WorldWideScience

Sample records for terrorism-related information sharing

  1. 2013 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  2. 2012 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  3. Information Sharing About International Terrorism in Latin America

    Science.gov (United States)

    2005-06-01

    articles/anmviewer.asp?a=464&print=yes. Somoza, L. (2001). Inteligencia: Su Utilidad para la Toma de Decisiones en un Mundo de Nuevos Conflictos...Terrorism Violence in Europe.” March 9-11, 2001, Minda de Gunzburg Center for European Studies, Harvard University, Cambridge, Massachusetts. 56...Taylor and Francis. Jane’s (2005). Terrorism and Insurgency Center. Fuerzas Armadas Revolucionarias de Colombia (FARC). Retrieved February 25, 2005

  4. The problems of informational terrorism in African countries

    Directory of Open Access Journals (Sweden)

    Voznyuk Eugenia Vasylivna

    2017-12-01

    Full Text Available The features of informational terrorism in African countries, especially in SADC countries, are analyzed as well as the ways to combat information terrorism in this region. The major issues related to information terrorism are highlighted, which include data exfiltration, social engineering, insider threats, database breaches as well as poor identity and access management. The essence of Computer Security (Cyber Security is revealed and its main tasks are characterized: accessibility, integrity, including authenticity and confidentiality. The main threats for cyberspace are distinguished.

  5. Epidemiology of terror-related versus non-terror-related traumatic injury in children.

    Science.gov (United States)

    Aharonson-Daniel, Limor; Waisman, Yehezkel; Dannon, Yehuda L; Peleg, Kobi

    2003-10-01

    In the past 2 years hundreds of children in Israel have been injured in terrorist attacks. There is a paucity of data on the epidemiology of terror-related trauma in the pediatric population and its effect on the health care system. The objective of this study was to review the accumulated Israeli experience with medical care to young victims of terrorism and to use the knowledge obtained to contribute to the preparedness of medical personnel for future events. Data on all patients who were younger than 18 years and were hospitalized from October 1, 2000, to December 31, 2001, for injuries sustained in a terrorist attack were obtained from the Israel National Trauma Registry. The parameters evaluated were patient age and sex, diagnosis, type, mechanism and severity of injury, interhospital transfer, stay in intensive care unit, duration of hospitalization, and need for rehabilitation. Findings were compared with the general pediatric population hospitalized for non-terror-related trauma within the same time period. During the study period, 138 children were hospitalized for a terror-related injury and 8363 for a non-terror-related injury. The study group was significantly older (mean age: 12.3 years [standard deviation: 5.1] v 6.9 years [standard deviation: 5.3]) and sustained proportionately more penetrating injuries (54% [n = 74] vs 9% [n = 725]). Differences were also noted in the proportion of internal injuries to the torso (11% in the patients with terror-related trauma vs 4% in those with non-terror-related injuries), open wounds to the head (13% vs 6%), and critical injuries (Injury Severity Score of 25+; 25% vs 3%). The study group showed greater use of intensive care unit facilities (33% vs 8% in the comparison group), longer median hospitalization time (5 days vs 2 days), and greater need for rehabilitative care (17% vs 1%). Terror-related injuries are more severe than non-terror-related injuries and increase the demand for acute care in children.

  6. 77 FR 74685 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2012-12-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and...: Comments that include trade secrets, confidential commercial or financial information, Chemical-terrorism...

  7. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...

  8. Concept of Operations for the Information Sharing Environment Electronic Directory Services - People and Organizations

    National Research Council Canada - National Science Library

    2006-01-01

    Section 1016 of the Intelligence Reform and Terrorism Prevention Act (IRTPA) calls for improved sharing of terrorism information to support the country's ability to effectively prosecute the counterterrorism (CT) mission...

  9. 78 FR 16698 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2013-03-18

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and... notice is also soliciting comments concerning the Information Collection Request, Chemical Facility Anti...

  10. Terrorism and information sharing between the intelligence and law enforcement communities in the US and the Netherlands: emergency criminal law?

    NARCIS (Netherlands)

    Vervaele, J.A.E.

    2005-01-01

    Intelligence sharing between intelligence and police services with a view to preventing and combating terrorism is high on the political agenda in Brussels and The Hague. The Netherlands is one of the few countries in the EU where this topic is subject of political scrutiny. It also led to

  11. Pregnant Women Sharing Pregnancy-Related Information on Facebook: Web-Based Survey Study.

    Science.gov (United States)

    Harpel, Tammy

    2018-03-22

    Research indicates expectant and new mothers use the Internet, specifically social media, to gain information and support during the transition to parenthood. Although parents regularly share information about and photos of their child or children on Facebook, researchers have neither explored the use of Facebook to share pregnancy-related information nor investigated factors that influence such sharing. The aim of this study was to address a gap in the literature by exploring the use of Facebook by pregnant women. Specifically, the study examined the use of Facebook to share pregnancy-related information, as well as any association between prenatal attachment and the aforementioned aspects of sharing pregnancy-related information on Facebook. Pregnant women who were at least 18 years of age were recruited for participation in the study through posts and paid advertisements on Facebook and posts to professional organization listservs. Individuals interested in participating were directed to a secure Web-based survey system where they completed the consent form and the survey that focused on their current pregnancy. Participants completed the Maternal Antenatal Attachment Scale and answered questions that assessed how often they shared pregnancy-related information on Facebook, who they shared it with, why they shared it, and what they shared. A total of 117 pregnant women completed the survey. Descriptive statistics indicated that the pregnancy announcement was most commonly shared (75/108, 69.4%), with most women sharing pregnancy-related information on Facebook less than monthly (52/117, 44.4%) with only family and friends (90/116, 77.6% and 91/116, 78.4%, respectively) and for the purpose of involving others or sharing the experience (62/107, 57.9%). Correlation and regression analyses showed that prenatal attachment, in general, was positively and significantly related to all aspects of sharing pregnancy-related information at the PFacebook for a variety of

  12. The War Against Terror and Transatlantic Information Sharing: Spillovers of Privacy or Spillovers of Security?

    Directory of Open Access Journals (Sweden)

    Maria Tzanou

    2015-02-01

    Full Text Available The EU-US Passenger Name Record (PNR agreement has been among the most controversial instruments in the fight against terrorism that the EU negotiated with the US after the 9/11 terrorist attacks. The agreement has been heavily criticised for its implications regarding fundamental rights, in particular the rights to privacy and data protection. Nevertheless, the EU has put forward plans to develop its own PNR programme. The present article aims to examine the new dynamics concerning privacy that arise from the transatlantic fight against terrorism. It argues that, while attempts for the development of a transatlantic privacy protection framework have been made, ‘spillovers’ of security, taking the form of internalisation of external counter-terrorism measures, are prevalent in the era of the war against terror.

  13. Pregnant Women Sharing Pregnancy-Related Information on Facebook: Web-Based Survey Study

    Science.gov (United States)

    2018-01-01

    Background Research indicates expectant and new mothers use the Internet, specifically social media, to gain information and support during the transition to parenthood. Although parents regularly share information about and photos of their child or children on Facebook, researchers have neither explored the use of Facebook to share pregnancy-related information nor investigated factors that influence such sharing. Objective The aim of this study was to address a gap in the literature by exploring the use of Facebook by pregnant women. Specifically, the study examined the use of Facebook to share pregnancy-related information, as well as any association between prenatal attachment and the aforementioned aspects of sharing pregnancy-related information on Facebook. Methods Pregnant women who were at least 18 years of age were recruited for participation in the study through posts and paid advertisements on Facebook and posts to professional organization listservs. Individuals interested in participating were directed to a secure Web-based survey system where they completed the consent form and the survey that focused on their current pregnancy. Participants completed the Maternal Antenatal Attachment Scale and answered questions that assessed how often they shared pregnancy-related information on Facebook, who they shared it with, why they shared it, and what they shared. Results A total of 117 pregnant women completed the survey. Descriptive statistics indicated that the pregnancy announcement was most commonly shared (75/108, 69.4%), with most women sharing pregnancy-related information on Facebook less than monthly (52/117, 44.4%) with only family and friends (90/116, 77.6% and 91/116, 78.4%, respectively) and for the purpose of involving others or sharing the experience (62/107, 57.9%). Correlation and regression analyses showed that prenatal attachment, in general, was positively and significantly related to all aspects of sharing pregnancy-related information

  14. National Strategy for Information Sharing: Successes and Challenges in Improving Terrorism-Related Information Sharing

    National Research Council Canada - National Science Library

    2007-01-01

    .... While this Strategy describes the vision that has guided the Administration for the past six years, it also sets forth our plan to build upon progress and establish a more integrated information...

  15. Terrorism and information sharing between the intelligence and law enforcement communities in the US and the Netherlands: emergency criminal law?

    Directory of Open Access Journals (Sweden)

    John A. E. Vervaele

    2005-06-01

    Full Text Available Intelligence sharing between intelligence and police services with a view to preventing and combating terrorism is high on the political agenda in Brussels and The Hague. The Netherlands is one of the few countries in the EU where this topic is subject of political scrutiny. It also led to controversial case law. Recently, Justice Minister Donner has used an expedited procedure to submit a legislative proposal concerning shielded witnesses. This Bill raises many questions, that concern, amongst others, the discretion of intelligence services to determine which information will be provided for use in criminal proceedings and the relationship between this discretionary power and the connected legal duty of secrecy on the one hand and the rights of the defence to test and question that information on the other. Furthermore, questions raise regarding the evidentiary quality of this information. The proposed rules also influence the legitimacy of criminal law and the position of the criminal courts. What effect does the paradigm of security-orientated thinking have on the historical connection between criminal law and the rule of law? This issue is also addressed in this article.

  16. The Nature Terrorism Reports on Social Networks

    Directory of Open Access Journals (Sweden)

    James Okolie-Osemene

    2015-12-01

    Full Text Available As new tools of communication, an in-depth study of social networking in the era of global terrorism is attempted in this article. This emerging tradition of information sharing is driven by social media technology which has greatly revolutionalised communication in all sectors. The article explored the information sharing relevance of new technologies in the age of terrorism and counterterrorism. It focused on how social networks are increasingly utilised by different groups. In terms of methodology, the study extracted and utilised positive, negative and neutral posts, updates, tweets and reports on social networks through different individual and organisational media accounts and blogs, and analysed the data qualitatively. Findings show that despite being used by extremist groups in promoting their political agenda, social networks are also useful in promoting positive perceptions that society has about Muslims in the era of terrorism, emphasising that Muslims are not terrorists. Through the instrumentality of social media, users are able to map the trends of terrorism and responses from stakeholders in government and security sector in curbing the menace. Given their capacity to reach a wider audience, breaking cultural and religious barriers, social networks serve as early warning signs and make it possible for people to share new ideas on possible ways of curbing the proliferation of terrorist organisations.

  17. Emergent information technologies and enabling policies for counter-terrorism

    CERN Document Server

    Popp, R

    2006-01-01

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberti...

  18. Final Report: Multi-State Sharing Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Begoli, Edmon [ORNL; Boehmann, Brant [ORNL; DeNap, Frank A [ORNL

    2012-04-01

    In 2003 a joint effort between the U.S. Department of Homeland Security (DHS) and the U.S. Department of Justice created state and metropolitan intelligence fusion centers. These fusion centers were an effort to share law enforcement, disaster, and terrorism related information and intelligence between state and local jurisdictions and to share terrorism related intelligence between state and local law enforcement agencies and various federal entities. In 2006, DHS commissioned the Oak Ridge National Laboratory to establish and manage a groundbreaking program to assist local, state, and tribal leaders in developing the tools and methods required to anticipate and forestall terrorist events and to enhance disaster response. This program, called the Southeast Region Research Initiative (SERRI), combines science and technology with validated operational approaches to address regionally unique requirements and suggest regional solutions with the potential for national application. In 2009, SERRI sponsored the Multistate Sharing Initiative (MSSI) to assist state and metropolitan intelligence fusion centers with sharing information related to a wider variety of state interests than just terrorism. While these fusion centers have been effective at sharing data across organizations within their respective jurisdictions, their organizational structure makes bilateral communication with federal entities convenient and also allows information to be further disbursed to other local entities when appropriate. The MSSI-developed Suspicious Activity Report (SAR) sharing system allows state-to-state sharing of non-terrorism-related law enforcement and disaster information. Currently, the MSSI SAR system is deployed in Alabama, Kentucky, Tennessee, and South Carolina. About 1 year after implementation, cognizant fusion center personnel from each state were contacted to ascertain the status of their MSSI SAR systems. The overwhelming response from these individuals was that the MSSI

  19. Homegrown terrorism; the known unknown

    OpenAIRE

    Hinkkainen, Kaisa

    2012-01-01

    Homegrown terrorism has attracted significant attention following the 2004 Madrid and 2005 London bombings. Homegrown terrorism is usually thought to be a new phenomenon, with few observed events, and inherently distinct from transnational terrorism or the old domestic terrorism in Europe. However, little research has so far examined the alleged distinctiveness of homegrown terrorism empirically. I argue that homegrown terrorism shares many similarities with domestic and international terrori...

  20. Terrorism-related injuries versus road traffic accident-related trauma: 5 years of experience in Israel.

    Science.gov (United States)

    Peleg, Kobi; Savitsky, Bella

    2009-12-01

    Terrorism victims comprise the minority among trauma injured people, but this small population imposes a burden on the health care system. Thirty percent of the population injured in terrorist activities experienced severe trauma (injury severity score > or =16), more than half of them need a surgical procedure, and 25% of the population affected by terrorism had been admitted to intensive care. Furthermore, compared with patients with non-terrorism-related trauma, victims of terrorism often arrive in bulk, as part of a mass casualty event. This poses a sudden load on hospital resources and requires special organization and preparedness. The present study compared terrorism-related and road accident-related injuries and examined clinical characteristics of both groups of patients. This study is a retrospective study of all patients injured through terrorist acts and road traffic accidents from September 29, 2000 to December 31, 2005, and recorded in the Israel Trauma Registry. Data on the nature of injuries, treatment, and outcome were obtained from the registry. Medical diagnoses were extracted from the registry and classified based on International Classification of Diseases coding. Diagnoses were grouped to body regions, based on the Barell Injury Diagnosis Matrix. The study includes 2197 patients with terrorism-related injuries and 30,176 patients injured in road traffic accidents. All in all, 27% of terrorism-related casualties suffered severe to critical injuries, comparing to 17% among road traffic accident-related victims. Glasgow Coma Scale scores terrorism victims, in contrast with 7.4% among people injured on the roads. The terrorism victims had a significantly higher rate of use of intensive care facilities (24.2% vs 12.4%). The overall inpatient death rate was 6.0% among terrorism victims and 2.4% among those injured in road traffic accidents. Casualties from terrorist events are more severely injured and require more resources relative to casualties

  1. 78 FR 30934 - Agency Information Collection Activities: Customs-Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2013-05-23

    ... Activities: Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... information collection requirement concerning the Customs-Trade Partnership Against Terrorism (C-TPAT). This... information collection: Title: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077...

  2. Online Resources Related to Children Affected by War, Terrorism, and Disaster

    Science.gov (United States)

    Masse, Anna L.

    2009-01-01

    This article provides a collection of websites related to children affected by war, terrorism, and disaster. These online resources are intended to provide information about various organizations and their efforts to improve the lives of children in crisis around the world.

  3. Terrorism Risk Insurance: An Overview

    National Research Council Canada - National Science Library

    Webel, Baird

    2005-01-01

    .... Addressing this problem, Congress enacted the Terrorism Risk Insurance Act of 2002 (TRIA) to create a temporary program to share future insured terrorism losses with the property-casualty insurance industry and policyholders...

  4. Simple probabilistic method for relative risk evaluation of nuclear terrorism events

    International Nuclear Information System (INIS)

    Zhang Songbai; Wu Jun

    2006-01-01

    On the basis of the event-tree and probability analysis methods, a probabilistic method of nuclear terrorism risk was built, and the risk of terrorism events was analyzed. With the statistical data for and hypothetical data for relative events, the relative probabilities of the four kinds of nuclear terrorism events were obtained, as well as the relative risks of these four kinds of nuclear terrorism events were calculated by using this probabilistic method. The illustrated case show that the descending sequence of damages from the four kinds of nuclear terrorism events for single event is as following: nuclear explosive and improvised nuclear explosive, nuclear facility attacked, and 'dirty bomb'. Under the hypothetical condition, the descending sequence of possibilities for the four kinds of nuclear terrorism events is as following: 'dirty bomb', nuclear facility attacked, improvised nuclear explosive and nuclear explosive, but the descending sequence of risks is as following: 'dirty bomb', improvised nuclear explosive, nuclear facility attacked, and nuclear explosive . (authors)

  5. Terrorism-related trauma in Africa, an increasing problem.

    Science.gov (United States)

    Alfa-Wali, Maryam; Sritharan, Kaji; Mehes, Mira; Abdullah, Fizan; Rasheed, Shahnawaz

    2015-06-01

    Global terrorist activities have increased significantly over the past decade. The impact of terrorism-related trauma on the health of individuals in low- and middle-income countries is under-reported. Trauma management in African countries in particular is uncoordinated, with little or no infrastructure to cater for emergency surgical needs. This article highlights the need for education, training and research to mitigate the problems related to terrorism and surgical public health. Copyright © 2014 Ministry of Health, Saudi Arabia. Published by Elsevier Ltd. All rights reserved.

  6. Relative Risk Appraisal, the September 11 Attacks, and Terrorism-Related Fears

    Science.gov (United States)

    Marshall, Randall D.; Bryant, Richard A.; Amsel, Lawrence; Suh, Eun Jung; Cook, Joan M.; Neria, Yuval

    2013-01-01

    There are now replicated findings that posttraumatic stress disorder (PTSD) symptoms related to the September 11, 2001, attacks occurred in large numbers of persons who did not fit the traditional definition of exposure to a traumatic event. These data are not explained by traditional epidemiologic “bull’s eye” disaster models, which assume the psychological effects are narrowly, geographically circumscribed, or by existing models of PTSD onset. In this article, the authors develop a researchable model to explain these and other terrorism-related phenomena by synthesizing research and concepts from the cognitive science, risk appraisal, traumatic stress, and anxiety disorders literatures. They propose the new term relative risk appraisal to capture the psychological function that is the missing link between the event and subjective response in these and other terrorism-related studies to date. Relative risk appraisal highlights the core notion from cognitive science that human perception is an active, multidimensional process, such that for unpredictable societal threats, proximity to the event is only one of several factors that influence behavioral responses. Addressing distortions in relative risk appraisal effectively could reduce individual and societal vulnerability to a wide range of adverse economic and ethnopolitical consequences to terrorist attacks. The authors present ways in which these concepts and related techniques can be helpful in treating persons with September 11– or terrorism-related distress or psychopathology. PMID:17516775

  7. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    National Research Council Canada - National Science Library

    Gallagher, Jerry P

    2008-01-01

    ... between private security and the KCPD. To empower this resource as a terrorism prevention force multiplier the development of a web based virtual knowledge sharing initiative was explored in this study as a solution to provide "one stop...

  8. Terrorism in South Korea.

    Science.gov (United States)

    Wang, Soon Joo; Choi, Jin Tae; Arnold, Jeffrey

    2003-01-01

    South Korea has experienced > 30 suspected terrorism-related events since 1958, including attacks against South Korean citizens in foreign countries. The most common types of terrorism used have included bombings, shootings, hijackings, and kidnappings. Prior to 1990, North Korea was responsible for almost all terrorism-related events inside of South Korea, including multiple assassination attempts on its presidents, regular kidnappings of South Korean fisherman, and several high-profile bombings. Since 1990, most of the terrorist attacks against South Korean citizens have occurred abroad and have been related to the emerging worldwide pattern of terrorism by international terrorist organizations or deranged individuals. The 1988 Seoul Olympic Games provided a major stimulus for South Korea to develop a national emergency response system for terrorism-related events based on the participation of multiple ministries. The 11 September 2001 World Trade Center and Pentagon attacks and the 2001 United States of America (US) anthrax letter attacks prompted South Korea to organize a new national system of emergency response for terrorism-related events. The system is based on five divisions for the response to specific types of terrorist events, involving conventional terrorism, bioterrorism, chemical terrorism, radiological terrorism, and cyber-terrorism. No terrorism-related events occurred during the 2002 World Cup and Asian Games held in South Korea. The emergency management of terrorism-related events in South Korea is adapting to the changing risk of terrorism in the new century.

  9. “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects

    Directory of Open Access Journals (Sweden)

    Joshua Sinai

    2014-02-01

    Full Text Available This column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by significant publishers (listed in alphabetical order - capsule reviews of 13 important books published by CRC Press. 

  10. Environmental terrorism

    International Nuclear Information System (INIS)

    Zirschky, J.

    1988-01-01

    Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts

  11. Perception of Risk and Terrorism-Related Behavior Change: Dual Influences of Probabilistic Reasoning and Reality Testing

    Science.gov (United States)

    Denovan, Andrew; Dagnall, Neil; Drinkwater, Kenneth; Parker, Andrew; Clough, Peter

    2017-01-01

    The present study assessed the degree to which probabilistic reasoning performance and thinking style influenced perception of risk and self-reported levels of terrorism-related behavior change. A sample of 263 respondents, recruited via convenience sampling, completed a series of measures comprising probabilistic reasoning tasks (perception of randomness, base rate, probability, and conjunction fallacy), the Reality Testing subscale of the Inventory of Personality Organization (IPO-RT), the Domain-Specific Risk-Taking Scale, and a terrorism-related behavior change scale. Structural equation modeling examined three progressive models. Firstly, the Independence Model assumed that probabilistic reasoning, perception of risk and reality testing independently predicted terrorism-related behavior change. Secondly, the Mediation Model supposed that probabilistic reasoning and reality testing correlated, and indirectly predicted terrorism-related behavior change through perception of risk. Lastly, the Dual-Influence Model proposed that probabilistic reasoning indirectly predicted terrorism-related behavior change via perception of risk, independent of reality testing. Results indicated that performance on probabilistic reasoning tasks most strongly predicted perception of risk, and preference for an intuitive thinking style (measured by the IPO-RT) best explained terrorism-related behavior change. The combination of perception of risk with probabilistic reasoning ability in the Dual-Influence Model enhanced the predictive power of the analytical-rational route, with conjunction fallacy having a significant indirect effect on terrorism-related behavior change via perception of risk. The Dual-Influence Model possessed superior fit and reported similar predictive relations between intuitive-experiential and analytical-rational routes and terrorism-related behavior change. The discussion critically examines these findings in relation to dual-processing frameworks. This

  12. Perception of Risk and Terrorism-Related Behavior Change: Dual Influences of Probabilistic Reasoning and Reality Testing.

    Science.gov (United States)

    Denovan, Andrew; Dagnall, Neil; Drinkwater, Kenneth; Parker, Andrew; Clough, Peter

    2017-01-01

    The present study assessed the degree to which probabilistic reasoning performance and thinking style influenced perception of risk and self-reported levels of terrorism-related behavior change. A sample of 263 respondents, recruited via convenience sampling, completed a series of measures comprising probabilistic reasoning tasks (perception of randomness, base rate, probability, and conjunction fallacy), the Reality Testing subscale of the Inventory of Personality Organization (IPO-RT), the Domain-Specific Risk-Taking Scale, and a terrorism-related behavior change scale. Structural equation modeling examined three progressive models. Firstly, the Independence Model assumed that probabilistic reasoning, perception of risk and reality testing independently predicted terrorism-related behavior change. Secondly, the Mediation Model supposed that probabilistic reasoning and reality testing correlated, and indirectly predicted terrorism-related behavior change through perception of risk. Lastly, the Dual-Influence Model proposed that probabilistic reasoning indirectly predicted terrorism-related behavior change via perception of risk, independent of reality testing. Results indicated that performance on probabilistic reasoning tasks most strongly predicted perception of risk, and preference for an intuitive thinking style (measured by the IPO-RT) best explained terrorism-related behavior change. The combination of perception of risk with probabilistic reasoning ability in the Dual-Influence Model enhanced the predictive power of the analytical-rational route, with conjunction fallacy having a significant indirect effect on terrorism-related behavior change via perception of risk. The Dual-Influence Model possessed superior fit and reported similar predictive relations between intuitive-experiential and analytical-rational routes and terrorism-related behavior change. The discussion critically examines these findings in relation to dual-processing frameworks. This

  13. Perception of Risk and Terrorism-Related Behavior Change: Dual Influences of Probabilistic Reasoning and Reality Testing

    Directory of Open Access Journals (Sweden)

    Andrew Denovan

    2017-10-01

    Full Text Available The present study assessed the degree to which probabilistic reasoning performance and thinking style influenced perception of risk and self-reported levels of terrorism-related behavior change. A sample of 263 respondents, recruited via convenience sampling, completed a series of measures comprising probabilistic reasoning tasks (perception of randomness, base rate, probability, and conjunction fallacy, the Reality Testing subscale of the Inventory of Personality Organization (IPO-RT, the Domain-Specific Risk-Taking Scale, and a terrorism-related behavior change scale. Structural equation modeling examined three progressive models. Firstly, the Independence Model assumed that probabilistic reasoning, perception of risk and reality testing independently predicted terrorism-related behavior change. Secondly, the Mediation Model supposed that probabilistic reasoning and reality testing correlated, and indirectly predicted terrorism-related behavior change through perception of risk. Lastly, the Dual-Influence Model proposed that probabilistic reasoning indirectly predicted terrorism-related behavior change via perception of risk, independent of reality testing. Results indicated that performance on probabilistic reasoning tasks most strongly predicted perception of risk, and preference for an intuitive thinking style (measured by the IPO-RT best explained terrorism-related behavior change. The combination of perception of risk with probabilistic reasoning ability in the Dual-Influence Model enhanced the predictive power of the analytical-rational route, with conjunction fallacy having a significant indirect effect on terrorism-related behavior change via perception of risk. The Dual-Influence Model possessed superior fit and reported similar predictive relations between intuitive-experiential and analytical-rational routes and terrorism-related behavior change. The discussion critically examines these findings in relation to dual

  14. Sharing health information online in South Korea: motives, topics, and antecedents.

    Science.gov (United States)

    Kye, S Y; Shim, M; Kim, Y C; Park, K

    2017-10-11

    This study aimed to examine the motives, topics and antecedents for sharing health information online among Korean Internet users. Eight hundred adults completed a web-based survey exploring the motives; topics; physical, cognitive, affective and environmental factors; and experiences relating to sharing health information online. The motives for not sharing information included information absence and inappropriateness. The most preferred topic was disease. Good subjective health was significantly associated with frequent information sharing while individuals with a history of disease involving themselves or family members were more likely to share health information than were those without such a history. Further, a higher level of depressed mood was related to a higher level of sharing. Internet-related self-efficacy and trust in information delivery channels were positively related to sharing. Future research could extend the factors related to information sharing to include the evaluation of shared information. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. Relative risk perception for terrorism: implications for preparedness and risk communication.

