and physician characteristics and outpatient visits for HIV-related and non-HIV-related care were used to assess the robustness and characteristics of the typology. Five possible patterns of care were described as low engagement (8.6%), exclusively primary care (52.7%), family physician-dominated comanagement (10.0%), specialist-dominated comanagement (30.5%), and exclusively specialist care (5.2%). Sensitivity analyses demonstrated robustness of typology assignments. Visit patterns varied in ways that conform to typology assignments. We anticipate this typology can be used to assess the impact of care patterns on the quality of primary care for people living with HIV. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. El cine de terror español

    OpenAIRE

    Gómez Llorente, Tatiana

    2015-01-01

    La autora comienza haciendo un estudio del cine de terror desde sus inicios, sus subgéneros, mecanimos utilizados para provocar el miedo en el espectador para finalmente centrarse en el cine de terror español a través de cinco películas representativas del género.

  13. Youth, Terrorism and Education: Britain's Prevent Programme

    Science.gov (United States)

    Thomas, Paul

    2016-01-01

    Since the 7/7 bombings of July 2005, Britain has experienced a domestic terror threat posed by a small minority of young Muslims. In response, Britain has initiated "Prevent," a preventative counter-terrorism programme. Building on previous, general critiques of Prevent, this article outlines and critically discusses the ways in which…

  14. Typology of customer driven manufacturing

    NARCIS (Netherlands)

    Wortmann, J.C.; Wortmann, J.C.; Muntslag, D.R.; Timmermans, P.J.M.

    1997-01-01

    The aim of this chapter has been to introduce a variety of customer driven manufacturing situations. This variety has been placed in a two-dimensional grid, which constitutes a typology. For some of these types, production management issues were discussed in section 6.3. It was concluded that an

  15. A Typology of Black Leadership.

    Science.gov (United States)

    Tryman, Donald L.

    1977-01-01

    A leadership typology is developed which describes the relationship of Black leadership styles to the Black masses. The role that such leadership plays in the political integration of Blacks as an ethnic group is analyzed. Four authority types are discussed: traditional brokerage, cultural nationalist, religious nationalist, and faddist…

  16. Factorial versus Typological Models: A Comparison of Methods for Personality Data

    Science.gov (United States)

    von Davier, Matthias; Naemi, Bobby; Roberts, Richard D.

    2012-01-01

    This article describes an exploration of the distinction between typological and factorial latent variables in the domain of personality theory. Traditionally, many personality variables have been considered to be factorial in nature, even though there are examples of typological constructs dating back to Hippocrates. Recently, some…

  17. A Study of Terrorism Emergency Preparedness Policies in School Districts

    Science.gov (United States)

    Umoh, Emmanuel

    2013-01-01

    The threat of terrorism is a concern in public facilities including schools. This study focused on school districts in a southwestern state. Terrorism emergency preparedness policies are well-documented as measures to protect students and staff in school districts from terrorism threats and vulnerabilities. However, those threats and…

  18. The problems of informational terrorism in African countries

    Directory of Open Access Journals (Sweden)

    Voznyuk Eugenia Vasylivna

    2017-12-01

    Full Text Available The features of informational terrorism in African countries, especially in SADC countries, are analyzed as well as the ways to combat information terrorism in this region. The major issues related to information terrorism are highlighted, which include data exfiltration, social engineering, insider threats, database breaches as well as poor identity and access management. The essence of Computer Security (Cyber Security is revealed and its main tasks are characterized: accessibility, integrity, including authenticity and confidentiality. The main threats for cyberspace are distinguished.

  19. Modeling a Strategy for the War on Terrorism

    National Research Council Canada - National Science Library

    Henderson, Darral

    2002-01-01

    .... This paper discusses a strategy for conducting the war on terrorism in terms of a system and how that strategy must be adjusted over the long-term to compensate for fluctuating components of the war on terrorism...

  20. Nuclear terrorism

    International Nuclear Information System (INIS)

    2002-01-01

    Recent reports of alleged terrorist plans to build a 'dirty bomb' have heightened longstanding concerns about nuclear terrorism. This briefing outlines possible forms of attack, such as: detonation of a nuclear weapon; attacks involving radioactive materials; attacks on nuclear facilities. Legislation addressing these risks and the UK's strategy for coping with them are also considered

  1. Terrorism and poverty: double trouble for macroeconomic ...

    African Journals Online (AJOL)

    This article investigates poverty and terrorism as allies in hindering economic growth in African countries. This study uses data for 22 African countries from 1970 to 2013 i.e. 44 years. Data for terrorism, poverty and national income is taken from GTD and WDI. Panel cointegration techniques of dynamic fixed effect, mean ...

  2. Terrorism as a Social and Legal Phenomenon

    Science.gov (United States)

    Serebrennikova, Anna; Mashkova, Yekaterina

    2017-01-01

    This article examines the concept of terrorism as a social and legal phenomenon, its international legal and criminal-legal characteristics. Highlighted are the main aspects of cooperation of the states and the international community to counter terrorist activities. Terrorism as a social phenomenon is determined by paragraph 1 of article 3 of the…

  3. Typological and Integrative Models of Sexual Abuse

    Directory of Open Access Journals (Sweden)

    Demidova L.Y.,

    2014-11-01

    Full Text Available We discuss the basic typological and integrative theoretical models that explain the occurrence of child sexual abuse and the differences detected among the perpetrators of crimes against sexual integrity of minors. A comprehensive review of the theoretical concepts of sexual abuse in our country, in fact has not been carried out, and in this paper for the first time we made such an attempt. It is shown that the existing notions of sexual abuse largely overlap each other, but each of the models somehow takes into account the factors not explicitly addressed in other concepts. Systematic consideration of the theoretical models of sexual abuse can generalize and systematize the available data on the mechanisms of pedophile behavior. This review provides an opportunity to develop a new benchmark in the study of sexual abuse, get closer to building the most accurate and comprehensive model. In turn, this may contribute to solving the questions about the factors, dynamics, and the prevention of criminal sexual conduct against children

  4. Perceived coping & concern predict terrorism preparedness in Australia

    Directory of Open Access Journals (Sweden)

    Stevens Garry

    2012-12-01

    Full Text Available Abstract Background In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Methods Adults in New South Wales (NSW completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI in 2010 (N=2038. Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Results Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR=2.07, p=0.001 learning evacuation plans (AOR=1.61, p=0.05, establishing emergency contact plans (AOR=2.73, p Conclusion The findings of this study suggest that terrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and

  5. On the Concept and Definition of Terrorism Risk.

    Science.gov (United States)

    Aven, Terje; Guikema, Seth

    2015-12-01

    In this article, we provide some reflections on how to define and understand the concept of terrorism risk in a professional risk assessment context. As a basis for this discussion we introduce a set of criteria that we believe should apply to any conceptualization of terrorism risk. These criteria are based on both criteria used in other areas of risk analysis and our experience with terrorism risk analysis. That is, these criteria offer our perspective. We show that several of the suggested perspectives and definitions have weaknesses in relation to these criteria. A main problem identified is the idea that terrorism risk can be conceptualized as a function of probability and consequence, not as a function of the interactions between adaptive individuals and organizations. We argue that perspectives based solely on probability and consequence should be used cautiously or not at all because they fail to reflect the essential features of the concept of terrorism risk, the threats and attacks, their consequences, and the uncertainties, all in the context of adaptation by the adversaries. These three elements should in our view constitute the main pillars of the terrorism risk concept. From this concept we can develop methods for assessing the risk by identifying a set of threats, attacks, and consequence measures associated with the possible outcome scenarios together with a description of the uncertainties and interactions between the adversaries. © 2015 Society for Risk Analysis.

  6. Systems Approach to Terrorism: Countering the Terrorist Training Subsystem

    Science.gov (United States)

    2006-12-01

    37 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich, (Washington D.C.: Woodrow...52 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich (Washington D.C.: Woodrow Wilson Center...Hitler?” in Mass Hate: the Global Rise of Genocide and Terror (New York , London: Plennium Press), p.165 55 Albert Bandura p.45 56 Ibid. 32 As

  7. International Terrorism and Mental Health: Recent Research and Future Directions

    Science.gov (United States)

    Fischer, Peter; Ai, Amy L.

    2008-01-01

    International terrorism has become a major global concern. Several studies conducted in North America and Europe in the aftermath of terrorist attacks reveal that international terrorism represents a significant short-term and long-term threat to mental health. In the present article, the authors clarify the concept and categories of terrorism and…

  8. ADDRESSING THE SPECTRE OF CYBER TERRORISM: A COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2012-08-01

    Full Text Available This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.

  9. A Typology of Political Participation Online

    DEFF Research Database (Denmark)

    Dutceac Segesten, Anamaria; Bossetta, Michael

    2017-01-01

    This study investigates how, and to what extent, citizens use Twitter as a platform for political mobilization in an electoral context. Conceptualizing political participation as a process, we develop a typology of political participation designed to isolate mobilizing calls for action from...... the rest of the political discussion online. Based on Twitter data collected one week prior to the 2015 British general election, we then identify the top 100 most retweeted accounts using the hashtag #GE2015, classify them by actor type, and perform a content analysis of their Twitter posts according...... to our typology. Our results show that that citizens – not political parties – are the primary initiators and sharers of political calls for action leading up to the election. However, this finding is largely due to an uneven distribution of citizen-driven mobilizing activity. A small number of highly...

  10. Reframing domestic violence as torture or terrorism

    Directory of Open Access Journals (Sweden)

    Marcus Isabel

    2014-01-01

    Full Text Available This paper focuses on the analysis of the phenomenon of domestic violence and the distinctive features for which is it may be recognized as a specific form of torture and/or terrorism at home. The author provides an overview of the scientific debate among feminist authors on this conception which has given rise to an innovative approach to understanding the concept of domestic violence. Underscoring the substantive similarity of domestic violence with the acts of torture and/or terrorism, the author urges for state action arguing that domestic violence as a form of gender-based violence should be approached by applying the same logic and strategies which are employed in response to traditional torture and terrorism.

  11. The heterogeneity of socially isolated older adults: a social isolation typology.

    Science.gov (United States)

    Machielse, Anja

    2015-01-01

    Recent statistics show a growing number of older adults who are living alone and are socially isolated. It is against this background that, in recent years, many interventions have been developed to address social isolation among the elderly. Evaluative studies show that most interventions are hardly effective, though. An important reason for this is the heterogeneity of the socially isolated. This article offers insight into this heterogeneity by presenting a typology with different profiles of socially isolated older adults and the intervention implications of this typology. The typology is derived from an extensive qualitative study on socially isolated elderly individuals in the Netherlands. The typology imposes some degree of order to a diversity of circumstances, ambitions, and possibilities of the socially isolated elderly, thereby deepening the understanding of the heterogeneity of this population. The definition of social isolation used in this study starts from a societal angle of incidence, namely the current policy context of Western European welfare states, in which governments emphasize the importance of independence and self-reliance of their citizens. Developed from that perspective, the typology provides a theoretical basis for applying interventions aimed at increasing self-reliance of social isolated elderly. This perspective on social isolation also has consequences for the way in which the effectiveness of interventions to alleviate social isolation is assessed.

  12. Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?

    Science.gov (United States)

    Elbakidze, L; Jin, Y H

    2015-08-01

    Using transnational terrorism data from 1980 to 2000, this study empirically examines the relationships between frequency of participation in transnational terrorism acts and economic development and education improvement. We find an inverse U-shaped association between the frequency of various nationals acting as perpetrators in transnational terrorism acts and per capita income in their respective home countries. As per capita incomes increase from relatively low levels, frequencies of participation in transnational terrorism increase. However, at sufficiently higher levels of per capita income, further increase in per capita income is negatively associated with the rate of participation in transnational terrorism. Education improvement from elementary to secondary is positively correlated with frequency of participation in transnational terrorism events, whereas further improvement from secondary to tertiary level is negatively correlated with participation in transnational terrorism. We also find that citizens of countries with greater openness to international trade, lower degree of income inequality, greater economic freedom, larger proportion of population with tertiary education, and less religious prevalence participate in transnational terrorism events less frequently. © 2015 Society for Risk Analysis.

  13. Technical considerations in nuclear terrorism

    International Nuclear Information System (INIS)

    Velardo, G.

    2007-01-01

    Nuclear terrorism is an evil application of nuclear energy, in the same way that chemical and biological terrorism could be considered as the evil side of chemistry and biology. This paper presents two effects of nuclear terrorism. First, dirty bombs or radioactive bombs or radiological dispersion devices (RDDs), and second, crude atom bombs or improvised nuclear devices (INDs). The paper analyses as well the probabilities of an attack, its biological effects and nuclear risk. Experiments carried out so far indicate that the lethal effects produced by RDDs are likely the same that the effects produced by the chemical explosive used in the bomb. These type of bombs are rather bounded to generate panic and have implicit a high cost of decontamination. It will be described the measures to be adopted. INDs will be also considered. Uranium INDs by gun-method are more feasible to be made. They can be disassembled and their components transported to the target place. Plutonium INDs by the implosion-method are complex and required high precision technology. Their disassembly is very difficult

  14. Lessons from History for Counter- Terrorism Strategic Communications

    NARCIS (Netherlands)

    Ingram, H.J.; Reed, A.G.

    2016-01-01

    Drawing on the Counter-terrorism Strategic Communication (CTSC) Project’s research paper “A Brief History of Propaganda during Conflict“, this Policy Brief lays out the key policy-relevant lessons for developing effective counter-terrorism strategic communications. It presents a framework of

  15. Turkish Elementary School Students' Perceptions of Local and Global Terrorism

    Science.gov (United States)

    Aricak, Tolga; Bekci, Banu; Siyahhan, Sinem; Martinez, Rebecca

    2008-01-01

    Introduction: Historically, terrorism has occurred in various regions of the world and has been considered a local problem until the September, 11 terrorist attacks on the United States in 2001. After 9/11, terrorism has become a global concern. The definition of terrorism has changed from a violent act of a group of local people against their…

  16. Attachment Styles and Enneagram Types: Development and Testing of an Integrated Typology for use in Marriage and Family Therapy

    OpenAIRE

    Arthur, Kristin Bedow

    2008-01-01

    This study developed and tested a new typology for use in Marriage and Family Therapy. The typology was created by integrating two already established typologies currently in use in MFT, the attachment style typology and the Enneagram typology. The attachment typology is based on attachment theory, a theory of human development that focuses on how infants and adults establish, monitor and repair attachment bonds. Differences in attachment style are associated with different kinds of relations...

  17. International terrorism, a new challenge to modern Western society

    International Nuclear Information System (INIS)

    Hochleitner, E.

    2002-01-01

    Full text: The attacks of 9/11 against the WTC and the Pentagon have made western society aware of the threat potential, which international terrorism presents to the open and democratic societies of the West. The new international terrorism is substantially different from the traditional form terrorism, which our societies has experienced in the past. The arms of traditional terrorism were bombs and guns and the victims were mostly clearly defined targets and its political and ideological motives were known. The terrorists assumed responsibility and there was an interest and scope for political negotiation. Terrorist groups had a vertical structure with a hierarchy. The new international terrorism is organized in a horizontal way and its structure is amorphous. Terrorist groups act in an autonomous way and linked by a rather loose network. International terrorism makes full use of modern communication systems and seek to equip themselves with the best armament available including WMDs, provided they can get hold of them. Their target are no longer individuals, but the modern western society. They aim at a maximum number of victims in order to get maximum media attention and to destabilize the targeted society. The motives of terrorist groups are religious or ideological. A terrorist attack represents for those terrorists a religious, nearly sacral act, including self sacrifice. Today, the main challenge for the open, democratic and modern society represents the network of Islamic Fundamentalists. Islamic terrorism has been active mainly in Islamic countries with the aim to overthrow westernized forms of government, mainly in Egypt and Algeria. In the early 1990's, the network of Islamic terror groups has been built up and the al-Qaida was formed. AI-Qaida is a network of Islamic terror groups and a platform for co-operation and support of Islamic cells. It provides training, arms, finances, etc.. AI-Qaida supported the Taliban regime, which provided it with a

  18. Creative environments for design education and practice : A typology of creative spaces

    NARCIS (Netherlands)

    Thoring, K.C.; Desmet, P.M.A.; Badke-Schaub, P.G.

    2018-01-01

    This article presents a typology of creative spaces that is relevant to facilitating creative working and learning processes for designers. Drawing on qualitative user research with cultural probes in a design thinking institution, this typology identifies five different types of creative spaces

  19. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  20. A Typology of International Strategies for Hungarian Professional Sports Clubs

    Directory of Open Access Journals (Sweden)

    Miklos Kozma

    2016-03-01

    Full Text Available The objective of our research project was to examine how league strength explains the observed differences between the international strategies of professional sports clubs in Hungary. Three case studies were made primarily based on the content analysis of management interviews, cross-checked with data from sports databases and corporate documentation. Through our analysis we identified three types of international strategy followed by professional sports clubs in Hungary. The typology highlights the importance of having a competitive product professional clubs may bring to the international marketplace. Hence, governments and local municipalities are advised to focus their support on sports where there is a team with reasonable chance to win trophies at international level. For club managers, the implication is that strategic focus on improving service provision and sales is critical even if they receive windfall support from government.

  1. Tourism and Terror: a Case Study: Israel 1948-2012

    Directory of Open Access Journals (Sweden)

    Erik H. Cohen

    2014-11-01

    Full Text Available Israel is a popular tourist destination which has by afflicted by varying levels of terrorism against civilians over the course of its history. A longitudinal analysis of data pertaining to tourism and terrorism is undertaken to examine how terrorism affects patterns of tourism. It is found that on the macro-level, tourism to Israel continues to grow although it experiences periodic declines corresponding with times of high terrorist activity. National and religious subpopulations of tourists react differently terrorism at the destination. Overall, Jews are proportionally more likely than non-Jews to continue to visit Israel during times of conflict, but this varies among Diaspora communities. Moreover, among US Jewish tourist, the strongly religious populations represented a greater percentage of visitors during years of high terrorism. This preliminary analysis explores how internal structural features of the Jewish community (such as Jewish educational settings and family ties to Israelis, external factors of the home country (such as anti-Semitism or the economic situation and national and cultural value orientation affect tourism patterns. The impact of these factors on tourism deserves continued research.

  2. Information exchange in virtual communities: a typology

    Directory of Open Access Journals (Sweden)

    Gary Burnett

    2000-01-01

    Full Text Available While there is wide agreement that virtual communities - and other phenomena utilizing CMC technologies - have the capability to provide both interpersonal and informational interactions, the degree to which they can be seen as specifically information-oriented social spaces has been open to some question. Drawing upon theoretical and empirical work that emphasizes an environmental model of human information behaviour, a foundation is developed for a model of information exchange in virtual communities, and a typology of the varieties of information behaviour to be found in virtual communities is proposed. This typology will provide a mechanism for assessing the characteristics of virtual communities in terms of their support for information exchange, and has the potential to enhance our understanding of virtual communities as information environments.

  3. Radicalización ideológico-política y terrorismo: un enfoque psicosocial (Ideological-political radicalization and terrorism: a psychosocial approach

    Directory of Open Access Journals (Sweden)

    Jorge Torres-Marín

    2017-08-01

    Full Text Available Ideological-political radicalization and terrorism generate a series of disastrous consequences for the correct functioning of society. Nowadays, polarization and ideological-political radicalization are on the rise. Factors contributing to this are situations of social upheaval like the migratory and economic crisis, as well as terrorism of an ideological-religious nature. The proposal of effective preventive interventions requires a multidisciplinary and systematic study of the phenomenon, in which social psychology is destined to play a central role. The aim of the current revision is to compile a comprehensive proposal of a conceptual nature, which will illustrate the psychosocial processes underlying violent radicalization of groups with extreme political ideologies. Specifically, the aim is to highlight the suitability of analyzing a set of psychosocial variables, which play an essential role in an individual’s personal balance, related to terrorists’ recruitment and the maintenance of extremist groups. Likewise, and as a response to the need to consider new research perspectives when studying the terrorism phenomenon, the part of victimization and competitive victimization in explaining terrorism is analyzed. The findings suggest enough theoretical links to encourage the integration of these constructs in future research.

  4. The roots of terrorism: A reassessment after September 11th

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F.

    2002-01-01

    The brutal terrorist attacks of September 11th, the anthrax attacks that followed and growing knowledge of al Qaeda's pursuit of nuclear, biological and chemical weapons have not only intensified concerns about terrorism but also created doubts about our understanding of terrorism. These attacks were in many ways unprecedented, and ultimately raise the question of the roots or causes of terrorism. Historically and today, there have been divergent views on this question, which reflect philosophical, religious, political and other differences. These differences are not merely academic, as they can affect our understanding of both the threat and of responses to terrorism in the aftermath of September 1 1 th. Terrorism is too complex and diverse a phenomenon to speak easily of causes. But we may be able to discern the causes of specific acts. Our response to 9/11 and other acts of terrorism will be affected by our understanding of their causes, as well as by possible political requirements to address widespread perceptions of causes. If 9/11 was caused by Islamic radicalism, the near-term response must be to ensure the terrorists are defeated and pose no fiuther danger. In the longer term, education is critical. If the attacks were caused by US Middle East policies, the response should involve a review of those policies. This may or may not result in changes to policy, public diplomacy, etc. If the attacks were a backlash against globalization, the response must address the realities underlying anti-globalization sentiments. Addressing causes (real and perceived) will not in any case end terrorism, and addressing the wrong causes can be counterproductive. Actions to reduce those conditions that create support for terrorism and aid its recruitment effort are critical to any counterterrorism strategy. For this reason alone, we must do everything possible to understand the reasons terrorism may be undertaken, including the attacks of September 1 1 th. This paper will

  5. Counter-Terrorism, Technology and Transparency: Reconsidering State Accountability

    Directory of Open Access Journals (Sweden)

    Quirine Eijkman

    2012-02-01

    Full Text Available In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal information, biometrics, satellite technology and other forms of ICT technology used in the fight against terrorism. Although technology is a powerful tool to fight terrorism, it is also a means for increasing social control by the state. Henceforth, there is a risk that panoptic surveillance – where the few view the many – could develop. Therefore accountability in relation to use of technological counter-terrorism measures such as smart surveillance cameras, biometric devices or the tracking of personal data is discussed in this article. The extra powers that both public authorities and private companies gain through new (surveillance technologies should be counterbalanced. In this context the role of the state, because of its monopoly to use force and its duty to protect the rule of law, is crucial. By reconsidering how to enforce accountability by the state, the effects of technological counter-terrorism measures could be checked and balanced.

  6. Simple probabilistic method for relative risk evaluation of nuclear terrorism events

    International Nuclear Information System (INIS)

    Zhang Songbai; Wu Jun

    2006-01-01

    On the basis of the event-tree and probability analysis methods, a probabilistic method of nuclear terrorism risk was built, and the risk of terrorism events was analyzed. With the statistical data for and hypothetical data for relative events, the relative probabilities of the four kinds of nuclear terrorism events were obtained, as well as the relative risks of these four kinds of nuclear terrorism events were calculated by using this probabilistic method. The illustrated case show that the descending sequence of damages from the four kinds of nuclear terrorism events for single event is as following: nuclear explosive and improvised nuclear explosive, nuclear facility attacked, and 'dirty bomb'. Under the hypothetical condition, the descending sequence of possibilities for the four kinds of nuclear terrorism events is as following: 'dirty bomb', nuclear facility attacked, improvised nuclear explosive and nuclear explosive, but the descending sequence of risks is as following: 'dirty bomb', improvised nuclear explosive, nuclear facility attacked, and nuclear explosive . (authors)

  7. Terror Medicine As Part of the Medical School Curriculum

    Directory of Open Access Journals (Sweden)

    Leonard A Cole

    2014-09-01

    Full Text Available Terror medicine, a field related to emergency and disaster medicine, focuses on medical issues ranging from preparedness to psychological manifestations specifically associated with terrorist attacks. Calls to teach aspects of the subject in American medical schools surged after the 2001 jetliner and anthrax attacks. Although the threat of terrorism persists, terror medicine is still addressed erratically if at all in most medical schools. This paper suggests a template for incorporating the subject throughout a 4-year medical curriculum. The instructional framework culminates in a short course for fourth year students, such as one recently introduced at Rutgers New Jersey Medical School, Newark, NJ. The proposed 4-year Rutgers curriculum serves as a model that could assist other medical schools contemplating the inclusion of terror medicine in pre-clerkship and clerkship training.