    Science.gov (United States)

    Caponecchia, Carlo

    2012-09-01

    Terrorism presents a significant risk that is often approached at public policy, infrastructure, or emergency management level. Public perceptions of the likelihood of terrorist events, and how this may relate to individual preparedness, are not always extensively examined. The tendency to think that negative events are less likely to happen to oneself than to the average person is known as optimism bias. Optimism bias is relevant to perceptions of terrorism, because it is thought to be related to a reduction in precaution use. Using an online survey of 164 participants, this study aimed to determine whether Sydney residents thought they had a lower likelihood of experiencing terrorist events than other Australians. Significant optimism bias was observed for witnessing terrorist events, but not for personally experiencing terrorist events. In addition, Sydney residents tended to think that terrorist attacks were more likely to occur in Sydney than another major Australian city in the next five years. At the same time, household and workplace preparedness for terrorism was quite low, as was awareness of emergency strategies in the central business district. Perceptions of high likelihood of terrorism happening in one's own city, yet low preparedness present a challenge for risk communication and emergency management strategies. The diversity of possible terrorist targets, and the simple plans that can moderate the effects of a disaster may need to be emphasized in future anti-terrorism initiatives. © 2012 Society for Risk Analysis.

  16. Center for Civil-Military Relations Counter-Terrorism Fellowship Program

    OpenAIRE

    Shemella, Paul

    2007-01-01

    The advent of more deadly forms of terrorism has challenged all governments to craft responses that stop terrorism while strengthening democracy – and without breeding more terrorism. The era of new terrorism is fraught with paradoxes and dilemmas that require decision-makers to develop a thorough understanding of the threats they face, as well as a comprehensive appreciation for the tools available to them for developing effective responses. No single government can respond effec...

  17. Winning the war on terror: psychology as a strategic framework.

    Science.gov (United States)

    Beecroft, Nicholas

    2006-01-01

    International relations is fundamentally about people. Psychology provides a wide range of tools to understand the rise of Islamic fundamentalist terrorism and offers part of the framework for its resolution. Western societies need to avoid being consumed with fear, revenge or anger which might lead to polarisation and perpetuate the cycle of violence. Understanding the enemy and the virulence of their ideas is essential to winning the hearts and minds of their potential supporters through dialogue, public diplomacy and foreign policy. The West needs to build trust, relationships, reputation and address double standards in its behaviour in order to build a global coalition of people with shared values. The concept of 'war on terror' has been damaging, not least by inhibiting western societies from the self-reflection required to overcome the challenge of terrorism.

  18. Look Who's Talking. Explaining Water-Related Information Sharing and Demand for Action Among Ugandan Villagers

    Science.gov (United States)

    Holvoet, Nathalie; Dewachter, Sara; Molenaers, Nadia

    2016-11-01

    Many national water policies propagate community-based participatory approaches to overcome weaknesses in supply-driven rural water provision, operation, and maintenance. Citizen involvement is thought to stimulate bottom-up accountability and broaden the information base, which may enrich design and implementation processes and foster improved water accessibility and sustainability. Practices on the ground, however, are embedded in socio-political realities which mediate possible beneficial effects of participatory approaches. This paper builds on full social network data collected in a Ugandan village to study the social and political reality of two distinct levels of participation, i.e. local information sharing among citizens and a more active appeal to fellow citizens to improve water services. We use Logistic Regression Quadratic Assignment Procedure to explore what type of actor and network traits influence information sharing and whether the same factors are in play in the demand for action to remedy water-related problems. Whereas social aspects (social support relations) and homophily (using the same water source, the same gender) play an important role in information sharing, it is the educational level, in particular, of the villager who is called upon that is important when villagers demand action. Our findings also demonstrate that those most in need of safe water do not mobilize their information sharing ties to demand for action. This indicates that building local water policies and practice exclusively on locally existing demand for action may fail to capture the needs of the most deprived citizens.

  19. The Relationship Between Posttraumatic Growth and Psychosocial Variables in Survivors of State Terrorism and Their Relatives.

    Science.gov (United States)

    Cárdenas-Castro, Manuel; Faúndez-Abarca, Ximena; Arancibia-Martini, Héctor; Ceruti-Mahn, Cristián

    2017-08-01

    The present study explores reports of growth in survivors and family members of victims of state terrorism ( N = 254) in Chile from 1973 to 1990. The results indicate the presence of reports of posttraumatic growth ( M = 4.69) and a positive and statistically significant correlation with variables related to the life impact of the stressful events ( r = .46), social sharing of emotions ( r = .32), deliberate rumination ( r = .37), positive reappraisal ( r = .35), reconciliation ( r = .39), spiritual practices ( r = .33), and meaning in life ( r = .51). The relationship between growth and forgiveness is not statistically significant. The variables that best predict posttraumatic growth are positive reappraisal (β = .28), life impact (β = .24), meaning in life β = .23), and reconciliation (β = .20). The forward-method hierarchical model indicates that these variables are significant predictors of growth levels, R 2 = .53, F(8, 210) = 30.08, p state terrorism manage to grow after these experiences, and the redefinition of meaning in life and the positive reappraisal of the traumatic experiences are the elements that make it possible to create a new narrative about the past.

  20. Terrorism as Media Event

    Directory of Open Access Journals (Sweden)

    2012-07-01

    Full Text Available Proving that terrorism should be seen as a media event (as defined by Dayan and Katzafter 9/11 and treated accordingly. We have turned to the work of Dayan and Katz and GeorgeGerbner’s for a definition of media events and of violence in the mass media. This paper is ahermeneutical interpretation of the concept of terrorism and its relation to communication. We haveput forward a better understanding of the complex concept of terrorism and its definitions in the massmedia context. Terrorism nowadays should always be defined within its inherent relation with themedia. The article is the first to define terrorism as media evenit in Dayan and Katz’s terms.

  1. Information Sharing and Knowledge Sharing as Communicative Activities

    Science.gov (United States)

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  2. [Terrorism, public health and health services].

    Science.gov (United States)

    Arcos González, Pedro; Castro Delgado, Rafael; Cuartas Alvarez, Tatiana; Pérez-Berrocal Alonso, Jorge

    2009-01-01

    Today the terrorism is a problem of global distribution and increasing interest for the international public health. The terrorism related violence affects the public health and the health care services in an important way and in different scopes, among them, increase mortality, morbidity and disability, generates a context of fear and anxiety that makes the psychopathological diseases very frequent, seriously alters the operation of the health care services and produces important social, political and economic damages. These effects are, in addition, especially intense when the phenomenon takes place on a chronic way in a community. The objective of this paper is to examine the relation between terrorism and public health, focusing on its effects on public health and the health care services, as well as to examine the possible frames to face the terrorism as a public health concern, with special reference to the situation in Spain. To face this problem, both the public health systems and the health care services, would have to especially adapt their approaches and operational methods in six high-priority areas related to: (1) the coordination between the different health and non health emergency response agencies; (2) the reinforcement of the epidemiological surveillance systems; (3) the improvement of the capacities of the public health laboratories and response emergency care systems to specific types of terrorism as the chemical or biological terrorism; (3) the mental health services; (4) the planning and coordination of the emergency response of the health services; (5) the relations with the population and mass media and, finally; (6) a greater transparency in the diffusion of the information and a greater degree of analysis of the carried out health actions in the scope of the emergency response.

  3. Information and the War against Terrorism, Part V: The Business Implications.

    Science.gov (United States)

    Strickland, Lee S.

    2002-01-01

    Discussion of changes in business information protection since the September 11th terrorist attacks focuses on three planning goals: continuing to serve the customer in times of threat; implementing new communication paradigms; and establishing a comprehensive knowledge redundancy program. Considers threats other than terrorism, risk management…

  4. Updates in the War against Terrorism.

    Science.gov (United States)

    Strickland, Lee S.

    2002-01-01

    Provides an update of new court cases related to Part IV of the series on Information and the War Against Terrorism. Discusses civil liberties versus security involving the legality of mandatory commercial use of biometrics as identification; and communication of privileged information between a person and his or her attorney. (LRW)

  5. Challenges in sharing information effectively

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    2006-01-01

    collaborating successfully, i.e., a deceptively false shared understanding had emerged. These incidents were analysed to discover what led to these unsuspected breakdowns in information sharing. Results. Unsuspected breakdowns in information sharing emerged when: differences in implementations of shared symbols......Introduction. The goal of information sharing is to change a person's image of the world and to develop a shared working understanding. It is an essential component of collaboration. This paper examines barriers to sharing information effectively in dynamic group work situations. Method. Three...... types of battlefield training simulations were observed and open-ended interviews with military personnel were conducted. Analysis. Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were...

  6. Affording to exchange: social capital and online information sharing.

    Science.gov (United States)

    Maksl, Adam; Young, Rachel

    2013-08-01

    The potential harm and benefit associated with sharing personal information online is a topic of debate and discussion. Using survey methods (n=872), we explore whether attainment of social capital online relates to greater comfort with sharing personal information. We found that perceptions of bridging and bonding social capital earned from using Facebook are significant predictors of overall comfort levels with sharing personal information. This research raises timely questions about how the perceived benefits of social networking sites influence how personal information is shared online.

  7. Online Information Sharing About Risks: The Case of Organic Food.

    Science.gov (United States)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-03-23

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic food products. An online survey among 535 respondents was conducted in the Netherlands to examine the determinants of information sharing behavior, and their relationships. Structural equation modeling was applied to test both the measurement model and the structural model. Results showed that the intention to share information online about the risks of organic food was low. Conversations and email were the preferred channels to share information; of the social media Facebook stood out. The developed model was found to provide an adequate description of the data. It explained 41% of the variance in information sharing. Injunctive norms and outcome expectancies were most important in predicting online information sharing, followed by information-related determinants. Risk-perception-related determinants showed a significant, but weak, positive relationship with online information sharing. Implications for authorities communicating on risks associated with food are addressed. © 2018 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  8. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  9. Terrorism, civil war and related violence and substance use disorder morbidity and mortality: a global analysis.

    Science.gov (United States)

    Kerridge, Bradley T; Khan, Maria R; Rehm, Jürgen; Sapkota, Amir

    2014-03-01

    The purpose of this study is to examine associations between deaths owing to terrorism, civil war, and one-sided violence from 1994-2000 and substance use disorder disability-adjusted life years (DALYs). The relationship between terrorism, and related violence and substance use disorder morbidity and mortality among World Health Organization Member States in 2002, controlling for adult per capita alcohol consumption, illicit drug use, and economic variables at baseline in 1994. Deaths as a result of terrorism and related violence were related to substance use disorder DALYs: a 1.0% increase in deaths as a result of terrorism, war and one-sided violence was associated with an increase of between 0.10% and 0.12% in alcohol and drug use disorder DALYs. Associations were greater among males and 15-44 year-old. Terrorism, war and one-sided violence may influence morbidity and mortality attributable to substance use disorders in the longer-term suggests that more attention to be given to rapid assessment and treatment of substance use disorders in conflict-affected populations with due consideration of gender and age differences that may impact treatment outcomes in these settings. Priorities should be established to rebuild substance abuse treatment infrastructures and treat the many physical and mental comorbid disorders. Copyright © 2014. Published by Elsevier Ltd.

  10. Groups like the support sharing channel of information and knowledge

    Directory of Open Access Journals (Sweden)

    Armando Sergio de Aguiar Filho

    2016-12-01

    Full Text Available Introduction: The role of sharing information and knowledge which tends to lead to a new understanding of distribution channels, allowing the maturation of sharing concept and its relationship to the process of information management. This interaction arises range of alternatives par as organizations relate internally with employees and externally with your audience. Objects: The goal is to survey and presentation of studies related to information sharing and knowledge channels, trying to identify its correlates in the area of administration. Methodology: The work was developed from a literature search. For both sought to initially align the concepts and terminology of information science area and a second time to identify a differentiated approach to sharing that would contribute to validate the interdisciplinary character of the information area and the contribution that other areas can make to the studies of information management and knowledge. Results: The analysis of the survey indicated considerations relevant to the understanding of the various approaches used in relation to the sharing of channels, as well as the common and different characteristics of these media and the impact on their dynamics. Conclusions: The Support Group terminology is one of several approaches used in the sharing of information and knowledge, and, like the other approaches presented to assess and promote better information services to meet the specific demands.

  11. The Reality Of The Homeland Security Enterprise Information Sharing Environment

    Science.gov (United States)

    2017-12-01

    Related Information to Protect the Homeland (GAO 15- 290) (Washington, DC: U.S. Government Accountability Office, 2015), http://www.gao.gov/ assets...Government Accountability Office [GAO], Information Sharing Environment Better Road Map Needed to Guide Implementation and Investments (GAO-11-455...and its ISE PM would have clearer accountability for information sharing lapses and a faster ability to reform or develop domestic information -sharing

  12. Psychiatry and terrorism.

    Science.gov (United States)

    Stoddard, Frederick J; Gold, Joel; Henderson, Schuyler W; Merlino, Joseph P; Norwood, Ann; Post, Jerrold M; Shanfield, Stephen; Weine, Stevan; Katz, Craig L

    2011-08-01

    Terrorism has dominated the domestic and international landscape since 9/11. Like other fields, psychiatry was not well prepared. With the 10th anniversary of the 9/11 attack approaching, it is timely to consider what can be done to prepare before the next event. Much has been learned to provide knowledge and resources. The roles of psychiatrists are challenged by what is known of the causes of, consequences of, and responses to terrorism. Reflecting on knowledge from before and since 9/11 introduces concepts, how individuals become terrorists, how to evaluate the psychiatric and behavioral effects of terrorism, and how to expand treatments, behavioral health interventions, public policy initiatives, and other responses for its victims. New research, clinical approaches, and policy perspectives inform strategies to reduce fear and cope with the aftermath. This article identifies the psychiatric training, skills and services, and ethical considerations necessary to prevent or reduce terrorism and its tragic consequences and to enhance resilience.

  13. The Value of Sharing Information: A Neural Account of Information Transmission.

    Science.gov (United States)

    Baek, Elisa C; Scholz, Christin; O'Donnell, Matthew Brook; Falk, Emily B

    2017-07-01

    Humans routinely share information with one another. What drives this behavior? We used neuroimaging to test an account of information selection and sharing that emphasizes inherent reward in self-reflection and connecting with other people. Participants underwent functional MRI while they considered personally reading and sharing New York Times articles. Activity in neural regions involved in positive valuation, self-related processing, and taking the perspective of others was significantly associated with decisions to select and share articles, and scaled with preferences to do so. Activity in all three sets of regions was greater when participants considered sharing articles with other people rather than selecting articles to read themselves. The findings suggest that people may consider value not only to themselves but also to others even when selecting news articles to consume personally. Further, sharing heightens activity in these pathways, in line with our proposal that humans derive value from self-reflection and connecting to others via sharing.

  14. Individual differences in relational motives interact with the political context to produce terrorism and terrorism-support.

    Science.gov (United States)

    Thomsen, Lotte; Obaidi, Milan; Sheehy-Skeffington, Jennifer; Kteily, Nour; Sidanius, Jim

    2014-08-01

    The psychology of suicide terrorism involves more than simply the psychology of suicide. Individual differences in social dominance orientation (SDO) interact with the socio-structural, political context to produce support for group-based dominance among members of both dominant and subordinate groups. This may help explain why, in one specific context, some people commit and endorse terrorism, whereas others do not.

  15. Terrorism-related fear and avoidance behavior in a multiethnic urban population.

    Science.gov (United States)

    Eisenman, David P; Glik, Deborah; Ong, Michael; Zhou, Qiong; Tseng, Chi-Hong; Long, Anna; Fielding, Jonathan; Asch, Steven

    2009-01-01

    We sought to determine whether groups traditionally most vulnerable to disasters would be more likely than would be others to perceive population-level risk as high (as measured by the estimated color-coded alert level) would worry more about terrorism, and would avoid activities because of terrorism concerns. We conducted a random digit dial survey of the Los Angeles County population October 2004 through January 2005 in 6 languages. We asked respondents what color alert level the country was under, how often they worry about terrorist attacks, and how often they avoid activities because of terrorism. Multivariate regression modeled correlates of worry and avoidance, including mental illness, disability, demographic factors, and estimated color-coded alert level. Persons who are mentally ill, those who are disabled, African Americans, Latinos, Chinese Americans, Korean Americans, and non-US citizens were more likely to perceive population-level risk as high, as measured by the estimated color-coded alert level. These groups also reported more worry and avoidance behaviors because of concerns about terrorism. Vulnerable populations experience a disproportionate burden of the psychosocial impact of terrorism threats and our national response. Further studies should investigate the specific behaviors affected and further elucidate disparities in the disaster burden associated with terrorism and terrorism policies.

  16. Counter-Terrorism, Technology and Transparency: Reconsidering State Accountability

    Directory of Open Access Journals (Sweden)

    Quirine Eijkman

    2012-02-01

    Full Text Available In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal information, biometrics, satellite technology and other forms of ICT technology used in the fight against terrorism. Although technology is a powerful tool to fight terrorism, it is also a means for increasing social control by the state. Henceforth, there is a risk that panoptic surveillance – where the few view the many – could develop. Therefore accountability in relation to use of technological counter-terrorism measures such as smart surveillance cameras, biometric devices or the tracking of personal data is discussed in this article. The extra powers that both public authorities and private companies gain through new (surveillance technologies should be counterbalanced. In this context the role of the state, because of its monopoly to use force and its duty to protect the rule of law, is crucial. By reconsidering how to enforce accountability by the state, the effects of technological counter-terrorism measures could be checked and balanced.

  17. Terrorism, Anti-Terrorism, and the Copycat Effect

    DEFF Research Database (Denmark)

    Jensen, Thomas

    that an increase in anti-terrorism makes it more likely that cells will plan small rather than large attacks. Furthermore, we see that an increase in anti-terrorism can make a terrorist attack more likely. Analyzing the problem of optimal anti-terrorism we see that the introduction of a copycat effect rationalizes...... an increase in the level of anti-terrorism after a large attack. Using this result we show how the copycat effect changes the dynamic pattern of terrorism attacks and what the long run consequences are...

  18. Sleep Terrors (Night Terrors)

    Science.gov (United States)

    ... terrors or other family members Lead to safety concerns or injury Result in daytime symptoms of excessive sleepiness or problems functioning Continue beyond the teen years or start in adulthood Causes Sleep terrors ...

  19. International Convention for the Suppression of Acts of Nuclear Terrorism. United Nations 2005: International Convention for the Suppression of Acts of Nuclear Terrorism

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    The International Convention for the Suppression of Acts of Nuclear Terrorism is a 2005 United Nations treaty designed to criminalize acts of nuclear terrorism and to promote police and judicial cooperation to prevent, investigate and punish those acts. As of September 2016, the convention has 115 signatories and 106 state parties, including the nuclear powers China, France, India, Russia, the United Kingdom, and the United States. The Convention covers a broad range of acts and possible targets, including nuclear power plants and nuclear reactors; covers threats and attempts to commit such crimes or to participate in them, as an accomplice; stipulates that offenders shall be either extradited or prosecuted; encourages States to cooperate in preventing terrorist attacks by sharing information and assisting each other in connection with criminal investigations and extradition proceedings; and, deals with both crisis situations, assisting States to solve the situations and post-crisis situations by rendering nuclear material safe through the International Atomic Energy Agency (IAEA)

  20. Cyber terrorism and cyber-crime – threats for cyber security

    OpenAIRE

    Ackoski, Jugoslav; Dojcinovski, Metodija

    2012-01-01

    This paper has aim to give contribution in supporting efforts against cyber threats recognized as a cyber terrorism and cyber crime. Also, it has aim to show future challenges related to cyber security and their emerging threats – cyber war, cyber terrorism and cyber crime. Accelerate weapon development called ICT (Information Communication Technology) which is developed every day faster and faster, and development of human conscious on higher level about consequences of ICT enormous pene...

  1. Confronting the risks of terrorism: making the right decisions

    International Nuclear Information System (INIS)

    John Garrick, B.; Hall, James E.; Kilger, Max; McDonald, John C.; O'Toole, Tara; Probst, Peter S.; Rindskopf Parker, Elizabeth; Rosenthal, Robert; Trivelpiece, Alvin W.; Van Arsdale, Lee A.; Zebroski, Edwin L.

    2004-01-01

    This report offers a methodology for assessing, quantitatively, the risks of terrorism. The purpose of the methodology is to support effective decision making to combat terrorism. The emphasis is on terrorist attacks that could have catastrophic consequences. The perspective taken is that in order to make the right decisions about combating terrorism, their needs to be a systematic means of assessing the likelihood of such attacks. A process of implementation of the decisions resulting from risk assessment is essential. That process includes (1) an understanding of the nature of the threat, (2) an information system linked directly to 'intelligence' on terrorism, and (3) organizational structures that can take timely, coordinated, and effective actions. There must also be sound evidence that the methodology can be successfully applied. A description of the nature of terrorism, a terrorism risk assessment methodology, information requirements to fight terrorism, and recommendations for successful implementation is what this report is about

  2. Violation of human rights to combat terrorism.

    OpenAIRE

    2012-01-01

    LL.B. No one definition of terrorism has gained universal acceptance. The lack of agreement on a definition of terrorism has been a major obstacle to meaningful international countermeasures to combat terrorism. There are 12 International Conventions related to terrorism and an explicit definition is still missing. Many states have tried to define terrorism and none of these definitions has been implemented, either by the United Nations or these states. There are many International Convent...

  3. New trends in terrorism : the use of social media, cyber-terrorism, the role of open-source intelligence and the cases of rightwing extremism and lone wolf terrorism

    OpenAIRE

    Καραδήμα, Σοφία

    2016-01-01

    Terrorism has existed almost as long as humanity, and has appeared in various forms, creating new and evolving trends, making the definition of terrorism even more difficult to define. The purpose of this thesis is to examine the new trends in terrorism after the terrorist attacks of 9/11, as well as attempting to find the factors that facilitate the emergence and/or recurrence of trends in terrorism, by examining the related Literature, creating case studies and providing supp...

  4. Mass media as an Effective Tool for Prevention of Socio-psychological Factors in the Development of Terrorism

    Directory of Open Access Journals (Sweden)

    Yuri P. Zinchenko

    2009-01-01

    Full Text Available Recently mass media play crucial role in social counterterrorism activity. The article is devoted to analysis of possibilities of mass media in prevention of the development of terrorism. Socio-psychological factors of development of terrorism, including concept of “contributing events” as well as hypothesis “frustration-aggression” are studied. The psychological component of terrorism in three major attitudes is considered in the article: psychology of terrorism, psychology of counteraction to terrorism, and using mass media for prevention the development of terrorism. Specific features and the external factors promoting involving into terrorism are analysed. Role of mass media in covering the information about terrorism events is analysed from point of view related to prevention of development of terrorism. Some key recommendations on counterterrorism activity using mass media means are formulated.

  5. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  6. Cyber terrorism prevention and counteraction workshop review

    NARCIS (Netherlands)

    Pastukhov, O.M.

    2011-01-01

    A NATO Advanced Training Course (ATC ) on Cyber Terrorism Prevention and Counteraction workshop, held in Kiev on September 27-29, 2010, allowed the participants to share their experiences with experts from Ukraine, a Partnership for Peace country. The participants exchanged their ideas on the ways

  7. 75 FR 18850 - National Protection and Programs Directorate; Chemical Facility Anti-Terrorism Standards...

    Science.gov (United States)

    2010-04-13

    ... Directorate; Chemical Facility Anti-Terrorism Standards Personnel Surety Program AGENCY: National Protection...-terrorism Vulnerability Information (CVI), Sensitive Security Information (SSI), or Protected Critical... . SUPPLEMENTARY INFORMATION: Program Description The Chemical Facility Anti-Terrorism Standards (CFATS), 6 CFR...

  8. Nuclear terrorism and reality

    International Nuclear Information System (INIS)

    St Sauver, J.E.

    1983-01-01

    Unlike conventional terrorist violence, bona-fide nuclear terrorism is a self-publicizing phenomenon. It is a public event by the very scope of its impact. Apocalyptic and catastrophically destructive, a nuclear explosion is the ideal instrument of mass terror. Rational nuclear insurgents would not inform authorities that a nuclear device is about to be detonated. Advance warning of an impending nuclear explosion would reduce the maximum potential effectiveness of any response to such an event

  9. Sharing information among existing data sources

    Science.gov (United States)

    Ashley, W. R., III

    1999-01-01

    share crucial investigative information across jurisdictional bounds by establishing a communications infrastructure for all of its law enforcement jurisdictions. The Criminal Justice Network (CJ-Net) is a statewide TCP/IP network, dedicated to the sharing of law enforcement information. CJ-Net is managed and maintained by the Florida Department of Law Enforcement (FDLE) and provides open access and privileges to any criminal justice agency, including the state court and penitentiary systems. In addition to Florida, other states, such as North Carolina, are also beginning to implement common protocol communication infrastructures and architectures in order to link local jurisdictions together throughout the state. The law enforcement domain in an optimum situation for information-sharing technologies. Communication infrastructures are continually established, and as such, action is required to effectively use these networks to their full potential. Information technologies that are best suited for the law enforcement domain, must be evaluated and implemented in a cost-effective manner. Unlike the Defense Department and other large federal agencies, individual jurisdictions at both the local and state level cannot afford to expend limited resources on research and development of prototype systems. Therefore, we must identify enabling technologies that have matured in related domains and transition them into law enforcement at a minimum cost. Crucial to this measure, is the selection of the appropriate levels of information-sharing technologies to be inserted. Information-sharing technologies that are unproven or have extensive recurring costs are not suitable for this domain. Information-sharing technologies traditionally exist between two distinct polar bounds: the data warehousing approach and mediation across distributed heterogeneous data sources. These two ends of the spectrum represent extremely different philosophies in accomplishing the same goal. In the

  10. Cooperative Games arising from Information Sharing Situations

    NARCIS (Netherlands)

    Brânzei, R.; Tijs, S.H.; Timmer, J.B.