  8. On immorality of terrorism and war

    OpenAIRE

    Čičovački Predrag

    2003-01-01

    The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others) who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable mora...

  9. 28 CFR 501.3 - Prevention of acts of violence and terrorism.

    Science.gov (United States)

    2010-07-01

    ... deterring future acts of violence or terrorism; (ii) That communications between the inmate and attorneys or... terrorism. 501.3 Section 501.3 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION SCOPE OF RULES § 501.3 Prevention of acts of violence and terrorism. (a) Upon...

  10. Conceptualising Terrorism: International Offence or Domestic Governance Tool?

    DEFF Research Database (Denmark)

    Aksenova, Marina

    2015-01-01

    This article argues that terrorism does not belong within the realm of international criminal law. On the surface, it is the lack of internationally agreed definition of terrorism and its domestic law origins that set it apart from the notions of crimes against humanity, war crimes and genocide...

  11. A Comparative Typology of Pension Regimes

    NARCIS (Netherlands)

    Arjan Soede; Cok Vrooman

    2008-01-01

    This report presents an empirical typology of pension regimes in the European Union, the US, Canada, Australia and Norway. The categorisation is based on 34 quantitative and qualitative characteristics of the mandatory parts of the pension systems in these countries. The empirical analysis shows

  12. Perceived coping & concern predict terrorism preparedness in Australia.

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Jones, Alison L; Barr, Margo; Raphael, Beverley

    2012-12-27

    In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Adults in New South Wales (NSW) completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI) in 2010 (N=2038). Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR)=2.07, p=0.001) learning evacuation plans (AOR=1.61, p=0.05), establishing emergency contact plans (AOR=2.73, pterrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and incident-specific preparedness and could form an integral element of community resilience strategies

  13. A Typology of Engineering Designs in Problem-Based Projects

    DEFF Research Database (Denmark)

    Larsen, Samuel Brüning; Bigum, Per Valentin

    include a set of general characteristics of great engineering solutions and a typology of three solution archetypes. The study labels these archetypes as 1) the adapted solution, 2) the “either/or”-solution, and 3) the multiple-elements solution. For each archetype, the paper specifies the corresponding...... class of problems that the archetype can logically address. In addition, the paper delineates (1) how each archetype relates to a project’s analysis and (2) how each archetype is evaluated, implemented and operated. The typology aids both students and project supervisors in conducting reports...

  14. TOURISM AND TERRORISM: A WORLDWIDE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Cristina Elena ALBU

    2016-03-01

    Full Text Available We live in a society marked by major changes in the tourism field. Tourist destinations make all possible efforts to best promote their tourist offer and attract as different tourist categories as there might be. However, these tourist destinations are sometimes associated with terrorist attacks that can turn a famous tourist area into a highly avoided one. Terrorism may be permanently detrimental to a tourist destination on both social and economic levels. The purpose of this paper is to highlight the impact that terrorist attacks have on tourism around the globe. The research method used for the achievement of this article is documentary research. Through the proportions and forms that it has taken, terrorism has become one of the more and more active and threatening calamities that affect the international community. For some organizations, terrorism has become a means of solving their political, cultural and religious problems, taking tourism as a niche through which they can carry out their targets.

  15. 174 THE MORALITY OF SUICIDE TERRORISM AND BOKO HARAM ...

    African Journals Online (AJOL)

    User

    philosophically consider the moral implication of suicide terrorism with particular .... define terrorism is political rather than theoretical. Brian Berkey (2010) is of ..... elements of relativism to the concept of morality because an. Islamic cleric who ...

  16. Cyber-Terrorism: Modem Mayhem

    National Research Council Canada - National Science Library

    White, Kenneth

    1998-01-01

    .... The arrival of the information age has created a new menace cyber terrorism. This threat recognizes no boundaries, requires minimal resources to mount an attack, and leaves no human footprint at ground zero...

  17. Racionalidad del terror

    Directory of Open Access Journals (Sweden)

    Sauquillo, Julián

    2012-06-01

    Full Text Available Contemporary terrorism is not an ancestral, irrational, oriental, phenomenon. Nor is it a fanatical reaction of the religions that vindicate a backward society as against the developed societies of the first world. The terrorism of today is a thoroughly modern phenomenon: one of the worst monstrosities of modern society, supplied with rational planning of objectives. A captious interpretation of the Islamic religion endows terrorism with a universal projection among the multitudinous audience of the discontented with the might of that diffuse power that we know as the developed Western world. Al Qaeda does not hesitate to present its war against the West as «a war without quarter» lasting until the infidel Christians are eliminated and the world is subjugated to Islam In the meantime, in a similar conflictive sense, the theoretical campaign of Samuel Huntington across the entire planet responds with a paradigmatic post-cold war, capable of inflaming the international conflict, in a sense no less belligerent with the Anti-Occident than that employed by the radical Imams. As has been pointed out by Amartya Sen, to give priority in this way to the religious identity, the response of the West to international terrorism in calling it «islamic terrorism» is very clumsy, as it magnifies the importance of the religious authorities in detriment to governmental ways and means in the solving of problems.

    El terrorismo contemporáneo no es un fenómeno ancestral, irracional y oriental. Tampoco es una reacción fanática de las religiones que reivindican una sociedad atrasada frente a las sociedades desarrolladas del primer mundo. El terrorismo actual es un fenómeno plenamente moderno: uno de los peores engendros de la sociedad moderna, dotado de una planificación racional de objetivos. Una interpretación capciosa de la religión islámica dota al terrorismo de una proyección universal entre la numerosa audiencia de descontentos con el poder

  18. Social capital and youth development: toward a typology of program practices.

    Science.gov (United States)

    Emery, Mary

    2013-06-01

    As part of our inquiry into how youth development and 4-H programming can affect the development of social capital for youth and for the community, we engaged youth in ripple mapping. Based on this information, we provide a typology of participation structures in youth development activities and the expected bridging and bonding social capital outcomes for each type. This article outlines the key factors underlying the typology and discusses strategies for using the typology to expand the impact of youth development and 4-H programming on young people and communities. It also outlines potential implications for increasing opportunities for fostering social capital leading to a spiraling-up effect for youth, volunteers, and the community. Copyright © 2013 Wiley Periodicals, Inc., A Wiley Company.

  19. The study of the attitude to terrorism in a gender context

    Directory of Open Access Journals (Sweden)

    Zhanserikova D. A.

    2017-12-01

    Full Text Available the concept of terrorism today is a very diverse phenomenon. Modern terrorism has recently acquired features of a global problem that requires close attention of the international community. It is well known that any society facing this problem will eventually change its attitude to this phenomenon. The article has discussed the questions concerning the formation of the attitude to terrorism and revealed empirical indicators of male and female attitude to terrorism. The results of the study allow to predict people's reactions to this negative phenomenon.

  20. Risk-based decision making for terrorism applications.

    Science.gov (United States)

    Dillon, Robin L; Liebe, Robert M; Bestafka, Thomas

    2009-03-01

    This article describes the anti-terrorism risk-based decision aid (ARDA), a risk-based decision-making approach for prioritizing anti-terrorism measures. The ARDA model was developed as part of a larger effort to assess investments for protecting U.S. Navy assets at risk and determine whether the most effective anti-terrorism alternatives are being used to reduce the risk to the facilities and war-fighting assets. With ARDA and some support from subject matter experts, we examine thousands of scenarios composed of 15 attack modes against 160 facility types on two installations and hundreds of portfolios of 22 mitigation alternatives. ARDA uses multiattribute utility theory to solve some of the commonly identified challenges in security risk analysis. This article describes the process and documents lessons learned from applying the ARDA model for this application.

  1. Differentiating the threat of radiological/nuclear terrorism: Motivations and constraints

    Energy Technology Data Exchange (ETDEWEB)

    Post, J M [Elliott School of International Affairs, George Washington University, Washington, DC (United States)

    2001-07-01

    Full text: Reviewing the spectrum of terrorist groups in terms of motivation, incentives and constraints, for nearly all groups, nuclear terrorism could be highly counter-productive. The constraints are particularly severe for large-scale mass casualty terrorism for groups that are concerned with their constituents--social revolutionary and nationalist separatist terrorists--although discriminate low level attacks are possible. Right-wing extremists, including individuals who are members of the right-wing virtual community of hatred, represent a distinct danger for low level discriminate attacks against their targets. Religious fundamentalist terrorist groups represent a particular threat, because they are not trying to influence the West but to expel Western modernizing influences. Moreover, they believe that their acts of violence are given sacred significance. The severe constraints against catastrophic terrorism for most groups argues for continuing to protect against the greatest danger - conventional terrorism - and to devote significantly increased resources to monitoring more closely the groups at greatest risk for nuclear terrorism. (author)

  2. Terrorism-related fear and avoidance behavior in a multiethnic urban population.

    Science.gov (United States)

    Eisenman, David P; Glik, Deborah; Ong, Michael; Zhou, Qiong; Tseng, Chi-Hong; Long, Anna; Fielding, Jonathan; Asch, Steven

    2009-01-01

    We sought to determine whether groups traditionally most vulnerable to disasters would be more likely than would be others to perceive population-level risk as high (as measured by the estimated color-coded alert level) would worry more about terrorism, and would avoid activities because of terrorism concerns. We conducted a random digit dial survey of the Los Angeles County population October 2004 through January 2005 in 6 languages. We asked respondents what color alert level the country was under, how often they worry about terrorist attacks, and how often they avoid activities because of terrorism. Multivariate regression modeled correlates of worry and avoidance, including mental illness, disability, demographic factors, and estimated color-coded alert level. Persons who are mentally ill, those who are disabled, African Americans, Latinos, Chinese Americans, Korean Americans, and non-US citizens were more likely to perceive population-level risk as high, as measured by the estimated color-coded alert level. These groups also reported more worry and avoidance behaviors because of concerns about terrorism. Vulnerable populations experience a disproportionate burden of the psychosocial impact of terrorism threats and our national response. Further studies should investigate the specific behaviors affected and further elucidate disparities in the disaster burden associated with terrorism and terrorism policies.

  3. Night Terrors (For Parents)

    Science.gov (United States)

    ... you tried. A night terror is a sleep disruption that seems similar to a nightmare , but is ... to: reduce your child's stress create a bedtime routine that's simple and relaxing make sure your child ...

  4. Managing terror: differences between Jews and Arabs in Israel.

    Science.gov (United States)

    Somer, Eli; Maguen, Shira; Or-Chen, Keren; Litz, Brett T

    2009-04-01

    Using telephone surveys, we examined exposure to terror, coping, and mental health response in randomly selected Jewish-Israelis (n = 100) and Arab-Israelis (n = 100) living in five Israeli cities affected by terrorism. Jewish-Israelis and Arab-Israelis were randomly selected for study participation and completed telephone surveys in May 2002, following an extended string of terror attacks and hostilities. Although terrorism is designed to target Jewish-Israelis, the rates of exposure were similar in the two groups. Arab-Israelis reported using a wider array of coping strategies, yet also endorsed more frequent PTSD and more severe depression symptoms than Jewish-Israelis. We examined a variety of demographic, ethnic, and religious predictors of different coping styles and found varying results. For example, acceptance coping was best predicted by Arab-Israeli ethnicity, being female, greater religiosity, and lower education. Predictors of mental health response to terror were also examined, with Arab-Israeli ethnicity, being female, adaptation coping and collaborative coping best predicting PTSD and depression symptoms. Arab-Israelis may not have the same access to overarching sources of patriotic support that are readily available to their Jewish compatriots, and civilian and economic inequity experienced by the Arab minority may add to a sense of diminished resources. Our findings justify outreach efforts to overlooked minorities at risk for posttraumatic distress. Women seem to be at particular risk for the development of mental health symptoms following terrorism, which should also be noted for outreach purposes.

  5. A Typology for Web 2.0

    DEFF Research Database (Denmark)

    Dalsgaard, Christian; Sorensen, Elsebeth Korsgaard

    2008-01-01

    Web 2.0 is a term used to describe recent developments on the World Wide Web. The term is often used to describe the increased use of the web for user-generated content, collaboration, and social networking. However, Web 2.0 is a weakly defined concept, and it is unclear exactly what kind...... of technologies it covers. The objective of the paper is to develop a typology that can be used to categorize Web 2.0 technologies. Further, the paper will discuss which of these technologies are unique to Web 2.0. Often, Web 2.0 is described by way of different kinds of software; for instance, blogs, wikis......, podcasts, RSS, and social networking sites. The problem with this type of description is that it fails to distinguish between different types or categories of technologies. As an alternative, the typology developed in the paper distinguishes between technologies on basis of, how - and in which contexts...

  6. The Double-Edged Effects of Social Media Terror Communication

    DEFF Research Database (Denmark)

    Nickel, Sandro

    2014-01-01

    This paper connects the effects of social media on terror/anti-terror communication with dynamics and consequences of surveillance. Citizens become via social media more independent from mass media and more interconnected. This is also valid when citizens engage in terror/anti-terror communication...... that social media contribute to extending surveillance: by being a temptation for intelligence services, by not resisting state authorities and via constructing threat perceptions among populations which in effect deliver security politicians ‘windows of opportunity’ in order to implement ever more....... However, via social media citizens also become targets of the ‘collect-it-all’ surveillance, which was revealed to the global public in 2013. I argue that due to such surveillance some citizens might start to censor themselves and that surveillance inflicts with a number of human rights. I further argue...

  7. Freedom of expression and the Ethiopian anti-terrorism proclamation

    African Journals Online (AJOL)

    Freedom of expression and the Ethiopian anti-terrorism proclamation: a comparative analysis. ... Though surveillance and interception undermine democracy, a mere suspicion of terrorism gives the National Intelligence and Security Service a power to conduct surveillance or intercept any type of communications.

  8. Militarized Maneuver Terrorism

    Science.gov (United States)

    2015-06-12

    striking the heart of the Indian tourism market and creating a siege in the Taj Mahal, it was certain to create a theater of terror. A drama played out... sport facilities, malls, movie theaters, and more. Grossman argues that American society has put forth enormous effort preparing and preventing harm to

  9. Dynamism and the erosion of procedural safeguards in international governance of terrorism

    NARCIS (Netherlands)

    N.T. Ali (Nathanael)

    2015-01-01

    markdownabstractAbstract Contemporary international governance of terrorism reflects a conceptualisation of terrorism as a global public problem that both affects and needs to be responded to by all sectors of global society. Consequently, counter-terrorism has taken the form of proactive risk

  10. A Typology for Charting Socioeconomic Mortality Gradients: "Go Southwest".

    Science.gov (United States)

    Blakely, Tony; Disney, George; Atkinson, June; Teng, Andrea; Mackenbach, Johan P

    2017-07-01

    Holistic depiction of time-trends in average mortality rates, and absolute and relative inequalities, is challenging. We outline a typology for situations with falling average mortality rates (m↓; e.g., cardiovascular disease), rates stable over time (m-; e.g., some cancers), and increasing average mortality rates (m↑; e.g., suicide in some contexts). If we consider inequality trends on both the absolute (a) and relative (r) scales, there are 13 possible combination of m, a, and r trends over time. They can be mapped to graphs with relative inequality (log relative index of inequality [RII]; r) on the y axis, log average mortality rate on the x axis (m), and absolute inequality (slope index of inequality; SII; a) as contour lines. We illustrate this by plotting adult mortality trends: (1) by household income from 1981 to 2011 for New Zealand, and (2) by education for European countries. Types range from the "best" m↓a↓r↓ (average, absolute, and relative inequalities all decreasing; southwest movement in graphs) to the "worst" m↑a↑r↑ (northeast). Mortality typologies in New Zealand (all-cause, cardiovascular disease, nonlung cancer, and unintentional injury) were all m↓r↑ (northwest), but variable with respect to absolute inequality. Most European typologies were m↓r↑ types (northwest; e.g., Finland), but with notable exceptions of m-a↑r↑ (north; e.g., Hungary) and "best" or southwest m↓a↓r↓ for Spain (Barcelona) females. Our typology and corresponding graphs provide a convenient way to summarize and understand past trends in inequalities in mortality, and hold potential for projecting future trends and target setting.

  11. Lessons from History for Counter-Terrorism Strategic Communications

    Directory of Open Access Journals (Sweden)

    Haroro J. Ingram

    2016-06-01

    Full Text Available Drawing on the Counter-terrorism Strategic Communication (CTSC Project’s research paper “A Brief History of Propaganda during Conflict“, this Policy Brief lays out the key policy-relevant lessons for developing effective counter-terrorism strategic communications. It presents a framework of interrelated macro-, mezzo- and micro-level considerations for maximizing the efficacy of not just a strategic communications campaign but message design. Historical examples are drawn upon to illustrate their practical application. The Policy Brief concludes by analysing four key strategic-policy principles arguing that a counter-terrorism strategic communications campaign is more likely to be successful if it is based on the cumulative effects of a multidimensional messaging strategy.

  12. Journals Supporting Terrorism Research: Identification and Investigation into Their Impact on the Social Sciences

    Science.gov (United States)

    Bullis, Daryl R.; Irving, Richard D.

    2013-01-01

    A citation analysis of two preeminent terrorism journals ("Terrorism and Political Violence" and "Studies in Conflict and Terrorism") was used to identify 37 additional social science journals of significant importance to terrorism research. Citation data extracted from the "Web of Science" database was used to…

  13. Tracking Typological Traits of Uralic Languages in Distributed Language Representations

    DEFF Research Database (Denmark)

    Bjerva, Johannes; Augenstein, Isabelle

    2018-01-01

    Although linguistic typology has a long history, computational approaches have only recently gained popularity. The use of distributed representations in computational linguistics has also become increasingly popular. A recent development is to learn distributed representations of language...... for model transfer between Uralic languages in deep neural networks. We then investigate which typological features are encoded in these representations by attempting to predict features in the World Atlas of Language Structures, at various stages of fine-tuning of the representations. We focus on Uralic...

  14. 6 CFR 25.6 - Procedures for designation of qualified anti-terrorism technologies.

    Science.gov (United States)

    2010-01-01

    ...-terrorism technologies. 25.6 Section 25.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.6 Procedures for designation of qualified anti-terrorism technologies. (a) Application Procedure. Any person, firm or other...

  15. Report on the trainings for terrorism. Document on present state of affairs

    International Nuclear Information System (INIS)

    Noda, Kimio; Saito, Toru; Hukumoto, Masahiro

    2001-12-01

    A series of attacks on America by terrorism on September 11, 2001 gave us a terrible shock. Two types of training against the act of terrorism had been held in Tokai Works of the Japan Nuclear Cycle Development Institute (JNC) to grasp the present situation of JNC Tokai Works and improve the countermeasure against the terrorism. The first training was for the incendiarism and the second one was for the injury. Consequently the revealed points to be improved were the followings. (1) Keeping a sense of crisis. The countermeasure against terrorism should be instructed and trained to realize the sense of crisis, that is, uncertainty of the time and the kind of terrorism. (2) Organization of the structure against the terrorism. The structure for the contingency should to organized to strengthen the guard structure by forming the pursuit team, the guard team and so on constituted by JNC's staff members. (3) Preparation of equipments against the terrorism. The coloring ball, club, two-pronged weapon, shield, knifeproof vest and so on should be provided the guards of to strengthen the countermeasure before the police's arrival. (4) Preparation and announcement of manuals. The manuals against terrorism for the ordinary stuff members should be prepared and used in the training to make the ordinary stuff's countermeasure more effective. (author)

  16. Catching Seriously Bad Dudes: US Counter-terrorism strategies

    Czech Academy of Sciences Publication Activity Database

    Bernardyová, Alžběta

    2008-01-01

    Roč. 6, č. 7-8 (2008), s. 34-38 ISSN 1214-1720 R&D Projects: GA ČR GA407/07/1395 Institutional research plan: CEZ:AV0Z70280505 Keywords : terrorism * counter- terrorism * US * 9/11 Subject RIV: AD - Politology ; Political Sciences http://www.socioweb.cz/upl/editorial/download/156_socioweb_7_08.pdf

  17. Access over ownership – a typology of shared space

    DEFF Research Database (Denmark)

    Brinkø, Rikke; Nielsen, Susanne Balslev; Meel, Juriaan van

    2015-01-01

    Purpose – This paper aims to explore shared use of space and facilities as a concept, and present and illustrate the use of a typology to help classify and describe the different options for sharing space and facilities within buildings for optimised use of a building portfolio. Design/methodolog......Purpose – This paper aims to explore shared use of space and facilities as a concept, and present and illustrate the use of a typology to help classify and describe the different options for sharing space and facilities within buildings for optimised use of a building portfolio. Design...

  18. [The Concept of Typology in Psychiatry in the Context of Historical Contributions of Max Weber and Karl Jaspers].

    Science.gov (United States)

    Jäger, M; Becker, T; Wigand, M E

    2016-08-01

    Against the background of Max Weber's and Karl Jaspers' outstanding historical contributions to the conceptual development of different typologies, the importance of a psychiatric typology is examined. The term "ideal type" was introduced into social science by Weber as an analytical construct to describe and classify cultural phenomena. This concept was adopted for the psychiatric context by Jaspers who proposed to establish a typological system in the field of psychotic disturbances without an organic correlate. He emphasized the importance of the course of psychopathological symptoms for such a typological system. The concept of typology can be regarded as a promising heuristic approach in psychiatry, providing a classification system for complex psychopathological symptoms. Even though several historic typologies exist in psychopathology, their usefulness in the fields of therapy and prognosis needs to be critically assessed. Also, new typologies will have to be developed, taking into account neurobiological knowledge now available. © Georg Thieme Verlag KG Stuttgart · New York.

  19. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  20. Nightmares and Night Terrors

    Science.gov (United States)

    ... able to tell you what happened in the dream and why it was scary. Your child may have trouble going back to sleep. Your child might have the same dream again on other nights. What are night terrors? ...

  1. Risk communication and radiological/nuclear terrorism: a strategic view.

    Science.gov (United States)

    Becker, Steven M

    2011-11-01

    It is now widely recognized that effective communication is a crucial element in radiological/nuclear terrorism preparedness. Whereas in the past, communication and information issues were sometimes viewed as secondary in comparison with technical concerns, today the need to improve risk communication, public information, and emergency messaging is seen as a high priority. The process of improving radiological/nuclear terrorism risk communication can be conceptualized as occurring in four overlapping phases. The first phase involves the recognition that communication and information issues will be pivotal in shaping how a radiological/nuclear terrorism incident unfolds and in determining its outcome. This recognition has helped shape the second phase, in which various research initiatives have been undertaken to provide an empirical basis for improved communication. In the third and most recent phase, government agencies, professional organizations and others have worked to translate research findings into better messages and informational materials. Like the first and second phases, the third phase is still unfolding. The fourth phase in risk communication for radiological/nuclear terrorism-a mature phase-is only now just beginning. Central to this phase is a developing understanding that for radiological/nuclear terrorism risk communication to be fully effective, it must go beyond crafting better messages and materials (as essential as that may be). This emerging fourth phase seeks to anchor radiological/nuclear communication in a broader approach: one that actively engages and partners with the public. In this article, each of the four stages is discussed, and future directions for improving radiological/nuclear terrorism risk communication are explored.

  2. Nuclear terrorism and legal protection of environment

    International Nuclear Information System (INIS)

    Ahmad-zada, Z.; Aliev, D.

    2003-01-01

    Full text: For the last years the terrorism has significantly changed. If 20-30 years ago terrorists would kidnap famous politicians or hijack planes, but at this stage they switched to massive destruction of innocent people. Now the problem of struggle against nuclear terrorism becomes very actual problem. The nuclear terrorism is meant as an opportunity of accomplishment of act of terrorism with use of the nuclear weapon, or accomplishment of explosions on atomic power stations and other objects of an atomic energy. Threats to nuclear objects become more and more often and appreciable. In the world there were some similar cases of threat to nuclear objects from the part of terrorists, and also cases of use by terrorists of nuclear, chemical and bacteriological substances. These cases testify to real threat of use by terrorists of the weapon of mass destruction. It is natural, that accomplishment of acts of terrorism on these objects can lead to ecological catastrophe and can put an irreparable loss to an environment and process of social development. Up to the middle of sixtieth years of twentieth century protection of an environment was not put forward as an independent political problem, and its scientific substantiation has not been developed enough as a diversified, complex, global problem. Only dynamical development in seventieth - eightieth years of scientific bases of global problems has allowed to allocate the rules of law concerning to protection of an environment, into special group. International legal protection of ecology was precisely allocated now in system of the general international law as independent, specific sphere of regulation. The principle of inadmissibility of radioactive pollution of environment covers both military, and peace area of use of nuclear power. Formation and the statement of this special principle of International law of the Environment takes place in two ways - contractual and usual, with observance by the states of

  3. Typology of recreation experiences: application in a Dutch forest service visitor monitoring survey

    NARCIS (Netherlands)

    Cottrell, S.P.; Lengkeek, J.; Marwijk, van R.B.M.

    2005-01-01

    This study applied a tourist typology to an outdoor recreation experience (day-use) in a Forest Service preserve in Holland using 25-items representing five modes of experience: amusement, change, interest, rapture and dedication. The aim was to offer a typology of recreation experiences for

  4. Outlining a typology of sports coaching careers

    DEFF Research Database (Denmark)

    Christensen, Mette Krogh

    2014-01-01

    This paper aims to extend our understanding of sports coaching careers and challenge related stage-based models by outlining and describing a typology of careers in high-performance sports coaching. A constructivist research approach is applied that intends to gain insight into the realities...... of coaches’ careers.Datawere drawn fromin-depth interviews with 10 Danish high-performance sports coaches. Results identified four classifying features that pave the way for the establishment of a typology consisting of three ideal types: (1) the elite-athlete coach; (2) the academic coach; and (3) the early......-starter coach. The findings are theorized throughWenger’s concept of paradigmatic pathways and Bourdieu’s concept of cultural capital. The study illuminates paradigmatic trajectories and conversions of cultural capital in high-performance sports coaching careers that may act as models for young athletes...

  5. Terrorism, war, and peace

    Directory of Open Access Journals (Sweden)

    JÜRGEN STOLZENBER

    2006-01-01

    Full Text Available The article tries first to analyse the different use of the concept of war made by George W. Bush with reference to the terrorist attack of 09/11 and to the invasion of Afghanistan. In order to do this, the paper will start from an analysis of the concept of terrorism itself and from the question whether terrorist acts can be designed as acts of war. It turns secondly to the more philosophical aspects of the question of terrorism, war and peace, starting from questions about the applicability of just war theories to the so called “war on terrorism” and discussing finally what is called “The Kantian Project”, that is the Kantian arguments for the establishment of “eternal peace” among the states of the world.

  6. Counter-Productive Counter-Terrorism. How is the dysfunctional discourse of Prevent failing to restrain radicalisation?

    Directory of Open Access Journals (Sweden)

    Lauren Powell

    2016-09-01

    Full Text Available This paper explores why the Prevent strand of the UK Government’s counter-terrorism strategy, CONTEST, is failing to achieve success in reducing radicalisation of young Muslims. By refusing to engage with extremists, and denying ‘extreme’ ideas a platform for expression, this paper will explain how the importance of cultural-linguistic epistemologies, and their role in extremism, has been overlooked. Rather than striving to understand how socio-political factors influence one’s reading of religious doctrines or interpretation of ideology, Prevent understands ideology to be the core radicalising agent, used by influential figures who can exploit the grievances of the vulnerable. The problematic repercussions of this will be addressed throughout, highlighting the various, and extensive, criticisms that Prevent has faced from academics, practitioners and commentators – primarily that it is counter-productive. The importance of the post-9/11 neoconservative paradigm in underpinning Prevent will be explained, but a Neo-Weberian approach, as a better lens through which to understand radicalisation, will be proposed, to ultimately trump the simplistic, yet currently dominant, ‘Conveyor Belt’ theory. Based on this, recommendations are made for an improved Prevent, rooted in the notion that radicalisation, extremism, or terrorism cannot be prevented, without knowing the motives, the views, and the assumptions of the radicals, the extremists, and those vulnerable to engaging with them.

  7. Toward a quantitative typology of burglars: a latent profile analysis of career offenders.

    Science.gov (United States)

    Vaughn, Michael G; DeLisi, Matt; Beaver, Kevin M; Howard, Matthew O

    2008-11-01

    Burglary is a serious, costly, and prevalent crime but prior typologies of burglars are mostly speculative and based on qualitative data. Using a sample of 456 adult career criminals, the current study used latent profile analysis to construct a methodologically rigorous quantitative typology. Four classes of burglars emerged: young versatile, vagrant, drug-oriented, and sexual predators. All groups demonstrated significant involvement in varied forms of crime, but the sexual predator group was the most violent and had the most serious criminal careers. Connections to the criminal career literature are offered and suggestions for further empirical study of offender typologies are discussed.

  8. A New Typology for Analyzing the Direction of Movement in Higher Education Internationalization

    Science.gov (United States)

    Wu, Hantian; Zha, Qiang

    2018-01-01

    This article proposes a new typology of "inward- and outward-oriented" higher education (HE) internationalization based on the spread of innovations that involve knowledge, culture, HE models, and norms. It reviews existing typologies related to HE internationalization; discusses theories of world system, soft power, and knowledge…

  9. Main features of narrow sociological theories explaining mental disorders

    Directory of Open Access Journals (Sweden)

    Opalić Petar

    2006-01-01

    Full Text Available In the introduction, the author states that sociological theories explaining mental disorders in the narrow sense have originated as an opposition to medical, i.e. biological model of interpreting mental disorders. With regard to this, the following sociological theories explaining mental disorders are presented in more detail: theory of anomie by Durkheim and Merton (with Merton’s typology of deviant behavior, social roles theory by Parsons, labeling theory by Scheff and other authors, theoretical career model of the mentally ill, the concept of psychic disorder of etnomethodology and finally, the anti-psychiatric interpretation of mental disorders. It is concluded that, although historically older, sociological theories of the onset of mental disorders are filling the epistemological void that occurred in understanding the role of society on the whole and a series of social factors particularly on the different aspects of understanding mental disorders.

  10. Understanding terminological systems. I: Terminology and typology

    NARCIS (Netherlands)

    de Keizer, N. F.; Abu-Hanna, A.; Zwetsloot-Schonk, J. H.

    2000-01-01

    Terminological systems are an important research issue within the field of medical informatics. For precise understanding of existing terminological systems a referential framework is needed that provides a uniform terminology and typology of terminological systems themselves. In this article a

  11. Toward a Psychology of Social Change: A Typology of Social Change

    Science.gov (United States)

    de la Sablonnière, Roxane

    2017-01-01

    Millions of people worldwide are affected by dramatic social change (DSC). While sociological theory aims to understand its precipitants, the psychological consequences remain poorly understood. A large-scale literature review pointed to the desperate need for a typology of social change that might guide theory and research toward a better understanding of the psychology of social change. Over 5,000 abstracts from peer-reviewed articles were assessed from sociological and psychological publications. Based on stringent inclusion criteria, a final 325 articles were used to construct a novel, multi-level typology designed to conceptualize and categorize social change in terms of its psychological threat to psychological well-being. The typology of social change includes four social contexts: Stability, Inertia, Incremental Social Change and, finally, DSC. Four characteristics of DSC were further identified: the pace of social change, rupture to the social structure, rupture to the normative structure, and the level of threat to one's cultural identity. A theoretical model that links the characteristics of social change together and with the social contexts is also suggested. The typology of social change as well as our theoretical proposition may serve as a foundation for future investigations and increase our understanding of the psychologically adaptive mechanisms used in the wake of DSC. PMID:28400739

  12. Toward a Psychology of Social Change: A Typology of Social Change.

    Science.gov (United States)

    de la Sablonnière, Roxane

    2017-01-01

    Millions of people worldwide are affected by dramatic social change (DSC). While sociological theory aims to understand its precipitants, the psychological consequences remain poorly understood. A large-scale literature review pointed to the desperate need for a typology of social change that might guide theory and research toward a better understanding of the psychology of social change. Over 5,000 abstracts from peer-reviewed articles were assessed from sociological and psychological publications. Based on stringent inclusion criteria, a final 325 articles were used to construct a novel, multi-level typology designed to conceptualize and categorize social change in terms of its psychological threat to psychological well-being. The typology of social change includes four social contexts: Stability, Inertia, Incremental Social Change and, finally, DSC. Four characteristics of DSC were further identified: the pace of social change, rupture to the social structure, rupture to the normative structure, and the level of threat to one's cultural identity. A theoretical model that links the characteristics of social change together and with the social contexts is also suggested. The typology of social change as well as our theoretical proposition may serve as a foundation for future investigations and increase our understanding of the psychologically adaptive mechanisms used in the wake of DSC.

  13. Age at onset typology in opioid dependent men: an exploratory study.

    Science.gov (United States)

    De, Biswajit; Mattoo, Surendra K; Basu, Debasish

    2002-04-01

    This study attempted to apply age at onset typology in ICD-10 diagnosed opioid dependence. The sample comprised 80 men seeking treatment at an addiction clinic. The measures included socio-demographic and clinical profile, Severity of Opioid Dependence Questionnaire, Modified Sensation Seeking Scale, Multiphasic Personality Questionnaire (MPQ) and Family History Assessment Module. A cut-off age of 20/21 years for an early-onset late-onset typology of opioid dependence was obtained using two methods - the modal age at onset method and one-third sample by age at onset method. The early onset group showed significant differences in terms of it being more often younger, urban, unmarried, wage earning or students, using oral opioids (not heroin or injectables), showing higher lifetime use and dependence of sedatives, earlier onset of use and dependence of sedatives and tobacco, and higher global psychopathology in terms of MPQ. The early onset group also showed statistically insignificant trends for lesser use and dependence of alcohol, higher severity of opioid dependence, more legal and less social complications, higher sensation seeking (except boredom susceptibility), and more frequent substance dependence in first degree relatives. The age at onset typology in opioid dependence appears to be feasible and having some similarities to similar typology in alcoholism.

  14. Integration of Social Sciences in Terrorism Modelling: Issues, Problems and Recommendations

    National Research Council Canada - National Science Library

    Resnyansky, L

    2007-01-01

    ...; terrorists behaviour; the structure of terrorist organisations and networks; terrorism threat; and influence strategies and actions directed towards terrorism threat anticipation and minimisation.

  15. 75 FR 18850 - National Protection and Programs Directorate; Chemical Facility Anti-Terrorism Standards...

    Science.gov (United States)

    2010-04-13

    ... Directorate; Chemical Facility Anti-Terrorism Standards Personnel Surety Program AGENCY: National Protection...-terrorism Vulnerability Information (CVI), Sensitive Security Information (SSI), or Protected Critical... . SUPPLEMENTARY INFORMATION: Program Description The Chemical Facility Anti-Terrorism Standards (CFATS), 6 CFR...

  16. Typological Descriptions as Generative Guides for Historical Architecture

    NARCIS (Netherlands)

    Stouffs, R.M.F.A.; Tuncer, B.

    2015-01-01

    This paper presents a description grammar approach in the context of the generation of historical architectural typologies. The specific architectural context is classical period Ottoman mosques of the architect Sinan.

  17. The European fight against terrorism financing: Professional fields and new governing practices

    NARCIS (Netherlands)

    Wesseling, M.

    2013-01-01

    Combating the financing of terrorism has been a core component of the global War on Terror that began after the 9/11 terrorist attacks. This book shows how the fight against terrorism financing has taken shape and become important in Europe. An examination of two case studies - the EU’s Third

  18. Terrorism and Political Violence in Africa: Contemporary Trends in a Shifting Terrain

    Directory of Open Access Journals (Sweden)

    James J.F. Forest

    2011-09-01

    Full Text Available In 1994, Martha Crenshaw’s edited volume Terrorism in Africa made clear how terrorism – generally defined as a tactic that uses violence or the threat of violence as a coercive strategy to cause fear and political intimidation – was a feature within resistance movements, military coups, political assassinations, and various intra- and inter-state wars that have affected most African states at some point during the continent’s transition to independence and subsequent post-colonial period.  Crenshaw further noted that terrorism was not “an isolated phenomenon” for African states or the region more broadly [1]. This description remains salient today: terrorism has been a global phenomenon for many decades, and Africa has not been unscathed by it. Terrorism is just one of several types of political violence that states and their citizens, in Africa and elsewhere, have had to grapple with. In fact, from a macro perspective, terrorism may not be universally seen as the most important security challenge faced by African states and their citizens. Famine, drought, endemic poverty, diseases and other natural and man-made disasters that undermine human security have also been at the forefront of recent policy discussions on Africa among Western governments and international aid organizations. It is thus necessary to place terrorism within the broader terrain of Africa’s security challenges, before examining the historical trends and specific examples discussed in this Special Issue of Perspectives on Terrorism.

  19. Blueprint for Incorporating Service Learning: A Basic, Developmental, K-12 Service Learning Typology

    Science.gov (United States)

    Terry, Alice W.; Bohnenberger, Jann E.

    2004-01-01

    Citing the need for a basic, K-12 developmental framework for service learning, this article describes such a model. This model, an inclusive typology of service learning, distinguishes three levels of service learning: Community Service, Community Exploration, and Community Action. The authors correlate this typology to Piaget's cognitive…

  20. Toward Building a Typology for the Evaluation of Services in Family Support Programs.

    Science.gov (United States)

    Manalo, Victor; Meezan, William

    2000-01-01

    Articulates how the family support movement emerged in the last 20 years, and describes the philosophical premises, principles, and practices that currently guide it. Considers the inability of current family support program typologies to guide outcome evaluations, and introduces a typology that deconstructs family support programs into their…

  1. Specific Phobia among U.S. Adolescents: Phenomenology and Typology

    Science.gov (United States)

    Burstein, Marcy; Georgiades, Katholiki; He, Jian-Ping; Schmitz, Anja; Feig, Emily; Khazanov, Gabriela Kattan; Merikangas, Kathleen

    2014-01-01

    Background Investigators have proposed the diagnostic value of a generalized subtype of specific phobia, with classification based upon the number of phobic fears. However, current and future typologies of specific phobia classify the condition by the nature of phobic fears. This study investigated the clinical relevance of these alternative typologies by: (1) presenting the prevalence and correlates of specific phobia separately by the number and nature of phobia types; and (2) examining the clinical and psychiatric correlates of specific phobia according to these alternative typologies. Methods The National Comorbidity Survey Replication-Adolescent Supplement (NCS-A) is a nationally representative face-to-face survey of 10,123 adolescents aged 13–18 years in the continental United States. Results Most adolescents with specific phobia met criteria for more than one type of phobia in their lifetime, however rates were fairly similar across DSM-IV/5 subtypes. Sex differences were consistent across DSM-IV/5 subtypes, but varied by the number of phobic types, with a female predominance observed among those with multiple types of phobias. Adolescents with multiple types of phobias exhibited an early age of onset, elevated severity and impairment, and among the highest rates of other psychiatric disorders. However, certain DSM-IV/5 subtypes (i.e. blood-injection-injury and situational) were also uniquely associated with severity and psychiatric comorbidity. Conclusions Results indicate that both quantitative and DSM-IV/5 typologies of specific phobia demonstrate diagnostic value. Moreover, in addition to certain DSM-IV/5 subtypes, a generalized subtype based on the number of phobias may also characterize youth who are at greatest risk for future difficulties. PMID:23108894

  2. Paramilitary Terrorism: A Neglected Threat

    National Research Council Canada - National Science Library

    Tallen, Jr, George W

    2007-01-01

    Fixation upon WMD terrorism, reinforced by the recurring need to manage the consequences of other manmade or natural disasters, has conditioned the homeland security community to focus upon prevention...

  3. Sociolinguistic Typology and Sign Languages

    OpenAIRE

    Adam Schembri; Jordan Fenlon; Kearsy Cormier; Trevor Johnston

    2018-01-01

    This paper examines the possible relationship between proposed social determinants of morphological ‘complexity’ and how this contributes to linguistic diversity, specifically via the typological nature of the sign languages of deaf communities. We sketch how the notion of morphological complexity, as defined by Trudgill (2011), applies to sign languages. Using these criteria, sign languages appear to be languages with low to moderate levels of morphological complexity. This may partly reflec...

  4. Terrorism

    International Nuclear Information System (INIS)

    Rossnagel, A.

    1990-01-01

    The NPT should prevent the proliferation of nuclear weapons, as a contribution to the worldpeace. This aim is also threatened today by the nuclear actions of states and subnational groups. Such actions have occured in the past and are expected in the future. States and specific terrorist groups are able to acquire specific nuclear material by theft and to assault nuclear plants and transport. The main constraint, the deficit of motivation, could be dropped in the future for many reasons. Therefore nuclear terrorism is a 'real threat to civilization' and its probability is increasing. (orig.) [de

  5. Terrorism and mental health in the rural Midwest.

    Science.gov (United States)

    Hawley, Suzanne R; Ablah, Elizabeth; Hawley, Gary C; Cook, David J; Orr, Shirley A; Molgaard, Craig A

    2006-01-01

    Since the terrorist attacks of 11 September 2001, the amount of terrorism preparedness training has increased substantially. However, gaps continue to exist in training for the mental health casualties that result from such events. Responders must be aware of the mental health effects of terrorism and how to prepare for and buffer these effects. However, the degree to which responders possess or value this knowledge has not been studied. Multi-disciplinary terrorism preparedness training for healthcare professionals was conducted in Kansas in 2003. In order to assess knowledge and attitudes related to mental health preparedness training, post-test surveys were provided to 314 respondents 10 months after completion of the training. Respondents returned 197 completed surveys for an analysis response rate of 63%. In general, the results indicated that respondents have knowledge of and value the importance of mental health preparedness issues. The respondents who reported greater knowledge or value of mental health preparedness also indicated significantly higher ability levels in nationally recognized bioterrorism competencies (p mental health components to be incorporated into terrorism preparedness training. Further studies to determine the most effective mental health preparedness training content and instruction modalities are needed.

  6. The Nature Terrorism Reports on Social Networks

    Directory of Open Access Journals (Sweden)

    James Okolie-Osemene

    2015-12-01

    Full Text Available As new tools of communication, an in-depth study of social networking in the era of global terrorism is attempted in this article. This emerging tradition of information sharing is driven by social media technology which has greatly revolutionalised communication in all sectors. The article explored the information sharing relevance of new technologies in the age of terrorism and counterterrorism. It focused on how social networks are increasingly utilised by different groups. In terms of methodology, the study extracted and utilised positive, negative and neutral posts, updates, tweets and reports on social networks through different individual and organisational media accounts and blogs, and analysed the data qualitatively. Findings show that despite being used by extremist groups in promoting their political agenda, social networks are also useful in promoting positive perceptions that society has about Muslims in the era of terrorism, emphasising that Muslims are not terrorists. Through the instrumentality of social media, users are able to map the trends of terrorism and responses from stakeholders in government and security sector in curbing the menace. Given their capacity to reach a wider audience, breaking cultural and religious barriers, social networks serve as early warning signs and make it possible for people to share new ideas on possible ways of curbing the proliferation of terrorist organisations.

  7. Genetics of Lesch's typology of alcoholism.

    Science.gov (United States)

    Samochowiec, Jerzy; Kucharska-Mazur, Jolanta; Grzywacz, Anna; Pelka-Wysiecka, Justyna; Mak, Monika; Samochowiec, Agnieszka; Bienkowski, Przemyslaw

    2008-02-15

    It is widely accepted that dopamine and serotonin (5-HT) neurotransmission can be critically involved in the development of alcohol abuse and alcohol dependence. Lesch's typology of alcoholism has been gaining increasing popularity as it qualitatively differentiates patients into different treatment response subgroups. The aim of the present study was to evaluate a possible genetic background of Lesch's typology with special emphasis placed on dopamine- and serotonin-related genes. 122 alcoholics (the mean age: 35+/-9 years) were investigated. According to Lesch's typology, 58 patients were of type I, 36 patients of type II, 11 patients of type III, and 17 patients of type IV. Alcohol drinking and family history was assessed by means of a structured interview, based on the Semi-Structured Assessment for the Genetics of Alcoholism. 150 control subjects without psychiatric disorders were also recruited. The control group was ethnically-, age- and gender-matched to the patients. The DRD2 TaqIA, exon 8, and promoter -141C ins/del polymorphisms as well as COMT Val158Met, 5HTT 44 bp del in promoter, and DAT 40 bp VNTR polymorphisms were detected by means of PCR. No significant differences were observed when the whole group of alcoholics and the controls were compared. Similarly, there were no differences between either the Lesch type I or type II alcoholics and the control subjects. No significant differences were observed between type I and type II alcoholics. Alleles frequencies were not calculated for the Lesch type III and type IV alcoholics since the number of patients was too small. The present results argue against any major role of the investigated polymorphisms in either Lesch type I or type II alcoholism. More comprehensive studies are needed to define the role of the investigated polymorphisms in Lesch type III and type IV alcoholism.

  8. The Concept of (Global Terrorism and Conspiracy Theory as Media Discourse

    Directory of Open Access Journals (Sweden)

    Neda Radulović

    2016-09-01

    Full Text Available Despite the urgency and growing interest in a subject, there is no unifying definition of terrorism. A large number of studies could be seen as integral part of ‘counter-terrorism’ strategies- as set of practices to prevent and defeat terrorism. Lisa Stampnitzky’s research looked into the discourse of terrorism experts and argued that the concept of terrorism is a social construct, thus revealing further structure that facilitated it. Aim of this paper is to compare the concept of terrorism as media discourse- a form of legitimate expert interpretation, with conspiracy theory as a form of illegitimate, para-institutional form of interpretation. Noting the commonplaces of the two: defined as an afterthought, both being designated and not self-described notions, featuring a plot that precedes the event- this paper will look at these discourses, the way they relate to (and intersect each other, and try to trace their manifestations.

  9. A process-based typology of hydrological drought

    NARCIS (Netherlands)

    Loon, van A.F.; Lanen, van H.A.J.

    2012-01-01

    Hydrological drought events have very different causes and effects. Classifying these events into distinct types can be useful for both science and management. We propose a hydrological drought typology that is based on governing drought propagation processes derived from catchment-scale drought

  10. A grounded typology of vacation decision-making

    NARCIS (Netherlands)

    Decrop, A.; Snelders, H.M.J.J.