    2000-01-01

    Relations are established between information sharing (IS) situations and IS-games on one hand and information collecting (IC) situations and IC-games on the other hand. It is shown that IC-games can be obtained as convex combinations of so-called local games. Properties are described which IC-games

  11. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  12. The 'war on terror"and international law

    NARCIS (Netherlands)

    Duffy, Helen

    2013-01-01

    The thesis analyses international law and practice in relation to terrorism and counter-terrorism in the post 9/11 environment. It finds terrorism to be a term of acute and wide-ranging political significance yet one which is not defined under generally accepted treaty or customary international

  13. Terror in time: extending culturomics to address basic terror management mechanisms.

    Science.gov (United States)

    Dechesne, Mark; Bandt-Law, Bryn

    2018-04-11

    Building on Google's efforts to scan millions of books, this article introduces methodology using a database of annual word frequencies of the 40,000 most frequently occurring words in the American literature between 1800 and 2009. The current paper uses this methodology to replicate and identify terror management processes in historical context. Variation in frequencies of word usage of constructs relevant to terror management theory (e.g. death, worldview, self-esteem, relationships) are investigated over a time period of 209 years. Study 1 corroborated previous TMT findings and demonstrated that word use of constructs related to death and of constructs related to patriotism and romantic relationships significantly co-vary over time. Study 2 showed that the use of the word "death" most strongly co-varies over time with the use of medical constructs, but also co-varies with the use of constructs related to violence, relationships, religion, positive sentiment, and negative sentiment. Study 3 found that a change in the use of death related words is associated with an increase in the use of fear related words, but not in anxiety related words. Results indicate that the described methodology generates valuable insights regarding terror management theory and provide new perspectives for theoretical advances.

  14. Children and terrorism-related news: training parents in Coping and Media Literacy.

    Science.gov (United States)

    Comer, Jonathan S; Furr, Jami M; Beidas, Rinad S; Weiner, Courtney L; Kendall, Philip C

    2008-08-01

    This study examined associations between televised news regarding risk for future terrorism and youth outcomes and investigated the effects of training mothers in an empirically based approach to addressing such news with children. This approach--Coping and Media Literacy (CML)--emphasized modeling, media literacy, and contingent reinforcement and was compared via randomized design to Discussion as Usual (DAU). Ninety community youth (aged 7-13 years) and their mothers viewed a televised news clip about the risk of future terrorism, and threat perceptions and state anxiety were assessed preclip, postclip, and postdiscussion. Children responded to the clip with elevated threat perceptions and anxiety. Children of CML-trained mothers exhibited lower threat perceptions than DAU youth at postclip and at postdiscussion. Additionally, CML-trained mothers exhibited lower threat perceptions and state anxiety at postclip and postdiscussion than did DAU mothers. Moreover, older youth responded to the clip with greater societal threat perception than did younger youth. Findings document associations between terrorism-related news, threat perceptions, and anxiety and support the utility of providing parents with strategies for addressing news with children. Implications and research suggestions are discussed. Copyright 2008 APA, all rights reserved.

  15. Children and Terrorism-Related News: Training Parents in Coping and Media Literacy

    Science.gov (United States)

    Comer, Jonathan S.; Furr, Jami M.; Beidas, Rinad S.; Weiner, Courtney L.; Kendall, Philip C.

    2009-01-01

    This study examined associations between televised news regarding risk for future terrorism and youth outcomes and investigated the effects of training mothers in an empirically based approach to addressing such news with children. This approach—Coping and Media Literacy (CML)—emphasized modeling, media literacy, and contingent reinforcement and was compared via randomized design to Discussion as Usual (DAU). Ninety community youth (aged 7−13 years) and their mothers viewed a televised news clip about the risk of future terrorism, and threat perceptions and state anxiety were assessed preclip, postclip, and postdiscussion. Children responded to the clip with elevated threat perceptions and anxiety. Children of CML-trained mothers exhibited lower threat perceptions than DAU youth at postclip and at postdiscussion. Additionally, CML-trained mothers exhibited lower threat perceptions and state anxiety at postclip and postdiscussion than did DAU mothers. Moreover, older youth responded to the clip with greater societal threat perception than did younger youth. Findings document associations between terrorism-related news, threat perceptions, and anxiety and support the utility of providing parents with strategies for addressing news with children. Implications and research suggestions are discussed. PMID:18665686

  16. Teaching about Terrorism: Lessons Learned at SWOTT

    Science.gov (United States)

    Miller, Gregory D.

    2009-01-01

    This article discusses some of the challenges and lessons for teaching undergraduate-level courses related to terrorism. The author outlines some of the primary issues that instructors can expect to face, and provides strategies for dealing with several of these challenges. The goal is to relay useful information to those teaching, or planning to…

  17. Understanding and Teaching the Semantics of Terrorism: An Alternative Perspective.

    Science.gov (United States)

    Long, Kenneth J.

    1990-01-01

    Critiques conventional definitions of terrorism. Advocates sensitizing students to the semantics of terrorism and teaching skepticism of leaders who manipulate such concepts. Recommends using historical case studies to clarify issues, inform students about state and state-sponsored terrorism, and challenge students' preconceptions. Includes a…

  18. 78 FR 44961 - Agency Information Collection Activities; Customs-Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2013-07-25

    ... Activities; Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... accordance with the Paperwork Reduction Act: Customs-Trade Partnership Against Terrorism (C-TPAT). This is a...: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract...

  19. Terror explosive injuries: a comparison of children, adolescents, and adults.

    Science.gov (United States)

    Jaffe, Dena H; Peleg, Kobi

    2010-01-01

    We sought to characterize injuries and outcomes from terror explosions with specific attention to children (0-10 years) and adolescents (11-15 years) compared to adults (16-45 years). Terror explosions target vulnerable populations and result in multidimensional injuries that may vary according to age group. The relative dearth of information regarding terror-related injuries among children inhibits proper preparedness and optimum management during such an event. A retrospective study was performed using data from the national Israel Trauma Registry (October 2000 to December 2005). Included were civilians and nonactive military personnel hospitalized as a result of a terror explosion. During the 5.3-year study period, 49 children (0-10 years), 65 adolescents (11-15 years), and 723 adults (16-45 years) were hospitalized from terror explosions. Children were more likely than adults to sustain severe injuries (27% vs. 12%) and traumatic brain injury (35% vs. 20%) and less likely to sustain injuries to their extremities (35% vs. 57%) or open wounds (39% vs. 59%) (P profile was similar to that of adults, however, adolescents presented with less internal injuries, more contusions, and superficial wounds to extremities and were more likely to require surgery for mild to moderate wounds. Differences in hospital utilization and outcomes by age groups were observed when data were stratified by injury severity. Compared to adults, children, and adolescents exposed to terror explosions present with different injuries and hospital utilization and outcomes. These results further confirm that preparedness of a pediatric healthcare system is essential for effective management in the event of a future mass casualty incident.

  20. Suggestion on Information Sharing for AP implementation

    Energy Technology Data Exchange (ETDEWEB)

    Shim, Hye Won; Kim, Min Su; Koh, Byung Marn [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2013-10-15

    Under the Additional Protocol, States should provide the IAEA with expanded declarations of activities related to the nuclear fuel cycle and other nuclear activities, and with expanded access to the relevant information and sites to allow the IAEA to verify the completeness of these declarations. The AP to the Safeguards Agreement (the Additional Protocol) was signed on June 21{sup st}, 1999 and entered into force on February 19{sup th}, 2004. ROK submitted initial declarations in August 2004. Since then, ROK has been submitting annual updated reports of initial declaration on every May 15{sup th}. To achieve successful implementation, it is necessary to collect the information for each individual article in Article 2 of the AP and verify the declared information provided by facility operators. Therefore, the cooperation among the ministries and offices concerned is a prerequisite for successful implementation of AP. Unfortunately, the formal procedure for inter-organizational information sharing and cooperation is not established. This paper will briefly outline the AP declarations and suggest the information sharing among the ministries, offices and organizations for effective and efficient implementation of AP. The State authority has responsibility for AP implementation and it should verify correctness and completeness of the information declared by facility operators before submitting the declarations. The close cooperation and information sharing among the ministries, offices and organizations are indispensable to effective and efficient implementation of AP.

  1. Health information sharing on Facebook: An exploratory study on diabetes mellitus

    Directory of Open Access Journals (Sweden)

    Zainab A. AlQarni

    2016-11-01

    Full Text Available Summary: Background: Increasingly, people are using Facebook (FB to share health information. However, little is known about the type of information sharing and its potential health consequences in the Arabic speaking world. This study attempts to fill this knowledge gap for diabetes mellitus (DM. Method: We conducted a retrospective qualitative FB content analysis using predefined eligibility criteria. The analysis was restricted to diabetes related groups in the Arabic speaking world. The data were collected between June 2010 and December 2015. A total of 55 groups were screened of which seven met the eligibility criteria. Results: We found 6107 posts in Arabic related to DM of which 1551 posts were included for further analysis. There were 458 (30% FB posts from Egypt with no posts from Somalia, Yemen, Comoros, and Djibouti. The majority of the posts, 863 (56%, were from females. The focus of the posts was on sharing personal experiences (n = 423, 27%, raising awareness (n = 210, 3.5%, providing spiritual support (n = 162, 10.4%, sharing latest research (n = 147, 9.5%, and providing education (n = 110, 7.1% on DM. A large number of the posts by people in 40–60 year age group were around finding out diagnosis related information due to limited access to care in their home countries. Conclusion: Patients with DM are increasingly sharing their health information with other FB users. This study will help inform future research with regard to health information sharing and designing appropriate interventions to harness the power of social media in improving public health. Keywords: Health information, Facebook, Diabetes mellitus, Arab world

  2. What to Share and Why to Share? A Case Study of CrossBoundary Information Sharing in Taiwan e-Government

    Directory of Open Access Journals (Sweden)

    Tung-Mou Yang

    2013-06-01

    Full Text Available In the public sector, cross-boundary information sharing has been an important theme among governmental collaboration and is critical to organizational efficiency and performance. This research explores the types and characteristics of shared information and the intended purposes of information sharing. In the case study, the cross-boundary shared information can be abstracted into five fundamental types: the collected raw data, the value-added information, the administration oriented information, the administration-oriented knowledge, and the domain-oriented knowledge. Another framework is proposed to conceptualize the purposes of interagency information sharing. The identified seven purposes are administrative work, information search and verification, information aggregation, business process chain, innovative service, experience-based knowledge sharing, and crisis and emergency. The seven purposes do not mean to be an exhaustive list but to provide an initial conceptualization to perceive the functionalities and roles that cross-boundary information sharing plays among government agencies. The two proposed frameworks can help both researchers and practitioners perceive and clarify the fundamental part of cross-boundary information sharing in the public sector. The finding of this research is also expected to enrich the current information-sharing theories and to contribute to the current e-Government literature from an international perspective.

  3. Multiprocessor shared-memory information exchange

    International Nuclear Information System (INIS)

    Santoline, L.L.; Bowers, M.D.; Crew, A.W.; Roslund, C.J.; Ghrist, W.D. III

    1989-01-01

    In distributed microprocessor-based instrumentation and control systems, the inter-and intra-subsystem communication requirements ultimately form the basis for the overall system architecture. This paper describes a software protocol which addresses the intra-subsystem communications problem. Specifically the protocol allows for multiple processors to exchange information via a shared-memory interface. The authors primary goal is to provide a reliable means for information to be exchanged between central application processor boards (masters) and dedicated function processor boards (slaves) in a single computer chassis. The resultant Multiprocessor Shared-Memory Information Exchange (MSMIE) protocol, a standard master-slave shared-memory interface suitable for use in nuclear safety systems, is designed to pass unidirectional buffers of information between the processors while providing a minimum, deterministic cycle time for this data exchange

  4. Secure medical information sharing in cloud computing.

    Science.gov (United States)

    Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia

    2015-01-01

    Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.

  5. Socioconomic nature of terrorism

    Directory of Open Access Journals (Sweden)

    Valeriy Petrovich Chichkanov

    2013-12-01

    Full Text Available In the article, the theoretical and methodological foundations of investigation of the  socioeconomic nature of terrorism are considered. Hypothesis of research is the existence of methodological criteria of territory classification on the basis of external and internal terrorism. On the basis of the analysis of theoretical works of national and foreign authors, normative documents of state and international level the genesis of approaches to the understanding of the essence of modern terrorism, its contents, the subject-object relations and manifestation forms is received. As the result, according to the authors’ definition “terrorism” is understood as an ideology connected with deliberate violence or threats against the civilian population or property to influence on the government or the interstate organizations. In the work, the factors of development and spreading of terrorism in the Russian Federation’s regions are allocated and quantitatively proved. Weight parameters of the specified factors are determined. The methodological differentiation of the specified factors on factors of terrorism external (attacks from the outside and an internal form (distribution and realization of radical ideas within the region in the territory is the distinctive feature of the conducted research. During the research, the cluster analysis of a region is carried out to distribute of Russia’s regions according to the typological characteristic of the region of internal and external terrorism. The obtained data are verified in accordance with empirical data, the hypothesis of the existence of methodological criteria of the region classification on the basis of external and internal terrorism is proved.

  6. Understanding Interdependency Through Complex Information Sharing

    Directory of Open Access Journals (Sweden)

    Fernando Rosas

    2016-01-01

    Full Text Available The interactions between three or more random variables are often nontrivial, poorly understood and, yet, are paramount for future advances in fields such as network information theory, neuroscience and genetics. In this work, we analyze these interactions as different modes of information sharing. Towards this end, and in contrast to most of the literature that focuses on analyzing the mutual information, we introduce an axiomatic framework for decomposing the joint entropy that characterizes the various ways in which random variables can share information. Our framework distinguishes between interdependencies where the information is shared redundantly and synergistic interdependencies where the sharing structure exists in the whole, but not between the parts. The key contribution of our approach is to focus on symmetric properties of this sharing, which do not depend on a specific point of view for differentiating roles between its components. We show that our axioms determine unique formulas for all of the terms of the proposed decomposition for systems of three variables in several cases of interest. Moreover, we show how these results can be applied to several network information theory problems, providing a more intuitive understanding of their fundamental limits.

  7. Health information sharing on Facebook: An exploratory study on diabetes mellitus.

    Science.gov (United States)

    AlQarni, Zainab A; Yunus, Faisel; Househ, Mowafa S

    Increasingly, people are using Facebook (FB) to share health information. However, little is known about the type of information sharing and its potential health consequences in the Arabic speaking world. This study attempts to fill this knowledge gap for diabetes mellitus (DM). We conducted a retrospective qualitative FB content analysis using predefined eligibility criteria. The analysis was restricted to diabetes related groups in the Arabic speaking world. The data were collected between June 2010 and December 2015. A total of 55 groups were screened of which seven met the eligibility criteria. We found 6107 posts in Arabic related to DM of which 1551 posts were included for further analysis. There were 458 (30%) FB posts from Egypt with no posts from Somalia, Yemen, Comoros, and Djibouti. The majority of the posts, 863 (56%), were from females. The focus of the posts was on sharing personal experiences (n=423, 27%), raising awareness (n=210, 3.5%), providing spiritual support (n=162, 10.4%), sharing latest research (n=147, 9.5%), and providing education (n=110, 7.1%) on DM. A large number of the posts by people in 40-60 year age group were around finding out diagnosis related information due to limited access to care in their home countries. Patients with DM are increasingly sharing their health information with other FB users. This study will help inform future research with regard to health information sharing and designing appropriate interventions to harness the power of social media in improving public health. Copyright © 2016 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  8. Sharing sensitive health information through social media in the Arab world.

    Science.gov (United States)

    Asiri, Eman; Khalifa, Mohamed; Shabir, Syed-Abdul; Hossain, Md Nassif; Iqbal, Usman; Househ, Mowafa

    2017-02-01

    Sharing daily activities on social media has become a part of our lifestyle, but little is known about sharing sensitive health information in the Arab world. The objective of this study is to explore how social media users in the Arab world share sensitive health information through Facebook. A retrospective qualitative analysis was used in the study. A total of 110 Facebook groups, related to HIV, sickle cell and depression were screened between 5 June and 1 December 2014. Forty four Facebook groups met the inclusion criteria. 28 471 posts were extracted, of which 649 met inclusion criteria. Forty two percent of health information exchanged were related to HIV, 34% to depression and 24% to sickle cell diseases. The majority of postings were from Egypt 21.1%, Saudi Arabia 20%, Algeria 10% and Libya 9.2%. Male posts were 54.2% while 45.8% were posted by females. Individuals utilized Facebook groups to share personal experiences of their disease 31%, in addition to being used for seeking queries 13.6%, offering explicit advice 8.3%, reporting signs and symptoms of the disease 7.3% and posting their communication with the health-care provider 6.6%. Users in the Arab world use social media to exchange sensitive health information, which could have serious implications regarding the privacy of the information shared with other members of the group. On the other hand, sharing health information could have positive effects for patients, such as sharing disease experiences and peer support. However, more work is needed to ensure that Facebook users in the Arab world are aware of the potential consequences of sharing sensitive health information through social media. © The Author 2016. Published by Oxford University Press in association with the International Society for Quality in Health Care. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  9. Terrorism in Colombia.

    Science.gov (United States)

    Paredes Zapata, Gabriel Darío

    2003-01-01

    Colombia is a poor country that has been plagued by ongoing violence for more than 120 years. During the 1940s, subversive terrorist groups emerged in rural areas of the country when criminal groups came under the influence of Communism, and were later transformed into contemporary groups, such as the Ejercito de Liberacion Nacional (ELN) or National Liberation Army and Fuerzas Armadas Revolucionares de Colombia (FARC) or Revolutionary Armed Forces of Colombia). Paramilitary terrorist groups emerged in response to subversive groups and were later transformed into contemporary groups, such as the Autodefensas Unidas de Colombia (AUC) or United Self-Defense Forces of Colombia. Terrorism has placed an enormous burden on modern Colombia. From 1995 to 2002, 9,435 people were killed by terrorism-related events, of which 5,864 were killed by subversive terrorist activities and 3,571 were killed by paramilitary terrorist activities. In 2002, at least nineteen attacks produced 10 or more casualties, of which 18 were bombings. In 2002, terrorists killed at least 12 mayors, 71 legislators, and internally displaced 300,000 persons from their homes. Since terrorist groups in Colombia are typically supported by drug manufacturing and trafficking, it has been difficult at times to distinguish violence due to terrorism from violence due to illicit drug trafficking. Terrorism has also had a major adverse effect on the economy, with restricted travel, loss of economic resources, and lack of economic investment. In addition to political, military, and commercial targets, terrorists have specifically targeted healthcare infrastructure and personnel. At the national and local levels, much emergency planning and preparedness has taken place for terrorism-related events. The Centro Regulador de Urgencias (CRU) or Emergency Regulation Center in Bogota plays a major role in coordinating local prehospital and hospital emergency response in the capital city and the national level where

  10. Night Terrors in Children

    OpenAIRE

    Feferman, Irv

    1988-01-01

    Night terrors are a bizarre sleep disorder that affects young children. The child partially awakes during the night agitated, afraid and terrified, and cannot be consoled. These events, which may be related to emotional turmoil, are self-limiting. Psychiatric evaluation is indicated in certain cases, and drug therapy is almost never necessary. Parents should be reassured that night terrors are not dangerous and do not reflect any serious pathology.

  11. Patterns of Knowledge Sharing and Knowledge Creation in New Information Environments

    DEFF Research Database (Denmark)

    Nielsen, Jørgen Lerche; Meyer, Kirsten

    2006-01-01

    and creation processes. The aim is to obtain a deeper comprehension of which factors determine whether the use of information technology becomes a success or a failure in relation to knowledge sharing and creation. The paper is based on three previous studies investigating the use of information technology......Do the knowledge sharing and creation processes in collaborating groups benefit from the use of new information environments or are the environments rather inhibitive to the development of these processes? A number of different studies have shown quite varied results when it comes to appraising...... the importance and value of using new information technology in knowledge sharing and creation processes. In this paper we will try to unveil the patterns appearing in the use of new information environment and the users' understanding of the significance of using information technology in knowledge sharing...

  12. Risk communication and radiological/nuclear terrorism: a strategic view.

    Science.gov (United States)

    Becker, Steven M

    2011-11-01

    It is now widely recognized that effective communication is a crucial element in radiological/nuclear terrorism preparedness. Whereas in the past, communication and information issues were sometimes viewed as secondary in comparison with technical concerns, today the need to improve risk communication, public information, and emergency messaging is seen as a high priority. The process of improving radiological/nuclear terrorism risk communication can be conceptualized as occurring in four overlapping phases. The first phase involves the recognition that communication and information issues will be pivotal in shaping how a radiological/nuclear terrorism incident unfolds and in determining its outcome. This recognition has helped shape the second phase, in which various research initiatives have been undertaken to provide an empirical basis for improved communication. In the third and most recent phase, government agencies, professional organizations and others have worked to translate research findings into better messages and informational materials. Like the first and second phases, the third phase is still unfolding. The fourth phase in risk communication for radiological/nuclear terrorism-a mature phase-is only now just beginning. Central to this phase is a developing understanding that for radiological/nuclear terrorism risk communication to be fully effective, it must go beyond crafting better messages and materials (as essential as that may be). This emerging fourth phase seeks to anchor radiological/nuclear communication in a broader approach: one that actively engages and partners with the public. In this article, each of the four stages is discussed, and future directions for improving radiological/nuclear terrorism risk communication are explored.

  13. Potential for nuclear terrorism: a discussion

    International Nuclear Information System (INIS)

    Kellen, K.

    1987-01-01

    Because there has never been an incident of nuclear terrorism, the author is reduced to informed speculation. The past cannot be used to extrapolate into the future. For terrorists as for nations, the domain of nuclear attack represents are unprecedented quantum leap, one that groups think carefully about. Terrorists will consider many factors, including the public climate, because they are not psychotics operating in a vacuum (though groups may include psychotic individuals). Rather, they are people involved in a reciprocal political and psychological relationship with the rest of the world. In reaching some assessment of the potential for nuclear terrorism, there is an immense number of variables to deal with, beginning with the many types of terrorists and terrorism, including nuclear. They can, however, look at individual terrorist groups - a their compositions, capabilities, motivations, and modus operandi - and reach some conclusions. The author first looks at the possible forms nuclear terrorism might take and at the severity of the consequences. A strict distinction must be made between nuclear terrorism where nuclear things are the means (for example, a nuclear device) and nuclear terrorism where nuclear things are the target (for example, nuclear power stations), or where they are both such as a nuclear weapon thrown at a nuclear power station. 2 tables

  14. Cyber-Terrorism: Modem Mayhem

    National Research Council Canada - National Science Library

    White, Kenneth

    1998-01-01

    .... The arrival of the information age has created a new menace cyber terrorism. This threat recognizes no boundaries, requires minimal resources to mount an attack, and leaves no human footprint at ground zero...

  15. Terror and Wellbeing

    DEFF Research Database (Denmark)

    Raffnsøe, Sverre

    Currently, terrorism provokes a widespread feeling of insecurity and global reactions to the terrorist attacks. This is not simply because it poses a substantial threat to society and to the lives of individual citizens. The relatively rare incidents of terrorism cause emotional overreaction...... because they challenge and intensify the contract that supersaturates today's society.In the welfare society one can observe the existence of a diffuse but widespread social contract, which has become the single most cohesive element in the social fabric. According the terms of this contract, we agree...

  16. THE ROLE OF LEADERSHIP IN COMMUNITY PARTNERSHIP, ORGANIZATIONAL CHANGES AND DECISION-MAKING PROCESS IN ADDRESSING CRIME ISSUES, AND TERRORISM

    Directory of Open Access Journals (Sweden)

    Ferid Azemi

    2017-09-01

    Full Text Available This research paper explains the role of leadership style in building community partnership and in this way also addressing many crime issues and terrorism. The methods used during this research paper are the deep insight of understanding leadership collaboration and organizational changes through literature review. A qualitative design was applied for face-to-face interview with a high ranking member of Kosovo Police. This interview shed light on the role of leadership style and challenges that are related to police reformation and also organizational changes. Through this paper, police leadership may be viewed differently, and seem to be very complex. Community partnership and shared decision-making process were emphasized during this study. This research paper also focused on integrity, ethics and strategic planning. Community partnership, organizational changes, and shared decision-making process are related to leadership style. Leadership style may have either positive or adverse effect on addressing crime rate and terrorism. Depending on the style leaders implement, certain components such as community partnership, or organizational change or even shared decision-making process may fail to function. This is why leadership style seems to bring some very interesting conclusions on this research.

  17. Why is terrorism a man's business?

    Science.gov (United States)

    Möller-Leimkühler, Anne Maria

    2018-04-01

    Terrorism, whether it is group-related or performed as lone actor terrorism, is a predominantly male phenomenon. Generally and throughout history, young males have been the main protagonists of criminal and political violence.This article aims to contribute, from different perspecives, to the question of what makes young men violent. These include neurobiological aspects, such as sex differences in the brain that predispose males to physical aggression and violence; gender role aspects, with regard to aggression and violence being basic components for demonstrating and reconstructing masculinity; demographic aspects of male youth bulges as potential breeding grounds for terrorism; aspects of group dynamics and identity fusion in the process of radicalization; and psychosocial characteristics of lone actor terrorists, which differ from group-related terrorists.It is concluded that in addition to ideological, political, economic, regional, demographic, or psychosocial causes, experiences of threatened masculinity may be an underlying factor and driving force for terrorism.

  18. Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Hagan, Ross F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-29

    This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature.

  19. Towards a European Position on Armed Drones and Targeted Killing: Surveying EU Counter-Terrorism Perspectives

    Directory of Open Access Journals (Sweden)

    Jessica Dorsey

    2015-04-01

    Full Text Available In this Research Paper, Jessica Dorsey and Dr. Christophe Paulussen gauge the extent to which European Union Member States share the position of the United States on armed drones and targeted killings. In doing so, it aims to assist in distilling a common EU position on the use of armed drones and a legal framework for counter-terrorism-related uses of force.

  20. 75 FR 6678 - Agency Information Collection Activities: Customs and Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2010-02-10

    ... Activities: Customs and Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border... Terrorism (C-TPAT). This request for comment is being made pursuant to the Paperwork Reduction Act of 1995... Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract: The Customs and Trade...

  1. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  2. Policy lessons from comparing mortality from two global forces: international terrorism and tobacco

    Directory of Open Access Journals (Sweden)

    Wilson Nick

    2005-12-01

    Full Text Available Abstract Background The aim of this study was to compare the mortality burdens from two global impacts on mortality: international terrorism and the major cause of preventable death in developed countries – tobacco use. We also sought to examine the similarities and differences between these two causes of mortality so as to better inform the policy responses directed at prevention. Methods Data on deaths from international terrorism were obtained from a US State Department database for 1994–2003. Estimates for tobacco-attributable deaths were based on Peto et al 2003. The countries were 37 developed and East European countries. Results and discussion The collective annualized mortality burden from tobacco was approximately 5700 times that of international terrorism. The ratio of annual tobacco to international terrorism deaths was lowest for the United States at 1700 times, followed by Russia at 12,900 times. The tobacco death burden in all these countries was equivalent to the impact of an 11 September type terrorist attack every 14 hours. Different perceptions of risk may contribute to the relative lack of a policy response to tobacco mortality, despite its relatively greater scale. The lack is also despite tobacco control having a stronger evidence base for the prevention measures used. Conclusion This comparison highlights the way risk perception may determine different policy responses to global forces causing mortality. Nevertheless, the large mortality differential between international terrorism and tobacco use has policy implications for informing the rational use of resources to prevent premature death.

  3. Globalisation, Faith and Terrorism: Religious Opposition to Modern ...

    African Journals Online (AJOL)

    The world is now moving from secular wars to religious motivated wars, from conventional wars to unconventional wars, that is, terrorism. This new phenomenon has been fuelled by globalisation and the drive to turn the world into a single global village. At the local level, Nigeria has had its own share of religious motivated ...

  4. Terrorism and disarmament

    International Nuclear Information System (INIS)

    2001-01-01

    In addressing the General Assembly at the opening of its debate on international terrorism (1 to 5 October 2001), the Secretary-General warned that a single attack involving a nuclear or biological weapon could kill millions. While the world was unable to prevent the II September attacks, there is much we can do to help prevent future terrorist acts carried out with weapons of mass destruction, he emphasized, calling for redoubled efforts to implement key treaties relating to those arms, closer cooperation among international organizations dealing with them, and tighter national legislation covering the exports of goods and technologies used in their production. Many representatives from all countries and all regions echoed the Secretary-General's sentiment during the debate. The general conclusion was that all countries could be affected in some form or another by such a fearful proposition, and all countries must work together to prevent it. To gain a greater understanding of the increased threat of international terrorism today, the Department for Disarmament Affairs sponsored a panel of high-level experts to discuss terrorism and its relationship to disarmament. Two leading experts from the Centre for the Study of Terrorism and Political Violence at the University of St. Andrews in Scotland, Professor Wilkinson and Dr. Gunaratna, put the attacks on the United States in an historical perspective, present some of the repercussions of the unprecedented scope of the attacks and give their views on how international institutions and agreements can assist in combating future acts of this kind. Mr Vladimir P Salov of the Russian Federation addresses the suppression of financing of terrorism and how Russia works towards that end. The IAEA has been trying for almost 50 years to safeguard nuclear materials from diversions to nuclear-weapon users and, in recent years, working more intensively on physical protection of nuclear material. Dr Nilsson's presentation

  5. FATF in Combating the Financing of Terrorism

    Directory of Open Access Journals (Sweden)

    Kristina Slavikovna Melkumyan

    2014-01-01

    Full Text Available The article examines the FATF specific approach to the problem of terrorism financing. The FATF essence, content of the activity and influence levers are also analyzed within the article. It is shown that the FATF has reviewed the problem of terrorism financing in the broadest perspective, having engaged simultaneously and consistently mechanisms for combating money laundering and terrorism financing. The Task Force has greatly contributed to building of the world counter-terrorism financing system through forming the legal and institutional basis as well as through interaction with all the possible participants and actors of world politics in this area. Moreover, the FATF has succeeded in geographical expansion of the FATF influence from the original 16 to187 jurisdictions by promotion of FATF-style regional bodies establishment. Particular attention is drawn to the unique features of the FATF Recommendations in comparison with the earlier issued sources of international law, which define the international counter-terrorism financing regime. The author believes that one of the advantages of the FATF as an institute within the counter-terrorism financing system among others is the informal status of the FATF, which provides its flexibility and high ability to respond quickly and in a timely manner to evolving nature of money laundering and terrorism financing as well as emerging threats.

  6. Sharing Elderly Healthcare information on Cloud Computing

    OpenAIRE

    Lu, Fangjie; Khan, Israr

    2012-01-01

    Context: Due to rapid increase in the population of elderly people, sharing healthcare information has become an essential requirement for the development of e-health system. By conducting a research in e-health and cloud computing we have explored the advantages and disadvantages of sharing healthcare information for elderly people through cloud computing. Objectives: The main purpose of this research is to investigate the suitability of cloud computing to share healthcare information. The s...

  7. Close Cousins or Distant Relatives? The Relationship between Terrorism and Hate Crime

    Science.gov (United States)

    Deloughery, Kathleen; King, Ryan D.; Asal, Victor

    2012-01-01

    Prior research has frequently drawn parallels between the study of hate crimes and the study of terrorism. Yet, key differences between the two behaviors may be underappreciated in extant work. Terrorism is often an "upward crime," involving a perpetrator of lower social standing than the targeted group. By contrast, hate crimes are…

  8. Empirical scaling law connecting persistence and severity of global terrorism

    Science.gov (United States)

    Gao, Jianbo; Fang, Peng; Liu, Feiyan

    2017-09-01

    Terrorism and counterterrorism have both been evolving rapidly. From time to time, there have been debates on whether the new terrorism is evolutionary or revolutionary. Such debate often becomes more heated after major terrorist activities, such as the terrorist attacks on September 11, 2001 and the November 13, 2015 coordinated Paris terror attack. Using country-wide terrorism data since 1970, we show that there exist scaling laws governing the continuity and persistence of world-wide terrorism, with the long-term scaling parameter for each country closely related to its yearly global terrorism index. This suggests that the new terrorism is more accurately considered evolutionary. It is further shown that the imbalance in the seesaw of terrorism and counterterrorism is not only responsible for the scaling behavior found here, but also provides new means of quantifying the severity of the global terrorism.

  9. Sharing and helping: predictors of adolescents' willingness to share diabetes personal health information with peers.

    Science.gov (United States)

    Vaala, Sarah E; Lee, Joyce M; Hood, Korey K; Mulvaney, Shelagh A

    2018-02-01

    Sharing personal information about type 1 diabetes (T1D) can help adolescents obtain social support, enhance social learning, and improve self-care. Diabetes technologies, online communities, and health interventions increasingly feature data-sharing components. This study examines factors underlying adolescents' willingness to share personal T1D information with peers. Participants were 134 adolescents (12-17 years of age; 56% female) who completed an online survey regarding experiences helping others with T1D, perceived social resources, beliefs about the value of sharing information and helping others, and willingness to share T1D information. Hemoglobin A1c values were obtained from medical records. Adolescents were more willing to share how they accomplished T1D tasks than how often they completed them, and least willing to share glucose control status. In multivariate analyses, sharing/helping beliefs (β = 0.26, P value; β = -0.26, P personal health information. Glucose control moderated relationships such that adolescents with worse A1c values had stronger relationships between sharing/helping beliefs and willingness to share (β = 0.18, P personal health information, particularly if they have better diabetes health status and a stronger belief in the benefits of sharing. Social learning and social media components may improve intervention participation, engagement, and outcomes by boosting adolescents' beliefs about the benefits of sharing information and helping others. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  10. A Taxonomy of Terror - About the Effect of Different Kinds of Terror on Risk Perceptions

    OpenAIRE

    Wolff, Katharina; Larsen, Svein

    2016-01-01

    Terrorism is an increasing problem; still, research systematically investigating the impact of varying kinds of terrorism is scarce. The present investigation uses hypothetical scenarios to look at effects of diverging sorts of terrorism on risk perceptions in a student- and a tourist sample. Two characteristics of terrorism were varied systematically: frequency (whether terrorism hits a destination where terrorism is frequent or infrequent) and degree of organization (whether terrorism is co...

  11. A new international convention against terrorism: the International Convention for the Suppression of Acts of Nuclear Terrorism. Full text in French, English and Spanish. Introduction to the main elements of the convention

    International Nuclear Information System (INIS)

    Laborde, Jean-Paul; )

    2005-01-01

    The International Convention for the Suppression of Acts of Nuclear Terrorism is a 2005 United Nations treaty designed to criminalize acts of nuclear terrorism and to promote police and judicial cooperation to prevent, investigate and punish those acts. As of September 2016, the convention has 115 signatories and 106 state parties, including the nuclear powers China, France, India, Russia, the United Kingdom, and the United States. The Convention covers a broad range of acts and possible targets, including nuclear power plants and nuclear reactors; covers threats and attempts to commit such crimes or to participate in them, as an accomplice; stipulates that offenders shall be either extradited or prosecuted; encourages States to cooperate in preventing terrorist attacks by sharing information and assisting each other in connection with criminal investigations and extradition proceedings; and, deals with both crisis situations, assisting States to solve the situations and post-crisis situations by rendering nuclear material safe through the International Atomic Energy Agency (IAEA)

  12. Global games with noisy sharing of information

    KAUST Repository

    Touri, Behrouz; Shamma, Jeff S.

    2014-01-01

    We provide a framework for the study of global games with noisy sharing of information. In contrast to the previous works where it is shown that an intuitive threshold policy is an equilibrium for such games, we show that noisy sharing of information leads to non-existence of such an equilibrium. We also investigate the group best-response dynamics of two groups of agents sharing the same information to threshold policies based on each group's observation and show the convergence of such dynamics.

  13. System Dynamics Modeling for Supply Chain Information Sharing

    Science.gov (United States)

    Feng, Yang

    In this paper, we try to use the method of system dynamics to model supply chain information sharing. Firstly, we determine the model boundaries, establish system dynamics model of supply chain before information sharing, analyze the model's simulation results under different changed parameters and suggest improvement proposal. Then, we establish system dynamics model of supply chain information sharing and make comparison and analysis on the two model's simulation results, to show the importance of information sharing in supply chain management. We wish that all these simulations would provide scientific supports for enterprise decision-making.

  14. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  15. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    phenomenon. This Research Paper, by contrast, considers another source of data that could inform this analysis, namely the financial intelligence (FININT generated by the huge quantities of transaction data gathered by the financial-services industry as it processes bank transfers, ATM withdrawals and credit-card transactions. It asks what barriers exist to greater partnership and information sharing between the security authorities and the financial-services industry in tackling terrorism. And whether, within the parameters of acceptable data-privacy restrictions, an intelligent and intelligence-led relationship between the security authorities and the financial-services industry could provide greater and more timely insight into which individuals are travelling to Syria or are already in-country, and (perhaps most importantly who, having been exposed to the extremist ideology espoused by groups such Daesh, has returned home. The lack of partnership and information sharing between the public and private sectors is dramatically hindering the valuable role banks could play in assisting in disrupting terrorism. Advances in technology and transaction-monitoring systems have immeasurably improved the capabilities of banks and other financial institutions, such as large-scale remittance companies, to play the front-line role that is required of them by the authorities. The security threat posed by FTFs – and the apparent struggle faced by national security authorities in identifying and tracking such individuals – provides an ideal and timely platform from which to discuss the role that banks can play in countering terrorist threats, which requires urgent re-evaluation and enhancement. The FTF phenomenon has caught security authorities across the globe off guard. Authorities in many Western capitals only awoke, belatedly, to the threat once many hundreds of their citizens had made the journey to Syria and had begun openly to promote their actions via social media. Significant

  16. Terrorism in Pakistan: a behavioral sciences perspective.

    Science.gov (United States)

    Nizami, Asad Tamizuddin; Rana, Mowadat Hussain; Hassan, Tariq Mahmood; Minhas, Fareed Aslam

    2014-01-01

    This article reviews the behavioral science perspectives of terrorism in Pakistan. It can be argued that Pakistan has gained worldwide attention for "terrorism" and its role in the "war against terrorism". The region is well placed geopolitically for economic successes but has been plagued by terrorism in various shapes and forms. A behavioral sciences perspective of terrorism is an attempt to explain it in this part of the world as a complex interplay of historical, geopolitical, anthropological and psychosocial factors and forces. Drawing from theories by Western scholars to explain the behavioral and cognitive underpinnings of a terrorist mind, the authors highlight the peculiarities of similar operatives at individual and group levels. Thorny issues related to the ethical and human right dimensions of the topic are visited from the unique perspective of a society challenged by schisms and divergence of opinions at individual, family, and community levels. The authors have attempted to minimize the political descriptions, although this cannot be avoided entirely, because of the nature of terrorism. Copyright © 2014 John Wiley & Sons, Ltd.

  17. Information Sharing and Channel Construction of Supply Chain under Asymmetric Demand Information

    Directory of Open Access Journals (Sweden)

    Guangdong Wu

    2014-01-01

    Full Text Available Information sharing and marketing channel building have become an important problem of supply chain management theory and practice. The research of information sharing focused on traditional channel of supply chain between upstream and downstream enterprises; however, the research ignores the behavior of information sharing with potential entrants and composite structure characteristics about traditional marketing channel with the direct channel. This paper uses the model to research the effects brought about sharing demand information with potential entrants and building marketing channel, which reveals information sharing and channel building mechanism in the supply chain. The study found that the five-force model of Porter regards potential entrants only as a threat that is one-sided. When the channel competitiveness meets certain conditions, manufacturer and retailer will share demand information with potential entrants. Building composite marketing channel is the manufacturer's absolute dominant strategy. Channel construction will increase the entry barriers for potential entrants and weaken the effect of double marginalization; meanwhile, the performance of supply chain will be augmented.

  18. Global games with noisy sharing of information

    KAUST Repository

    Touri, Behrouz

    2014-12-15

    We provide a framework for the study of global games with noisy sharing of information. In contrast to the previous works where it is shown that an intuitive threshold policy is an equilibrium for such games, we show that noisy sharing of information leads to non-existence of such an equilibrium. We also investigate the group best-response dynamics of two groups of agents sharing the same information to threshold policies based on each group\\'s observation and show the convergence of such dynamics.

  19. Terrorism as Communication.

    Science.gov (United States)

    Decker, Warren; Rainey, Daniel

    Terrorism has become not merely a political act, but a carefully designed and rhetorically sophisticated attempt at communication. What role should the communication scholar play in the investigation of terrorism? Specifically, there are six areas within which the communication scholar may actively contribute to an understanding of terrorism as…

  20. Information Sharing and Information Acqusition in Credit Markets

    NARCIS (Netherlands)

    Karapetyan, A.; Stacescu, B.

    2009-01-01

    Since information asymmetries have been identified as an important source of bank profits, it may seem that the establishment of information sharing arrangements such as credit registers and bureaus will lead to lower investment in acquiring information. However, banks base their decisions on both

  1. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  2. Issue in Information Sharing of Halal Food Supply Chain

    Directory of Open Access Journals (Sweden)

    Masrom Nor Ratna

    2017-01-01

    Full Text Available Information sharing serves as an essential approach for the companies and antecedents of supply chain integration. Nowadays, with the highly competitive in halal food market, information sharing has become more conceivable. Furthermore, information sharing in supply chains has become more efficient by having meaningful relationship with the members of halal supply chain. There is a lack information regarding information shared within members in halal food supply chain literature. The information needed in order to shed the light of how companies nowadays can be more competitive. The purpose of this study is to investigate to what extent the information can be shared among the members of the halal food supply chain. This study elaborates the barriers of information sharing leading to enhanced supply chain integration among enterprises, as a result. The interview with four managers from halal certified food manufactures has been deployed to get rich data about the information sharing. The finding shows that most of cases halal certified food manufacturers has low communication with their suppliers. Trust is the key enablers within the members of halal food supply chain.

  3. Understanding Contemporary Terrorism.

    Science.gov (United States)

    Mitchell, Thomas H.

    1989-01-01

    Discusses the issue of terrorism as it exists today and examines progress that has been made toward understanding its dimensions. Suggests how this subject can be explored in the classroom. Dispels misconceptions about terrorism by defining the term, and examines some causes of terrorism and strategies employed by terrorists. (KO)

  4. Producing 'internal suspect bodies': divisive effects of UK counter-terrorism measures on Muslim communities in Leeds and Bradford.

    Science.gov (United States)

    Abbas, Madeline-Sophie

    2018-04-06

    Research on UK government counter-terrorism measures has claimed that Muslims are treated as a 'suspect community'. However, there is limited research exploring the divisive effects that membership of a 'suspect community' has on relations within Muslim communities. Drawing from interviews with British Muslims living in Leeds or Bradford, I address this gap by explicating how co-option of Muslim community members to counter extremism fractures relations within Muslim communities. I reveal how community members internalize fears of state targeting which precipitates internal disciplinary measures. I contribute the category of 'internal suspect body' which is materialized through two intersecting conditions within preventative counter-terrorism: the suspected extremist for Muslims to look out for and suspected informer who might report fellow Muslims. I argue that the suspect community operates through a network of relations by which terrors of counter-terrorism are reproduced within Muslim communities with divisive effects. © London School of Economics and Political Science 2018.

  5. Terrorism Research Centres: 100 Institutes, Programs and Organisations in the Field of Terrorism, Counter-Terrorism, Radicalisation and Asymmetric Warfare Studies

    Directory of Open Access Journals (Sweden)

    Benjamin Freedman

    2010-12-01

    Full Text Available Who is doing research – academic and otherwise – on terrorism? The field of terrorism research is broad and ever-expanding. Governments sponsor intelligence-driven analytical research agencies. Commercial intelligence firms like Jane’s, sell their research to corporate and governmental clients. There are think tanks likeRAND, which work closely with government agencies. An increasing number of universities house terrorism research centres, the oldest one being the Centre for the Study of Terrorism and Political Violence at the University of St. Andrews. Then there are virtual networks, such as the Terrorism Research Initiative (TRI, that try to create synergies between a wide array of researchers and topics.

  6. Thermodynamical quantum information sharing

    International Nuclear Information System (INIS)

    Wiesniak, M.; Vedral, V.; Brukner, C.

    2005-01-01

    Full text: Thermodynamical properties fully originate from classical physics and can be easily measured for macroscopic systems. On the other hand, entanglement is a widely spoken feature of quantum physics, which allows to perform certain task with efficiency unavailable with any classical resource. Therefore an interesting question is whether we can witness entanglement in a state of a macroscopic sample. We show, that some macroscopic properties, in particular magnetic susceptibility, can serve as an entanglement witnesses. We also study a mutual relation between magnetic susceptibility and magnetisation. Such a complementarity exhibits quantum information sharing between these two thermodynamical quantities. Magnetization expresses properties of individual spins, while susceptibility might reveal non-classical correlations as a witness. Therefore, a rapid change of one of these two quantities may mean a phase transition also in terms of entanglement. The complementarity relation is demonstrated by an analytical solution of an exemplary model. (author)

  7. “Counterterrorism Bookshelf” – 27 Books on Terrorism & Counterterrorism Related Subjects

    Directory of Open Access Journals (Sweden)

    Joshua Sinai

    2014-04-01

    Full Text Available This column consists of two parts: capsule reviews of nine books on terrorism and counterterrorism-related topics, and — continuing the series begun in the previous column of highlighting books by significant publishers (listed in alphabetical order — capsule reviews of 18 books published by Hurst, Oxford University Press, Polity Press, and Rowman & Littlefield. Please note that most of these books were recently published, with several others released over the past few years but deserving renewed interest.

  8. Contracting and Information Sharing Under Supply Chain Competition

    OpenAIRE

    Albert Y. Ha; Shilu Tong

    2008-01-01

    We investigate contracting and information sharing in two competing supply chains, each consisting of one manufacturer and one retailer. The two supply chains are identical, except they may have different investment costs for information sharing. The problem is studied using a two-stage game. In the first stage, the manufacturers decide whether to invest in information sharing. In the second stage, given the information structure created in the first stage, the manufacturers offer contracts t...

  9. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  10. Terrorism and its centuries challenges

    Directory of Open Access Journals (Sweden)

    Jonida Drogu

    2018-03-01

    Full Text Available The goal of this article is to portray how to better understand the epistemic differences of terminology used for terrorism and how people’s lives have been and are still affected by this undefined violence. By collecting some diary information from 20people about their perception about terrorism attaches we will analyze some of overall countries and Saudi Arabia’s commitment in fighting this century’s challenge. Fighting radical religious beliefs in the Kingdom is an immense challenge. The true Islamic faith is in large contrast to those individuals and entities whose actions are centered on the intentional misrepresentation or the degradation of the teachings of Islam. The base of this data will indicate the progress within Saudi Arabia, its position in the world prospect and its impact in society since it remains a robust construction even now days, even thought, a lot has been done. The first signs provided in this analysis start with the beginning of the new century, when a strong attack happened just days before it began. Some important indicators such as terrorism founding, or money charities caused many changes in Saudi Arabia as a leading power, in the war against terrorism in Middle East.

  11. Privacy Protection Standards for the Information Sharing Environment

    Science.gov (United States)

    2009-09-01

    enable ISE participants to share information and data (see ISE Implementation Plan, p. 51, ISE Enterprise Architecture Framework, pp. 67, 73–74 and...of frontiers. This article shall not prevent States from requiring the licensing of broadcasting, television or cinema enterprises. 2. The exercise...5 U.S.C. § 552a, as amended. Program Manager-Information Sharing Environment. (2008). Information Sharing Enterprise Architecture Framework

  12. Containing Terrorism: A Dynamic Model

    Directory of Open Access Journals (Sweden)

    Giti Zahedzadeh

    2017-06-01

    Full Text Available The strategic interplay between counterterror measures and terror activity is complex. Herein, we propose a dynamic model to depict this interaction. The model generates stylized prognoses: (i under conditions of inefficient counterterror measures, terror groups enjoy longer period of activity but only if recruitment into terror groups remains low; high recruitment shortens the period of terror activity (ii highly efficient counterterror measures effectively contain terror activity, but only if recruitment remains low. Thus, highly efficient counterterror measures can effectively contain terrorism if recruitment remains restrained. We conclude that the trajectory of the dynamics between counterterror measures and terror activity is heavily altered by recruitment.

  13. Knowledge sharing and innovation in relationships interorganizational type of information technology outsourcing

    Directory of Open Access Journals (Sweden)

    Roberta Rodrigues Faoro

    2017-04-01

    Full Text Available Introduction: this paper presents an analysis of the sharing of knowledge and innovation in the inter-relationships of the type outsourcing of Information Technology. Objective: analyze the existence of relationship between knowledge sharing and innovation in the inter-relationships of the type of outsourcing information technology (IT. Methodology: research is exploratory, qualitative and using as a strategy the multiple case study, which analyzed 12 companies in IT outsourcing environments, 4 suppliers of IT and IT 8 client companies. Data were collected through semi structured interviews, documentary and direct observation. Results: it can be noted that the sharing of knowledge showed contribute to the existence of innovation in IT outsourcing environment. The suppliers prioritize the codification of shared knowledge, while customers prefer the sharing of knowledge through informal conversations. It was identified that the motives for outsourcing IT may be related to the sharing of knowledge and innovation. Conclusions: this research contributes to the advancement of knowledge about the knowledge and innovation sharing phenomena in outsourcing of IT environments.

  14. The Politics of Terror: Rereading "Harry Potter"

    Science.gov (United States)

    Strimel, Courtney B.

    2004-01-01

    This article claims that J. K. Rowling's "Harry Potter" series, with its use of magic, frightening storylines, and character ambiguity is beneficial to children who are dealing with issues related to terror and terrorism. The author explains that the scenarios presented in Rowling's series teach children strategies for coping with both physical…

  15. A methodology for modeling regional terrorism risk.

    Science.gov (United States)

    Chatterjee, Samrat; Abkowitz, Mark D

    2011-07-01

    Over the past decade, terrorism risk has become a prominent consideration in protecting the well-being of individuals and organizations. More recently, there has been interest in not only quantifying terrorism risk, but also placing it in the context of an all-hazards environment in which consideration is given to accidents and natural hazards, as well as intentional acts. This article discusses the development of a regional terrorism risk assessment model designed for this purpose. The approach taken is to model terrorism risk as a dependent variable, expressed in expected annual monetary terms, as a function of attributes of population concentration and critical infrastructure. This allows for an assessment of regional terrorism risk in and of itself, as well as in relation to man-made accident and natural hazard risks, so that mitigation resources can be allocated in an effective manner. The adopted methodology incorporates elements of two terrorism risk modeling approaches (event-based models and risk indicators), producing results that can be utilized at various jurisdictional levels. The validity, strengths, and limitations of the model are discussed in the context of a case study application within the United States. © 2011 Society for Risk Analysis.

  16. How terrorism news reports increase prejudice against outgroups: A terror management account

    NARCIS (Netherlands)

    Das, E.; Bushman, B.J.; Bezemer, M.D.; Kerkhof, P.; Vermeulen, I.E.

    2009-01-01

    Three studies tested predictions derived from terror management theory (TMT) about the effects of terrorism news on prejudice. Exposure to terrorism news should confront receivers with thoughts about their own death, which, in turn, should increase prejudice toward outgroup members. Non-Muslim

  17. Information Sharing and Channel Construction of Supply Chain under Asymmetric Demand Information

    OpenAIRE

    Wu, Guangdong; Kong, Qingshan; Shi, Jian-gang; Karimi, Hamid Reza; Zhang, Wei

    2014-01-01

    Information sharing and marketing channel building have become an important problem of supply chain management theory and practice. The research of information sharing focused on traditional channel of supply chain between upstream and downstream enterprises; however, the research ignores the behavior of information sharing with potential entrants and composite structure characteristics about traditional marketing channel with the direct channel. This paper uses the model to research the eff...

  18. Defining Terrorism.

    Science.gov (United States)

    Hoffman, Bruce

    1986-01-01

    Notes the lack of a concise meaning for the word terrorism. Develops a working definition which states that terrorism is the deliberate creation and exploitation of fear through violence or the threat of violence in the attainment of political objectives. (JDH)

  19. Terrorism as a process: a critical review of Moghaddam's "Staircase to Terrorism".

    Science.gov (United States)

    Lygre, Ragnhild B; Eid, Jarle; Larsson, Gerry; Ranstorp, Magnus

    2011-12-01

    This study reviews empirical evidence for Moghaddam's model "Staircase to Terrorism," which portrays terrorism as a process of six consecutive steps culminating in terrorism. An extensive literature search, where 2,564 publications on terrorism were screened, resulted in 38 articles which were subject to further analysis. The results showed that while most of the theories and processes linked to Moghaddam's model are supported by empirical evidence, the proposed transitions between the different steps are not. These results may question the validity of a linear stepwise model and may suggest that a combination of mechanisms/factors could combine in different ways to produce terrorism. © 2011 The Authors. Scandinavian Journal of Psychology © 2011 The Scandinavian Psychological Associations.