    2005-01-01

    This paper presents a typology of vacationers based on decision-making variables and processes. Employing a naturalistic perspective, the (summer) vacation decision-making process of 25 Belgian households was followed for a year. In-depth interview and observation data were analyzed and interpreted

  11. AN URBAN TYPOLOGY WITH THE DIMENSIONS OF KNOWLEDGE ERA

    Directory of Open Access Journals (Sweden)

    Flavio Numata Junior

    2014-07-01

    Full Text Available Starting from geographical issues to globalization of the economy, cities have come to play multiple roles as the center of life for most people. The paper aims to propose an urban typology with the main features of development strategies for innovation and internationalization. The research literature is essentially exploratory in nature and qualitative approach. The literature review shows the cities in different dimensions and its relationship to the knowledge era. Shows an urban prospective design, the Project Curitiba 2030, which is used for analysis with the relevant literature. At the end of the research we propose a urban typology with potential to experience the competitive dynamics of cities.

  12. SOCIO-PSYCHOLOGICAL CRITERIONS OF FAMILY LIFESTYLE TYPOLOGY

    Directory of Open Access Journals (Sweden)

    Yekaterina Anatolievna Yumkina

    2015-02-01

    Full Text Available The purpose of this article is to present socio-psychological criterions of family lifestyle typology, which were found during theoretical modelling and empirical research work. It is important in fundamental and practical aspects. St-Petersburg students (n = 116, from 19 to 21 years old were examined by special questionnaire «Family relationship and home» (Kunitsi-na V.N., Yumkina Ye.A., 2012 which measures different aspects of family lifestyle. We also used complex of methods that gave us information about personal values, self-rating and parent-child relationships. Dates were divided into six groups according to three main criterions of family lifestyle typology: social environment of family life, family activity, and family interpersonal relationships. There were found statistically significant differences between pairs of group from every criterions. The results can be useful in spheres dealing with family crisis, family development, family traditions etc.

  13. Why Communication and Performance are Key in Countering Terrorism

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-02-01

    Full Text Available In this Research Paper, Research Fellow Prof. Dr. Beatrice de Graaf emphasises the importance of effective communication and performance in the fight against terrorism and the fear it aims to induce. Essentially, terrorists and states are conducting “influence warfare”, a battle to convince and persuade the different target audiences to rally behind them. In this battle of perceptions, the different government agencies need to be aware of the often implicit and unwittingly produced “stories” they tell to counter those narrated by the terrorists. It is crucial to take in consideration the fact that combating terrorism is a form of communication, as much as terrorism is itself.

  14. Epistemological failures : everyday terrorism in the west

    OpenAIRE

    Gentry, Caron Eileen

    2016-01-01

    This article attempts to problematize the disparate level of attention paid to similar violences globally, whereby violence against women in the developing world is seen as a security concern to the West and yet violence against women in the West is minimized or ignored. It will do this first by demonstrating that everyday violences, better known as everyday terrorism, in the West are subjugated knowledges within Terrorism Studies. To demonstrate this, Half the Sky, Sex and World Peace, and T...

  15. Information Sharing About International Terrorism in Latin America

    Science.gov (United States)

    2005-06-01

    articles/anmviewer.asp?a=464&print=yes. Somoza, L. (2001). Inteligencia: Su Utilidad para la Toma de Decisiones en un Mundo de Nuevos Conflictos...Terrorism Violence in Europe.” March 9-11, 2001, Minda de Gunzburg Center for European Studies, Harvard University, Cambridge, Massachusetts. 56...Taylor and Francis. Jane’s (2005). Terrorism and Insurgency Center. Fuerzas Armadas Revolucionarias de Colombia (FARC). Retrieved February 25, 2005

  16. The typological approach in child and family psychology: a review of theory, methods, and research.

    Science.gov (United States)

    Mandara, Jelani

    2003-06-01

    The purpose of this paper was to review the theoretical underpinnings, major concepts, and methods of the typological approach. It was argued that the typological approach offers a systematic, empirically rigorous and reliable way to synthesize the nomothetic variable-centered approach with the idiographic case-centered approach. Recent advances in cluster analysis validation make it a promising method for uncovering natural typologies. This paper also reviewed findings from personality and family studies that have revealed 3 prototypical personalities and parenting styles: Adjusted/Authoritative, Overcontrolled/Authoritarian, and Undercontrolled/Permissive. These prototypes are theorized to be synonymous with attractor basins in psychological state space. The connection between family types and personality structure as well as future directions of typological research were also discussed.

  17. Terrorism: Supplement to the Second Edition. A Selected Bibliography.

    Science.gov (United States)

    Boston, Guy D.

    The annotated bibliography describes 85 materials related to terrorism which were collected by the National Criminal Reference Service. Although no consensus exists on the definition of terrorism, the term is interpreted in this document to include both illegal and destructive acts against society and governments and violent means undertaken to…

  18. 239 Inter-Agency Cooperation in Combating Terrorism in Nigeria ...

    African Journals Online (AJOL)

    User

    In recent times, terrorism has become one of the most dangerous threats to .... groups or clandestine agents, usually intended to influence an audience”. (ITSR ... terrorist attacks on the World Trade Center in New York and the Pentagon ..... Books. Imobighe, T.A. (2006b). “Combating Terrorism in Africa: An Integrated.

  19. Lone-actor Terrorism and Impulsivity.

    Science.gov (United States)

    Meloy, J Reid; Pollard, Jeffrey W

    2017-11-01

    In some recent cases of lone-actor terrorism, there is evidence the subject acted impulsively, often in response to a triggering event which contained a loss and humiliation. Evidence suggests the subjects acted precipitously, despite planning and preparation carried out in the preceding weeks or months, and their attacks failed to include the often considerable preparation that had been done. The pathway became a runway. The authors recommend the traditional assessment of impulsivity in persons of concern for lone acts of terrorism, as well as other proximal warning behaviors for targeted violence. Both indirect and direct assessment guidelines are proposed, with an emphasis upon self-report, psychological testing, collateral data gathering, and historical records. © 2017 American Academy of Forensic Sciences.

  20. Implications of the War On Terror for Khyber Pukhtunkhwa, Pakistan

    Directory of Open Access Journals (Sweden)

    Manzoor Ahmad

    2010-09-01

    Full Text Available The US-led War on Terror in Afghanistan conducted for the aim of eliminating Al- Qaeda and Osama-bin-Laden has brought about enormous economic, social and political changes in the region. Pakistan’s role as a front-line state in the War on Terror has had profound implications for its domestic politics and foreign policy. Pakistan not only took a U-turn on its Afghanistan policy, but also had to crack down on internal extremism and terrorism. Several military operations were carried out against the so- called terrorist factions in tribal areas and some other parts of the North West Frontier Province (NWFP, renamed as Khyber Pukhtunkhwa (KPK under the 18th Amendment to the Constitution of 1973 of Pakistan. With a majority Pashtun population, KPK has been a target of the War on Terror due to its social structure, cultural restraints and the religion of its inhabitants on the boundary with Afghanistan. The socio-cultural similarities and geographical proximity with Afghanistan have made it a sanctuary for Al-Qaeda members. The War on Terror in KPK has had negative political, economic and social repercussions for the region and thus has created hatred among the Pashtuns. This paper is an attempt to analyze the factors which made the Pashtuns of this area prone to militancy. It will analyze the political, economic and social implications of the War on Terror for KPK in general and its Pashtun population in particular.

  1. VALIDATION GUIDELINES FOR LABORATORIES PERFORMING FORENSIC ANALYSIS OF CHEMICAL TERRORISM

    Science.gov (United States)

    The Scientific Working Group on Forensic Analysis of Chemical Terrorism (SWGFACT) has developed the following guidelines for laboratories engaged in the forensic analysis of chemical evidence associated with terrorism. This document provides a baseline framework and guidance for...

  2. Setting the agenda of a counter-terrorism strategic policy model

    Directory of Open Access Journals (Sweden)

    Emilia Ferone

    2018-03-01

    Full Text Available The aim of this paper is to present a functional model to fight terrorism from macro perspective through a “Strategic Policy Model” (SPM. The focus on legal order within the practices of Sociology of Law and Criminology is pivotal in order to reframe terrorism within a viable SPM. In “The Counterterrorism Handbook”, written by Bolz, Dudonis, and Schulz (2005, terrorism, at its very basic level, is defined as “an action that the urban guerrilla must execute with the greatest cold bloodedness, calmness and decision”. They further go on to provide a more scholarly definition: “the calculated use of violence to attain goals which are political, religious or ideological in nature. Terrorism involves a criminal act that is often symbolic in nature and intended to influence an audience beyond the immediate victims”.

  3. Measures against radiation disaster/terrorism and radiation emergency medical assistance team

    International Nuclear Information System (INIS)

    Tominaga, Takako; Akashi, Makoto

    2016-01-01

    The probability of occurrence of radiological terrorism and disaster in Japan is not low. For this reason, preparations for coping with the occurrence of radiological terrorism should be an urgent issue. This paper describes the radiation medical system and the threat of radiological terrorism and disaster in Japan, and introduces the Radiation Emergency Medical Assistance Team (REMAT), one of the radiation accident/disaster response organizations at the National Institute of Radiological Sciences. Radiation exposure medical systems in Japan are constructed only in the location of nuclear facilities and adjacent prefectures. These medical systems have been developed only for the purpose of medical correspondence at the time of nuclear disaster, but preparations are not made by assuming measures against radiological terrorism. REMAT of the National Institute of Radiological Sciences is obligated to dispatch persons to the requesting prefecture to support radiation medical care in case of nuclear disaster or radiation accident. The designation of nuclear disaster orientated hospitals in each region, and the training of nuclear disaster medical staffing team were also started, but preparations are not enough. In addition to enhancing and strengthening experts, specialized agencies, and special forces dealing with radiological terrorism, it is essential to improve regional disaster management capacity and terrorism handling capacity. (A.O.)

  4. Typologies of extreme longevity myths.

    Science.gov (United States)

    Young, Robert D; Desjardins, Bertrand; McLaughlin, Kirsten; Poulain, Michel; Perls, Thomas T

    2010-01-01

    Purpose. Political, national, religious, and other motivations have led the media and even scientists to errantly accept extreme longevity claims prima facie. We describe various causes of false claims of extraordinary longevity. Design and Methods. American Social Security Death Index files for the period 1980-2009 were queried for individuals with birth and death dates yielding ages 110+ years of age. Frequency was compared to a list of age-validated supercentenarians maintained by the Gerontology Research Group who died during the same time period. Age claims of 110+ years and the age validation experiences of the authors facilitated a list of typologies of false age claims. Results. Invalid age claim rates increase with age from 65% at age 110-111 to 98% by age 115 to 100% for 120+ years. Eleven typologies of false claims were: Religious Authority Myth, Village Elder Myth, Fountain of Youth Myth (substance), Shangri-La Myth (geographic), Nationalist Pride, Spiritual Practice, Familial Longevity, Individual and/or Family Notoriety, Military Service, Administrative Entry Error, and Pension-Social Entitlement Fraud. Conclusions. Understanding various causes of false extreme age claims is important for placing current, past, and future extreme longevity claims in context and for providing a necessary level of skepticism.

  5. Typologies of Extreme Longevity Myths

    Directory of Open Access Journals (Sweden)

    Robert D. Young

    2010-01-01

    Full Text Available Purpose. Political, national, religious, and other motivations have led the media and even scientists to errantly accept extreme longevity claims prima facie. We describe various causes of false claims of extraordinary longevity. Design and Methods. American Social Security Death Index files for the period 1980–2009 were queried for individuals with birth and death dates yielding ages 110+ years of age. Frequency was compared to a list of age-validated supercentenarians maintained by the Gerontology Research Group who died during the same time period. Age claims of 110+ years and the age validation experiences of the authors facilitated a list of typologies of false age claims. Results. Invalid age claim rates increase with age from 65% at age 110-111 to 98% by age 115 to 100% for 120+ years. Eleven typologies of false claims were: Religious Authority Myth, Village Elder Myth, Fountain of Youth Myth (substance, Shangri-La Myth (geographic, Nationalist Pride, Spiritual Practice, Familial Longevity, Individual and/or Family Notoriety, Military Service, Administrative Entry Error, and Pension-Social Entitlement Fraud. Conclusions. Understanding various causes of false extreme age claims is important for placing current, past, and future extreme longevity claims in context and for providing a necessary level of skepticism.

  6. Terrorism reports: The tip of the iceberg.

    Science.gov (United States)

    Ellenberg, Eytan; Taragin, Mark; Bar-On, Zvia; Cohen, Osnat; Ostfeld, Ishay

    2017-01-01

    Medical impact of terror is a public health issue as the threat is growing all over the world. Our objective was to compare the number of injured and incidents in the three different databases and reports [Global Terrorism Database (GTD), Israeli Security Agency (ISA) and National Insurance Institute (NII)] in Israel. Retrospective study. Analyses of three different databases (GTD, ISA and NII) and basic comparison. The victims reimbursed for medical expenses are the largest population. The number of injured as described by GTD and ISA database are less important. The 2010-2013 years are marked by more incidents recognized in Israel vs GTD assessment (except in 2014). The number of victims being reimbursed for medical and mental health services is radically different from the GTD and the ISA reports. Public Health specialists should be advised of this phenomenon to deliver their right approach (including mental health) to growing threat and develop new definition of victim of terror.

  7. Nuclear Law: A Key Against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Cardozo, P.

    2004-01-01

    The role of the legal instruments in the war against nuclear terrorism. Control of radioactive sources. Elements of Nuclear Law: Definition: it is the body of special legislation that regulates the pacific uses of nuclear energy and the conduct of the persons engaged in activities related to fissionable materials and ionizing radiation . Objective: to provide a legal framework in order to protect individuals , property and the environment against the harmful effects of the use of nuclear energy and ionising radiation. Principles of nuclear energy legislation: safety principle, exclusively operator responsibility, authorization, independence of the regulatory body, inspections and enforcement, nuclear damage compensation, international cooperation. National regulatory infrastructure. Establishment of special law in Emergency Preparedness for nuclear or radiological disaster. IAEA Conventions. Transportation of nuclear material. IAEA regulations on radioactive material. Compensation for nuclear damage. Nuclear safety, security and terrorism. International and domestic instruments. Anti terrorism acts. International agreements on Safety Cooperation. (Author)

  8. Gender, education and terrorism

    Czech Academy of Sciences Publication Activity Database

    Malečková, Jitka; Stanišić, Dragana

    2014-01-01

    Roč. 5, č. 1 (2014), s. 40-65 ISSN 1759-5673 R&D Projects: GA ČR(CZ) GAP402/12/0510; GA MŠk(CZ) 7E08090 Institutional support: RVO:67985998 Keywords : international terrorism * women's education * public opinion Subject RIV: AH - Economics

  9. Combatting Domestic Terrorism: A Strategic Approach for the Twenty-First Century

    National Research Council Canada - National Science Library

    Sienrukos, John

    1999-01-01

    .... In order to reach sound, strategic recommendations for combating terrorism, the author will begin with some background on terrorism, review the various definitions as defined by the Department...

  10. Typology on Leadership toward Creativity in Virtual Work

    Directory of Open Access Journals (Sweden)

    Iris A Humala

    2017-07-01

    Full Text Available Aim/Purpose: This study aims to develop a descriptive typology to better identify leadership toward creativity in virtual work in different types of companies. Background: The study empirically explores how leadership toward creativity occurs in virtual work and uses the theoretical lenses of creativity-conducive leadership and heterarchy to generate a typology. Methodology\t: A multiple qualitative case study design, interpretivist approach, and abductive analysis are applied. Data is collected by interviewing 21 leaders and employees face-to-face in four companies in the ICT sector and one business advisor company. Contribution: The empirical evidence of this study enriches the understanding of leadership toward creativity in virtual work and contributes to the limited empirical knowledge on leadership that stimulates a virtual workforce to achieve creativity. Findings: The four different types of companies in the typology utilize various transitions toward leadership creativity in virtual work. The trend in leadership in the existing virtually networked business environment is toward the “collective mind” company, which is characterized by shared values, meaningful work, collective intelligence, conscious reflection, transparency, coaching, empowering leadership by example, effective multichannel interaction, and assertiveness. The findings empirically support applying a heterarchy perspective to lead a virtual workforce toward creativity and promote leaders who are genuinely interested in people, their development, collaboration, and technology. Recommendations for Practitioners: The typology helps professionals realize the need to develop leadership, communication, interaction, learning, and growth to foster creative interaction and improve productivity and competitiveness. Recommendation for Researchers: This study enables researchers to more rigorously and creatively conceptualize the conditions and relationships in leadership that

  11. Against acts of nuclear terrorism

    International Nuclear Information System (INIS)

    Heller, W.

    2007-01-01

    The Act on the International Convention of the United Nations of April 13, 2005 on Combating Acts of Nuclear Terrorism was promulgated in the German Federal Gazette and entered into force one day later. The Convention expresses the deep concern about the worldwide escalation of all kinds and manifestations of acts of terrorism. What was true in April 2005 (the year the UN convention was adopted) is even more true today. At the same time, however, the Convention recognizes the right of all nations to develop and use nuclear power for peaceful purposes, acknowledging their justified interest in the possible benefits of the peaceful uses of nuclear power. As the Convention was signed in German still during the term of office of the Red-Green government, this passage is a remarkable acceptance of the realities of the world and past peaceful uses of nuclear power in Germany. Whether or not the convention will become an effective instrument to be used against acts of nuclear terrorism and threats depends on its entering into force after deposition of 22 ratification documents, and on as many states as possible acceding to it. Irrespective of these aspects, action in the spirit of the Convention should be taken now, criminal law should be adapted, and international cooperation should be improved and strengthened. (orig.)

  12. A typology of alcohol consumption among young people

    DEFF Research Database (Denmark)

    Davoren, M.P.; Cronin, M; Perry, I.J.

    2016-01-01

    information from studies that produced types of alcohol consumption among young people. Method Quantitative and qualitative literature investigating the different types of drinkers among young people [aged 12–24 years], published in peer reviewed journals, were eligible for inclusion in this systematic review...... In total, 13 studies were eligible for inclusion: 11 quantitative, one qualitative and one mixed methods. Six classes of drinkers were formed within this typology. Abstainers reported no alcohol consumption. Light drinkers reported drinking small amounts of alcohol infrequently. In comparison, social......Background Currently, alcohol consumption levels are significantly higher among younger age groups. However, previous research has noted the diversity of motivations and patterns. These patterns of drinking have yet to be synthesised into a typology. The aim of the current study was to synthesise...

  13. KENYA’S OIL PIPELINE AND TERRORISM

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2014-04-01

    Full Text Available The threat of Al-Shabaab and Al-Qaeda terrorist attacks on the critical infrastructure (oil pipeline in Kenya has brought to the attention the strategic issue of the energy sector security, highlighting the potential vulnerabilities of this sector. Critical Infrastructure Protection (CIP should be a key component of the national security especially after the Kenya Defence Forces’ (KDF incursion into Somalia. The merger of Al-Shabaab and Al-Qaeda terrorist groups and the accelerated grenades attack against Kenya in retaliation has become the centre of the debate on terrorism and internal security of the Kenya. The energy resources are strategic assets from the security, political and economic point of view. Kenya as an oil transit country is considered of primary strategic importance at international level. International terrorism has always looked with interest at the oil resource in order to meet its political and economic targets. We argue that Kenya’s oil pipelines are vulnerable to Al-Shabaab and Al-Qaeda terrorist attack. In summary, the article looks at the concept of terrorism within the framework of critical infrastructure protection, the dangers of attacks on oil pipelines, Kenya’s government preparedness and recommendations.

  14. Global initiatives to prevent nuclear terrorism; Globalt initiativ for aa hindre nukleaer terrorisme

    Energy Technology Data Exchange (ETDEWEB)

    2010-07-01

    The fight against nuclear and radiological terrorism - someone to blow up a nuclear weapon or spread radioactive material as a 'dirty bomb' that act of terrorism - is one of the most serious threats to international security. The Global Initiative to prevent nuclear terrorism is a Norwegian-sponsored initiative that is aimed directly at combating terrorism by non-state actors. NRPA follow up Norwegian measures, including in Kazakhstan, and verifies that they are implemented and functioning as intended. (AG)

  15. The black-and-white world: Towards the history of dual typologies of nationalism

    Directory of Open Access Journals (Sweden)

    Subotić Milan

    2005-01-01

    Full Text Available Attempts at formulating a dichotomous classification of nations and nationalisms have proliferated in the relevant literature over a long period of time. In this study some of the most influential instances of dual typologies of nationalisms are selected for interpretation and analysis. The examples include Renan's under­standing of differences between the "French" and the "German" concepts of nation; Kohn's distinction between "eastern" and "western" nationalisms; a revision of Kohn's dichotomy suggested by J. Plamenatz; and a more recent version of dual typology propounded by L. Greenfield. By reconstructing the views of the selected theorists of nationalism, at the basis of all these typologies a dichotomous division into "civic" and "ethnic" nationalism is identified. Critical objections to this fundamental dual division are articulated at two levels. At the first, historical level, a socio-political contextualization of dual typologies points to their practical, political-ideological purposes. At the second, conceptual level, and drawing on the ideas of R. Brubaker, the author discusses analytical and normative weaknesses of the usual distinction between "civic" and "ethnic" nationalism.

  16. State health policy for terrorism preparedness.

    Science.gov (United States)

    Ziskin, Leah Z; Harris, Drew A

    2007-09-01

    State health policy for terrorism preparedness began before the terrorist attacks on September 11, 2001, but was accelerated after that day. In a crisis atmosphere after September 11, the states found their policies changing rapidly, greatly influenced by federal policies and federal dollars. In the 5 years since September 11, these state health policies have been refined. This refinement has included a restatement of the goals and objectives of state programs, the modernization of emergency powers statutes, the education and training of the public health workforce, and a preparation of the health care system to better care for victims of disasters, including acts of terrorism.

  17. Forgiveness, coping, and terrorism: do tendency to forgive and coping strategies associate with the level of posttraumatic symptoms of injured victims of terror attacks?

    Science.gov (United States)

    Weinberg, Michael; Gil, Sharon; Gilbar, Ora

    2014-07-01

    The study examined the tendency to forgive (self, others, and situations) and coping strategies (problem-focused, emotion-focused, and avoidance) among terror attack victims as associated with posttraumatic stress disorder (PTSD) symptom severity. The sample included 108 terror victims who had been injured in terror attacks (mean age 46.23, standard deviation = 11.61; 58.3% male). Participants agreed to undergo assessments of their PTSD symptoms, coping strategies, and tendency to forgive. A nested structural equation model design showed that tendency to forgive is positively associated with problem-focused coping and negatively associated with avoidance coping. Additionally, tendency to forgive and problem-focused coping are associated with decreased PTSD symptom severity, whereas emotion-focused coping is associated with elevated PTSD symptom severity. Tendency to forgive and coping strategies are significantly associated with each other and with severity of PTSD symptoms among individuals injured in terror attacks. Theoretical and clinical implications of the findings are discussed. © 2013 Wiley Periodicals, Inc.