  20. Informal milk sharing: what nurses need to know.

    Science.gov (United States)

    Martino, Kimberly; Spatz, Diane

    2014-01-01

    Human milk is the ideal food for human infants. However, some infants will be in situations wherein there is insufficient human milk to meet their needs. This article addresses formal breast milk donation (donor milk) and informal sharing of breast milk. Healthcare providers are likely to encounter families who access milk by informal breast milk sharing or cross-nursing. Both practices rely heavily on receiving human milk from women who are potentially unscreened for disease, medication, and illicit substances. Therefore, it is important for perinatal nurses to have adequate information to be able to inform these families of the risks and benefits of breast milk sharing. Two case exemplars are provided to illustrate the nuances of informal milk sharing. Implications for practice include providing families with information on health history and laboratory screening as well as safe milk-handling practices.

  1. Exploring a social network for sharing information about pain.

    Science.gov (United States)

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  2. Information sharing and relationships on social networking sites.

    Science.gov (United States)

    Steijn, Wouter M P; Schouten, Alexander P

    2013-08-01

    This article investigates the relationship between sharing personal information and relationship development in the context of social networking sites (SNSs). Information disclosed on these sites could affect relationships in a different manner compared to more traditional interactions, such as instant messaging or face-to-face interaction. Respondents in the age range of 12 to 83 were surveyed about experiences of relationship development as a consequence of contact through Facebook or Hyves-the most popular Dutch SNSs. Results showed a primarily positive effect of information sharing on SNSs on our relationships. Furthermore, relationship development mainly occurs among acquaintances and friends, and public posts are most strongly related to relationship development. These findings suggest that SNSs might affect relationships in a distinct fashion as acquaintances and friends gain access to public self-disclosures that might normally only be reserved for close friends and family. Overall, this study provides an insight into some of the positive aspects of the public nature of SNSs in contrast with the general negative associations.

  3. Nuclear Terrorism and its Confrontation

    International Nuclear Information System (INIS)

    Al Barody, M.M.

    2006-01-01

    The whole world first knew nuclear terrorism during the second world war through the use of excessive violence that to terror exercised by one country against another, as was carried out by USA when it exploded two nuclear bombs over Hiroshima and Nagasaki t the end of the war. there are numerous types of nuclear terrorism that can be performed by individuals or organized groups for achieving political or social objectives. the definition of the term t errorism i s correlated with u sing means capable of creating a case of public dnger . that property exists in all types of direct or indirect nuclear terrorism . the present study is divided into two chapters. Chapter one deals with nuclear terrorism and consists of two sections , the first deals with the identification of the nature of nuclear terrorism an the second deals with organize nuclear terrorism on the international level. Chapter two deals with the confrontation of nuclear terrorism in two sections. the first deals with the role of the state in combating against nuclear terrorism nd the second deals with combating against nuclear terrorism on the international level. while internally it is confronted through promulgation of legislations that deal with the protection against nuclear terrorism as well as the national legal instruments for protection of nuclear materials and installation and combating illicit trafficking of nuclear materials, confrontation of nuclear terrorism on the international level is carried out through the promulgation of international convention such as that on suppression of actions of nuclear terrorism which shall be opened for signature on sept.14 -2005 according to the recommendation the general assembly of the united nations in its 59 t h session

  4. Terrorism and Other Threats to Civilization

    Science.gov (United States)

    Garwin, Richard L.

    2014-07-01

    In the Seminars on Planetary Emergencies, we have for more than a decade had a strong focus on terrorism, and, indeed, on megaterrorism. We realized early that there was much that could be achieved to mitigate the consequences of terrorists' acts, and so our original PMP, ably chaired by Kamal, was split into PMP-MTA (Mitigation of Terrorists Acts) and PMP-Motivation of Terrorism. Clearly, terrorism doesn't just happen, but is performed by people, either relatively spontaneously or in an organized fashion. I will not presume to report on the considerations and accomplishments of our colleagues, chaired by John Alderdice, who have studied terrorist motivations and worked hard to eliminate such motivations...

  5. Discussion on the nuclear information resources co-constructing and sharing under network information

    International Nuclear Information System (INIS)

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  6. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    Directory of Open Access Journals (Sweden)

    Chao-Chen Lin

    2017-10-01

    Full Text Available This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on terrorism and face the danger from it.

  7. Management of the Extreme Events: Countering International Terrorism

    Directory of Open Access Journals (Sweden)

    Dr. Cristian Barna

    2011-12-01

    Full Text Available After the terrorism attacks of September 11, 2001, there is recognition by both the public and private sectors that one needs to rethink our strategy for dealing with these low probability but extreme consequence events. September 11, 2001 attacks against the United States raised numerous questions related to counter-terrorism, foreign policy, as well as national security in the United States and abroad. They also raised the fundamental question of who should pay for losses due to terrorism.The question of who should pay for terrorism risk prevention and sustainable coverage within a country is likely to be seen first as a matter of collective responsibility that each country has to consider – a societal choice

  8. Enabling information sharing in a port

    DEFF Research Database (Denmark)

    Olesen, Peter Bjerg; Hvolby, Hans-Henrik; Dukovska-Popovska, Iskra

    2012-01-01

    Ports are integral parts of many supply chains and are as such a contributing factor to the overall efficiency of the supply chain. Ports are also dynamic entities where things changes continuously. The dynamic nature of ports is also a problem when trying to optimise the utilisation of resources...... and ensure a low lead-time. Information sharing is a very important tool to reduce the effect of dynamism. This paper attempts to explain how information sharing is enabled in such an environment, and which considerations are relevant, both in regards to the information and required technology. The paper...

  9. Mass trauma: disasters, terrorism, and war.

    Science.gov (United States)

    Chrisman, Allan K; Dougherty, Joseph G

    2014-04-01

    Disasters, war, and terrorism expose millions of children globally to mass trauma with increasing frequency and severity. The clinical impact of such exposure is influenced by a child's social ecology, which is understood in a risk and resilience framework. Research findings informed by developmental systems theory and the related core principles of contemporary developmental psychopathology are reviewed. Their application to the recent recommendations for interventions based on evolving public health models of community resilience are discussed along with practical clinical tools for individual response. Published by Elsevier Inc.

  10. Epidemiological patterns of suicide terrorism in the civilian Pakistani population.

    Science.gov (United States)

    Bhatti, Junaid Ahmad; Mehmood, Amber; Shahid, Muhammad; Bhatti, Sajjad Akbar; Akhtar, Umbreen; Razzak, Junaid Abdul

    2011-09-01

    In this study, we assessed the epidemiological patterns of suicide terrorism in the civilian population of Pakistan. Information about suicide terrorism-related events, deaths and injuries was extracted from the South-Asian Terrorism Portal (SATP) for the period from 2002 to October 2009. Of 198 events, civilians were involved in 194 events. Civilians accounted for 74.1% (N = 2017) of those who died and 93.8% (N = 6129) of those who were injured. In nine districts, mortality rates were more than one death per 100,000 inhabitants per year. The yearly trend showed a shift of attack targets from foreigners and sectarian targets in 2002-2005 to security forces or general public in 2006-2009. Attacks on public installations (mosques) or political gatherings resulted in a significantly greater (P ≤ 0.02) number of deaths (22 vs. 8) and injuries (59 vs. 24) per event compared with security installations. These results show that prevention might focus on political negotiation with armed groups and that appropriate measures should be taken to protect mosques and political gatherings.

  11. Information sharing for consumption tax purposes : An empirical analysis

    NARCIS (Netherlands)

    Ligthart, Jenny E.

    The paper studies the determinants of information sharing between Swedish tax authorities and 14 EU tax authorities for value-added tax (VAT) purposes. It is shown that trade-related variables (such as the partner country's net trade position and population size), reciprocity, and legal arrangements

  12. Optimal Physical Protection against Nuclear Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Doyoung; Kim, ChangLak [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2014-10-15

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  13. Optimal Physical Protection against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Lee, Doyoung; Kim, ChangLak

    2014-01-01

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  14. Exploring the concepts of privacy and the sharing of sensitive health information.

    Science.gov (United States)

    Asiri, Eman; Asiri, Hanan; Househ, Mowafa

    2014-01-01

    People are increasingly sharing their personal information on social networks such as Facebook. Patients, in particular, join online support groups for specific conditions to get support and share their experience with other members of a social media group. Throughout this process, sensitive health information could be shared by group members as a part of this information exchange and privacy concerns can arise as a result. The purpose of this study is to explore various aspects relating to privacy and the sharing of sensitive health information through social media platforms. Our review found that social media such as Facebook already plays a large role in patients' lives as it helps patients to understand their health conditions and gain support from other people who suffer from the same condition. However, there are major concerns for those patients as their privacy and confidentiality can be harmed by improper use of their posted sensitive health information by governments, hospitals or individuals. More importantly, there is an increased need for laws and legislations that protect and empower patients. We recommend that healthcare organizations collaborate with social media software companies and create educational and awareness campaigns on the impacts of sharing sensitive health information through social media.

  15. Out from under the rock: improving FDNY information sharing

    Science.gov (United States)

    2017-03-01

    54 Ibid., 6. 55 Michael R. Bloomberg, Nicholas Scoppetta, and Salvatore J. Cassano, Terrorism and Disaster Preparedness Strategy (New York...98 Gilley, Gilley, and Godek, “Change, Resistance, and the Organizational Immune System,” 9. 99 David K. Tan , “Rescue Task Force Is Best...Bloomberg, Michael R., Nicholas Scoppetta, and Salvatore J. Cassano. Terrorism and Disaster Preparedness Strategy. New York: FDYN, 2007. http

  16. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    International Nuclear Information System (INIS)

    Gareva, R.

    2007-01-01

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  17. A proposed universal medical and public health definition of terrorism.

    Science.gov (United States)

    Arnold, Jeffrey L; Ortenwall, Per; Birnbaum, Marvin L; Sundnes, Knut Ole; Aggrawal, Anil; Anantharaman, V; Al Musleh, Abdul Wahab; Asai, Yasufumi; Burkle, Frederick M; Chung, Jae Myung; Cruz-Vega, Felipe; Debacker, Michel; Della Corte, Francesco; Delooz, Herman; Dickinson, Garth; Hodgetts, Timothy; Holliman, C James; MacFarlane, Campbell; Rodoplu, Ulkumen; Stok, Edita; Tsai, Ming-Che

    2003-01-01

    The lack of a universally applicable definition of terrorism has confounded the understanding of terrorism since the term was first coined in 18th Century France. Although a myriad of definitions of terrorism have been advanced over the years, virtually all of these definitions have been crisis-centered, frequently reflecting the political perspectives of those who seek to define it. In this article, we deconstruct these previously used definitions of terrorism in order to reconstruct a definition of terrorism that is consequence-centered, medically relevant, and universally harmonized. A universal medical and public health definition of terrorism will facilitate clinical and scientific research, education, and communication about terrorism-related events or disasters. We propose the following universal medical and public definition of terrorism: The intentional use of violence--real or threatened--against one or more non-combatants and/or those services essential for or protective of their health, resulting in adverse health effects in those immediately affected and their community, ranging from a loss of well-being or security to injury, illness, or death.

  18. 31 CFR 594.311 - Terrorism.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism. 594.311 Section 594.311... ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.311 Terrorism. The term terrorism means an activity that: (a) Involves a violent act or an act...

  19. On Welfare and Terror: Social Welfare Policies and Political-Economic Roots of Terrorism

    Science.gov (United States)

    Burgoon, Brian

    2006-01-01

    This article argues that social welfare policies may reduce international and domestic terrorism. Social policies likely affect terrorism in offsetting ways but, on balance, should diminish preferences for terrorism by reducing economic insecurity, inequality, poverty, and religious-political extremism. Thus, countries with more generous welfare…

  20. Maximizing Intelligence Sharing Within the Los Angeles Police Department

    Science.gov (United States)

    2013-09-01

    terrorism-even suicide terrorism-are a little different from those that conventional criminals displays” (2008, p. 21). If LAPD is going to be a leader in...was, was being waged by an army of music sharing teens , college students and IPod carrying businessmen” (Brackman & Beckstrom, 2006, pp. 5–7). On...millions from starvation and reverse a crippling depression . But FDR’s government, like our own today, was too centralized to respond quickly to the

  1. A qualitative analysis of information sharing for children with medical complexity within and across health care organizations.

    Science.gov (United States)

    Quigley, Laura; Lacombe-Duncan, Ashley; Adams, Sherri; Hepburn, Charlotte Moore; Cohen, Eyal

    2014-06-30

    Children with medical complexity (CMC) are characterized by substantial family-identified service needs, chronic and severe conditions, functional limitations, and high health care use. Information exchange is critically important in high quality care of complex patients at high risk for poor care coordination. Written care plans for CMC are an excellent test case for how well information sharing is currently occurring. The purpose of this study was to identify the barriers to and facilitators of information sharing for CMC across providers, care settings, and families. A qualitative study design with data analysis informed by a grounded theory approach was utilized. Two independent coders conducted secondary analysis of interviews with parents of CMC and health care professionals involved in the care of CMC, collected from two studies of healthcare service delivery for this population. Additional interviews were conducted with privacy officers of associated organizations to supplement these data. Emerging themes related to barriers and facilitators to information sharing were identified by the two coders and the research team, and a theory of facilitators and barriers to information exchange evolved. Barriers to information sharing were related to one of three major themes; 1) the lack of an integrated, accessible, secure platform on which summative health care information is stored, 2) fragmentation of the current health system, and 3) the lack of consistent policies, standards, and organizational priorities across organizations for information sharing. Facilitators of information sharing were related to improving accessibility to a common document, expanding the use of technology, and improving upon a structured communication plan. Findings informed a model of how various barriers to information sharing interact to prevent optimal information sharing both within and across organizations and how the use of technology to improve communication and access to

  2. Boundaries of the Battlefield: A Critical Look at the Legal Paradigms and Rules in Countering Terrorism

    Directory of Open Access Journals (Sweden)

    Jessica Dorsey

    2013-04-01

    Full Text Available This Research Paper is a detailed report from the two-day symposium entitled The Boundaries of the Battlefield: A Critical Look at the Legal Paradigms and Rules in Countering Terrorism, which was convened in The Hague in January 2013. The conference covered a range of issues that are relevant in debates about using force in counter-terrorism operations against non-state actors. Specifically, this Paper elaborates on a number of key questions raised during the conference; these relate to the temporal and geographical limitations of armed conflict, the interplay between international humanitarian law and international human rights law, as well as the use of drones, the law enforcement approach to counter-terrorism and the possible need for a new framework for countering terrorism. The authors, Jessica Dorsey and Dr. Christophe Paulussen, supplement participants’ debates with detailed background information and theoretical discussions.

  3. Sharing Health Information and Influencing Behavioral Intentions: The Role of Health Literacy, Information Overload, and the Internet in the Diffusion of Healthy Heart Information.

    Science.gov (United States)

    Crook, Brittani; Stephens, Keri K; Pastorek, Angie E; Mackert, Michael; Donovan, Erin E

    2016-01-01

    Low health literacy remains an extremely common and problematic issue, given that individuals with lower health literacy are more likely to experience health challenges and negative health outcomes. In this study, we use the first three stages of the innovation-decision process found in the theory of diffusion of innovations (Rogers, 2003). We incorporate health literacy into a model explaining how perceived health knowledge, information sharing, attitudes, and behavior are related. Results show that health information sharing explains 33% of the variance in behavioral intentions, indicating that the communicative practice of sharing information can positively impact health outcomes. Further, individuals with high health literacy tend to share less information about heart health than those with lower health literacy. Findings also reveal that perceived heart-health knowledge operates differently than health literacy to predict health outcomes.

  4. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    OpenAIRE

    Chao-Chen Lin

    2017-01-01

    This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on te...

  5. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  6. The age of terrorism: to the problem statement

    Directory of Open Access Journals (Sweden)

    I. V. Yevtyagina

    2014-04-01

    Full Text Available In the present article analyzes the problem of terrorism. Historical essay on the topic helps clarify the concept of the term «terrorism», as well as its causes. The existing classification of terrorism reveals the different types and ways of influencing people by terrorists to achieve their goals. The author suggests the age classification, namely, adult and adolescence terrorism. Discussed in detail adolescence terrorism. The possible reasons for solutions to the problems teenagers violently. On the example of the terrorist act in Moscow school number 263 attempts to analyze the causal relationships aggressive behavior among adolescents in relation to their peers and teachers. Author shows the factors influencing the formation of the propensity to aggression (the terrorist behavior: the crisis of spirituality and morality, reducing cultural awareness, conflict resolution based on adults imitation, striving for leadership, using aggression, the substitution of the present reality of the computer world, acceptance of immoral behavior for conventional norm, plenty of scenes of cruelty and violence in the media, national intolerance. Also in the article are recommendations to prevent teenage terrorism, emphasizes the need for joint activities of the school psychologist, teachers, children and their parents.

  7. Informing Ex Ante Event Studies with Macro-Econometric Evidence on the Structural and Policy Impacts of Terrorism.

    Science.gov (United States)

    Nassios, Jason; Giesecke, James A

    2018-04-01

    Economic consequence analysis is one of many inputs to terrorism contingency planning. Computable general equilibrium (CGE) models are being used more frequently in these analyses, in part because of their capacity to accommodate high levels of event-specific detail. In modeling the potential economic effects of a hypothetical terrorist event, two broad sets of shocks are required: (1) physical impacts on observable variables (e.g., asset damage); (2) behavioral impacts on unobservable variables (e.g., investor uncertainty). Assembling shocks describing the physical impacts of a terrorist incident is relatively straightforward, since estimates are either readily available or plausibly inferred. However, assembling shocks describing behavioral impacts is more difficult. Values for behavioral variables (e.g., required rates of return) are typically inferred or estimated by indirect means. Generally, this has been achieved via reference to extraneous literature or ex ante surveys. This article explores a new method. We elucidate the magnitude of CGE-relevant structural shifts implicit in econometric evidence on terrorist incidents, with a view to informing future ex ante event assessments. Ex post econometric studies of terrorism by Blomberg et al. yield macro econometric equations that describe the response of observable economic variables (e.g., GDP growth) to terrorist incidents. We use these equations to determine estimates for relevant (unobservable) structural and policy variables impacted by terrorist incidents, using a CGE model of the United States. This allows us to: (i) compare values for these shifts with input assumptions in earlier ex ante CGE studies; and (ii) discuss how future ex ante studies can be informed by our analysis. © 2017 Society for Risk Analysis.

  8. Privacy Protection in Personal Health Information and Shared Care Records

    Directory of Open Access Journals (Sweden)

    Roderick L B Neame

    2014-03-01

    Full Text Available Background The protection of personal information privacy has become one of the most pressing security concerns for record keepers. Many institutions have yet to implement the essential infrastructure for data privacy protection and patient control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring has led to the imposition of increasingly significant monetary penalties for failures to protect privacy. Objective  There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information.  This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy.  This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing.Requirements for Privacy  There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers to keep patient information confidential and to share it only with the authorisation of the patient.  To achieve this information storage and retrieval, and communication systems must be appropriately configured. Patients may consult clinicians anywhere and at any time: therefore their data must be available for recipient-driven retrieval under patient control and kept private. 

  9. Children exposed to war/terrorism.

    Science.gov (United States)

    Shaw, Jon A

    2003-12-01

    This paper reviews the prevalence of psychological morbidities in children who have been exposed to war-related traumas or terrorism as well as the diversity of war-related casualties and their associated psychological responses. The psychological responses to war-related stressors are categorized as (1) little or no reaction, (2) acute emotional and behavioral effects, and (3) long-term effects. Specific categories of war-related casualties discussed include refugee status, traumatic bereavement, effects of parental absence, and child soldiers. Psychological responses associated with terrorism and bioterrorism are presented. Lastly, mediators of the psychological response to war-related stressors are discussed, to include exposure effects, gender effects, parental, family and social factors, and child-specific factors. Children exposed to war-related stressors experience a spectrum of psychological morbidities including posttraumatic stress symptomatology, mood disorders, externalizing and disruptive behaviors, and somatic symptoms determined by exposure dose effect. Specific questions for future research are identified.

  10. Perceived coping & concern predict terrorism preparedness in Australia

    Directory of Open Access Journals (Sweden)

    Stevens Garry

    2012-12-01

    Full Text Available Abstract Background In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Methods Adults in New South Wales (NSW completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI in 2010 (N=2038. Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Results Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR=2.07, p=0.001 learning evacuation plans (AOR=1.61, p=0.05, establishing emergency contact plans (AOR=2.73, p Conclusion The findings of this study suggest that terrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and

  11. Terrorism in Peru.

    Science.gov (United States)

    Barrientos Hernandez, Dora H; Church, Adam L

    2003-01-01

    Two major domestic terrorist groups have plagued Peru over the past 20 years, the Sendero Luminoso or "Shining Path" (SL) and the Revolutionary Movement Túpac Amaru (MRTA). On 28 August 2003, the Peruvian Truth and Reconciliation Commission reported that an estimated 69,280 persons were killed in the internal conflict in Peru from 1980 to 2000. Most of the victims were farmers (56%), most attacks occurred in rural settings (79%), and the SL was responsible for most of the deaths (54%). Aggressive anti-terrorism efforts by police and military during this period, often at the expense of basic human rights, also contributed to this large burden of terrorism on Peru. During the 1990s, terrorist attacks in Peru had spread to its urban areas. On 17 December 1996, 22 members of MRTA took over the Japanese ambassador's residence in Lima, holding 72 hostages until the grounds were stormed by Peruvian special forces on 23 April 1997. Until recently, emergency planning and preparedness for terrorism-related events in Peru were largely underdeveloped. In the last five years, Peru has taken two key steps towards developing a mature emergency response system, with the establishment of the country's first emergency medicine residency training program and the construction of the first dedicated trauma center in Lima.

  12. Count Your Calories and Share Them: Health Benefits of Sharing mHealth Information on Social Networking Sites.

    Science.gov (United States)

    Oeldorf-Hirsch, Anne; High, Andrew C; Christensen, John L

    2018-04-23

    This study investigates the relationship between sharing tracked mobile health (mHealth) information online, supportive communication, feedback, and health behavior. Based on the Integrated Theory of mHealth, our model asserts that sharing tracked health information on social networking sites benefits users' perceptions of their health because of the supportive communication they gain from members of their online social networks and that the amount of feedback people receive moderates these associations. Users of mHealth apps (N = 511) completed an online survey, and results revealed that both sharing tracked health information and receiving feedback from an online social network were positively associated with supportive communication. Network support both corresponded with improved health behavior and mediated the association between sharing health information and users' health behavior. As users received greater amounts of feedback from their online social networks, however, the association between sharing tracked health information and health behavior decreased. Theoretical implications for sharing tracked health information and practical implications for using mHealth apps are discussed.

  13. The universal legal framework against nuclear terrorism

    International Nuclear Information System (INIS)

    Gehr, W.

    2007-01-01

    been mandated by the UN General Assembly to assist States in strengthening international cooperation mechanisms in criminal matters related to terrorism, including through national capacity-building. (author)

  14. Estimated Costs of U.S. Operations in Iraq and Afghanistan and of Other Activities Related to the War on Terrorism

    National Research Council Canada - National Science Library

    Sunshine, Robert A

    2007-01-01

    ...) has tabulated the funding provided through July 2007 for military and diplomatic operations in Iraq and Afghanistan, and for other activities related to the war on terrorism, as well as for related...

  15. Defining and Theorizing Terrorism: A Global Actor-Centered Approach

    Directory of Open Access Journals (Sweden)

    Omar Lizardo

    2015-08-01

    Full Text Available Arriving at a consensual definition of the phenomenon of terrorism has been a particularly difficult undertaking. Some definitions are either too specific or too vague, concentrating on some essential “terrorist” aspect of the actions, strategies, or types of non-state organizations that engage in terrorism. In this paper I draw on global approaches from international relations and world systems theories to propose a definition of terrorism that skirts these issues by concentrating on terrorist actors rather than terrorist behavior. I argue that this approach has several advantages, including the dissolution of several empirical and analytical problems produced by more essentialist definitions, and the location of terrorism within a two dimensional continuum of collective-violence phenomena in the international system which discloses important theoretical insights. I proceed to examine the characteristics of terrorism by comparing it with other forms of violence in the international system. I propose that terrorism may be part of the cycles and trends of unrest in the world system, responding to the same broad families of global dynamics as other forms of system-level conflict.

  16. Overview of DOE-NE Proliferation and Terrorism Risk Assessment

    International Nuclear Information System (INIS)

    Sadasivan, Pratap

    2012-01-01

    Research objectives are: (1) Develop technologies and other solutions that can improve the reliability, sustain the safety, and extend the life of current reactors; (2) Develop improvements in the affordability of new reactors to enable nuclear energy; (3) Develop Sustainable Nuclear Fuel Cycles; and (4) Understand and minimize the risks of nuclear proliferation and terrorism. The goal is to enable the use of risk information to inform NE R and D program planning. The PTRA program supports DOE-NE's goal of using risk information to inform R and D program planning. The FY12 PTRA program is focused on terrorism risk. The program includes a mix of innovative methods that support the general practice of risk assessments, and selected applications.

  17. Information Sharing, Cooperative Behaviour and Hotel Performance: A Survey of the Kenyan Hospitality Industry

    Directory of Open Access Journals (Sweden)

    Sammy Odari Namusonge

    2015-10-01

    Full Text Available Information sharing is the life blood of supply chain collaboration. Its role in achieving operational performance of supply chains has been widely acclaimed. However whether information sharing would result in improved performance in the context of the hospitality industry has not been empirically determined. This study sought to find out the role of information sharing on hotel performance when the relationship was mediated by cooperative behaviour. A survey design was employed where proportionate stratified sampling was used to select 50 out of 57 town hotels. Data was collected through the use of questionnaires as well interview guides to the procurement\\supply chain departments of these hotels. Logarithmic transformations were used in conjunction with multiple regression analysis to determine the relationship between information sharing, cooperative behaviour and hotel performance. The study concludes that information sharing in the Kenyan hospitality industry does not directly relate to hotel performance. Its relationship is mediated by cooperative behaviour (trust and attitude with supply chain partners. This suggests that information sharing is essential but insufficient by itself to bring significant performance improvements in hotels in the Kenyan hospitality industry. A possible reason for this is that this collaborative practice is highly dependent on information sharing capability, structure of the information as well as culture. Through quadrant analysis the study identifies and recommends the sharing of information about long term strategic plans and events such as entering new markets and acquiring a new customer base as an area of primary priority for improvement.