  18. Hospitals: Soft Target for Terrorism?

    Science.gov (United States)

    De Cauwer, Harald; Somville, Francis; Sabbe, Marc; Mortelmans, Luc J

    2017-02-01

    In recent years, the world has been rocked repeatedly by terrorist attacks. Arguably, the most remarkable were: the series of four coordinated suicide plane attacks on September 11, 2001 on buildings in New York, Virginia, and Pennsylvania, USA; and the recent series of two coordinated attacks in Brussels (Belgium), on March 22, 2016, involving two bombings at the departure hall of Brussels International Airport and a bombing at Maalbeek Metro Station located near the European Commission headquarters in the center of Brussels. This statement paper deals with different aspects of hospital policy and disaster response planning that interface with terrorism. Research shows that the availability of necessary equipment and facilities (eg, personal protective clothing, decontamination rooms, antidotes, and anti-viral drugs) in hospitals clearly is insufficient. Emergency teams are insufficiently prepared: adequate and repetitive training remain necessary. Unfortunately, there are many examples of health care workers and physicians or hospitals being targeted in both political or religious conflicts and wars. Many health workers were kidnapped and/or killed by insurgents of various ideology. Attacks on hospitals also could cause long-term effects: hospital units could be unavailable for a long time and replacing staff could take several months, further compounding hospital operations. Both physical and psychological (eg, posttraumatic stress disorder [PTSD]) after-effects of a terrorist attack can be detrimental to health care services. On the other hand, physicians and other hospital employees have shown to be involved in terrorism. As data show that some offenders had a previous history with the location of the terror incident, the possibility of hospitals or other health care services being targeted by insiders is discussed. The purpose of this report was to consider how past terrorist incidents can inform current hospital preparedness and disaster response planning

  19. Is counter-terrorism policy evidence-based? What works, what harms, and what is unknown.

    Science.gov (United States)

    Lum, Cynthia; Kennedy, Leslie W; Sherley, Alison

    2008-02-01

    Is counter-terrorism policy evidence-based? What works, what harms, and what is unknown. One of the central concerns surrounding counter-terrorism interventions today, given the attention and money spent on them, is whether such interventions are effective. To explore this issue, we conducted a general review of terrorism literature as well as a Campbell systematic review on counter-terrorism strategies. In this article, we summarize some of our findings from these works. Overall, we found an almost complete absence of evaluation research on counter-terrorism strategies and conclude that counter-terrorism policy is not evidence-based. The findings of this review emphasise the need for government leaders, policy makers, researchers, and funding agencies to include and insist on evaluations of the effectiveness of these programs in their agendas.

  20. Systems analysis of past, present, and future chemical terrorism scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Hoette, Trisha Marie

    2012-03-01

    Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of the attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.

  1. Conflict and complexity countering terrorism, insurgency, ethnic and regional violence

    CERN Document Server

    Bar-Yam, Yaneer; Minai, Ali

    2015-01-01

    Complexity science affords a number of novel tools for examining terrorism, particularly network analysis and NK-Boolean fitness landscapes as well as other tools drawn from non-linear dynamical systems modeling. This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.

  2. Mass media as an Effective Tool for Prevention of Socio-psychological Factors in the Development of Terrorism

    Directory of Open Access Journals (Sweden)

    Yuri P. Zinchenko

    2009-01-01

    Full Text Available Recently mass media play crucial role in social counterterrorism activity. The article is devoted to analysis of possibilities of mass media in prevention of the development of terrorism. Socio-psychological factors of development of terrorism, including concept of “contributing events” as well as hypothesis “frustration-aggression” are studied. The psychological component of terrorism in three major attitudes is considered in the article: psychology of terrorism, psychology of counteraction to terrorism, and using mass media for prevention the development of terrorism. Specific features and the external factors promoting involving into terrorism are analysed. Role of mass media in covering the information about terrorism events is analysed from point of view related to prevention of development of terrorism. Some key recommendations on counterterrorism activity using mass media means are formulated.

  3. “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects

    Directory of Open Access Journals (Sweden)

    Joshua Sinai

    2014-02-01

    Full Text Available This column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by significant publishers (listed in alphabetical order - capsule reviews of 13 important books published by CRC Press. 

  4. On Terrorism: An Analysis of Terrorism as a Form of Warfare

    Science.gov (United States)

    1987-09-01

    unwitting political terrorists subconsciously reacting to their political and social environment. Given this, it is necessary to subject the...overt political rationale, there are some who would argue that it was, at least subconsciously , a product of sincere political motivations. For example...Isolate 3) Expansion Guerrilla War Physically Isolate 4) Victorious Conventional Physically Destroy 5) Consolidation Terrorism Reprogram Populace 6

  5. The dislocations of terror: Assessments of risk during the Second Intifada.

    Science.gov (United States)

    Spilerman, Seymour; Stecklov, Guy

    2013-05-01

    The goal of terrorism is to create havoc and disrupt the normal functioning of society. To understand the impact of terrorism on a country it is useful to consider two types of country experiences with these shocks to the social order-the instance of a very small number of attacks against high profile targets and the case of chronic terror with a great number of attacks, generally against targets that are part of routine daily activities. The present study explores the Israeli experience with chronic terror. Using expenditure information from coffee shops and restaurants we examine how individuals assess their vulnerability to an attack and adjust their behavior. Specifically, we explore whether distance from the site of an attack, and similarity of a contemplated undertaking to the target of a recent attack, influence decision making in a context of chronic terror. We find strong support for a situational similarity effect but only weak evidence for a proximity effect. We examine the implications of these findings for the organization of economic activity. Copyright © 2012 Elsevier Inc. All rights reserved.

  6. Teaching Guide on International Terrorism: Definitions, Causes, and Responses.

    Science.gov (United States)

    United States Inst. of Peace, Washington, DC.

    Dealing with terrorism has become the centerpiece of United States foreign policy today. Yet terrorism--its definition, causes, and methods of dealing with it--has rarely been dealt with in high school courses. The United States Institute of Peace has developed this 3-lesson plan (for 45-minute class periods) teaching guide, aimed at grades 11 and…

  7. Terror explosive injuries: a comparison of children, adolescents, and adults.

    Science.gov (United States)

    Jaffe, Dena H; Peleg, Kobi

    2010-01-01

    We sought to characterize injuries and outcomes from terror explosions with specific attention to children (0-10 years) and adolescents (11-15 years) compared to adults (16-45 years). Terror explosions target vulnerable populations and result in multidimensional injuries that may vary according to age group. The relative dearth of information regarding terror-related injuries among children inhibits proper preparedness and optimum management during such an event. A retrospective study was performed using data from the national Israel Trauma Registry (October 2000 to December 2005). Included were civilians and nonactive military personnel hospitalized as a result of a terror explosion. During the 5.3-year study period, 49 children (0-10 years), 65 adolescents (11-15 years), and 723 adults (16-45 years) were hospitalized from terror explosions. Children were more likely than adults to sustain severe injuries (27% vs. 12%) and traumatic brain injury (35% vs. 20%) and less likely to sustain injuries to their extremities (35% vs. 57%) or open wounds (39% vs. 59%) (P profile was similar to that of adults, however, adolescents presented with less internal injuries, more contusions, and superficial wounds to extremities and were more likely to require surgery for mild to moderate wounds. Differences in hospital utilization and outcomes by age groups were observed when data were stratified by injury severity. Compared to adults, children, and adolescents exposed to terror explosions present with different injuries and hospital utilization and outcomes. These results further confirm that preparedness of a pediatric healthcare system is essential for effective management in the event of a future mass casualty incident.

  8. MEANS OF CHEMICAL RECONNAISSANCE AND CONTROL IN THE FIGHT AGAINST CBRN TERRORISM

    Directory of Open Access Journals (Sweden)

    Dušan VIČAR

    2013-01-01

    Full Text Available The chemical, biological, radiological and nuclear terrorism (CBRN terrorism is a special form of terrorism known for its extraordinary efficiency as superterrorism or ultra-terrorism. Detection and identification of the presence of hazardous chemical toxic substances is very difficult and can be achieved only by using advanced detection and monitoring instruments and devices that are currently only in the equipment of units of the Fire and Rescue Service of the Czech Republic and some units of the chemical troops of the Czech Army. Instigators of chemical terrorism count on the surprise factor, as well as on the difficulty and great delay in detecting the presence of hazardous chemical toxic substances. Therefore, for early warning of the population and minimization of consequences of a terrorist attack with the use of hazardous chemicals, the ability of early detection and subsequent identification is very important.

  9. The Study of Terrorism: An Interdisciplinary Approach for the Classroom.

    Science.gov (United States)

    Kumamoto, Bob

    1993-01-01

    Asserts that terrorism, in its domestic and international forms, is a subject worthy of attention in social studies. Provides a list of causes of terrorism, a list of reasons why the United States is often a terrorist target, and three application lesson ideas. (CFR)

  10. Who Prepares for Terrorism?

    Science.gov (United States)

    Bourque, Linda B.; Mileti, Dennis S.; Kano, Megumi; Wood, Michele M.

    2012-01-01

    The National Survey of Disaster Experiences and Preparedness (NSDEP) examined whether households in the United States have engaged in proactive preparedness and avoidance activities since September 11, 2001, and whether the activities reported were done because of terrorism, natural disasters, other reasons, or any combination of reasons. Reported…

  11. Childhood night terrors and sleepwalking: diagnosis and treatment

    OpenAIRE

    Sachin Ratan Gedam; Pradeep S. Patil; Imran Ali Shivji

    2017-01-01

    Night terrors and sleepwalking are arousal disorders that occur during the first third of night. Combined existence of sleep disorders are rare phenomenon and found to be associated with behavioural and emotional problems. It becomes difficult to diagnose among sleep disorders and epilepsy is an important differential diagnosis. Management with combined approach of pharmacotherapy and psychological counselling is safe and effective. Here, we present a case of night terrors and sleepwalking to...

  12. Youth, terrorism and education: Britain’s Prevent programme

    OpenAIRE

    Thomas, Paul

    2016-01-01

    Since the 7/7 bombings of July 2005, Britain has experienced a domestic terror threat posed by a small minority of young Muslims. In response, Britain has initiated ‘Prevent’, a preventative counter-terrorism programme. Building on previous, general critiques of Prevent, this article outlines and critically discusses the ways in which Prevent has approached young Muslims and their educational institutions. The article argues that, rather than trust in broader and non-stigmatising processes of...

  13. A Typology of International Student Community Engagement

    Science.gov (United States)

    Fleischman, David; Raciti, Maria; Lawley, Meredith

    2014-01-01

    This paper presents an empirical study undertaken to develop a typology of international student community engagement activities that incorporates the perceptions of three key stakeholder groups--the international students, the community and the university. Framed by the notion of value co-creation, our exploratory study was undertaken at a…

  14. Terrorism and Counter-Terrorism Strategies in a Globalised World : alternative perceptiveness of terrorist emergence theory and policing strategies confrontation with human rights

    OpenAIRE

    Kikkas, Margit

    2015-01-01

    Globalisation and development in technology have advanced terrorism to reach a broader target audience. Especially focussing at the international co-operation strategies and combined social networks, terrorist activities have an direct- and indirect effect on private households, international commerce and local governments. Security institutions and state organisations use various combinations of counter- terrorism measures, that are mostly social-, political-, or financial in nature. Neverth...

  15. 75 FR 30106 - Terrorism Risk Insurance Program; Recordkeeping Requirements for Insurers Compensated Under the...

    Science.gov (United States)

    2010-05-28

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Recordkeeping Requirements for... Budget. The Terrorism Risk Insurance Program Office within the Department of the Treasury is soliciting... original and two copies) to: Terrorism Risk Insurance Program, Public Comment Record, Suite 2100...

  16. The Shared Building Portfolio: an exploration and typology

    DEFF Research Database (Denmark)

    Brinkø, Rikke; Meel, Juriaan van; Nielsen, Susanne Balslev

    2014-01-01

    Purpose: The purpose of this paper is to explore shared-use of facilities as a concept that can help organizations to make better, more sustainable use of their building portfolios. The practical aim is to present a typology to help classify, describe and evaluate the different options for sharing...... facilities from a facility manager’s point of view. Background (State of the Art) : Space management literature provides examples and concepts for sharing space, such as ‘hot-desking’, within a given organisational and physical setting. However, this literature rarely deals with sharing on a building level...... of municipalities and larger companies. It can help them get a better understanding of how they can minimize the need for building new by better utilization of the existing building stock for increased sustainability or as a corporate-socialresponsibility activity. Research limitations: The typology is a work...

  17. Outline of a typology of men’s use of anabolic androgenic steroids in fitness and strength training environments

    DEFF Research Database (Denmark)

    Christiansen, Ask Vest; Vinther, Anders Schmidt; Liokaftos, Dimitrios

    2017-01-01

    to develop theoretical frameworks directed at conceptualising the variance in AAS use. In this paper, we propose a unified framework in the form of a typology, which concerns men’s general approach to AAS use. The typology is based on sociologist Max Weber’s method on the ideal typology. The work comes out...

  18. Terrorism in Australia: factors associated with perceived threat and incident-critical behaviours.

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Barr, Margo; Raphael, Beverley; Jorm, Louisa

    2009-03-27

    To help improve incident preparedness this study assessed socio-demographic and socio-economic predictors of perceived risk of terrorism within Australia and willingness to comply with public safety directives during such incidents. The terrorism perception question module was incorporated into the New South Wales Population Health Survey and was completed by a representative sample of 2,081 respondents in early 2007. Responses were weighted against the New South Wales population. Multivariate analyses indicated that those with no formal educational qualifications were significantly more likely (OR = 2.10, 95%CI:1.32-3.35, p terrorism risk perception and concerns regarding potential impacts. The pattern of concern and response among those of migrant background may reflect secondary social impacts associated with heightened community threat, rather than the direct threat of terrorism itself. These findings highlight the need for terrorism risk communication and related strategies to address the specific concerns of these sub-groups as a critical underpinning of population-level preparedness.

  19. Terrorism in Australia: factors associated with perceived threat and incident-critical behaviours

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Barr, Margo; Raphael, Beverley; Jorm, Louisa

    2009-01-01

    Background To help improve incident preparedness this study assessed socio-demographic and socio-economic predictors of perceived risk of terrorism within Australia and willingness to comply with public safety directives during such incidents. Methods The terrorism perception question module was incorporated into the New South Wales Population Health Survey and was completed by a representative sample of 2,081 respondents in early 2007. Responses were weighted against the New South Wales population. Results Multivariate analyses indicated that those with no formal educational qualifications were significantly more likely (OR = 2.10, 95%CI:1.32–3.35, p terrorism risk perception and concerns regarding potential impacts. The pattern of concern and response among those of migrant background may reflect secondary social impacts associated with heightened community threat, rather than the direct threat of terrorism itself. These findings highlight the need for terrorism risk communication and related strategies to address the specific concerns of these sub-groups as a critical underpinning of population-level preparedness. PMID:19323842

  20. The Revised Academic Consensus Definition of Terrorism

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2012-05-01

    Full Text Available Terrorism is a contested concept. While there are many national and regional definitions, there is no universal legal definition approved by the General Assembly of the United Nations (the one proposed by the Security Council in Res. 1566 (2004 is non-binding, lacking legal authority in international law. The Ad Hoc Committee on Terrorism of the 6th (legal Committee of the General Assembly has, with some interruptions, been trying to reach a legal definition since 1972 - but in vain. In the absence of a legal definition, attempts have been made since the 1980s to reach agreement on an academic consensus definition. The latest outcome is the revised definition reprinted below. It is the result of three rounds of consultations among academics and other professionals. A description how it was arrived at can be found on pp. 39 - 98 of Alex P. Schmid (Ed.. The Routledge Handbook of Terrorism Research. London and New York: Routledge, 2011. The same volume also contains 260 other definitions compiled by Joseph J. Easson and Alex P. Schmid on pp. 99 -200.

  1. A Typology of Maritally Violent Men and Correlates of Violence in a Community Sample.

    Science.gov (United States)

    Delsol, Catherine; Margolin, Gyala; John, Richard S.

    2003-01-01

    Tests A. Holtzworth-Munroe and G. L. Stuart's (1994) typology of male batterers in a community sample. Analyses based on severity of physical aggression, generality of violence, and psychopathology partially replicated the Holtzworth-Munroe and Stuart typology by identifying 3 types of violent men: family-only, medium-violence, and generally…

  2. Psychological consequences caused by nuclear terrorism

    International Nuclear Information System (INIS)

    Peyankov, I.

    2009-01-01

    The psychological consequences caused by eventual nuclear terrorist act are believed to be some of the most: serious. in this article are presented the issues concerning psychological effects as psychological suffering, alteration of risk estimation, changes of individual and social behavior, etc. The most common psychological consequences as a result of the most popular large-scale nuclear accidents in Chernobyl, TMI (USA), Goiania (Brazil) are described. Some of the main factors, such as sex, age, health status, social status and etc, are analyzed. These factors determine the expression of psychological reactions provoked by nuclear accidents or eventual act of nuclear terrorism. In addition, the main precautions to cope with psychological consequences caused by nuclear terrorism are listed

  3. Mortise terrorism on the main pipelines

    Science.gov (United States)

    Komarov, V. A.; Nigrey, N. N.; Bronnikov, D. A.; Nigrey, A. A.

    2018-01-01

    The research aim of the work is to analyze the effectiveness of the methods of physical protection of main pipelines proposed in the article from the "mortise terrorism" A mathematical model has been developed that made it possible to predict the dynamics of "mortise terrorism" in the short term. An analysis of the effectiveness of physical protection methods proposed in the article to prevent unauthorized impacts on the objects under investigation is given. A variant of a video analytics system has been developed that allows detecting violators with recognition of the types of work they perform at a distance of 150 meters in conditions of complex natural backgrounds and precipitation. Probability of detection is 0.959.

  4. Managing diversity and European policy: Towards a typology for sport pedagogy.

    Science.gov (United States)

    Dinold, Maria; Diketmüller, Rosa; Grix, Jonathan; Phillpots, Lesley

    2013-01-01

    This article adds to the growing body of knowledge in sport pedagogy and focuses specifically upon the intersection of gender and disability. Its purpose is twofold, to create a typology for examining good practice in sport pedagogy that is reflective and inclusive and raises awareness of the diverse needs of all participants in physical activity 'regardless' of gender and ability for all children. We acknowledge that access to physical activity, education and sport are complex and multifaceted, however, the main purpose of this paper is to raise awareness of 'diversity' by focusing specifically upon the role of gender and ability. Through an examination of gender and disability policies in official European Union (EU) policy documents and commercial examples of policy-in-practice we propose a typology for diversity and diversity management. A close look at EU level is instructive because national policies of the member countries vary a lot with respect to diversity issues but should be in accordance in the main areas. Such a reading enables the building of a typology of recommendations for how such policy can be rendered in sport pedagogy practice. We suggest six significant, but related principles that include (1) mainstreaming; (2) teaching and coaching sensitive to difference; (3) empowerment; (4) inclusion; (5) adaptation; and (6) inner differentiation. This holistic typology seeks to 'mainstream' issues of gender and disability policy by providing a set of principles that can be applied to a range of teaching and coaching settings.

  5. Research approach for forming a new typology of spatial planning theory

    Directory of Open Access Journals (Sweden)

    Bulajić Vladan

    2011-01-01

    Full Text Available What is being suggested in this paper is the research approach for the classification of theoretical contributions in the scientific domain of the spatial planning. Typology is a multidimensional classification, actually it is the framework for the understanding of the subject area, theory and practice, ideas and methodologies. The complex approach is needed to organize the complex and diverse domain of spatial planning theory, which has been shaped by different schools of thought and the influences of the related scientific disciplines. It has been suggested that the research approach becomes the bridge between two cultures, in other words it should be the synthesis of the qualitative and quantitative methods of the typology construction. With the analysis of the existing typologies, which are quantitatively derived, the chosen concepts will be improved and completed due to the computerized statistical analysis of the appropriate bibliometrical data. Moreover, the procedure in the opposite direction will be used, which also connects empiric types with their conceptual counterparts. With that approach, the main aim is to achieve the comprehensive classification scheme, which will take part of the platform for integration of the interdisciplinary approach in the spatial planning domain. That concept of the research belongs to the wider approach that has got the aim that with the scientific innovations and imaginations bring about the solving of the problems and challenges that the spatial planning faces with. The forming of the new typology is the first step in that direction.

  6. The IAEA Nuclear Security Programme Combating Nuclear Terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    Discusses the four threats of nuclear terrorism,which are theft of a nuclear weapon, theft of material to make an improvised nuclear explosive device,theft of other radioactive material for an Radiological dispersal device and sabotage of a facility or transport. The IAEA Nuclear Security programme combating Nuclear Terrorism therefore adopts a comprehensive approach. The programme addresses the need to cover nuclear and other radioactive materials, nuclear facilities and transports, non-nuclear, medical and industrial applications of sources

  7. Remotely Piloted Innovation: Terrorism, Drones and Supportive Technology

    Science.gov (United States)

    2016-10-01

    Michael Jenkins , most of “today’s terrorists want a lot of people watching and a lot of people dead.”1 To accomplish these objectives, and to outbid...Michael Jenkins , The New Age of Terrorism (Santa Monica, CA: RAND Corporation, 2006), p. 119. 2 For example, see “Iraq Sees Worst Bombing Since...see Henry H. Willis et al., Estimating Terrorism Risk (Santa Monica, CA: RAND Corporation, 2005); and John A. Major, “Advanced Techniques for Modeling

  8. 78 FR 30934 - Agency Information Collection Activities: Customs-Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2013-05-23

    ... Activities: Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... information collection requirement concerning the Customs-Trade Partnership Against Terrorism (C-TPAT). This... information collection: Title: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077...

  9. Defining Terrorism at the Special Tribunal for Lebanon

    Directory of Open Access Journals (Sweden)

    Prakash Puchooa

    2011-11-01

    Full Text Available On 16 February 2011, the Appeals Chamber of the Special Tribunal for Lebanon (STL issued an interlocutory decision regarding the legal definition of terrorism.This decision was in response to a Pre-Trial Chamber (PTC list of questions requesting,' inter alia', an elaboration of the elements of this crime.In exploring this matter, the Appeals Chamber defined the subjective ('mens rea' and objective elements ('actus reus' of terrorism by referring to domestic Lebanese law and international law. It thereby set out the applicable law for the court. The consequence of this decision however is not limited to the law of STL but may be seen as having far-reaching consequences for the conception of terrorism under both international law and International Criminal Law (ICL. Given the significance of the Appeals Chamber judgment, this paper will scrutinise three areas of concern regarding its propriety:

  10. Forensic Speaker Recognition Law Enforcement and Counter-Terrorism

    CERN Document Server

    Patil, Hemant

    2012-01-01

    Forensic Speaker Recognition: Law Enforcement and Counter-Terrorism is an anthology of the research findings of 35 speaker recognition experts from around the world. The volume provides a multidimensional view of the complex science involved in determining whether a suspect’s voice truly matches forensic speech samples, collected by law enforcement and counter-terrorism agencies, that are associated with the commission of a terrorist act or other crimes. While addressing such topics as the challenges of forensic case work, handling speech signal degradation, analyzing features of speaker recognition to optimize voice verification system performance, and designing voice applications that meet the practical needs of law enforcement and counter-terrorism agencies, this material all sounds a common theme: how the rigors of forensic utility are demanding new levels of excellence in all aspects of speaker recognition. The contributors are among the most eminent scientists in speech engineering and signal process...

  11. Extreme Left Terrorism in Contemporary Europe: from “Communist Combatant Parties” to Militant Campaigns?

    Directory of Open Access Journals (Sweden)

    Miroslav Mareš

    2007-12-01

    Full Text Available The aim of this paper is to analyze the strategy and tactics of the of extreme left terrorism in Europe. Traditional red terrorist organizations (combatant communist parties like the RAF, the RB etc. have been replaced by small militant groups, by violent militancy campaigns, by anti-globalist violence or by “single-issue” terrorism. The militant extreme left may itself be both a direct and indirect ally to other forms of terrorism, including Islamist terrorism.

  12. A networks analysis of terrorism in Africa: implications for Kenya

    Directory of Open Access Journals (Sweden)

    Steven Kigen Morumbasi

    2016-12-01

    Full Text Available This paper highlights the challenges that the international community faces in responding to the terrorists and the need to change tactics to respond more effectively to an increasingly nebulous enemy. Terrorism can take different forms and is perpetrated by both state and non-state actors. This research looks into the network structure of terrorism and terrorist groups. In the contemporary setting, terrorist organizations operate transnationally hence the use of the term ‘terrorism without borders’. An enabling factor of terrorism today is the network structure that it has adopted which gives it the ability to both project its reach and prevent easy infiltration. The network structure has also brought about renewed interests in Africa, where global terror networks such as al-Qaeda and the Islamic State compete for influence. Boko Haram in West Africa is an affiliate of the Islamic State and this provides possible linkages with the Islamic State in Libya. Boko Haram refers to itself as the Islamic State’s Western Province. Al-Shabaab has dominated headlines by carrying out deadly attacks in East Africa. The al-Qaeda affiliate has however faced resistance from a section of its members who seek ties with the Islamic State. This resulted in the formation of Jabha East Africa, a group that aligns itself to the Islamic State. The Sinai Peninsula has also witnessed an upsurge of terror attacks perpetrated by the Sinai Province, which views itself as a province of the Islamic State. This surmounts to a complex network structure of terrorist networks in Africa and the growing threat to militant Islam. The special attention is paid to analysis of terrorist challenges in Kenia.

  13. The Newsworthiness of International Terrorism.

    Science.gov (United States)

    Weimann, Gabriel; Brosius, Hans-Bernd

    1991-01-01

    Investigates the newsworthiness of international terrorism. Relates the concept of deviance as a predictor of newsworthiness to the specific attributes of terrorist events and their impact on media selection (coverage or no coverage) and prominence of coverage. (SR)

  14. Coping with Fear of and Exposure to Terrorism among Expatriates

    Directory of Open Access Journals (Sweden)

    Nicholas J. Beutell

    2017-07-01

    Full Text Available This paper examines existing research on the impact of terrorism on expatriate coping strategies. We consider pre-assignment fear of terrorism, in-country coping strategies, and anxiety and posttraumatic stress disorder (PTSD associated with repatriation. The extant research is small but growing. Our model for expatriate coping at the pre-departure, in-country, and repatriation stages includes strategies specific to each stage. Preparation using proactive coping, systematic desensitization, problem and emotion focused coping, social support, and virtual reality explorations are recommended. Selecting expatriate candidates who are well-adjusted, emotionally intelligent, and possessing good coping skills is essential for successful assignments in terror-prone regions.

  15. Coping with Fear of and Exposure to Terrorism among Expatriates.

    Science.gov (United States)

    Beutell, Nicholas J; O'Hare, Marianne M; Schneer, Joy A; Alstete, Jeffrey W

    2017-07-19

    This paper examines existing research on the impact of terrorism on expatriate coping strategies. We consider pre-assignment fear of terrorism, in-country coping strategies, and anxiety and posttraumatic stress disorder (PTSD) associated with repatriation. The extant research is small but growing. Our model for expatriate coping at the pre-departure, in-country, and repatriation stages includes strategies specific to each stage. Preparation using proactive coping, systematic desensitization, problem and emotion focused coping, social support, and virtual reality explorations are recommended. Selecting expatriate candidates who are well-adjusted, emotionally intelligent, and possessing good coping skills is essential for successful assignments in terror-prone regions.

  16. A typology of longitudinal integrated clerkships.

    Science.gov (United States)

    Worley, Paul; Couper, Ian; Strasser, Roger; Graves, Lisa; Cummings, Beth-Ann; Woodman, Richard; Stagg, Pamela; Hirsh, David

    2016-09-01

    Longitudinal integrated clerkships (LICs) represent a model of the structural redesign of clinical education that is growing in the USA, Canada, Australia and South Africa. By contrast with time-limited traditional block rotations, medical students in LICs provide comprehensive care of patients and populations in continuing learning relationships over time and across disciplines and venues. The evidence base for LICs reveals transformational professional and workforce outcomes derived from a number of small institution-specific studies. This study is the first from an international collaborative formed to study the processes and outcomes of LICs across multiple institutions in different countries. It aims to establish a baseline reference typology to inform further research in this field. Data on all LIC and LIC-like programmes known to the members of the international Consortium of Longitudinal Integrated Clerkships were collected using a survey tool developed through a Delphi process and subsequently analysed. Data were collected from 54 programmes, 44 medical schools, seven countries and over 15 000 student-years of LIC-like curricula. Wide variation in programme length, student numbers, health care settings and principal supervision was found. Three distinct typological programme clusters were identified and named according to programme length and discipline coverage: Comprehensive LICs; Blended LICs, and LIC-like Amalgamative Clerkships. Two major approaches emerged in terms of the sizes of communities and types of clinical supervision. These referred to programmes based in smaller communities with mainly family physicians or general practitioners as clinical supervisors, and those in more urban settings in which subspecialists were more prevalent. Three distinct LIC clusters are classified. These provide a foundational reference point for future studies on the processes and outcomes of LICs. The study also exemplifies a collaborative approach to medical

  17. QUALITY ASSURANCE GUIDELINES FOR LABORATORIES PERFORMING FORENSIC ANALYSIS OF CHEMICAL TERRORISM

    Science.gov (United States)

    The Scientific Working Group on Forensic Analysis of Chemical Terrorism (SWGFACT) has developed the following quality assurance guidelines to provide laboratories engaged in forensic analysis of chemical evidence associated with terrorism a framework to implement a quality assura...

  18. Psychology of Terrorism

    Science.gov (United States)

    2007-12-14

    and logistic support. 160. Kfir, N. (2002). Understanding suicidal terror through humanistic and existential psychology. C. E. Stout (Ed), The...anomie or for an existential vacuum, which may drive other individuals to drifting or to entering the drug culture. - To understand the differences...any group of prisoners is by definition ‘survivalist’, yet that of the Red Brigades has evolved through three phases ‘social’, ‘ existential ’ and

  19. Addressing the Cyber-security and Cyber-terrorism Threats [video

    OpenAIRE

    Robi Sen; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    While cyber terrorism is a relatively new threat in the world of national defense, the security issues we face are not necessarily new as a genre. In this segment, Chief Science Officer Robi Sen draws on the changing attitudes towards the cyber world. Topics include cooperation between law enforcement and hackers, the major motivations behind criminal hacking, and the realistic threats of cyber terrorism.

  20. Visions of the future: social processes and terrorism in Europe.

    Science.gov (United States)

    Reshetnikov, Mikhail

    2008-11-01

    When we think of terrorism, we tend to think of Islamic terrorism but in fact most of the violent happenings in our societies are caused by 'domestic terrorism' and it has been suggested by authors such as Twemlow that there is a developmental continuum between social activism and terrorism. The generalized rise in what the author terms 'a terrorist worldview' has been linked to many different social, political, economic and psychological conflicts but the present paper suggests that this is not sufficient and that in order to understand it it is necessary to take into consideration certain processes in contemporary civilization. At present, I am suggesting that Western civilization is characterized by the generalized breakdown of values and of signifying structures and by the gradual weakening of the models of state power and institutions that previously guaranteed the unity and security of our societies. The result is a crisis of identity which is particularly evident among the youth of today and when this is exasperated by the failure of authority to provide an adequate explanatory system of contemporary reality and by the tendency to resort to repressive mechanisms, all too often the result is the degeneration of social activism into social violence. It is becoming urgent that our societies reflect on more efficient ways of preventing social activism degenerating into terrorism, both internationally and domestically.

  1. Konservatismen og den højreradikale terror

    DEFF Research Database (Denmark)

    Skov, Christian Houlberg

    2011-01-01

    Den norske højreekstremist Anders Behring Breiviks terror mod det norske samfund har herhjemme ledt til en voldsom debat om blandt andet forbindelsen mellem tonen i debatten og terrorangrebet og forholdet mellem den siden 2001 meget omtalte kulturkonservatisme og Anders Breiviks terrorhandling....... Essayet Konservatismen og den højreradikale terror forsøger dels at skabe klarhed over fronterne i debatten, dels at rette en kritik mod såvel tendensen til at afskrive handlingen som uforståelig som af tendensen til at slå den bredere højrefløjs kritik af multikulturalismen i hartkorn med Breiviks...

  2. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    Directory of Open Access Journals (Sweden)

    Asadi NEJMAH

    2015-11-01

    Full Text Available The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the extensive publicity its activity gains in public, through electronic and printed media. In terrorism, a blow to the “soft stomach” of the state (civilians is performed, with the purpose of causing the state to give in to the demands of terrorism operators. In the basis of terrorism is also an objection to the basis of legitimacy of the ruling government, in that it is not capable of guarantying the safety of its citizens and maintain public order. This article presents the attitudes and ways of operation of terrorist organizations and how Western intelligence attempts to thwart, foil and prevent these organizations from casing for destruction and victims in human lives and state.COMBATEREA TERORISMULUI ISLAMIC PRIN WESTERN INTELLIGENCE Chiar de la înfiinţare, statul Israel s-a confruntat, în viaţa de zi cu zi, cu organizaţiile teroriste, care urmăresc să-l distrugă. Actele de terorism, aşa cum reiese din sensul originar al cuvântului – frică, anxietate, teroare, sunt menite să implanteze frica în rândul populaţiei, s-o demoralizeze şi să perturbeze viaţa cotidiană. Uneori teroarea se dovedeşte a fi un act de răzbunare. Prin acte de terorism se dă o lovitură la „stomacul moale” al statului, adică civililor. Actele de terorism sunt comise, de asemenea, pentru a „demonstra” lipsa de legitimitate a statului, incapacitatea lui de a asigura securitatea cetăţenilor săi. În articol sunt specificate modalităţile de func

  3. A Typology of Techniques for Motivation of Personnel at Mechanical Engineering Enterprises

    Directory of Open Access Journals (Sweden)

    Melnyk Olga G.

    2015-03-01

    Full Text Available The purpose of the article is to develop a typology of techniques for motivation of personnel at mechanical engineering enterprises providing for systematization of their forms on the basis of a number of the existing features and identified new ones, which are justified by the requirements of today. There has been proved the fragmentary character of developments in this area making it impossible to form basic prerequisites for studying the concept. It has been found that certain features of the typology of methods for motivating employees may also be signs of a typology of techniques for motivation of personnel at enterprises of mechanical engineering industry. Among the current signs of a typology of techniques for motivation of personnel at mechanical engineering enterprises it is proposed to use the following ones: the nature of the impact; results obtained, object of the impact; direction; nature of the objectives; scope of the anticipated changes in the existing motivation system; nature of the needs, at which the techniques are directed. In addition, expediency of introducing new features of the typology, namely: the novelty level (classic and innovative motivation techniques, level of individualization (individual and standard; level of formalization (formalized at the high, medium and low level, source of the need for formation and implementation (the techniques, which necessity is specified by the enterprise, and the techniques, which necessity is specified by the business environment, origin («field» and «office» ones. These results allow forming a holistic view of the diversity of techniques for motivation of personnel at mechanical engineering enterprises as well as reasonable choosing among them their individual types at improving the motivation system. Prospects for further research in this direction should be allocation and systematization of the factors influencing the choice of one or another technique for motivation of

  4. 78 FR 44961 - Agency Information Collection Activities; Customs-Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2013-07-25

    ... Activities; Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... accordance with the Paperwork Reduction Act: Customs-Trade Partnership Against Terrorism (C-TPAT). This is a...: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract...

  5. Cyber security in nuclear industry – Analytic study from the terror incident in nuclear power plants (NPPs)

    International Nuclear Information System (INIS)

    Cho, Hyo Sung; Woo, Tae Ho

    2017-01-01

    Highlights: • The cyber terrorism in NPPs of South Korea shows the study motivations. • Analyses of the cyber terrorism in NPPs are investigated. • Designed solutions for the cyber terrorism in NPPs are discussed. • South Korean case is considered as the cyber terrorism in NPPs. - Abstract: The cyber terrorism for nuclear power plants (NPPs) is investigated for the analytic study following the South Korean case on December 2014. There are several possible cyber terror attacks in which the twelve cases are studied for the nuclear terror cases including the computer hacking and data stealing. The defense-in-depth concept is compared for cyber terrorism, which was imported from the physical terror analysis. The conventional three conditions of the physical protection system (PPS) are modified as prevention, detection, and response. The six cases are introduced for the solutions of the facility against the possible cyber terrorism in NPPs. The computer hacking methods and related solutions are analyzed for the applications in the nuclear industry. The nuclear security in the NPPs could be an extremely serious condition and the remedies are very important in the safe plant operations. In addition, the quantitative modeling study is performed.

  6. Terrorism in South Africa.

    Science.gov (United States)

    MacFarlane, Campbell

    2003-01-01

    The Republic of South Africa lies at the southern tip of the African continent. The population encompasses a variety of races, ethnic groups, religions, and cultural identities. The country has had a turbulent history from early tribal conflicts, colonialisation, the apartheid period, and post-apartheid readjustment. Modern terrorism developed mainly during the apartheid period, both by activities of the state and by the liberation movements that continued to the time of the first democratic elections in 1994, which saw South Africa evolve into a fully representative democratic state with equal rights for all. Since 1994, terrorist acts have been criminal-based, evolving in the Cape Town area to political acts, largely laid at the feet of a predominantly Muslim organisation, People against Gangsterism and Drugs, a vigilant organisation allegedly infiltrated by Muslim fundamentalists. Along with this, has been terrorist activities, mainly bombings by disaffected members of white, right-wing groups. In the apartheid era, a Draconian series of laws was enacted to suppress liberation activities. After 1994, most of these were repealed and new legislation was enacted, particularly after the events of 11 September 2001; this legislation allows the government to act against terrorism within the constraints of a democratic system. Disaster management in South Africa has been largely local authority-based, with input from provincial authorities and Civil Defence. After 1994, attempts were made to improve this situation, and national direction was provided. After 11 September 2001, activity was increased and the Disaster Management Act 2002 was brought into effect. This standardized disaster management system at national, provincial, and local levels, also facilites risk assessment and limitation as well as disaster mitigation. The potential still exists for terrorism, mainly from right-wing and Muslim fundamentalist groups, but the new legislation should stimulate disaster

  7. An integrative typology of personality assessment for aggression: implications for predicting counterproductive workplace behavior.

    Science.gov (United States)

    Bing, Mark N; Stewart, Susan M; Davison, H Kristl; Green, Philip D; McIntyre, Michael D; James, Lawrence R

    2007-05-01

    This study presents an integrative typology of personality assessment for aggression. In this typology, self-report and conditional reasoning (L. R. James, 1998) methodologies are used to assess 2 separate, yet often congruent, components of aggressive personalities. Specifically, self-report is used to assess explicit components of aggressive tendencies, such as self-perceived aggression, whereas conditional reasoning is used to assess implicit components, in particular, the unconscious biases in reasoning that are used to justify aggressive acts. These 2 separate components are then integrated to form a new theoretical typology of personality assessment for aggression. Empirical tests of the typology were subsequently conducted using data gathered across 3 samples in laboratory and field settings and reveal that explicit and implicit components of aggression can interact in the prediction of counterproductive, deviant, and prosocial behaviors. These empirical tests also reveal that when either the self-report or conditional reasoning methodology is used in isolation, the resulting assessment of aggression may be incomplete. Implications for personnel selection, team composition, and executive coaching are discussed. 2007 APA, all rights reserved

  8. The Construction of Macro-events. A typological perspective

    DEFF Research Database (Denmark)

    Pedersen, Johan

    2009-01-01

    languages. The discussion originates in a contrastive analysis of a short story by H. C. Andersen available in six parallel versions: the original Danish version, an English, a German, a Spanish, an Italian and a French version. The paper argues that the generalized version of the typology (Talmy 1991, 2000....... Constructions of the main information (MIC) and the supportive information (SIC), of varying degree of specificity, are the basic constituents of the typology. From this point of view, Germanic languages tend to map the main information (MI) onto a complex schematic construction and the supportive information...... (SI) onto a lexical (verbal) construction. Romance languages tend to map the MI onto the verb, while the SI may be mapped onto a complex schematic construction. The paper hypothesizes that MIC and SIC stem from generalizations from usage, that they have their own, procedural role in grammar...

  9. A Content Analysis Study on Ankara Reductions in the Framework of Terrorities in Turkey

    OpenAIRE

    AKSOY, GONCA PERVİN; NİSAN, FATMA

    2017-01-01

    Terrorism is one of the topics that have gained importance in the agenda in recent years. Both the concept of terrorism and terrorist incidents cover a long period of time. Terrorism which is a problem that is being tackled all over the World are the most important national security problem that need to be solved in Turkey. Especially in the past 30-35 years of history in Turkey, terrorism has been one of the important issue on the agenda since the first da...

  10. Combatting Terrorism: A New National Strategy

    National Research Council Canada - National Science Library

    Hoover, Bruce

    1997-01-01

    .... Conducted by organized, highly trained, and technologically sophisticated paramilitary units, terrorism is in fact a form of warfare waged against the United States and its allies. But current U.S...

  11. Why do I dread looking old?: A test of social identity theory, terror management theory, and the double standard of aging.

    Science.gov (United States)

    Chonody, Jill M; Teater, Barbra

    2016-01-01

    Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.

  12. Childhood trauma, antisocial personality typologies and recent violent acts among inpatient males with severe mental illness: exploring an explanatory pathway.

    Science.gov (United States)

    Bruce, Matt; Laporte, Dionne

    2015-03-01

    Prevalence of childhood trauma is elevated among individuals with severe mental illness (SMI) compared to the general population and associated with poor prognosis, substance misuse, lower treatment compliance and violence. Antisocial personality disorder (ASPD) typologies (childhood vs adult onset) also represent possible mediating mechanisms to explain risk of violence among men with SMI. The current study aimed to explore an explanatory pathway linking childhood traumatic exposure, antisocial personality typologies and risk of violent behaviour among adult male inpatients with SMI. A total of 162 male inpatients with SMI were examined using a cross-sectional survey design. Information was extracted from medical files, interviews and official criminal records. Fifty-two participants (32.1%) reported experiencing a childhood trauma before 15. This group was 2.8 times more likely to engage in violent acts within the past 6months than those without such a history. Furthermore, those with childhood onset ASPD (early starters) were more likely to report childhood trauma and engage in violence compared to adult onset ASPD (late starters) and those without antisocial histories. Multivariate analyses revealed that early starter ASPD was the only variable that independently predicted violence and mediated the relationship between childhood trauma and recent violent acts. A significant subset of men reporting trauma and antisocial conduct from childhood (early starter ASPD) is at considerably elevated risk of engaging in violent behaviours. Assessment of antisocial typologies in men with SMI may assist effective and defensible case prioritisation, resource allocation and treatment planning. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. International Terrorism in East Africa: The Case of Kenya 1 ...

    African Journals Online (AJOL)

    International terrorism is a significant threat to world peace and security, and as such remains high on the agenda within policy and intelligence circles. In Africa, the notion of terrorism itself can be traced back to anti-colonial struggles whilst the more recent terrorist attacks in Kenya and Tanzania give some indication of the ...

  14. A social-cognitive perspective of terrorism risk perception and individual response in Canada.

    Science.gov (United States)

    Lee, Jennifer E C; Lemyre, Louise

    2009-09-01

    The volume of research on terrorism has increased since the events of September 11, 2001. However, efforts to develop a contextualized model incorporating cognitive, social-contextual, and affective factors as predictors of individual responses to this threat have been limited. Therefore, the aim of this study was to evaluate a series of hypotheses drawn from such a model that was generated from a series of interviews with members of the Canadian public. Data of a national survey on perceived chemical, biological, radiological, nuclear, and explosives (CBRNE) terrorism threat and preparedness were analyzed. Results demonstrated that worry and behavioral responses to terrorism, such as individual preparedness, information seeking, and avoidance behaviors, were each a function of cognitive and social-contextual factors. As an affective response, worry about terrorism independently contributed to the prediction of behavioral responses above and beyond cognitive and social-contextual factors, and partially mediated the relationships of some of these factors with behavioral responses. Perceived coping efficacy emerged as the cognitive factor associated with the most favorable response to terrorism. Hence, findings highlight the importance of fostering a sense of coping efficacy to the effectiveness of strategies aimed at improving individual preparedness for terrorism.

  15. Typologies of intimate partner violence-maternal parenting and children's externalizing problems: The moderating effect of the exposure to other forms of family violence.

    Science.gov (United States)

    Lamela, Diogo; Jongenelen, Inês; Pinto, Ricardo; Levendosky, Alytia

    2018-07-01

    Typologies of IPV and parenting practices in mothers who experienced police-reported IPV remain surprisingly unexplored, in addition to how those typologies are linked with children's externalizing problems. Using data from 162 Portuguese mother-child dyads with a police or child protection services referral of IPV, this study aimed to: (a) identify IPV-parenting typologies; (b) test the associations between typologies and children's externalizing problems, and (c) examine the moderating effect of children's exposure to other forms of family violence in those associations. Using a person-centered approach, two IPV-parenting typologies were found: a spillover typology, with high levels of physical, psychological, and sexual violence and high levels of harsh and inconsistent parenting practices; and a compartmentalized typology, with high levels of physical, psychological, and sexual violence and lower ineffective parenting practices. Results also showed that externalizing symptoms (reported by mothers and teachers) were significantly lower in children of mothers in the compartmentalized typology compared to those in the spillover typology. Children's direct exposure to other forms of family violence moderated this association. Findings suggested that children with a high exposure to other forms of family violence showed the highest levels of externalizing problems when their mothers were classified into the spillover typology, and they exhibited the lowest levels of externalizing problems when their mothers were classified in the compartmentalized typology. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Terrorism in Australia: factors associated with perceived threat and incident-critical behaviours

    Directory of Open Access Journals (Sweden)

    Raphael Beverley

    2009-03-01

    Full Text Available Abstract Background To help improve incident preparedness this study assessed socio-demographic and socio-economic predictors of perceived risk of terrorism within Australia and willingness to comply with public safety directives during such incidents. Methods The terrorism perception question module was incorporated into the New South Wales Population Health Survey and was completed by a representative sample of 2,081 respondents in early 2007. Responses were weighted against the New South Wales population. Results Multivariate analyses indicated that those with no formal educational qualifications were significantly more likely (OR = 2.10, 95%CI:1.32–3.35, p Conclusion Low education level is a risk factor for high terrorism risk perception and concerns regarding potential impacts. The pattern of concern and response among those of migrant background may reflect secondary social impacts associated with heightened community threat, rather than the direct threat of terrorism itself. These findings highlight the need for terrorism risk communication and related strategies to address the specific concerns of these sub-groups as a critical underpinning of population-level preparedness.

  17. Victims of terrorism in Pakistan : Review of existing victim services and scope of improvement

    NARCIS (Netherlands)

    Waheed, Athar

    2018-01-01

    Terrorism is the most dehumanizing factor in the present world. Pakistan among top five most affected countries lost 22,191 civilians and 6,887 law enforcement officials by acts of terrorism from 2003 to December 2017 (South Asia Terrorism Portal, 2017). This is the first study of its kind in the

  18. Terrorism-related trauma in Africa, an increasing problem.

    Science.gov (United States)

    Alfa-Wali, Maryam; Sritharan, Kaji; Mehes, Mira; Abdullah, Fizan; Rasheed, Shahnawaz

    2015-06-01

    Global terrorist activities have increased significantly over the past decade. The impact of terrorism-related trauma on the health of individuals in low- and middle-income countries is under-reported. Trauma management in African countries in particular is uncoordinated, with little or no infrastructure to cater for emergency surgical needs. This article highlights the need for education, training and research to mitigate the problems related to terrorism and surgical public health. Copyright © 2014 Ministry of Health, Saudi Arabia. Published by Elsevier Ltd. All rights reserved.