  18. Three Essays on Law Enforcement and Emergency Response Information Sharing and Collaboration: An Insider Perspective

    Science.gov (United States)

    Treglia, Joseph V.

    2013-01-01

    This dissertation identifies what may be done to overcome barriers to information sharing among federal, tribal, state, and local law enforcement agencies and emergency responders. Social, technical, and policy factors related to information sharing and collaboration in the law enforcement and emergency response communities are examined. This…

  19. Product Bundling and Shared Information Goods: A Pricing Exercise

    Science.gov (United States)

    Morrison, William G.

    2016-01-01

    In this article, the author describes an exercise in which two pricing problems (product bundling and the sharing of digital information goods) can be understood using the same analytical approach. The exercise allows students to calculate the correct numerical answers with relative ease, while the teaching plan demonstrates the importance of the…

  20. Religiosity and reactions to terrorism.

    Science.gov (United States)

    Adamczyk, Amy; LaFree, Gary

    2015-05-01

    Although many of the world's most serious outbreaks of conflict and violence center on religion, social science research has had relatively little to say about religion's unique role in shaping individuals' attitudes about these events. In this paper we investigate whether Americans' religious beliefs play a central role in shaping attitudes toward the continuing threat of terrorism and their willingness to assist officials in countering these perceived threats. Our analysis of an original data collection of almost 1600 Americans shows that more religious respondents are more likely to express concerns about terrorism. However, this relationship is mediated by their level of conservatism. We also find that more religious respondents are more likely to claim that they will assist government officials in countering terrorism. This relationship remained even after accounting for conservatism, and people's general willingness to help police solve crimes like breaking and entering. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Terrorism and Investigation Strategies

    OpenAIRE

    Muhammad Mustofa

    2005-01-01

    This paper discussed that, for successful implementation of the strategies in investigating terrorism, besides requiring professional skilled investigators, there are some additional requirements that need to be fulfilled. Effective and long term prevention of terrorism should be directed towards producing good social welfare and to minimize every condition that may be conducive to the emergence of terrorism, such as discrimination and marginalization.

  2. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  3. Behavioural aspects of terrorism.

    Science.gov (United States)

    Leistedt, Samuel J

    2013-05-10

    Behavioural and social sciences are useful in collecting and analysing intelligence data, understanding terrorism, and developing strategies to combat terrorism. This article aims to examine the psychopathological concepts of terrorism and discusses the developing roles for behavioural scientists. A systematic review was conducted of studies investigating behavioural aspects of terrorism. These studies were identified by a systematic search of databases, textbooks, and a supplementary manual search of references. Several fundamental concepts were identified that continue to influence the motives and the majority of the behaviours of those who support or engage in this kind of specific violence. Regardless of the psychological aspects and new roles for psychiatrists, the behavioural sciences will continue to be called upon to assist in developing better methods to gather and analyse intelligence, to understand terrorism, and perhaps to stem the radicalisation process. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  4. Effect of information sharing on research and teaching activities of ...

    African Journals Online (AJOL)

    This study was designed to determine the effect of Information sharing on research and teaching activities of Academic Scientists in Federal Universities in the North- East Nigeria. Investigation was done on the activities of information sharing and the effect of information sharing on teaching and research activities. Survey ...

  5. Hidden profiles and concealed information: strategic information sharing and use in group decision making.

    Science.gov (United States)

    Toma, Claudia; Butera, Fabrizio

    2009-06-01

    Two experiments investigated the differential impact of cooperation and competition on strategic information sharing and use in a three-person group decision-making task. Information was distributed in order to create a hidden profile so that disconfirmation of group members' initial preferences was required to solve the task. Experiment 1 revealed that competition, compared to cooperation, led group members to withhold unshared information, a difference that was not significant for shared information. In competition, compared to cooperation, group members were also more reluctant to disconfirm their initial preferences. Decision quality was lower in competition than in cooperation, this effect being mediated by disconfirmation use and not by information sharing. Experiment 2 replicated these findings and revealed the role of mistrust in predicting strategic information sharing and use in competition. These results support a motivated information processing approach of group decision making.

  6. Social Technologies and Informal Knowledge Sharing within and across Organizations

    Science.gov (United States)

    Jarrahi, Mohammad Hosein

    2013-01-01

    This doctoral dissertation is focused on both empirical and conceptual contributions relative to the roles social technologies play in informal knowledge sharing practices, both within and across organizations. Social technologies include (a) traditional social technologies (e.g., email, phone and instant messengers), (b) emerging social…

  7. Security Investment, Hacking, and Information Sharing between Firms and between Hackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2017-05-01

    Full Text Available A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker receives less information, and mixed motives may exist between information sharing and own reputation gain. The second hacker’s attack is deterred by the first hacker’s reputation gain. Increasing information sharing effectiveness causes firms to substitute from defense to information sharing, which also increases in the firms’ unit defense cost, decreases in each firm’s unit cost of own information leakage, and increases in the unit benefit of joint leakage. Increasing interdependence between firms causes more information sharing between hackers caused by larger aggregate attacks, which firms should be conscious about. We consider three corner solutions. First and second, the firms deter disadvantaged hackers. When the second hacker is deterred, the first hacker does not share information. Third, the first hacker shares a maximum amount of information when certain conditions are met. Policy and managerial implications are provided for how firms should defend against hackers with various characteristics.

  8. Terrorism: Supplement to the Second Edition. A Selected Bibliography.

    Science.gov (United States)

    Boston, Guy D.

    The annotated bibliography describes 85 materials related to terrorism which were collected by the National Criminal Reference Service. Although no consensus exists on the definition of terrorism, the term is interpreted in this document to include both illegal and destructive acts against society and governments and violent means undertaken to…

  9. Perceived coping & concern predict terrorism preparedness in Australia.

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Jones, Alison L; Barr, Margo; Raphael, Beverley

    2012-12-27

    In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Adults in New South Wales (NSW) completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI) in 2010 (N=2038). Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR)=2.07, p=0.001) learning evacuation plans (AOR=1.61, p=0.05), establishing emergency contact plans (AOR=2.73, pterrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and incident-specific preparedness and could form an integral element of community resilience strategies

  10. Sharing is caring, but not error free: transparency of granular controls for sharing personal health information in social networks.

    Science.gov (United States)

    Hartzler, Andrea; Skeels, Meredith M; Mukai, Marlee; Powell, Christopher; Klasnja, Predrag; Pratt, Wanda

    2011-01-01

    When patients share personal health information with family and friends, their social networks become better equipped to help them through serious health situations. Thus, patients need tools that enable granular control over what personal health information is shared and with whom within social networks. Yet, we know little about how well such tools support patients' complex sharing needs. We report on a lab study in which we examined the transparency of sharing interfaces that display an overview and details of information sharing with network connections in an internet-based personal health information management tool called HealthWeaver. Although participants found the interfaces easy to use and were highly confident in their interpretation of the sharing controls, several participants made errors in determining what information was shared with whom. Our findings point to the critical importance of future work that examines design of usable interfaces that offer transparent granularity in support of patients' complex information sharing practices.

  11. Relational models for knowledge sharing behavior

    NARCIS (Netherlands)

    Boer, N.I.; Berends, J.J.; Baalen, P.

    2011-01-01

    In this paper we explore the relational dimension of knowledge sharing behavior by proposing a comprehensive theoretical framework for studying knowledge sharing in organizations. This theoretical framework originates from (Fiske, 1991) and (Fiske, 1992) Relational Models Theory (RMT). The RMT

  12. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  13. Fighting terrorism in Africa: Benchmarking policy harmonization

    Science.gov (United States)

    Asongu, Simplice A.; Tchamyou, Vanessa S.; Minkoua N., Jules R.; Asongu, Ndemaze; Tchamyou, Nina P.

    2018-02-01

    This study assesses the feasibility of policy harmonization in the fight against terrorism in 53 African countries with data for the period 1980-2012. Four terrorism variables are used, namely: domestic, transnational, unclear and total terrorism dynamics. The empirical evidence is based on absolute beta catch-up and sigma convergence estimation techniques. There is substantial absence of catch-up. The lowest rate of convergence in terrorism is in landlocked countries for regressions pertaining to unclear terrorism (3.43% per annum for 174.9 years) while the highest rate of convergence is in upper-middle-income countries in domestic terrorism regressions (15.33% per annum for 39.13 years). After comparing results from the two estimation techniques, it is apparent that in the contemporary era, countries with low levels of terrorism are not catching-up their counterparts with high levels of terrorism. As a policy implication, whereas some common policies may be feasibly adopted for the fight against terrorism, the findings based on the last periodic phase (2004-2012) are indicative that country-specific policies would better pay-off in the fight against terrorism than blanket common policies. Some suggestions of measures in fighting transnational terrorism have been discussed in the light of an anticipated surge in cross-national terrorism incidences in the coming years.

  14. Workplace Preparedness for Terrorism

    National Research Council Canada - National Science Library

    Ursano, Robert J

    2006-01-01

    Comprehensive workplace preparedness for terrorism must address and integrate the psychological and behavioral aspects of terrorism preparedness and response in order to address issues of human continuity...

  15. Gamma-neutron pagers make revolution in combating nuclear terrorism

    International Nuclear Information System (INIS)

    Stavrov, A.; Kagan, L.; Antonovski, A.

    2002-01-01

    Full text: After the events of September 11, 2001 it became quite evident that to combat terrorism, nuclear terrorism including, comprehensive measures able to prevent acts of terrorism are required. One of the important factors that ensure solving this task is technical means that allow early detection of tolls of terrorism. All the aforesaid is especially true for means of detection of radioactive materials. One of the most effective and convenient instruments designed for detection of radioactive materials, including nuclear materials, are gamma-neutron pagers that are instruments of the new generation developed in the last year. These pagers are sensitive, small and rugged monitors designed for detection of special nuclear materials and other radioactive materials by their gamma and/or neutron radiation. This detection is based on a comparison of the radiation intensity of an object and a background. These instruments will immediately inform an individual about the presence of a radioactive source by audible, visual, or vibration alarm. They are easy-to-operate instruments and a user does not need to be an expert in nuclear physics or radiation protection. A pager may be worn in pocket or on a belt ensuring the radiation protection of an individual. This instrument operates in automatic mode during a labor shift. It is provided with a non-volatile memory to store information about a history of operation: date and time when an instrument is turned on/off; the time and radiation levels, gamma and/or neutron, that exceed the alarm threshold; the current values of the count rate, etc. This information can be transmitted to a PC. These instruments can be used as the first level alarming devices at sites where installation of fixed monitors is impossible or inexpedient. Pagers are relatively inexpensive, sensitive and small instruments. Therefore it is advised that each person involved in control of goods transportation, vehicles and people uses such instruments. A

  16. Anti-Romani Terrorism in Europe

    Directory of Open Access Journals (Sweden)

    Mareš Miroslav

    2016-12-01

    Full Text Available This article analyzes terrorism against the Roma in Europe. It identifies acts of terrorism in violence that targets the largest stateless nation on the continent and categorizes this terrorism according to current research methods. Focusing on events in both Western and Eastern Europe, the article analyses and compares the most significant terrorist acts against the Roma of recent years. It concludes that anti-Romani terrorism is heterogeneous in terms of tactics, strategies, and ideological justification, yet can usually be subsumed into the broadly conceived category of far-right terrorism. The variety of attacks suggests that terrorist acts are an offshoot of the broad spectrum of anti-Romani activity, and are influenced by contemporary trends in inter-ethnic violence.

  17. Social Networking Privacy Control: Exploring University Variables Related to Young Adults' Sharing of Personally Identifiable Information

    Science.gov (United States)

    Zimmerman, Melisa S.

    2014-01-01

    The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…

  18. Modern terrorism: concept and approach analysis

    OpenAIRE

    CHAIKA ALEXANDER VIKTOROVICH

    2015-01-01

    The problem of modern terrorism as an image of counterculture environment is considered. The analysis of concepts and approaches of foreign and native authors, specialists of terrorism problem research was conducted. Separate features of the modern terrorism are considered and emphasized. The author drew conceptual conclusions on the basis of dialectical approach to modern terrorism counterculture phenomenon research.

  19. 75 FR 2445 - Chemical Facility Anti-Terrorism Standards

    Science.gov (United States)

    2010-01-15

    ... include trade secrets, confidential commercial information, Chemical-terrorism Vulnerability Information... and submit an online data collection (the Top-Screen) to DHS. The Department uses the facility's Top... required to submit Top-Screens. See 72 FR 65397-65398. \\2\\ Among other things, the November 2007 rule...

  20. Communications and Information Sharing (CIS) Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — TheCommunications and Information Sharing (CIS) Laboratory is a Public Safety interoperable communications technology laboratory with analog and digital radios, and...

  1. Terror Medicine As Part of the Medical School Curriculum

    Directory of Open Access Journals (Sweden)

    Leonard A Cole

    2014-09-01

    Full Text Available Terror medicine, a field related to emergency and disaster medicine, focuses on medical issues ranging from preparedness to psychological manifestations specifically associated with terrorist attacks. Calls to teach aspects of the subject in American medical schools surged after the 2001 jetliner and anthrax attacks. Although the threat of terrorism persists, terror medicine is still addressed erratically if at all in most medical schools. This paper suggests a template for incorporating the subject throughout a 4-year medical curriculum. The instructional framework culminates in a short course for fourth year students, such as one recently introduced at Rutgers New Jersey Medical School, Newark, NJ. The proposed 4-year Rutgers curriculum serves as a model that could assist other medical schools contemplating the inclusion of terror medicine in pre-clerkship and clerkship training.

  2. Socially Shared Health Information

    DEFF Research Database (Denmark)

    Hansen, Kjeld S.

    2018-01-01

    In this PhD project, I'm investigating how health organizations are sharing health information on social media. My PhD project is divided into two parts, but in this paper, I will only focus on the first part: To understand current practices of how health organizations engage with health...... information and users on social media (empirical studies 1,2,3) and to develop a theoretical model for how it is done efficiently and effectively. I have currently conducted and published on two empirical studies (1,2). I am in the process of collecting data for a revised version of empirical study (2...

  3. Risks of mortality and morbidity from worldwide terrorism: 1968-2004.

    Science.gov (United States)

    Bogen, Kenneth T; Jones, Edwin D

    2006-02-01

    Worldwide data on terrorist incidents between 1968 and 2004 gathered by the RAND Corporation and the Oklahoma City National Memorial Institute for the Prevention of Terrorism (MIPT) were assessed for patterns and trends in morbidity/mortality. Adjusted data analyzed involve a total of 19,828 events, 7,401 "adverse" events (each causing >or= 1 victim), and 86,568 "casualties" (injuries), of which 25,408 were fatal. Most terror-related adverse events, casualties, and deaths involved bombs and guns. Weapon-specific patterns and terror-related risk levels in Israel (IS) have differed markedly from those of all other regions combined (OR). IS had a fatal fraction of casualties about half that of OR, but has experienced relatively constant lifetime terror-related casualty risks on the order of 0.5%--a level 2 to 3 orders of magnitude more than those experienced in OR that increased approximately 100-fold over the same period. Individual event fatality has increased steadily, the median increasing from 14% to 50%. Lorenz curves obtained indicate substantial dispersion among victim/event rates: about half of all victims were caused by the top 2.5% (or 10%) of harm-ranked events in OR (or IS). Extreme values of victim/event rates were approximated fairly well by generalized Pareto models (typically used to fit to data on forest fires, sea levels, earthquakes, etc.). These results were in turn used to forecast maximum OR- and IS-specific victims/event rates through 2080, illustrating empirically-based methods that could be applied to improve strategies to assess, prevent, and manage terror-related risks and consequences.

  4. Conflict and complexity countering terrorism, insurgency, ethnic and regional violence

    CERN Document Server

    Bar-Yam, Yaneer; Minai, Ali

    2015-01-01

    Complexity science affords a number of novel tools for examining terrorism, particularly network analysis and NK-Boolean fitness landscapes as well as other tools drawn from non-linear dynamical systems modeling. This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.

  5. The Newsworthiness of International Terrorism.

    Science.gov (United States)

    Weimann, Gabriel; Brosius, Hans-Bernd

    1991-01-01

    Investigates the newsworthiness of international terrorism. Relates the concept of deviance as a predictor of newsworthiness to the specific attributes of terrorist events and their impact on media selection (coverage or no coverage) and prominence of coverage. (SR)

  6. Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?

    Science.gov (United States)

    Elbakidze, L; Jin, Y H

    2015-08-01

    Using transnational terrorism data from 1980 to 2000, this study empirically examines the relationships between frequency of participation in transnational terrorism acts and economic development and education improvement. We find an inverse U-shaped association between the frequency of various nationals acting as perpetrators in transnational terrorism acts and per capita income in their respective home countries. As per capita incomes increase from relatively low levels, frequencies of participation in transnational terrorism increase. However, at sufficiently higher levels of per capita income, further increase in per capita income is negatively associated with the rate of participation in transnational terrorism. Education improvement from elementary to secondary is positively correlated with frequency of participation in transnational terrorism events, whereas further improvement from secondary to tertiary level is negatively correlated with participation in transnational terrorism. We also find that citizens of countries with greater openness to international trade, lower degree of income inequality, greater economic freedom, larger proportion of population with tertiary education, and less religious prevalence participate in transnational terrorism events less frequently. © 2015 Society for Risk Analysis.

  7. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  8. Against CBRN terrorism

    International Nuclear Information System (INIS)

    Inoue, Tadao

    2016-01-01

    Although CBRN (Chemical, Biological, Radiological, Nuclear) terrorism has seldom happened in recent terrorist attacks, a large number of victims would appear leading to disastrous situation if it arises. This paper discussed what CBRN terrorism is, why terrorists are interested in these weapons, and how to deal with these cases, with reference to the lessons learnt from the Tokyo subway sarin event, which occurred in Japan. It also outlined the features of CBRN terrorism and protective measures against it. CBRN terrorism is the terror activity using unusual weapons and agents such as chemicals, biological agents, radioactive substances, and nuclear weapons. As the reasons why terrorists are interested in CBRN weapons, there are such factors that raw materials are easy to obtain, manufacturing is not difficult, weapons are easy to transport, and indiscriminate and mass slaughter is possible when used. From the lessons from the Tokyo subway sarin event, the Tokyo Fire Department has been engaging in the following items: (1) strengthening knowledge and skills, (2) introduction of detection equipment, (3) construction and strengthening of decontamination system, (4) collaboration among firefighting - police - SDF - medical institutions, and (5) enhancing and strengthening organizational structure. Although protective measures vary depending on the type of chemical agent, biological agent, etc., it is important to prepare in daily life for detoxification, decontamination, evacuation, etc. (A.O.)

  9. Information Sharing and International Taxation

    NARCIS (Netherlands)

    Keen, M.; Ligthart, J.E.

    2004-01-01

    The sharing between national tax authorities of taxpayer-specific information has emerged over the last few years as a-probably "the"-central issue in the formation of international tax policy.Yet this refocusing of the debate on international taxation-away from parametric tax coordination and

  10. Aligning Learner Preferences for Information Seeking, Information Sharing and Mobile Technologies

    Science.gov (United States)

    Mills, Leila A.; Knezek, Gerald; Khaddage, Ferial

    2012-01-01

    This paper reports on the development of a new information communications technology (ICT) learning preference survey, its cross-validation with attitudes towards mobile learning, and new perspectives on information seeking, information sharing, and mobile access derived from the relationships uncovered. The Information and Communications…

  11. Information sharing with rural family caregivers during care transitions of hip fracture patients

    Directory of Open Access Journals (Sweden)

    Jacobi Elliott

    2014-06-01

    Full Text Available Introduction: Following hip fracture surgery, patients often experience multiple transitions through different care settings, with resultant challenges to the quality and continuity of patient care. Family caregivers can play a key role in these transitions, but are often poorly engaged in the process. We aimed to: (1 examine the characteristics of the family caregivers’ experience of communication and information sharing and (2 identify facilitators and barriers of effective information sharing among patients, family caregivers and health care providers.Methods: Using an ethnographic approach, we followed 11 post-surgical hip fracture patients through subsequent care transitions in rural Ontario; in-depth interviews were conducted with patients, family caregivers (n = 8 and health care providers (n = 24.Results: Priority areas for improved information sharing relate to trust and respect, involvement, and information needs and expectations; facilitators and barriers included prior health care experience, trusting relationships and the rural setting.Conclusion: As with knowledge translation, effective strategies to improve information sharing and care continuity for older patients with chronic illness may be those that involve active facilitation of an on-going partnership that respects the knowledge of all those involved.

  12. Information sharing with rural family caregivers during care transitions of hip fracture patients

    Directory of Open Access Journals (Sweden)

    Jacobi Elliott

    2014-06-01

    Full Text Available Introduction: Following hip fracture surgery, patients often experience multiple transitions through different care settings, with resultant challenges to the quality and continuity of patient care. Family caregivers can play a key role in these transitions, but are often poorly engaged in the process. We aimed to: (1 examine the characteristics of the family caregivers’ experience of communication and information sharing and (2 identify facilitators and barriers of effective information sharing among patients, family caregivers and health care providers. Methods: Using an ethnographic approach, we followed 11 post-surgical hip fracture patients through subsequent care transitions in rural Ontario; in-depth interviews were conducted with patients, family caregivers (n = 8 and health care providers (n = 24. Results: Priority areas for improved information sharing relate to trust and respect, involvement, and information needs and expectations; facilitators and barriers included prior health care experience, trusting relationships and the rural setting. Conclusion: As with knowledge translation, effective strategies to improve information sharing and care continuity for older patients with chronic illness may be those that involve active facilitation of an on-going partnership that respects the knowledge of all those involved.

  13. Enhancing Group Decision Making: An Exercise to Reduce Shared Information Bias

    Science.gov (United States)

    Baker, Diane F.

    2010-01-01

    Research on shared information bias has shown that group members involved in a decision-making task tend to undervalue information that a single member shares with the group, especially when that information conflicts with their prior conclusions. The group activity in this article is intended to heighten awareness of this shared information bias…

  14. Defining and Distinguishing Secular and Religious Terrorism

    Directory of Open Access Journals (Sweden)

    Heather S. Gregg

    2014-04-01

    Full Text Available Religious terrorism is typically characterised as acts of unrestrained, irrational and indiscriminant violence, thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from traditional terrorism; investigate three goals of religious terrorism (fomenting the apocalypse, creating a religious government, and establishing a religiously pure state; consider the role of leadership and target selection of religious terrorists; and, finally, suggest a range of counterterrorism strategies based on these observations.

  15. Multiparty secret sharing of quantum information based on entanglement swapping

    International Nuclear Information System (INIS)

    Li Yongmin; Zhang Kuanshou; Peng Kunchi

    2004-01-01

    A protocol of multiparty secret sharing of quantum information based on entanglement swapping is analyzed. In this protocol, Bell states are needed in order to realize the quantum information secret sharing and it is convenient to realize the quantum secret sharing among the members of any subset of users

  16. Issues of terrorism on the internet in the wave of democratization of post-reform Indonesia: A semiotic analysis

    Directory of Open Access Journals (Sweden)

    Aceng Ruhendi Saifullah

    2016-01-01

    Full Text Available The discourse of terrorism is a global issue but tends to be interpreted as controversial. This study sought to dismantle the controversy of meanings through the analysis of signs and meanings, with a view to explore and demonstrate the wave of democratization that took place in post-reform era in Indonesia. This study was a case study using readers’ responses to terrorism issues provided by cyber media on the Internet. It also rests primarily on the semiotic theory of Peirce and the concept of democratization of Huntington. The results showed that participation, freedom of expression, and equal power relations occurred in the interactive discourse in the cyber news media in the form of a dialogue between the responders, the media, and the debate among the responders. Responders tended to argue that signs and meanings are constructed by the media and to interpret information about terrorism as "political engineering" which was expressed by means of emotive tone. Meanwhile, the media tended to construct a "political imagery" which was expressed in a confrontational way, and the resources tended to understand it as "noise level of political elite ", which was expressed in a persuasive manner. Such differences occurred due to the factors of media context that tended to be "convivial" and the context of the communication situation on the Internet that tends to show "discretion". Based on these findings, this study concluded that interactive discourse in the Internet can be formulated as a democratic forum as the meaning making of the text is no longer dominated by media and the sources of information, but tend to be shared with the public. However, in terms of discourse process, interactive discourse in cyber media tends to be anarchic because the tone of interaction tends to be little, the relationship patterns tend to center on and be dominated by responders, the identities of responders tend to be anonymous, and linguistic expressions of the

  17. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  18. Privacy protection for personal health information and shared care records.

    Science.gov (United States)

    Neame, Roderick L B

    2014-01-01

    The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.

  19. Library information sharing. Best practices and trends. Challenges and prospects

    Directory of Open Access Journals (Sweden)

    Posner Beth

    2017-12-01

    Full Text Available Libraries share information with each other, through interlibrary loan services, so that their library users can access more of the world of information than is available in any one library. When supported with enough budget, staff and authority to do so, library resource sharing specialists can facilitate information access in a variety of traditional and innovative ways, including and beyond lending and borrowing print and digital information. Best practices, trends and new solutions for library resource sharing are reviewed. International cooperation is also highlighted.

  20. The dislocations of terror: Assessments of risk during the Second Intifada.

    Science.gov (United States)

    Spilerman, Seymour; Stecklov, Guy

    2013-05-01

    The goal of terrorism is to create havoc and disrupt the normal functioning of society. To understand the impact of terrorism on a country it is useful to consider two types of country experiences with these shocks to the social order-the instance of a very small number of attacks against high profile targets and the case of chronic terror with a great number of attacks, generally against targets that are part of routine daily activities. The present study explores the Israeli experience with chronic terror. Using expenditure information from coffee shops and restaurants we examine how individuals assess their vulnerability to an attack and adjust their behavior. Specifically, we explore whether distance from the site of an attack, and similarity of a contemplated undertaking to the target of a recent attack, influence decision making in a context of chronic terror. We find strong support for a situational similarity effect but only weak evidence for a proximity effect. We examine the implications of these findings for the organization of economic activity. Copyright © 2012 Elsevier Inc. All rights reserved.