  19. Do Jews and Arabs Differ in Their Fear of Terrorism and Crime?

    Science.gov (United States)

    Shechory Bitton, Mally; Silawi, Yousef

    2016-10-01

    The current study was carried out with the aim of supplementing the existing literature and broadening the understanding of the determinants of two powerful types of fear, fear of terrorism and fear of crime, by comparing their presence among Jews and Arabs in Israel. Based on an overview of factors influencing fear of victimization, the study focused on individual variables (ethnicity, sex, age, objective, and subjective exposure) as well as on neighborhood disorder and social integration. The sample consisted of 375 Israeli students (191 Jews and 184 Arabs). Predictions of fear of terrorism and crime were conducted with two multiple regressions. Fear of terrorism was significantly predicted by gender (women more than men), higher self exposure to terror, and higher neighborhood disorder. The only interaction found with regard to exposure to incidents showed that previous victimization predicts only fear of terrorism and only among Arabs who were themselves affected or exposed to the victimization of others. Fear of crime was predicted by sector (Jews more than Arabs), gender (women more than men), higher neighborhood disorder, and lower social integration. As far as known, this is the first attempt to examine differences between Jews and Arabs with regard to these two types of fear and to predict their causes. The findings help gain a better understanding as to how people perceive the threat of crime and terrorism, in general and in the Arab-Jewish context in particular. The findings also enable an understanding of the complexity of living under ongoing terrorism threats. The results are discussed in accordance with the literature, concluding with the need for further research that will take into account the wider cultural and social context.

  20. Education, Globalization, and the State in the Age of Terrorism

    Science.gov (United States)

    Peters, Michael A.

    2004-01-01

    Education plays an important role in challenging, combating and in understanding terrorism in its different forms, whether as counter-terrorism or as a form of human rights education. Just as education has played a significant role in the process of nation-building, so education also plays a strong role in the process of empire, globalization and…

  1. The threat of nuclear terrorism: from analysis to precautionary measures

    International Nuclear Information System (INIS)

    Schneider, M.

    2003-01-01

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  2. The threat of nuclear terrorism: from analysis to precautionary measures

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, M

    2003-07-01

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  3. The Role Of Education In Combating Terrorism | Oni | Journal of ...

    African Journals Online (AJOL)

    2005-06-07

    The world is witnessing series of repeated political, religious conflict and terrorism, particularly worrisome is the acts of terrorism, which is now prevalent across the world. The phenomenon of 9/11/2001 on U.S and the recent attack on June 7, 2005 in London and some other parts of the world revealed the devastation, pains ...

  4. Towards a Theory of Fear Management in the Counter-Terrorism Domain

    Directory of Open Access Journals (Sweden)

    Edwin Bakker

    2014-01-01

    Full Text Available Since 9/11, the state of the art in counter-terrorism research, counter-terorism measures and counter-terrorism impacts has taken off. Nevertheless, countering terrorism as a branch of fear management is still a discipline to be developed. In this Research Paper, authors Prof. Dr. Edwin Bakker and Prof. Dr. Beatrice de Graaf attempt to lessen this gap. The Paper identifies and analyses governmental approaches to managing fear in relation to terrorist incidents. It is a stocktaking approach, offering a preliminary oversight of some central aspects and pointers on the way forward when constructing and testing such a theory.

  5. Indonesia’s Way To Counter Terrorism 2002—2009: Lesson Learned

    Directory of Open Access Journals (Sweden)

    Ali Muhammad

    2014-08-01

    Full Text Available Terrorism emerged as serious security problem in Indonesia since a network of terrorist group rocked this country, started from the Bali bombing (2002 followed by other consecutive bombings, such as, J. W. Marriott Hotel bombing (2003, the Australian Embassy bombing (2004, and the Ritz Carlton Hotel bombing (2009. This article attempts to examine the ways in which the government responded towards the problem. What sort of policies did the Indonesian government take to respond to terrorism during the 2002—2009 period? This study uses a qualitative research method. The data used in this research are derived from official documents, direct interviews with government officials and the secondary sources (books and journals on terrorism and counterterrorism. This article shows that the government adopted the legal approach or law-enforcement (“hard approach” by issuing the anti-terrorism law as a legal framework and by reorganizing the police force to strengthen its counter-terrorist capability. It also adopted an “ideological” approach (soft approach to battle religious extremism. This sort of approach is mainly aimed at defusing and neutralizing the religious extremism of terrorist groups and preventing it from spreading into the wider community. This article shows that the government has used effectively both approaches in destroying problem of terrorism in Indonesia.

  6. Preventing nuclear terrorism: the report and papers of the International Task Force on Prevention of Nuclear Terrorism

    International Nuclear Information System (INIS)

    Leventhal, P.; Alexander, Y.

    1987-01-01

    The International Task Force on Prevention of Nuclear Terrorism, formed in 1985 under the Nuclear Control Institute, commissioned 26 studies and produced an extensive report on the problem and prevention of nuclear terrorism, Part I of this book is the full report, and part II contains the individual studies under two section: (A) Defining the Threat (8 studies); and (B) Strategies for Dealing with the Threat (18 studies). Detailed recommendations are made, in many of the studies, for better protection of nuclear weapons, materials, and facilities; greater cooperation among national intelligence agencies; tighter controls on nuclear transfers; more effective arms control initiatives; and emergency management programs. A separate abstract was prepared for the report and each of the 26 studies

  7. Mapping Contemporary Terrorism Courses at Top-Ranked National Universities and Liberal Arts Colleges in the United States

    OpenAIRE

    Ivan Sascha Sheehan

    2012-01-01

    Most of the scholarly work on Terrorism Studies focuses on terrorism research (knowledge production). By contrast, relatively little attention has been paid to teaching about terrorism (knowledge dissemination) at universities. This paper addresses this gap by providing a systematic analysis of contemporary terrorism courses at 106 top-ranked U.S. based universities and colleges. The study uses 1) key word searches of course catalogues for the academic year 2010-2011 to identify terrorism cou...

  8. U.S.-EU Cooperation Against Terrorism

    National Research Council Canada - National Science Library

    Archick, Kristin

    2005-01-01

    The September 11, 2001 terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...

  9. U.S.-EU Cooperation Against Terrorism

    National Research Council Canada - National Science Library

    Archick, Kristin

    2006-01-01

    The September 11, 2001, terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...

  10. PERSIAN DOMES: HISTORY, MORPHOLOGY AND TYPOLOGIES

    Directory of Open Access Journals (Sweden)

    Maryam Ashkan

    2009-11-01

    Full Text Available Persian master builders had introduced an architectural innovation which had an imperishable effect on dome architecture in the Middle East and Central Asia: surmounting a dome on squinches. This paper aims to provide a broader perspective of Persian domes as the most significant feature of Eastern domes in the Middle East. As opposed to previous general historic studies, this paper introduces a new analytical approach directed towards analysis of architectural concepts and stylistic attributes of Persian domes based on an epistemological premise of their space syntax. By analytic reviewing of examples, the paper addresses the origin of Persian domes, their formal morphological constitutions, and their typological forms based on the diversity of the external shell over the specific timeline, from the pre-Islamic era through the Qajar period in Iran. The study of the Persian dome’s characteristics can illustrate undiscovered information about the essences of developing dome constructions in the Middle East. It can also establish new design standards regarding the frameworks of domical building configurations to be used for creating typological diversity in dome design and to renew the morphological principles of the traditional dome compositions in contemporary architectural designs. Finally, the insights gained can inform conservation efforts on domical structures in the region and elsewhere.

  11. Emergent information technologies and enabling policies for counter-terrorism

    CERN Document Server

    Popp, R

    2006-01-01

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberti...

  12. Applying Intermediate Microeconomics to Terrorism

    OpenAIRE

    Charles Anderton; John Carter

    2004-01-01

    The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, while basic game theory helps characterize the strategic interdependencies among terrorists and governments.

  13. Applying Intermediate Microeconomics to Terrorism

    Science.gov (United States)

    Anderton, Charles H.; Carter, John R.

    2006-01-01

    The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, and basic game theory helps characterize the strategic interdependencies among terrorists and governments.…

  14. Nuclear terrorism

    International Nuclear Information System (INIS)

    Watson, C.

    2005-01-01

    This article is aimed at those professional scientists and engineers who believe that issues of international peace and security are too important to be left to the politicians. Nuclear Terrorism is a hostile act (or a threat of such an act) involving nuclear materials (fissile or radioactive) performed by a terrorist, a term which covers a wide range of individuals. What they all have in common is that, for some reason they have become motivated to hurt or destroy sections of society which they have come to regard as the enemy; their motivation varies enormously. They also vary enormously in the extent and nature of their technical/scientific education. There are 'PhD terrorists' and 'Peasant terrorists', and they differ greatly in the threat that they represent, and the steps which can appropriately be taken to counter it. The most serious threat comes from the potential ability of terrorists to steal or manufacture nuclear weapons of mass destruction (e.g. capable of causing thousands of deaths). Unless the underlying causes of terrorism can be quickly removed, we have a duty to mankind to make terrorist access to such weapons, and to the nuclear materials which are their essential ingredients, as difficult as possible. Improvements in the arrangements for denying unauthorised access to radioactive material should be made such that the protective measures made are proportionate to the number of Curies at risk and the likelihood of a terrorist initiative. The preventative measures, sadly, need to take account of the possibility that the terrorist will use lethal force to access the material. (author)

  15. Ordering theories: Typologies and conceptual frameworks for sociotechnical change

    Science.gov (United States)

    Sovacool, Benjamin K; Hess, David J

    2017-01-01

    What theories or concepts are most useful at explaining socio technical change? How can – or cannot – these be integrated? To provide an answer, this study presents the results from 35 semi-structured research interviews with social science experts who also shared more than two hundred articles, reports and books on the topic of the acceptance, adoption, use, or diffusion of technology. This material led to the identification of 96 theories and conceptual approaches spanning 22 identified disciplines. The article begins by explaining its research terms and methods before honing in on a combination of fourteen theories deemed most relevant and useful by the material. These are: Sociotechnical Transitions, Social Practice Theory, Discourse Theory, Domestication Theory, Large Technical Systems, Social Construction of Technology, Sociotechnical Imaginaries, Actor-Network Theory, Social Justice Theory, Sociology of Expectations, Sustainable Development, Values Beliefs Norms Theory, Lifestyle Theory, and the Unified Theory of Acceptance and Use of Technology. It then positions these theories in terms of two distinct typologies. Theories can be placed into five general categories of being centered on agency, structure, meaning, relations or norms. They can also be classified based on their assumptions and goals rooted in functionalism, interpretivism, humanism or conflict. The article lays out tips for research methodology before concluding with insights about technology itself, analytical processes associated with technology, and the framing and communication of results. An interdisciplinary theoretical and conceptual inventory has much to offer students, analysts and scholars wanting to study technological change and society. PMID:28641502

  16. Terrorism-related injuries versus road traffic accident-related trauma: 5 years of experience in Israel.

    Science.gov (United States)

    Peleg, Kobi; Savitsky, Bella

    2009-12-01

    Terrorism victims comprise the minority among trauma injured people, but this small population imposes a burden on the health care system. Thirty percent of the population injured in terrorist activities experienced severe trauma (injury severity score > or =16), more than half of them need a surgical procedure, and 25% of the population affected by terrorism had been admitted to intensive care. Furthermore, compared with patients with non-terrorism-related trauma, victims of terrorism often arrive in bulk, as part of a mass casualty event. This poses a sudden load on hospital resources and requires special organization and preparedness. The present study compared terrorism-related and road accident-related injuries and examined clinical characteristics of both groups of patients. This study is a retrospective study of all patients injured through terrorist acts and road traffic accidents from September 29, 2000 to December 31, 2005, and recorded in the Israel Trauma Registry. Data on the nature of injuries, treatment, and outcome were obtained from the registry. Medical diagnoses were extracted from the registry and classified based on International Classification of Diseases coding. Diagnoses were grouped to body regions, based on the Barell Injury Diagnosis Matrix. The study includes 2197 patients with terrorism-related injuries and 30,176 patients injured in road traffic accidents. All in all, 27% of terrorism-related casualties suffered severe to critical injuries, comparing to 17% among road traffic accident-related victims. Glasgow Coma Scale scores terrorism victims, in contrast with 7.4% among people injured on the roads. The terrorism victims had a significantly higher rate of use of intensive care facilities (24.2% vs 12.4%). The overall inpatient death rate was 6.0% among terrorism victims and 2.4% among those injured in road traffic accidents. Casualties from terrorist events are more severely injured and require more resources relative to casualties

  17. THE PERCEIVED RISK OF TRAVELLING, WITH EMPHASIS ON TERRORISM

    OpenAIRE

    Stefanou, Areti

    2009-01-01

    Risk is an important factor when considering international tourism (Lepp and Gibson, 2003; Sonmez and Graefe, 1998b; 1998a; Sonmez, 1998), especially nowadays as a result of the increased magnitude and frequency of terrorism attacks when travelling. Such events have negatively affected individuals’ perceived risk in international travel, making terrorism risk a key element of the international travel scene. Perceived risk can influence a positive image, intention to travel to a particular des...

  18. Prevention and Pre-emption in Australia’s Domestic Anti-terrorism Legislation

    Directory of Open Access Journals (Sweden)

    Tamara Tulich

    2012-11-01

    Full Text Available The move towards prevention in domestic anti-terror law and policy was initially justified as an exceptional response to the exceptional threat of transnational terrorism following September 11, 2001. However, commonalities are discernable between prevention in anti-terror law and prevention as employed in other areas of Australian law. To begin contextualising and analysing preventive practices in Australia, a framework is required. ‘The preventive state’ provides one way to view the collection of preventive measures employed in Australia. Engaging a governmentality perspective has the potential to make visible prevention and pre-emption in law and governance, and to inform critical treatment of the preventive state itself. Whether and how prevention and pre-emption in anti-terror law differ from and exhibit continuities with other preventive measures has the potential to expose issues of selectivity and proportionality between preventive measures and force consideration of the limits of state action to prevent or pre-empt harm.

  19. Towards a (Decentralization-Based Typology of Peer Production

    Directory of Open Access Journals (Sweden)

    Melanie Dulong de Rosnay

    2016-03-01

    Full Text Available Online peer-production platforms facilitate the coordination of creative work and services. Generally considered as empowering participatory tools and a source of common good, they can also be, however, alienating instruments of digital labour. This paper proposes a typology of peer-production platforms, based on the centralization/decentralization levels of several of their design features. Between commons-based peer-production and crowdsourced, user-generated content “enclosed” by corporations, a wide range of models combine different social, political, technical and economic arrangements. This combined analysis of the level of (decentralization of platform features provides information on emancipation capabilities in a more granular way than a market-based qualification of platforms, based on the nature of ownership or business models only. The five selected features of the proposed typology are: ownership of means of production, technical architecture/design, social organization/governance of work patterns, ownership of the peer-produced resource, and value of the output.

  20. A typological analysis: understanding pre-service teacher beliefs and how they are transformed

    Science.gov (United States)

    Lloyd, Mary Elizabeth Riley

    2018-04-01

    This article describes the beliefs and their transformations of members of a cohort of early-childhood, elementary and middle-level pre-service teachers (PSTs) as they professionally develop. A typological analysis of both quantitative and qualitative data collected between August 2011 and May 2013 was utilized to categorize how 40 PSTs' beliefs transformed throughout their formal teacher preparation. Five typologies were identified, showing variation in how PST beliefs transform or remain static.

  1. Coping with the threat of terrorism: a review.

    Science.gov (United States)

    Maguen, Shira; Papa, Anthony; Litz, Brett T

    2008-01-01

    Terrorism creates a ripple of fear and uncertainty. Although most individuals are resilient and recover over time, a minority remains functionally and psychologically impaired. In this paper, we examine research on coping strategies employed in the aftermath of terrorist events, theories and empirical findings related to appraisal processes that influence individuals' primary attributions of risk, and normative processes that shape secondary appraisals, which predict specific coping behaviors. We also describe individual diatheses and factors promoting resilience that may influence coping and functioning in the face of terrorism. Finally, we offer suggestions for future research.

  2. Tikal obsidian: sources and typology

    Energy Technology Data Exchange (ETDEWEB)

    Moholy-Nagy, H.; Asaro, F.; Stross, F.H.

    1984-01-01

    The obsidian industry of Classic period Tikal, Guatemala, is discussed with regard to geological source determinations and behavioral typology. The potential of these two approaches for cultural reconstruction is greatly extended when they can supplement each other. Recent source determinations of obsidian artifacts from Tikal indicate (1) a behavioral link between locally-produced prismatic blades of Highland Guatemalan stone and ceremonial incised obsidians and eccentrics, and (2) a Central Mexican origin for a seemingly large portion of Tikal's obsidian projectile points and knives. 25 references, 3 figures, 5 tables.

  3. Prior adversities predict posttraumatic stress reactions in adolescents following the Oslo Terror events 2011

    Science.gov (United States)

    Nordanger, Dag Ø.; Breivik, Kyrre; Haugland, Bente Storm; Lehmann, Stine; Mæhle, Magne; Braarud, Hanne Cecilie; Hysing, Mari

    2014-01-01

    Background Former studies suggest that prior exposure to adverse experiences such as violence or sexual abuse increases vulnerability to posttraumatic stress reactions in victims of subsequent trauma. However, little is known about how such a history affects responses to terror in the general adolescent population. Objective To explore the role of prior exposure to adverse experiences as risk factors for posttraumatic stress reactions to the Oslo Terror events. Method We used data from 10,220 high school students in a large cross-sectional survey of adolescents in Norway that took place seven months after the Oslo Terror events. Prior exposure assessed was: direct exposure to violence, witnessing of violence, and unwanted sexual acts. We explored how these prior adversities interact with well-established risk factors such as proximity to the events, perceived life threat during the terror events, and gender. Results All types of prior exposure as well as the other risk factors were associated with terror-related posttraumatic stress reactions. The effects of prior adversities were, although small, independent of adolescents’ proximity to the terror events. Among prior adversities, only the effect of direct exposure to violence was moderated by perceived life threat. Exposure to prior adversities increased the risk of posttraumatic stress reactions equally for both genders, but proximity to the terror events and perceived life threat increased the risk more in females. Conclusions Terror events can have a more destabilizing impact on victims of prior adversities, independent of their level of exposure. The findings may be relevant to mental health workers and others providing post-trauma health care. PMID:24872862

  4. Prior adversities predict posttraumatic stress reactions in adolescents following the Oslo Terror events 2011.

    Science.gov (United States)

    Nordanger, Dag Ø; Breivik, Kyrre; Haugland, Bente Storm; Lehmann, Stine; Mæhle, Magne; Braarud, Hanne Cecilie; Hysing, Mari

    2014-01-01

    Former studies suggest that prior exposure to adverse experiences such as violence or sexual abuse increases vulnerability to posttraumatic stress reactions in victims of subsequent trauma. However, little is known about how such a history affects responses to terror in the general adolescent population. To explore the role of prior exposure to adverse experiences as risk factors for posttraumatic stress reactions to the Oslo Terror events. We used data from 10,220 high school students in a large cross-sectional survey of adolescents in Norway that took place seven months after the Oslo Terror events. Prior exposure assessed was: direct exposure to violence, witnessing of violence, and unwanted sexual acts. We explored how these prior adversities interact with well-established risk factors such as proximity to the events, perceived life threat during the terror events, and gender. All types of prior exposure as well as the other risk factors were associated with terror-related posttraumatic stress reactions. The effects of prior adversities were, although small, independent of adolescents' proximity to the terror events. Among prior adversities, only the effect of direct exposure to violence was moderated by perceived life threat. Exposure to prior adversities increased the risk of posttraumatic stress reactions equally for both genders, but proximity to the terror events and perceived life threat increased the risk more in females. Terror events can have a more destabilizing impact on victims of prior adversities, independent of their level of exposure. The findings may be relevant to mental health workers and others providing post-trauma health care.

  5. Children exposed to war/terrorism.

    Science.gov (United States)

    Shaw, Jon A

    2003-12-01

    This paper reviews the prevalence of psychological morbidities in children who have been exposed to war-related traumas or terrorism as well as the diversity of war-related casualties and their associated psychological responses. The psychological responses to war-related stressors are categorized as (1) little or no reaction, (2) acute emotional and behavioral effects, and (3) long-term effects. Specific categories of war-related casualties discussed include refugee status, traumatic bereavement, effects of parental absence, and child soldiers. Psychological responses associated with terrorism and bioterrorism are presented. Lastly, mediators of the psychological response to war-related stressors are discussed, to include exposure effects, gender effects, parental, family and social factors, and child-specific factors. Children exposed to war-related stressors experience a spectrum of psychological morbidities including posttraumatic stress symptomatology, mood disorders, externalizing and disruptive behaviors, and somatic symptoms determined by exposure dose effect. Specific questions for future research are identified.

  6. A typology of place attachment and activity involvement

    Science.gov (United States)

    Andrew J. Mowen; Alan R. Graefe; Randy J. Virden

    1998-01-01

    While previous research suggests that place attachment and activity involvement impact visitor perceptions, it has not examined the simultaneous effects of these affective constructs. This study develops a typology of both place attachment and activity involvement. It examines variations between attachment-involvement levels and visitor evaluations of quality. Results...

  7. A Typology of Moral Positionality for Educational Administrators

    Science.gov (United States)

    O'Brien, Jonathan J.

    2017-01-01

    This qualitative study explored educational leaders' conduct in self-reported critical incidents (n = 50). Incidents were analyzed for participants' orientations to self or others and professional values, and assigned to one of four position types: authority, equity, compliance, or strategy. The typology categorizes participants' ethical actions…

  8. Towards a Typology of Imams of the West

    DEFF Research Database (Denmark)

    Vinding, Niels Valdemar

    2018-01-01

    To understand the relevant and signifijicant diffferences between imams of the West, this chapter suggests a typology of imams according to variations of institutional authority – that is, the signifijicant dimensions of institutionally embedded authority available in the West – and what has been...

  9. Terrorism threats and preparedness in Canada: the perspective of the Canadian public.

    Science.gov (United States)

    Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C

    2007-06-01

    Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.

  10. 31 CFR 596.404 - Financial transactions transferred through a bank of a Terrorism List Government.

    Science.gov (United States)

    2010-07-01

    ... through a bank of a Terrorism List Government. 596.404 Section 596.404 Money and Finance: Treasury... TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS Interpretations § 596.404 Financial transactions transferred through a bank of a Terrorism List Government. For the purposes of this part only, a financial...

  11. THE PROBLEM OF TYPOLOGY OF RUSSIAN INTELLIGENCE

    Directory of Open Access Journals (Sweden)

    V.I. GIDIRINSKY

    2007-05-01

    Full Text Available The author makes an attempt to revise generally accepted in social science approach tothe problem of Russian intelligence. Grounds for necessity of such revision are analyses in thefirst part of the article. It makes possible for the author to point out inadequacy of too gener-al estimations (both positive and negative and show advantages of typological approach

  12. Israeli adolescents with ongoing exposure to terrorism: suicidal ideation, posttraumatic stress disorder, and functional impairment.

    Science.gov (United States)

    Chemtob, Claude M; Pat-Horenczyk, Ruth; Madan, Anita; Pitman, Seth R; Wang, Yanping; Doppelt, Osnat; Burns, Kelly Dugan; Abramovitz, Robert; Brom, Daniel

    2011-12-01

    In this study, we examined the relationships among terrorism exposure, functional impairment, suicidal ideation, and probable partial or full posttraumatic stress disorder (PTSD) from exposure to terrorism in adolescents continuously exposed to this threat in Israel. A convenience sample of 2,094 students, aged 12 to 18, was drawn from 10 Israeli secondary schools. In terms of demographic factors, older age was associated with increased risk for suicidal ideation, OR = 1.33, 95% CI [1.09, 1.62], p terrorism was associated with increased risk for each of the measured outcomes including probable partial or full PTSD, functional impairment, and suicidal ideation. When age, gender, level of exposure to terrorism, probable partial or full PTSD, and functional impairment were examined together, only terrorism exposure and functional impairment were associated with suicidal ideation. This study underscores the importance and feasibility of examining exposure to terrorism and functional impairment as risk factors for suicidal ideation. Copyright © 2011 International Society for Traumatic Stress Studies.

  13. State of terror: women at risk

    OpenAIRE

    The Karen Women’s Organisation

    2008-01-01

    Two reports researched and written by the Karen Women’sOrganisation – Shattering Silences in 2004 and State ofTerror in 20071 – document the wide range of humanrights abuses against Burmese women and girls.

  14. War on Terror: Fantasy and Fiction Behind the Mythology of Terrorist Financing

    Directory of Open Access Journals (Sweden)

    El-Fatih A. Abdel Salam

    2009-06-01

    Full Text Available Documentary evidence shows that the series of financial crackdowns initiated since 9/11 have had virtually no impact on terrorism. This is because these efforts are based on a fundamental misconception on how terrorism works. The financial warriors’ predisposition to stereotypes about “Arabs and their money” allowed unsubstantiated rumours–such as Bin Laden’s personal fortune of $300 million–to become established as facts. This study exposes the extent to which Washington policymakers simply transposed the template for the war on drugs on to the war on terror, despite the fact that terrorism is not a profit–driven enterprise. The collateral damage inflicted on organisations like Al-Barakaat, the Somali remittance network, wrongly accused of channeling money to the terrorists, and others are counter-productive as they dent the image of the US in the Muslim world.

  15. A new typology of work schedules: Evidence from a cross-sectional study among nurses working in residential elder care.

    Science.gov (United States)

    Peters, V; de Rijk, A; Engels, J; Heerkens, Y; Nijhuis, F

    2016-04-07

    Work schedules contribute substantially to the health and well-being of nurses. Too broad typologies are used in research that do not meet the current variety in work schedules. To develop a new typology for nurses' work schedules based on five requirements and to validate the typology. This study is based on a questionnaire returned by 498 nurses (response 51%) including questions regarding nurses' work schedule, socio-demographic, and family characteristics and their appraisal of the work schedule. Frequencies of the different schedules were computed to determine the typology. To validate the typology, differences between the types were tested with ANOVAs, Chi2 and Kruskal-Wallis tests. Five main types can be distinguished based on predetermined requirements and frequencies, namely: (1) fixed early shift, (2) rotating two shift pattern without night shift, (3) rotating three shift pattern, (4) fixed and rotating two shift pattern including night shift, and (5) fixed normal day or afternoon shifts. Nurses in these types of work schedule differed significantly with respect to hours worked, days off between shifts, age, education, years in the job, commuting time, contribution to household income, satisfaction with work schedule and work schedule control. Especially nurses with type 3 schedules differed from other types. A typology of five main types of work schedules is proposed. Content validity of the typology is sufficient and the new typology seems useful for research on work-related aspects of nursing.

  16. The nuclear and radiological terrorism events and the strategy to combat

    International Nuclear Information System (INIS)

    Wang Shanqiang

    2004-01-01

    The super-terrorism using large-scale antipersonnel weapons has become one real threat for the contemporary international society to face. The radioactive materials releasing from the nuclear and radiological terrorism events will cause the personnel dead and injured with mental state dismay, which break national official business, people life, society stability and economy development, and give mankind social result in endanger with large affect and have been concerned by the people all over the world. This paper analyzes the possible pattern and harmfulness of the nuclear and radiological terrorism events, at the same time puts forward the strategy to combat them according to their three categories and typical scenes. (author)

  17. Mass media as an effective tool for prevention of sociopsychological factors in the development of terrorism

    OpenAIRE

    Zinchenko, Yuri

    2009-01-01

    Recently mass media play crucial role in social counterterrorism activity. The article is devoted to analysis of possibilities of mass media in prevention of the development of terrorism. Socio-psychological factors of development of terrorism, including concept of “contributing events” as well as hypothesis “frustration-aggression” are studied. The psychological component of terrorism in three major attitudes is considered in the article: psychology of terrorism, psychology of counteraction ...

  18. Circadian typology is related to resilience and optimism in healthy adults.

    Science.gov (United States)

    Antúnez, Juan Manuel; Navarro, José Francisco; Adan, Ana

    2015-05-01

    The relationships between circadian typology and several aspects related to mental health, such as satisfaction with life, emotional intelligence, perceived well-being and psychopathological symptomatology have been documented. However, their relationships with two psychological strengths such as resilience and optimism have not been examined yet. Therefore, the purpose of the present study was to explore whether circadian typology is related to both measures, taking into consideration the possible influence of sex. A sample of 1922 participants (978 men), aged between 18 and 60 yrs (30.08 ± 10.53) completed the reduced Morningness-Eveningness Questionnaire (rMEQ), the 10-item Connor-Davidson Resilience Scale (10-item CD-RISC) and the Life Orientation Test-Revised (LOT-R). Circadian typology was associated with different values in resilience (F(2,1915) = 45.89; p optimism (F(2,1915) = 37.74; p optimism scores while the lowest scores were shown by evening-type, exhibiting the neither-type subjects intermediate scores (p < 0.007, in all cases). These results suggest that evening-type subjects could display less capacity to face adversity and adapt positively, as well as less expectance of the occurrence of positive events compared to neither and morning-type individuals. In addition, these results provide new evidence that might improve our understanding about the relationships between circadian typology and psychological traits and disorders. Although future studies with longitudinal designs are needed, the obtained results emphasize that the evening-type could be a risk factor for the development of psychological problems and mental disorders, whereas the morning-type could be considered as a protective factor.

  19. Worrying about terrorism and other acute environmental health hazard events.

    Science.gov (United States)

    Greenberg, Michael; Babcock-Dunning, Lauren

    2012-04-01

    To better understand why some people worry more about terrorism compared with others, we measured how much US residents worried about a terrorist event in their area and examined the association of their fears with their concerns about acute and chronic hazards and other correlates. In 2008 (n = 600) and 2010 (n = 651), we performed a random-digit dialing national landline telephone survey. We asked about worries about terrorism and 5 other environmental health hazard issues. We also collected demographic and socioeconomic data. Only 15% worried "a great deal" about a terrorist event in their area and 18% to 33% were greatly concerned about other environmental issues. Fear about acute hazard events was a stronger predictor of a great deal of concern about terrorism than were age, race/ethnicity, gender, educational achievement, and other correlates. Those who worried most about acute environmental health hazard events were most likely to worry about terrorism. Also, those who were older, poorer, Blacks, or Latinos, or who lived in populous urban areas felt they were most vulnerable to terrorist attacks. We recommend methods to involve US citizens as part of disaster planning.

  20. Spousal Coping Strategies in the Shadow of Terrorism.

    Science.gov (United States)

    Shechory-Bitton, Mally; Cohen-Louck, Keren

    2017-11-01

    The present study focuses on spousal differences in reaction to ongoing exposure to terror and security threats. Sixty-eight married couples with children living in a region exposed to ongoing security threats were evaluated. All participants completed questionnaires on objective exposure (number of incidents) and subjective exposure (sense of fear) to terrorism and security threats, posttraumatic stress disorder (PTSD) symptoms, and their coping strategies with this ongoing exposure. Mothers reported higher levels of fear and PTSD symptoms, although their objective levels of exposure did not differ from those of their husbands. Similarities were found in coping strategies adopted by mothers and fathers to cope with life in the shadow of terrorism. Both mothers and fathers integrated emotion- and problem-focused coping strategies, with greater use of the latter. These similarities partially contradict research findings suggesting gender differences in coping with exposure to security threats. The results support the need for further research into investigating the role of dyadic coping in the context of prolonged exposure to security threats.

  1. Towards a typology of video game trailers: Between the ludic and the cinematic

    OpenAIRE

    Jan Švelch

    2015-01-01

    This paper explores video game trailers, their various forms and the roles they play within video game industry and culture. It offers an overview of the current practice of video game trailer differentiation and proposes a new typology of video game trailers based on their relation to ludic and cinematic aspects of a video game, combining the theory of paratexts, video game performance framework, the interface effect concept, as well as the concept of transmedia storytelling. This typology r...

  2. 75 FR 6678 - Agency Information Collection Activities: Customs and Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2010-02-10

    ... Activities: Customs and Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border... Terrorism (C-TPAT). This request for comment is being made pursuant to the Paperwork Reduction Act of 1995... Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract: The Customs and Trade...

  3. Predominant typologies of psychopathology in the United States: a latent class analysis.

    Science.gov (United States)

    El-Gabalawy, Renée; Tsai, Jack; Harpaz-Rotem, Ilan; Hoff, Rani; Sareen, Jitender; Pietrzak, Robert H

    2013-11-01

    Latent class analysis (LCA) offers a parsimonious way of classifying common typologies of psychiatric comorbidity. We used LCA to identify the nature and correlates of predominant typologies of Axis I and II disorders in a large and comprehensive population-based sample of U.S. adults. We analyzed data from Wave 2 of the National Epidemiologic Survey on Alcohol and Related Conditions (2004-2005; n = 34,653), a population-based sample of U.S. adults. We derived latent classes based on all assessed Axis I and II disorders and examined the relationship between the identified Axis I classes and lifetime psychiatric disorders and suicide attempts, and physical and mental health-related quality of life. A four-class solution was optimal in characterizing predominant typologies of both Axis I and II disorders. For Axis I disorders, these included low psychopathology (n = 28,935, 84.0%), internalizing (n = 3693, 9.9%), externalizing (n = 1426, 4.5%), and high psychopathology (n = 599, 1.6%) classes. For Axis II disorders, these included no/low personality disorders (n = 31,265, 90.9%), obsessive/paranoid (n = 1635, 4.6%), borderline/dysregulated (n = 1319, 3.4%), and highly comorbid (n = 434, 1.1%) classes. Compared to the low psychopathology class, all other Axis I classes had significantly increased odds of mental disorders, elevated Axis II classes, suicide attempts and poorer quality of life, with the high psychopathology class having the overall highest rates of these correlates, with the exception of substance use disorders. Compared to the low psychopathology class, the internalizing and externalizing classes had increased rates of mood and anxiety disorders, and substance use disorders, respectively. Axis I and II psychopathology among U.S. adults may be best represented by four predominant typologies. Characterizing co-occurring patterns of psychopathology using person-based typologies represents a higher-order classification system that may be useful in clinical

  4. Typology of Regions by Level and Dynamics of the Quality of Life

    Directory of Open Access Journals (Sweden)

    Boris Mikhailovich Grinchel’

    2015-07-01

    Full Text Available The paper considers the methodology and algorithm for the construction of typologies of regions in a two-dimensional space “level of development – dynamics of development” taking into account the quality of life, which is one of the most relevant competitiveness factors at the present stage of Russia’s development. The authors analyze the concept of “quality of life” and propose their own variant of the concept, on the basis of which they make a list of indicators for measuring and assessing the “quality of life” factor. In the implementation of the algorithm it is proposed to transform specific indicators, which assess the level and dynamics of the quality of life, into nonmetric numerical scores, normalized to the weighted average values of indicators for the Russian regions. The method of transformation of indicators into scores was tested on the example of the Northwestern Federal District regions, and the typologies in a two-dimensional space “level – dynamics” of the quality of life were made for 80 regions of Russia; the level of the quality of life was assessed according to official statistics for 2013, and the dynamics of the quality of life was assessed with the use of official statistics for 2011–2013. A detailed analysis is provided for each of the proposed typological groups and characteristics of this typology are highlighted. The proposed methodology and algorithm make it possible to compare and analyze not only the level and dynamics of development of different factors promoting competitive attractiveness, but also the interaction b etween the factors, for example, such as economy and the quality of life, economy and innovation, innovation and human resources, quality of life and innovation, etc. The typology provides a better understanding of advantages and disadvantages of both federal and local social policy for regional strategic development and helps justify the need and the focus of territorial

  5. Risks of mortality and morbidity from worldwide terrorism: 1968-2004.

    Science.gov (United States)

    Bogen, Kenneth T; Jones, Edwin D

    2006-02-01

    Worldwide data on terrorist incidents between 1968 and 2004 gathered by the RAND Corporation and the Oklahoma City National Memorial Institute for the Prevention of Terrorism (MIPT) were assessed for patterns and trends in morbidity/mortality. Adjusted data analyzed involve a total of 19,828 events, 7,401 "adverse" events (each causing >or= 1 victim), and 86,568 "casualties" (injuries), of which 25,408 were fatal. Most terror-related adverse events, casualties, and deaths involved bombs and guns. Weapon-specific patterns and terror-related risk levels in Israel (IS) have differed markedly from those of all other regions combined (OR). IS had a fatal fraction of casualties about half that of OR, but has experienced relatively constant lifetime terror-related casualty risks on the order of 0.5%--a level 2 to 3 orders of magnitude more than those experienced in OR that increased approximately 100-fold over the same period. Individual event fatality has increased steadily, the median increasing from 14% to 50%. Lorenz curves obtained indicate substantial dispersion among victim/event rates: about half of all victims were caused by the top 2.5% (or 10%) of harm-ranked events in OR (or IS). Extreme values of victim/event rates were approximated fairly well by generalized Pareto models (typically used to fit to data on forest fires, sea levels, earthquakes, etc.). These results were in turn used to forecast maximum OR- and IS-specific victims/event rates through 2080, illustrating empirically-based methods that could be applied to improve strategies to assess, prevent, and manage terror-related risks and consequences.

  6. Anti-Money Laundering and Combating the Financing of Terrorism : Niger

    OpenAIRE

    World Bank

    2009-01-01

    The assessment of the Anti-Money Laundering and Combating the Financing of Terrorism (AML/CFT) regime in Niger was conducted on the basis of the Forty Recommendations and the Nine Special Recommendations on the financing of terrorism drawn up in 2003 and 2001, respectively, by the Financial Action Task Force (FATF), and on the AML/CFT Methodology of 2004. The assessment was based on the la...

  7. A Typology of Disability Harassment in Secondary Schools

    Science.gov (United States)

    Holzbauer, Jerome J.; Conrad, Clifton F.

    2010-01-01

    The purpose of this exploratory study of disability harassment was to develop a typology of disability harassment experiences anchored in the perspectives of students with disabilities who have experienced harassment in urban, suburban, and exurban-rural schools. Based on focus group interviews with four groups of young people with various…

  8. Prior adversities predict posttraumatic stress reactions in adolescents following the Oslo Terror events 2011

    Directory of Open Access Journals (Sweden)

    Dag Ø. Nordanger

    2014-05-01

    Full Text Available Background: Former studies suggest that prior exposure to adverse experiences such as violence or sexual abuse increases vulnerability to posttraumatic stress reactions in victims of subsequent trauma. However, little is known about how such a history affects responses to terror in the general adolescent population. Objective: To explore the role of prior exposure to adverse experiences as risk factors for posttraumatic stress reactions to the Oslo Terror events. Method: We used data from 10,220 high school students in a large cross-sectional survey of adolescents in Norway that took place seven months after the Oslo Terror events. Prior exposure assessed was: direct exposure to violence, witnessing of violence, and unwanted sexual acts. We explored how these prior adversities interact with well-established risk factors such as proximity to the events, perceived life threat during the terror events, and gender. Results: All types of prior exposure as well as the other risk factors were associated with terror-related posttraumatic stress reactions. The effects of prior adversities were, although small, independent of adolescents’ proximity to the terror events. Among prior adversities, only the effect of direct exposure to violence was moderated by perceived life threat. Exposure to prior adversities increased the risk of posttraumatic stress reactions equally for both genders, but proximity to the terror events and perceived life threat increased the risk more in females. Conclusions: Terror events can have a more destabilizing impact on victims of prior adversities, independent of their level of exposure. The findings may be relevant to mental health workers and others providing post-trauma health care.

  9. SECURITY AND DEFENSE IN THE AMERICAS: THE SIMBIOTIC TRANSVERSAL TERRORISM, STT

    Directory of Open Access Journals (Sweden)

    VICENTE TORRIJOS RIVERA

    2017-12-01

    Full Text Available The following article has as its primary objective to explain and determine the model of Simbiotic Transversal Terrorism, which was created based on the actions and strategies of the Revolutionary Armed Forces of Colombia (FARC during the last few years. Its particular use of terrorist actions, have made it necessary to construct a specific concept, that takes into account every aspect of this particular fenomenon, so that we may have a better understanding of it. Therefore, the different spheres of action- intrastate as well as interstate- of the mentioned organization will be analyzed as well as their bonds with the many illegal organizations (national as well as international and the support that they receive from certain governments that has contributed to the perpetuation of the armed con ict in Colombia.

  10. Winning the war on terror: psychology as a strategic framework.

    Science.gov (United States)

    Beecroft, Nicholas

    2006-01-01

    International relations is fundamentally about people. Psychology provides a wide range of tools to understand the rise of Islamic fundamentalist terrorism and offers part of the framework for its resolution. Western societies need to avoid being consumed with fear, revenge or anger which might lead to polarisation and perpetuate the cycle of violence. Understanding the enemy and the virulence of their ideas is essential to winning the hearts and minds of their potential supporters through dialogue, public diplomacy and foreign policy. The West needs to build trust, relationships, reputation and address double standards in its behaviour in order to build a global coalition of people with shared values. The concept of 'war on terror' has been damaging, not least by inhibiting western societies from the self-reflection required to overcome the challenge of terrorism.

  11. The Effects of Terrorism on the Travel and Tourism Industry

    Directory of Open Access Journals (Sweden)

    David Mc. A Baker

    2014-11-01

    Full Text Available The impact of terrorism on the travel and tourism industry can be enormous. It can lead to unemployment, homelessness, deflation, and many other social and economic ills. The contribution of tourism for many countries is so great that any downturn in the industry is a cause of major concern for many governments. The repercussions are left in many other industries associated with tourism like airlines, hotels, restaurants and shops that cater to the tourists and allied services. Terrorism is an enigmatic and compelling phenomenon, and its relationship with tourism is complex and multifaceted. This paper aims to clarify this relationship and examines the relationship between selected factors and tourists’ decision-making process for destination choice. Tourists’ risk perception associated with terrorism served as a basis for the analysis.

  12. Chinas Response to Terrorism

    Science.gov (United States)

    2016-06-01

    regulations regarding terrorism and related activities (e.g., the 2006 Anti- Money iv Laundering Law), most notably the 2015 Counterterrorism... Money Laundering ASEAN Association for Southeast Asian Nations CASS Chinese Academy of Social Sciences CCP Chinese Communist Party CICIR China...the Financing of Terrorism” in 2006, and passed a new law governing money laundering in an effort to restrict access to funds available to terrorists

  13. Childhood night terrors and sleepwalking: diagnosis and treatment

    Directory of Open Access Journals (Sweden)

    Sachin Ratan Gedam

    2017-12-01

    Full Text Available Night terrors and sleepwalking are arousal disorders that occur during the first third of night. Combined existence of sleep disorders are rare phenomenon and found to be associated with behavioural and emotional problems. It becomes difficult to diagnose among sleep disorders and epilepsy is an important differential diagnosis. Management with combined approach of pharmacotherapy and psychological counselling is safe and effective. Here, we present a case of night terrors and sleepwalking to highlight the importance of diagnosis and treatment in this condition. To conclude, all medical professionals need to be aware of different parasomnias and its treatment options.

  14. A Typology of Social Workers in Long-Term Care Facilities in Israel.

    Science.gov (United States)

    Lev, Sagit; Ayalon, Liat

    2018-04-01

    This article explores moral distress among long-term care facility (LTCF) social workers by examining the relationships between moral distress and environmental and personal features. Based on these features, authors identified a typology of LTCF social workers and how they handle moral distress. Such a typology can assist in the identification of social workers who are in a particular need for assistance. Overall, 216 LTCF social workers took part in the study. A two-step cluster analysis was conducted to identify a typology of LTCF social workers based on features such as ethical environment, support in workplace, mastery, and resilience. The variance of the identified clusters and their associations with moral distress were examined, and four clusters of LTCF social workers were identified. The clusters varied from each other in relation to their personal and environmental features and in relation to their experience of moral distress. The article concludes with a discussion of the importance of developing programs for LTCF social workers that provide support and enhancement of personal resources and an adequate and ethical environment for practice.

  15. State of terror: women at risk

    Directory of Open Access Journals (Sweden)

    The Karen Women’s Organisation

    2008-04-01

    Full Text Available Two reports researched and written by the Karen Women’sOrganisation – Shattering Silences in 2004 and State ofTerror in 20071 – document the wide range of humanrights abuses against Burmese women and girls.

  16. Antisocial behavior in adolescence: Typology and relation to family context

    Czech Academy of Sciences Publication Activity Database

    Sobotková, Veronika; Blatný, Marek; Jelínek, Martin; Hrdlička, M.

    2013-01-01

    Roč. 33, č. 8 (2013), s. 1091-1115 ISSN 0272-4316 Institutional support: RVO:68081740 Keywords : family * antisocial behavior * typology * adolescence Subject RIV: AN - Psychology Impact factor: 1.200, year: 2013

  17. Epidemiology of international terrorism involving fatal outcomes in developed countries (1994-2003).

    Science.gov (United States)

    Wilson, Nick; Thomson, George

    2005-01-01

    We aimed to describe the public health burden and epidemiology of international terrorism (i.e. involving foreign nationals) with fatal outcomes in developed countries. Data was abstracted from a United States Department of State database for 21 'established market economy' countries and 18 'former socialist economies of Europe' for 1994-2003. To put the findings in a wider context, comparisons were made with WHO data on all homicides for each country. A total of 32 international terrorist attacks causing fatalities were identified over the 10-year period. These resulted in 3299 deaths, giving a crude annual mortality rate of 0.3 per million population. The mortality burden attributable to international terrorism in these countries was 208 times less than that attributable to other homicide. Even for the country with the highest mortality burden from international terrorism (the United States), this ratio was 60. There was no statistically significant trend in the number of attacks over time, but the attack severity (in terms of deaths per attack) was higher in the latter part of the 10-year period. A number of limitations with this data set were identified. If a more rigorous definition of 'international terrorism' was used, then this would substantially reduce the total number of such attacks defined in this way. In conclusion, there is a need for better quality data and improved classification systems for describing international terrorism. Nevertheless, the available data indicates that the mortality burden from international terrorism in developed countries is small compared to that from other homicide.

  18. Towards a Risk-Based Typology for Transnational Education

    Science.gov (United States)

    Healey, Nigel Martin

    2015-01-01

    Transnational education (TNE) has been a growth area for UK universities over the last decade. The standard typology classifies TNE by the nature of the activity (i.e., distance learning, international branch campus, franchise, and validation). By analysing a large number of TNE partnerships around the world, this study reveals that the current…

  19. National Counterterrorism Center: 2007 Report on Terrorism

    National Research Council Canada - National Science Library

    2008-01-01

    ...." While NCTC keeps statistics on the annual number of incidents of "terrorism," its ability to track the specific groups responsible for each attack involving killings, kidnappings, and injuries...

  20. 28 CFR Appendix to Subpart A - International Terrorism Victim Expense Reimbursement Program (ITVERP); Chart of Expense...

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false International Terrorism Victim Expense... Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIME VICTIM SERVICES International Terrorism Victim Expense Reimbursement Program Pt. 94, Subpt. A, App. Appendix to Subpart A—International Terrorism Victim Expense...