  1. 31 CFR 596.310 - Terrorism List Government.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  2. Georgetown University Research Psychologist Shares Terrorism Insight

    OpenAIRE

    Center for Homeland Defense and Security

    2013-01-01

    Georgetown University research psychologist Dr. Anne Speckhard has spent the last decade interviewing more than four hundred terrorists, terrorist supporters, family members, close associates and even terrorist's hostages in Western Europe and the Middle East. Speckhard shared her insights with students at the Naval Postgraduate School Center for Homeland Defense and Security in July.

  3. On the Concept and Definition of Terrorism Risk.

    Science.gov (United States)

    Aven, Terje; Guikema, Seth

    2015-12-01

    In this article, we provide some reflections on how to define and understand the concept of terrorism risk in a professional risk assessment context. As a basis for this discussion we introduce a set of criteria that we believe should apply to any conceptualization of terrorism risk. These criteria are based on both criteria used in other areas of risk analysis and our experience with terrorism risk analysis. That is, these criteria offer our perspective. We show that several of the suggested perspectives and definitions have weaknesses in relation to these criteria. A main problem identified is the idea that terrorism risk can be conceptualized as a function of probability and consequence, not as a function of the interactions between adaptive individuals and organizations. We argue that perspectives based solely on probability and consequence should be used cautiously or not at all because they fail to reflect the essential features of the concept of terrorism risk, the threats and attacks, their consequences, and the uncertainties, all in the context of adaptation by the adversaries. These three elements should in our view constitute the main pillars of the terrorism risk concept. From this concept we can develop methods for assessing the risk by identifying a set of threats, attacks, and consequence measures associated with the possible outcome scenarios together with a description of the uncertainties and interactions between the adversaries. © 2015 Society for Risk Analysis.

  4. The development of a differential game related to terrorism: Min-Max differential game

    Directory of Open Access Journals (Sweden)

    Abd El-Monem A. Megahed

    2017-07-01

    Full Text Available In this work, we study a differential game related to terrorism: Min-Max differential game taking into account the governmental activities such as the education quality, increasing the chances of labor, social justice, religious awareness and security arrangements. A Min-Max differential game between government and terrorist organizations is considered in this study. To obtain the optimal strategy of solving this problem, we study the analytic form of a Min-Max differential game and the governmental activities. Furthermore, a saddle point of a Min-Max differential game is studied.

  5. Wanna know about vaping? Patterns of message exposure, seeking and sharing information about e-cigarettes across media platforms

    Science.gov (United States)

    Emery, Sherry L; Vera, Lisa; Huang, Jidong; Szczypka, Glen

    2014-01-01

    Background Awareness and use of electronic cigarettes has rapidly grown in the USA recently, in step with increased product marketing. Using responses to a population survey of US adults, we analysed demographic patterns of exposure to, searching for and sharing of e-cigarette-related information across media platforms. Methods An online survey of 17 522 US adults was conducted in 2013. The nationally representative sample was drawn from GfK Group's KnowledgePanel plus off-panel recruitment. Fixed effects logit models were applied to analyse relationships between exposure to, searching for and sharing of e-cigarette-related information and demographic characteristics, e-cigarette and tobacco use, and media behaviours. Results High levels of awareness about e-cigarettes were indicated (86% aware; 47% heard through media channels). Exposure to e-cigarette-related information was associated with tobacco use, age, gender, more education, social media use and time spent online. Although relatively small proportions of the sample had searched for (∼5%) or shared (∼2%) e-cigarette information, our analyses indicated demographic patterns to those behaviours. Gender, high income and using social media were associated with searching for e-cigarette information; lesbian, gay and bisexual and less education were associated with sharing. Current tobacco use, age, being Hispanic and time spent online were associated with both searching and sharing. Conclusions US adults are widely exposed to e-cigarette marketing through the media; such marketing may differentially target specific demographic groups. Further research should longitudinally examine how exposure to, searching for and sharing of e-cigarette information relate to subsequent use of e-cigarettes and/or combustible tobacco. PMID:24935893

  6. Labelling : Security in Information Management and Sharing

    NARCIS (Netherlands)

    Schotanus, H.A.; Hartog, T.; Hut, D.H.; Boonstra, D.

    2011-01-01

    Military communication infrastructures are often deployed as stand-alone information systems operating at the System High mode. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements for information management and sharing which current communication

  7. User observations on information sharing (corporate knowledge and lessons learned)

    Science.gov (United States)

    Montague, Ronald A.; Gregg, Lawrence A.; Martin, Shirley A.; Underwood, Leroy H.; Mcgee, John M.

    1993-01-01

    The sharing of 'corporate knowledge' and lessons learned in the NASA aerospace community has been identified by Johnson Space Center survey participants as a desirable tool. The concept of the program is based on creating a user friendly information system that will allow engineers, scientists, and managers at all working levels to share their information and experiences with other users irrespective of location or organization. The survey addresses potential end uses for such a system and offers some guidance on the development of subsequent processes to ensure the integrity of the information shared. This system concept will promote sharing of information between NASA centers, between NASA and its contractors, between NASA and other government agencies, and perhaps between NASA and institutions of higher learning.

  8. Global initiatives to prevent nuclear terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    The fight against nuclear and radiological terrorism - someone to blow up a nuclear weapon or spread radioactive material as a 'dirty bomb' that act of terrorism - is one of the most serious threats to international security. The Global Initiative to prevent nuclear terrorism is a Norwegian-sponsored initiative that is aimed directly at combating terrorism by non-state actors. NRPA follow up Norwegian measures, including in Kazakhstan, and verifies that they are implemented and functioning as intended. (AG)

  9. Understanding Terrorism from an Economic perspective

    OpenAIRE

    Haldar, Tanushree

    2013-01-01

    Terrorism has emerged as a major threat to the contemporary society. Nation States are reliant on their counter-terrorism laws for checking terrorism and deterring terrorists. To understand the effectiveness of these counter terrorism laws, it is important to first understand the behaviour of terrorists, so as to comprehend what actions can dissuade terrorist’s behaviour and decision to propagate violence. This paper will first look at behaviour of terrorist in decision making from an economi...

  10. The evolution of extreme cooperation via shared dysphoric experiences.

    Science.gov (United States)

    Whitehouse, Harvey; Jong, Jonathan; Buhrmester, Michael D; Gómez, Ángel; Bastian, Brock; Kavanagh, Christopher M; Newson, Martha; Matthews, Miriam; Lanman, Jonathan A; McKay, Ryan; Gavrilets, Sergey

    2017-03-14

    Willingness to lay down one's life for a group of non-kin, well documented historically and ethnographically, represents an evolutionary puzzle. Building on research in social psychology, we develop a mathematical model showing how conditioning cooperation on previous shared experience can allow individually costly pro-group behavior to evolve. The model generates a series of predictions that we then test empirically in a range of special sample populations (including military veterans, college fraternity/sorority members, football fans, martial arts practitioners, and twins). Our empirical results show that sharing painful experiences produces "identity fusion" - a visceral sense of oneness - which in turn can motivate self-sacrifice, including willingness to fight and die for the group. Practically, our account of how shared dysphoric experiences produce identity fusion helps us better understand such pressing social issues as suicide terrorism, holy wars, sectarian violence, gang-related violence, and other forms of intergroup conflict.

  11. Intelligence and Information-Sharing Elements of S.4 and H.R. 1

    National Research Council Canada - National Science Library

    Masse, Todd

    2007-01-01

    Title I of S.4 and Title VII of H.R. 1 include corresponding measures related to enhancing information and intelligence sharing, both horizontally within the Federal Government and vertically between the Federal Government and state...

  12. Online Information Sharing About Risks : The Case of Organic Food

    NARCIS (Netherlands)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-01-01

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic

  13. Addressing the Cyber-security and Cyber-terrorism Threats [video

    OpenAIRE

    Robi Sen; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    While cyber terrorism is a relatively new threat in the world of national defense, the security issues we face are not necessarily new as a genre. In this segment, Chief Science Officer Robi Sen draws on the changing attitudes towards the cyber world. Topics include cooperation between law enforcement and hackers, the major motivations behind criminal hacking, and the realistic threats of cyber terrorism.

  14. Sharing Hydrologic Data with the CUAHSI Hydrologic Information System (Invited)

    Science.gov (United States)

    Tarboton, D. G.; Maidment, D. R.; Zaslavsky, I.; Horsburgh, J. S.; Whiteaker, T.; Piasecki, M.; Goodall, J. L.; Valentine, D. W.; Whitenack, T.

    2009-12-01

    The CUAHSI Hydrologic Information System (HIS) is an internet based system to support the sharing of hydrologic data consisting of databases connected using the internet through web services as well as software for data discovery, access and publication. The HIS is founded upon an information model for observations at stationary points that supports its data services. A data model, the CUAHSI Observations Data Model (ODM), provides community defined semantics needed to allow sharing information from diverse data sources. A defined set of CUAHSI HIS web services allows for the development of data services, which scale from centralized data services which support access to National Datasets such as the USGS National Water Information System (NWIS) and EPA Storage and Retrieval System (STORET), in a standard way; to distributed data services which allow users to establish their own server and publish their data. User data services are registered to a central HIS website, and they become searchable and accessible through the centralized discovery and data access tools. HIS utilizes both an XML and relational database schema for transmission and storage of data respectively. WaterML is the XML schema used for data transmission that underlies the machine to machine communications, while the ODM is implemented as relational database model for persistent data storage. Web services support access to hydrologic data stored in ODM and communicate using WaterML directly from applications software such as Excel, MATLAB and ArcGIS that have Simple Object Access Protocol (SOAP) capability. A significant value of web services derives from the capability to use them from within a user’s preferred analysis environment, using community defined semantics, rather than requiring a user to learn new software. This allows a user to work with data from national and academic sources, almost as though it was on their local disk. Users wishing to share or publish their data through CUAHSI

  15. Informational value and bias of videos related to orthodontics screened on a video-sharing Web site.

    Science.gov (United States)

    Knösel, Michael; Jung, Klaus

    2011-05-01

    To assess the informational value, intention, source, and bias of videos related to orthodontics screened by the video-sharing Internet platform YouTube. YouTube (www.youtube.com) was scanned in July 2010 for orthodontics-related videos using an adequately defined search term. Each of the first 30 search results of the scan was categorized with the system-generated sorts "by relevance" and "most viewed" (total: 60). These were rated independently by three assessors, who completed a questionnaire for each video. The data were analyzed statistically using Friedman's test for dependent samples, Kendall's tau, and Fleiss's kappa. The YouTube scan produced 5140 results. There was a wide variety of information about orthodontics available on YouTube, and the highest proportion of videos was found to originate from orthodontic patients. These videos were also the most viewed ones. The informational content of most of the videos was generally judged to be low, with a rather poor to inadequate representation of the orthodontic profession, although a moderately pro-orthodontics stance prevailed. It was noticeable that the majority of contributions of orthodontists to YouTube constituted advertising. This tendency was not viewed positively by the majority of YouTube users, as was evident in the divergence in the proportions when sorting by "relevance" and "most viewed." In the light of the very large number of people using the Internet as their primary source of information, orthodontists should recognize the importance of YouTube and similar social media Web sites in the opinion-forming process, especially in the case of adolescents.

  16. Gender Imbalance and Terrorism in Developing Countries.

    Science.gov (United States)

    Younas, Javed; Sandler, Todd

    2017-03-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results.

  17. Terrorism and financial supervision

    NARCIS (Netherlands)

    Krans, Anatoli van der

    2005-01-01

    This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective,

  18. Solidarity through shared disadvantage: Highlighting shared experiences of discrimination improves relations between stigmatized groups.

    Science.gov (United States)

    Cortland, Clarissa I; Craig, Maureen A; Shapiro, Jenessa R; Richeson, Jennifer A; Neel, Rebecca; Goldstein, Noah J

    2017-10-01

    Intergroup relations research has largely focused on relations between members of dominant groups and members of disadvantaged groups. The small body of work examining intraminority intergroup relations, or relations between members of different disadvantaged groups, reveals that salient experiences of ingroup discrimination promote positive relations between groups that share a dimension of identity (e.g., 2 different racial minority groups) and negative relations between groups that do not share a dimension of identity (e.g., a racial minority group and a sexual minority group). In the present work, we propose that shared experiences of discrimination between groups that do not share an identity dimension can be used as a lever to facilitate positive intraminority intergroup relations. Five experiments examining relations among 4 different disadvantaged groups supported this hypothesis. Both blatant (Experiments 1 and 3) and subtle (Experiments 2, 3, and 4) connections to shared experiences of discrimination, or inducing a similarity-seeking mindset in the context of discrimination faced by one's ingroup (Experiment 5), increased support for policies benefiting the outgroup (Experiments 1, 2, and 4) and reduced intergroup bias (Experiments 3, 4, and 5). Taken together, these experiments provide converging evidence that highlighting shared experiences of discrimination can improve intergroup outcomes between stigmatized groups across dimensions of social identity. Implications of these findings for intraminority intergroup relations are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. Terrorism in Canada.

    Science.gov (United States)

    Kollek, Daniel

    2003-01-01

    This paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses. Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.

  20. The boomerang affect of the war on terror

    Directory of Open Access Journals (Sweden)

    Carolin Goerzig

    2010-11-01

    /11.Preemption does not help to reduce the terrorism risk, but on the very contrary leads to its increase. The argument will be taken a step further by claiming that, in fact, the war on terror increases the likelihood of catastrophic terrorism, because the risk of terrorism increases as such that terrorists might seek indiscriminate violence not shying away to use weapons of mass destruction. The war on terror therewith turns into a risk paradox - carrying consequences which, arguably, are even more risky than the original risk itself. In order to demonstrate this point, this article applies the concept of risk to terrorist groups and relates it to the paradox implications of the war on terror.Keywords: war on terror; terrorism risk; risk paradox; catastrophic terrorism; 9/11

  1. A Fear Management Approach to Counter-Terrorism

    Directory of Open Access Journals (Sweden)

    Tinka Veldhuis

    2012-02-01

    Full Text Available Spreading fear is the essence of terrorism. Terrorists exploit fear by terrorising the target audience into concessions. Understanding how feelings of fear influence the way people feel, think and act is therefore an important starting point to explore how individuals and societies can learn how to cope with fear of terrorism. In this Policy Brief, Research Fellows Prof. Dr. Edwin Bakker and Dr. Tinka Veldhuis explore the dynamics of fear in response to terrorism, and emphasise the importance of integrating initiatives to manage fear of terrorism and reduce its negative consequences into overarching counter-terrorism strategies. It argues that societies can benefit greatly from promoting resilience and a fear management approach to counter-terrorism.

  2. Sharing information: Mixed-methods investigation of brief experiential interprofessional

    Science.gov (United States)

    Cocksedge, Simon; Barr, Nicky; Deakin, Corinne

    In UK health policy ‘sharing good information is pivotal to improving care quality, safety, and effectiveness. Nevertheless, educators often neglect this vital communication skill. The consequences of brief communication education interventions for healthcare workers are not yet established. This study investigated a three-hour interprofessional experiential workshop (group work, theoretical input, rehearsal) training healthcare staff in sharing information using a clear structure (PARSLEY). Staff in one UK hospital participated. Questionnaires were completed before, immediately after, and eight weeks after training, with semistructured interviews seven weeks after training. Participants (n=76) were from assorted healthcare occupations (26% non-clinical). Knowledge significantly increased immediately after training. Self-efficacy, outcome expectancy, and motivation to use the structure taught were significantly increased immediately following training and at eight weeks. Respondents at eight weeks (n=35) reported their practice in sharing information had changed within seven days of training. Seven weeks after training, most interviewees (n=13) reported confidently using the PARSLEY structure regularly in varied settings. All had re-evaluated their communication practice. Brief training altered self-reported communication behaviour of healthcare staff, with sustained changes in everyday work. As sharing information is central to communication curricula, health policy, and shared decision-making, the effectiveness of brief teaching interventions has economic and educational implications.

  3. Wanna know about vaping? Patterns of message exposure, seeking and sharing information about e-cigarettes across media platforms.

    Science.gov (United States)

    Emery, Sherry L; Vera, Lisa; Huang, Jidong; Szczypka, Glen

    2014-07-01

    Awareness and use of electronic cigarettes has rapidly grown in the USA recently, in step with increased product marketing. Using responses to a population survey of US adults, we analysed demographic patterns of exposure to, searching for and sharing of e-cigarette-related information across media platforms. An online survey of 17,522 US adults was conducted in 2013. The nationally representative sample was drawn from GfK Group's KnowledgePanel plus off-panel recruitment. Fixed effects logit models were applied to analyse relationships between exposure to, searching for and sharing of e-cigarette-related information and demographic characteristics, e-cigarette and tobacco use, and media behaviours. High levels of awareness about e-cigarettes were indicated (86% aware; 47% heard through media channels). Exposure to e-cigarette-related information was associated with tobacco use, age, gender, more education, social media use and time spent online. Although relatively small proportions of the sample had searched for (∼5%) or shared (∼2%) e-cigarette information, our analyses indicated demographic patterns to those behaviours. Gender, high income and using social media were associated with searching for e-cigarette information; lesbian, gay and bisexual and less education were associated with sharing. Current tobacco use, age, being Hispanic and time spent online were associated with both searching and sharing. US adults are widely exposed to e-cigarette marketing through the media; such marketing may differentially target specific demographic groups. Further research should longitudinally examine how exposure to, searching for and sharing of e-cigarette information relate to subsequent use of e-cigarettes and/or combustible tobacco. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  4. The Concept of Information Sharing Behaviors in Complex Organizations: Research in Latvian Enterprises

    Directory of Open Access Journals (Sweden)

    Andrejs Cekuls

    2016-12-01

    Full Text Available The purpose of this paper is to explore the factors influencing behaviors of information sharing in complex organizations. Evaluation of the previous studies on provision of information turnover process and the role of organizational culture in competitive intelligence of business environment in Latvia indicated the trends that employees of Latvian enterprises lack incentive to share information. Tasks of the study were to research the basis of the review of scientific sources and study aspects influencing habits of information sharing in complex organizations. For this particular study, the focus group is selected as the most appropriate data collection method for high-quality research. To find out individuals' opinions and attitudes two focus group discussions were carried out. Members from various industries and with different employment period were included in discussion groups. In aggregate, opinions of the employees from 41 different companies were summarized regarding the aspects affecting the process of information sharing in organizations. Results of researches show that that influence the sharing of information are closely related to the values: interpersonal trust, organizational trust, and organizational identification, support, fairness etc. Results of discussions showed that it is important for a manager to be aware of the factors affecting the performance of the organization. To identify the need for changes, a manager should follow events in the environment and analyze the extent, to which they affect the performance of the organization. Complexity science suggests that maturity to changes emerges when the system is far from balance, but the tension makes to accept changes.

  5. Female terrorism : a review

    NARCIS (Netherlands)

    Jacques, Karen; Taylor, Paul J.

    2009-01-01

    The sharp growth in the number of publications examining female involvement in terrorism has produced a valuable but un-integrated body of knowledge spread across many disciplines. In this paper, we bring together 54 publications on female terrorism and use qualitative and quantitative analyses to

  6. Acts of terrorism and mass violence targeting schools : Analysis and implications for preparedness in the USA.

    Science.gov (United States)

    Schlegelmilch, Jeff; Petkova, Elisaveta; Martinez, Stephanie; Redlener, Irwin

    2017-01-01

    To enhance the preparedness of US schools to acts of terrorism and mass violence, the landscape of threats against schools must first be understood. This includes exploring the global trends of acts of terrorism against schools, as well as looking specifically at the history of terrorism and acts of mass violence against schools domestically. This paper conducts a review of two databases in order to look at the trends in acts of terrorism and mass violence carried out against schools, and provides recommendations for domestic school preparedness based on this information.

  7. Introduction to Teaching About Terrorism.

    Science.gov (United States)

    Totten, Sam

    1986-01-01

    Provides an historical and conceptual framework for understanding contemporary terrorism. Includes quotations from government officials, syndicated columnists, and scholars regarding terrorism and its effects on society. (JDH)

  8. Gender Imbalance and Terrorism in Developing Countries

    Science.gov (United States)

    Younas, Javed

    2016-01-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results. PMID:28232755

  9. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam

    2015-12-15

    It is known that global games with noisy sharing of information do not admit a certain type of threshold policies [1]. Motivated by this result, we investigate the existence of threshold-type policies on global games with noisy sharing of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a solution to a fixed point equation. Then, we show that for a sufficiently noisy environment, the functional fixed point equation leads to a contraction mapping, and hence, its iterations converge to a unique continuous threshold policy.

  10. The normalisation of terror: the response of Israel's stock market to long periods of terrorism.

    Science.gov (United States)

    Peleg, Kobi; Regens, James L; Gunter, James T; Jaffe, Dena H

    2011-01-01

    Man-made disasters such as acts of terrorism may affect a society's resiliency and sensitivity to prolonged physical and psychological stress. The Israeli Tel Aviv stock market TA-100 Index was used as an indicator of reactivity to suicide terror bombings. After accounting for factors such as world market changes and attack severity and intensity, the analysis reveals that although Israel's financial base remained sensitive to each act of terror across the entire period of the Second Intifada (2000-06), sustained psychological resilience was indicated with no apparent overall market shift. In other words, we saw a 'normalisation of terror' following an extended period of continued suicide bombings. The results suggest that investors responded to less transitory global market forces, indicating sustained resilience and long-term market confidence. Future studies directly measuring investor expectations and reactions to man-made disasters, such as terrorism, are warranted. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  11. Terrorism: some philosophical and ethical dilemmas

    OpenAIRE

    Stojanov, Trajce; Unsal, Zeynep

    2017-01-01

    Philosophers weren`t thinking a lot about terrorism before the terrorist attacks in the United States on 11 September 2001. Or even when they were thinking the main concern was how to deal with terrorism. But after this attack terrorism was high on the philosophical agenda mainly manifested as an ethical problem. The key concern was: can terrorism be morally justified? That is the issue we are dealing in this paper too. But, the answer of this question largely depends on the treatment of t...

  12. How to fight terrorism? Political and strategic aspects.

    Science.gov (United States)

    Vad, Erich

    2018-04-01

    "Fighting terrorism is like eating soup with a fork" (Shimon Peres). Peres's quote symbolically captures the key problem of countering terrorism. 9/11 proved to be a hallmark in the global perception of modern terrorism. The following questions form the framework of the present essay: What is the essence of modern terrorism? How did it develop during the past two decades? Who are the key players within the terror framework? What are the root causes for global terrorism? How are we to deal appropriately with the global phenomenon of terrorism? Are there any solutions (short-, medium-, long-term) to terrorism? If yes, where do we have to look for them? The underlying essay provides a strategic overview of antiterrorism policy that is based on the author's years-long experience as a high-level expert and advisor within the security policy framework. For this reason, citations are expressly not included. The key target audience comprises laypersons interested in the phenomenon of global terrorism and its social interplay.

  13. Zika-Virus-Related Photo Sharing on Pinterest and Instagram.

    Science.gov (United States)

    Fung, Isaac Chun-Hai; Blankenship, Elizabeth B; Goff, M Elizabeth; Mullican, Lindsay A; Chan, Kwun Cheung; Saroha, Nitin; Duke, Carmen H; Eremeeva, Marina E; Fu, King-Wa; Tse, Zion Tsz Ho

    2017-12-01

    Pinterest (San Francisco, CA) and Instagram (Menlo Park, CA) are 2 popular photo-sharing social media platforms among young individuals. We assessed differences between Instagram and Pinterest in relaying photographic information regarding Zika virus. Specifically, we investigated whether the percentage of Zika-virus-related photos with Spanish or Portuguese texts embedded therein was higher for Instagram than for Pinterest and whether the contents of Zika-virus-related photos shared on Pinterest were different from those shared on Instagram. We retrieved and manually coded 616 Pinterest (key words: "zika" AND "virus") and 616 Instagram (hashtag: #zikavirus) photos. Among the manually coded samples, 47% (290/616) of Pinterest photos and 23% (144/616) of Instagram photos were relevant to Zika virus. Words were embedded in 57% (164/290) of relevant Pinterest photos and all 144 relevant Instagram photos. Among the photos with embedded words, photos in Spanish or Portuguese were more prevalent on Instagram (77/144, 53%) than on Pinterest (14/164, 9%). There were more Zika-virus-related photos on Instagram than on Pinterest pertinent to Zika virus prevention (59/144, 41%, versus 41/290, 14%; PInstagram are similar platforms for Zika virus prevention communication. (Disaster Med Public Health Preparedness. 2017;11:656-659).

  14. Anonymity versus privacy: Selective information sharing in online cancer communities

    OpenAIRE

    Frost, J.H.; Vermeulen, I.E.; Beekers, N.

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients ap...

  15. An Experimental Study of the Effect of Shared Information on Pilot/Controller Re-Route Negotiation

    Science.gov (United States)

    Farley, Todd C.; Hansman, R. John

    1999-01-01

    Air-ground data link systems are being developed to enable pilots and air traffic controllers to share information more fully. The sharing of information is generally expected to enhance their shared situation awareness and foster more collaborative decision making. An exploratory, part-task simulator experiment is described which evaluates the extent to which shared information may lead pilots and controllers to cooperate or compete when negotiating route amendments. The results indicate an improvement in situation awareness for pilots and controllers and a willingness to work cooperatively. Independent of data link considerations, the experiment also demonstrates the value of providing controllers with a good-quality weather representation on their plan view displays. Observed improvements in situation awareness and separation assurance are discussed. It is argued that deployment of this relatively simple, low-risk addition to the plan view displays be accelerated.

  16. Terrorism, distress, and drinking: vulnerability and protective factors.

    Science.gov (United States)

    Richman, Judith A; Rospenda, Kathleen M; Cloninger, Lea

    2009-12-01

    Research has demonstrated effects of 9/11 on distress and drinking outcomes in individuals directly affected and indirectly affected across the United States. Fewer studies have addressed vulnerability and protective factors shown to moderate the effects of stress exposure. We report findings from a Midwestern workplace cohort study. Respondents to a 6 wave longitudinal mail survey completed questionnaires prior to September 11, 2001 and again in 2003 and 2005. Regression analyses encompassed measures of terrorism-related beliefs and fears, workplace stressors (sexual harassment, generalized abuse and low decision latitude), marital and parental status, and perceived social support in 2003, and distress and deleterious drinking outcomes in 2005. Analyses showed that terrorism-related fears significantly interacted with workplace stressors and interpersonal social relationships in predicting distress, drinking or both, controlling for pre-9/11 distress and drinking. Gender differences were also found. This article suggests that certain individuals may be at heightened risk for distressful reactions to and/or deleterious drinking resulting from terrorism-related issues and fears due to additional risk factors involving workplace stressors and inadequate interpersonal bonds. However, limitations of the study were noted and future research was recommended.

  17. A school-based, teacher-mediated prevention program (ERASE-Stress) for reducing terror-related traumatic reactions in Israeli youth: a quasi-randomized controlled trial.

    Science.gov (United States)

    Gelkopf, Marc; Berger, Rony

    2009-08-01

    Since September 2000 Israeli children have been exposed to a large number of terrorist attacks. A universal, school-based intervention for dealing with the threat of terrorism as well as with terror-related symptoms, ERASE-Stress (ES), was evaluated in a male religious middle school in southern Israel. The program was administered by the homeroom teachers as part of the school curriculum. It consists of 12 classroom sessions each lasting 90 minutes, and included psycho-educational material, skill training and resiliency strategies delivered to the students by homeroom teachers. One hundred and fourteen 7th and 8th grade students were randomly assigned to the ES intervention or were part of a waiting list (WL). They were assessed on measures of posttraumatic symptomatology, depression, somatic symptoms and functional problems before and 3 months after the intervention or the WL period. Three months after the program ended, students in the experimental group showed significant reduction in all measures compared to the waiting-list control group. The ERASE-Stress program may help students suffering from terror-related posttraumatic symptoms and mitigate the negative effects of future traumatic experiences. Furthermore, a school-based universal program such as the ERASE-Stress may potentially serve as an important and effective component of a community mental health policy for communities affected by terrorism.

  18. Terrorism as Genocide: Killing with “Intent”

    Directory of Open Access Journals (Sweden)

    Ashlie Perry

    2012-07-01

    Full Text Available It is plausible that terrorism can manifest itself as a form of genocide. Using Raphael Lemkin’s definition of genocide and the UN Genocide Convention’s definition of genocide, non-state and state terrorism are assessed as a form of genocide. Commonalities found in the definitions of both genocide and terrorism supports the argument. The psychology of terrorism and Lemkin’s psychology of genocide describe similar motivations of perpetrators. The September 11th attacks and the U.S. invasion of Iraq are used as case studies to illustrate that terrorism can result in genocide or genocidal acts. Framing acts of terrorism as genocide allows for prosecution in international courts and brings a new perspective to the concept of killing with intent.

  19. Model of health information sharing behavior among patients in cervical cancer

    Directory of Open Access Journals (Sweden)

    Ragil Tri atmi

    2018-01-01

    Full Text Available Cervical cancer is the second highest cause of death for women in Indonesia, despite a deadly illness, patients with cervical cancer are not desperate to survive. Instead, they are motivated to undertake positive actions, one of which is to do health informtion sharing or share information on environmental health tersekatnya. This study aims to look at how the patterns of behavior of sharing health information on cervical cancer patients, as well as the motive behind their actions the health information sharing. This study uses the method of qualitative research grounded approach. Location of the study conducted in Surabaya, while the search for informants researchers used snowball sampling. The results from this study is there are different behavior patterns of health information sharing among cervical cancer patients who have been diagnosed with advanced cervical cancer with cervical cancer at an early stage level.

  20. Security investment, hacking, and information sharing between firms and between hackers

    OpenAIRE

    Hausken, Kjell

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers' attacks and the firms' defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm's defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  1. Prevention and Pre-emption in Australia’s Domestic Anti-terrorism Legislation

    Directory of Open Access Journals (Sweden)

    Tamara Tulich

    2012-11-01

    Full Text Available The move towards prevention in domestic anti-terror law and policy was initially justified as an exceptional response to the exceptional threat of transnational terrorism following September 11, 2001. However, commonalities are discernable between prevention in anti-terror law and prevention as employed in other areas of Australian law. To begin contextualising and analysing preventive practices in Australia, a framework is required. ‘The preventive state’ provides one way to view the collection of preventive measures employed in Australia. Engaging a governmentality perspective has the potential to make visible prevention and pre-emption in law and governance, and to inform critical treatment of the preventive state itself. Whether and how prevention and pre-emption in anti-terror law differ from and exhibit continuities with other preventive measures has the potential to expose issues of selectivity and proportionality between preventive measures and force consideration of the limits of state action to prevent or pre-empt harm.

  2. Sleep Terrors in Twins

    OpenAIRE

    J Gordon Millichap

    2008-01-01

    In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  3. National Ambulatory Medical Care Survey: terrorism preparedness among office-based physicians, United States, 2003-2004.

    Science.gov (United States)

    Niska, Richard W; Burt, Catharine W

    2007-07-24

    This investigation describes terrorism preparedness among U.S. office-based physicians and their staffs in identification and diagnosis of terrorism-related conditions, training methods and sources, and assistance with diagnosis and reporting. The National Ambulatory Medical Care Survey (NAMCS) is an annual national probability survey of approximately 3,000 U.S. nonfederal, office-based physicians. Terrorism preparedness items were added in 2003 and 2004. About 40 percent of physicians or their staffs received training for anthrax or smallpox, but less than one-third received training for any of the other exposures. About 42.2 percent of physicians, 13.5 percent of nurses, and 9.4 percent of physician assistants and nurse practitioners received training in at least one exposure. Approximately 56.2 percent of physicians indicated that they would contact state or local public health officials for diagnostic assistance more frequently than federal agencies and other sources. About 67.1 percent of physicians indicated that they would report a suspected terrorism-related condition to the state or local health department, 50.9 percent to the Centers for Disease Control and Prevention (CDC), 27.5 percent to the local hospital, and 1.8 percent to a local elected official's office. Approximately 78.8 percent of physicians had contact information for the local health department readily available. About 53.7 percent had reviewed the diseases reportable to health departments since September 2001, 11.3 percent had reviewed them before that month, and 35 percent had never reviewed them.

  4. The Concept of (Global Terrorism and Conspiracy Theory as Media Discourse

    Directory of Open Access Journals (Sweden)

    Neda Radulović

    2016-09-01

    Full Text Available Despite the urgency and growing interest in a subject, there is no unifying definition of terrorism. A large number of studies could be seen as integral part of ‘counter-terrorism’ strategies- as set of practices to prevent and defeat terrorism. Lisa Stampnitzky’s research looked into the discourse of terrorism experts and argued that the concept of terrorism is a social construct, thus revealing further structure that facilitated it. Aim of this paper is to compare the concept of terrorism as media discourse- a form of legitimate expert interpretation, with conspiracy theory as a form of illegitimate, para-institutional form of interpretation. Noting the commonplaces of the two: defined as an afterthought, both being designated and not self-described notions, featuring a plot that precedes the event- this paper will look at these discourses, the way they relate to (and intersect each other, and try to trace their manifestations.

  5. Indicators of Terrorism Vulnerability in Africa

    Science.gov (United States)

    2015-03-26

    security. The relation, if any, to terrorism is explored. The data comes from the World Bank database. Gender Equality. How a country treats women and the...55 Gender Equality...method to evaluate poverty is based upon income inequality . This ap- proach is based upon the belief that poverty is relative, individuals only feel

  6. Information Sharing and Collaboration Business Plan

    Science.gov (United States)

    2006-03-30

    for information sharing The proposed environment will need a common definition of terms and dictionaries of competing terms where common definitions...a lexicon, a monolingual on-line handbook, and a thesaurus and ontology of abbreviations, acronyms, and terminology. (ISCO 2005, 18

  7. Nuclear terrorism: Facts and fiction

    International Nuclear Information System (INIS)

    Kamp, K.H.

    1994-01-01

    The study tries to assess the risk of nuclear terrorism in the light of recent developments in the area of nuclear weapons proliferation, and to develop suggestions of how to cope with existing challenges. First of all the term of ''nuclear terrorism'' is defined and differentiated from other forms of nuclear crimes. In a second step the attempt is made to compile the findings and assessments of the past on the problem of nuclear terrorism. Since, as a rule, a threat potential is composed of 'intentions' and 'capabilities', a third part is dedicated to terrorist intentions and studies the degree of probability of terrorists considering nuclear weapons an appropriate means for their aims. In connection with 'capabilities' it is scrutinized whether terrorist groups will be able at all to procure, design or initiate nuclear warheads. This leads to the question as to which consequences result from nuclear safety shortcomings - in particular in Russia - with a view to nuclear terrorism. Based on the preceding considerations, several proposals for coping with the danger of nuclear terrorism are made. (orig./HP) [de

  8. Mapping Contemporary Terrorism Courses at Top-Ranked National Universities and Liberal Arts Colleges in the United States

    OpenAIRE

    Ivan Sascha Sheehan

    2012-01-01

    Most of the scholarly work on Terrorism Studies focuses on terrorism research (knowledge production). By contrast, relatively little attention has been paid to teaching about terrorism (knowledge dissemination) at universities. This paper addresses this gap by providing a systematic analysis of contemporary terrorism courses at 106 top-ranked U.S. based universities and colleges. The study uses 1) key word searches of course catalogues for the academic year 2010-2011 to identify terrorism cou...

  9. Security Investment, Hacking, and Information Sharing between Firms and between Hackers

    OpenAIRE

    Kjell Hausken

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  10. Security Investment, Hacking, and Information Sharing Between Firms and Between Hackers

    OpenAIRE

    Hausken, Kjell

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  11. Future Roles of Air and Space Power in Combatting Terrorism

    National Research Council Canada - National Science Library

    McAlpine, Mark

    1997-01-01

    .... The political, economic, and informational instruments of power play primary roles in addressing and eliminating the root causes behind terrorism attacks, but the military instrument will prevent...

  12. Definitions of Cyber Terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an

  13. Sleep Terrors in Twins

    Directory of Open Access Journals (Sweden)

    J Gordon Millichap

    2008-12-01

    Full Text Available In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  14. The Information Aspect of Extremism and Terrorism and the Destructive Trends in the Mass Media

    Directory of Open Access Journals (Sweden)

    E V Nekrasova

    2013-12-01

    Full Text Available The article is devoted to the problem of destructive trends in modern Russian mass media as well as to the information component in the activities of extremist and terrorist organizations. The destructive trends in the mass media manifest themselves in the escalation of animosity, aggression, creation of the cult of violence and xenophobia moods. Terrorist organizations use the mass media for their own purposes: they create the atmosphere of fear and tension in society, recruit new followers, mainly among the youth, which is a serious problem. It is important to use the positive potential of the mass media to counteract extremism and terrorism.

  15. A social-cognitive perspective of terrorism risk perception and individual response in Canada.

    Science.gov (United States)

    Lee, Jennifer E C; Lemyre, Louise

    2009-09-01

    The volume of research on terrorism has increased since the events of September 11, 2001. However, efforts to develop a contextualized model incorporating cognitive, social-contextual, and affective factors as predictors of individual responses to this threat have been limited. Therefore, the aim of this study was to evaluate a series of hypotheses drawn from such a model that was generated from a series of interviews with members of the Canadian public. Data of a national survey on perceived chemical, biological, radiological, nuclear, and explosives (CBRNE) terrorism threat and preparedness were analyzed. Results demonstrated that worry and behavioral responses to terrorism, such as individual preparedness, information seeking, and avoidance behaviors, were each a function of cognitive and social-contextual factors. As an affective response, worry about terrorism independently contributed to the prediction of behavioral responses above and beyond cognitive and social-contextual factors, and partially mediated the relationships of some of these factors with behavioral responses. Perceived coping efficacy emerged as the cognitive factor associated with the most favorable response to terrorism. Hence, findings highlight the importance of fostering a sense of coping efficacy to the effectiveness of strategies aimed at improving individual preparedness for terrorism.

  16. Nuclear Law: A Key Against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Cardozo, P.

    2004-01-01

    The role of the legal instruments in the war against nuclear terrorism. Control of radioactive sources. Elements of Nuclear Law: Definition: it is the body of special legislation that regulates the pacific uses of nuclear energy and the conduct of the persons engaged in activities related to fissionable materials and ionizing radiation . Objective: to provide a legal framework in order to protect individuals , property and the environment against the harmful effects of the use of nuclear energy and ionising radiation. Principles of nuclear energy legislation: safety principle, exclusively operator responsibility, authorization, independence of the regulatory body, inspections and enforcement, nuclear damage compensation, international cooperation. National regulatory infrastructure. Establishment of special law in Emergency Preparedness for nuclear or radiological disaster. IAEA Conventions. Transportation of nuclear material. IAEA regulations on radioactive material. Compensation for nuclear damage. Nuclear safety, security and terrorism. International and domestic instruments. Anti terrorism acts. International agreements on Safety Cooperation. (Author)

  17. What's 'Awe' The Hype? Motivations to Share Video Game Information

    OpenAIRE

    Blankenbeckler, Logan Bryan

    2017-01-01

    Over the past few decades, video games have become a popular avenue for dissemination of information and publicity about video games is word-of-mouth sharing. Thus, it is imperative for researchers to examine the social, and individual processes that guide this behavior. Focusing on prerelease sharing behavior specifically, this pair of studies aimed to identify predictors and dimensions of video game information sharing, and explore the impact content characteristics have on individuals' ...

  18. The virtues of gossip: reputational information sharing as prosocial behavior.

    Science.gov (United States)

    Feinberg, Matthew; Willer, Robb; Stellar, Jennifer; Keltner, Dacher

    2012-05-01

    Reputation systems promote cooperation and deter antisocial behavior in groups. Little is known, however, about how and why people share reputational information. Here, we seek to establish the existence and dynamics of prosocial gossip, the sharing of negative evaluative information about a target in a way that protects others from antisocial or exploitative behavior. We present a model of prosocial gossip and the results of 4 studies testing the model's claims. Results of Studies 1 through 3 demonstrate that (a) individuals who observe an antisocial act experience negative affect and are compelled to share information about the antisocial actor with a potentially vulnerable person, (b) sharing such information reduces negative affect created by observing the antisocial behavior, and (c) individuals possessing more prosocial orientations are the most motivated to engage in such gossip, even at a personal cost, and exhibit the greatest reduction in negative affect as a result. Study 4 demonstrates that prosocial gossip can effectively deter selfishness and promote cooperation. Taken together these results highlight the roles of prosocial motivations and negative affective reactions to injustice in maintaining reputational information sharing in groups. We conclude by discussing implications for reputational theories of the maintenance of cooperation in human groups.

  19. Body and Terror: Women’s Bodies as Victims and Perpetrators of Terror

    Directory of Open Access Journals (Sweden)

    Parvin Sultana

    2014-07-01

    Full Text Available Bodies are vulnerable because they are intrinsically linked to death. Bodies are social and they are embedded with meaning. They cannot be extracted from their specific contexts. The nation is also often equated with body politic. As a result individual bodies become the site of security/ insecurity depending on the social location of bodies. Within this discourse, this article tries to locate the bodies of women. It will look at the bodies of women as victims of terror as well as perpetrators of terror. It will try to understand if in these differentiated roles, women are able to break away from stereotypes or are still caught in heteronormative narratives. Keywords: Body, Suicide Bombers, Victims, Ethnic Conflict, Terrorism.

  20. Cognitive simplicity and self-deception are crucial in martyrdom and suicide terrorism.

    Science.gov (United States)

    Fink, Bernhard; Trivers, Robert

    2014-08-01

    Suicide attacks and terrorism are characterized by cognitive simplicity, which is related to self-deception. In justifying violence in pursuit of ideologically and/or politically driven commitment, people with high religious commitment may be particularly prone to mechanisms of self-deception. Related megalomania and glorious self-perception are typical of self-deception, and are thus crucial in the emergence and expression of (suicide) terrorism.

  1. The enigma of lone wolf terrorism: an assessment

    NARCIS (Netherlands)

    Spaaij, R.

    2010-01-01

    Lone wolf terrorism remains an ambiguous and enigmatic phenomenon. The boundaries of lone wolf terrorism are fuzzy and arbitrary. This article aims to define and analyze the main features and patterns of lone wolf terrorism in fifteen countries. Lone wolf terrorism is shown to be more prevalent in

  2. Defining and Distinguishing Traditional and Religious Terrorism

    OpenAIRE

    Gregg, Heather S.

    2014-01-01

    The article of record may be found at: http://dx.doi.org/10.1080/23296151.2016.1239978 thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from tr...

  3. Mass Media and Terrorism: Deconstructing the Relationship

    OpenAIRE

    Prayudi, Prayudi

    2008-01-01

    Issue of terrorism came to surface in this early twenty first century through a number ofacts violence that have killed hundreds and injured thousands of people. At the same time, theseevents have been dominated the mass media contents. Principally, mass media and issue ofterrorism are inseparable. This paper examines the relationship between mass media and terrorism.It is done through the deconstruction of the concept of terrorism and how terrorism isunderstood as a communicational process. ...

  4. Nuclear and Radiological Terrorism

    International Nuclear Information System (INIS)

    Cizmek, A.

    2003-01-01

    Radiological and nuclear terrorism is widely considered as a major if not ultimate terrorist threat for modern societies. Highly industrialized countries could be extremely sensitive to terrorist aggressions of this kind. Nuclear terrorism is often associated with nuclear proliferation. Strictly speaking, nuclear proliferation deals with the spread of nuclear weapons into states which doesn't posses them. But proliferation can also be understood as the spread of radioactive material or even nuclear explosives into the hands of non-state organizations, such as sub national terrorist or criminal organizations as well as any kind of extreme groups for sabotage, blackmail or any other destabilization or destruction purposes. New driving factors for nuclear terrorism which 'help' terrorists are: the consequence of the break down of the Soviet Union and 'easy' radioactive smuggling and black market. What is 'New terrorism'? In analyzing the treat, one has to start by posing several crucial questions such as 'do such groups or individuals have the skill to complete their aim'? 'Who are these groups and individuals', 'how they can be categorized', 'what is their motivation'? If analysis of the 'new terrorism' is one side of the coin, the other is just as daunting. Who, what, when, where and how would be targeted by 'new terrorism'? Although there are existing different reasons (religious and political/social), mainly the target is civilian population. In many instances the aim is to exert either political or economic pressure on authorities or both. Police, ambulance - first call response teams - local, regional and national authorities have a hard task still ahead of them. The upside is that industrialized nations have acknowledged the need to reassess where we are and what the risk is. The bottom line has to be 'who is likely to want to resort to such methods and what the likelihood of them succeeding would be. (author)

  5. Terrorism and mental health in the rural Midwest.

    Science.gov (United States)

    Hawley, Suzanne R; Ablah, Elizabeth; Hawley, Gary C; Cook, David J; Orr, Shirley A; Molgaard, Craig A

    2006-01-01

    Since the terrorist attacks of 11 September 2001, the amount of terrorism preparedness training has increased substantially. However, gaps continue to exist in training for the mental health casualties that result from such events. Responders must be aware of the mental health effects of terrorism and how to prepare for and buffer these effects. However, the degree to which responders possess or value this knowledge has not been studied. Multi-disciplinary terrorism preparedness training for healthcare professionals was conducted in Kansas in 2003. In order to assess knowledge and attitudes related to mental health preparedness training, post-test surveys were provided to 314 respondents 10 months after completion of the training. Respondents returned 197 completed surveys for an analysis response rate of 63%. In general, the results indicated that respondents have knowledge of and value the importance of mental health preparedness issues. The respondents who reported greater knowledge or value of mental health preparedness also indicated significantly higher ability levels in nationally recognized bioterrorism competencies (p mental health components to be incorporated into terrorism preparedness training. Further studies to determine the most effective mental health preparedness training content and instruction modalities are needed.

  6. Irrational Rationality of Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Nalbandov

    2013-12-01

    Full Text Available The present article deals with the ontological problem of applying the rational choice frameworks to the study of terrorism. It testing the application of the rational choice to the “old” (before the end of the Cold War and the “new” (after the end of the Cold War terrorisms. It starts with analyzing the fundamentals of rationality and applies it at two levels: the individual (actors and group (collective via two outlooks: tactical (short-term and strategic (long-term. The main argument of the article is that while the “old” terrorism can be explained by the rational choice theory its “new” version represents a substantial departure from rationality.

  7. Terrorism, Hegel, Honneth

    Directory of Open Access Journals (Sweden)

    Sinkwan Cheng

    2015-07-01

    Full Text Available My essay begins by analyzing how Hegel and Honneth’s theory of recognition would seem to lend support to insurgent terrorists’ struggle for the right to self-determination. Insurgent terrorism often looks like a concretization of what Honneth calls the moral protest of the oppressed launched against the dominating powers. Insurgent terrorism also bears affinity to the politics of recognition in the sense that it challenges the legitimacy and authority of the forces owned by the state, and seeks to gain public recognition instead for the legitimacy of their own cause. Precisely because what matters uppermost to terrorists is the gaining of recognition for their cause as just, terrorists are eager to seize the mass media as a means of spreading their ideas. My essay will end, however, by pointing out major differences between insurgent terrorism on the one hand, and Hegel and Honneth on the other.

  8. Review and expectations of terror attack emergency rescue

    Directory of Open Access Journals (Sweden)

    De-wen WANG

    2012-03-01

    Full Text Available Ten years of anti-terror struggle since the 9/11 event has indicated adequately that terrorism is a global problem and international danger. Likewise, anti-terror emergency rescue is also an important task which will influence the safety and benefit of every country all over the world. This paper reviews the main progress and result of international anti-terror struggle in the last ten years, and also introduces the new characteristic of the international anti-terror activity. Besides that, this paper also brings forward the further consideration about the anti-terror emergency medical rescue and the researches remaining to be carried out. The latter includes: (1 to further perfect the high-efficient medical rescue command organization; (2 to further perfect the emergency medical rescue prearranged scheme; (3 to further perfect the construction of rescue system and rescue base after various types of terror attack; (4 to further promote the anti-terror consciousness in the public, and pay more attention to the prevention and investigation of the psychological disaster; (5 to further carry out the basic investigation on emergency medical rescue after various terror attack injuries (for example the types and characteristics of new injuries, pathophysiology and prevention and treatment of stress-psychological effect induced by terror attack, new high-efficient medical rescue measure and equipments, and so on.

  9. Chinas Response to Terrorism

    Science.gov (United States)

    2016-06-01

    regulations regarding terrorism and related activities (e.g., the 2006 Anti- Money iv Laundering Law), most notably the 2015 Counterterrorism... Money Laundering ASEAN Association for Southeast Asian Nations CASS Chinese Academy of Social Sciences CCP Chinese Communist Party CICIR China...the Financing of Terrorism” in 2006, and passed a new law governing money laundering in an effort to restrict access to funds available to terrorists

  10. Latin America: Terrorism Issues

    National Research Council Canada - National Science Library

    Sullivan, Mark P

    2005-01-01

    .... In its annual report on worldwide terrorism, the State Department highlights threats in Colombia, Peru, and the tri-border region of Argentina, Brazil, and Paraguay. The State Department also has designated four terrorist groups (three in Colombia and one in Peru) as Foreign Terrorist Organizations, and Cuba has been listed as a state sponsor of terrorism since 1982.

  11. Towards a Theory of Fear Management in the Counter-Terrorism Domain

    Directory of Open Access Journals (Sweden)

    Edwin Bakker

    2014-01-01

    Full Text Available Since 9/11, the state of the art in counter-terrorism research, counter-terorism measures and counter-terrorism impacts has taken off. Nevertheless, countering terrorism as a branch of fear management is still a discipline to be developed. In this Research Paper, authors Prof. Dr. Edwin Bakker and Prof. Dr. Beatrice de Graaf attempt to lessen this gap. The Paper identifies and analyses governmental approaches to managing fear in relation to terrorist incidents. It is a stocktaking approach, offering a preliminary oversight of some central aspects and pointers on the way forward when constructing and testing such a theory.

  12. Information Sharing in a Closed-Loop Supply Chain with Asymmetric Demand Forecasts

    Directory of Open Access Journals (Sweden)

    Pan Zhang

    2017-01-01

    Full Text Available This paper studies the problem of sharing demand forecast information in a closed-loop supply chain with the manufacturer collecting and remanufacturing. We investigate two scenarios: the “make-to-order” scenario, in which the manufacturer schedules production based on the realized demand, and the “make-to-stock” scenario, in which the manufacturer schedules production before the demand is known. For each scenario, we find that it is possible for the retailer to share his forecast without incentives when the collection efficiency of the manufacturer is high. When the efficiency is moderate, information sharing can be realized by a bargaining mechanism, and when the efficiency is low, non-information sharing is a unique equilibrium. Moreover, the possibility of information sharing in the make-to-stock scenario is higher than that in the make-to-order scenario. In addition, we analyze the impact of demand forecasts’ characteristics on the value of information sharing in both scenarios.

  13. Coping with the threat of terrorism: a review.

    Science.gov (United States)

    Maguen, Shira; Papa, Anthony; Litz, Brett T

    2008-01-01

    Terrorism creates a ripple of fear and uncertainty. Although most individuals are resilient and recover over time, a minority remains functionally and psychologically impaired. In this paper, we examine research on coping strategies employed in the aftermath of terrorist events, theories and empirical findings related to appraisal processes that influence individuals' primary attributions of risk, and normative processes that shape secondary appraisals, which predict specific coping behaviors. We also describe individual diatheses and factors promoting resilience that may influence coping and functioning in the face of terrorism. Finally, we offer suggestions for future research.

  14. Content Sharing Based on Personal Information in Virtually Secured Space

    Science.gov (United States)

    Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.

    User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.

  15. CULTURAL FEATURES SHARED BY INFORMATION SYSTEMS USERS

    Directory of Open Access Journals (Sweden)

    Marilena Maldonado

    2006-11-01

    Full Text Available Problems may arise when organizational culture is not considered in the development of information systems, such as difficulties in system implementation, since users do not accept changes in their work cultures. However, current methodology designs do not contemplate cultural factors. The objective of this investigation was to identify the main cultural features shared by the users of information systems in an Argentinean university. As result of this work it was possible to identify the memes shared by the members of the community selected, and to categorize such memes according to their incidence grade. This work seeks to be an initial step towards the construction of systems that evolve along with the organizational culture they are an integral part of.

  16. Terrorism threats and preparedness in Canada: the perspective of the Canadian public.

    Science.gov (United States)

    Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C

    2007-06-01

    Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.

  17. Bringing the State Back into Terrorism Studies

    OpenAIRE

    Blakeley, Ruth

    2007-01-01

    Orthodox terrorism studies tend to focus on the activities of illiberal nonstate actors against the liberal democratic states in the North. It thus excludes state terrorism, which is one of a number of repressive tools that great powers from the North have used extensively in the global South in\\ud the service of foreign policy objectives. I establish the reasons for the absence of state terrorism from orthodox accounts of terrorism and argue that critical–normative approaches could help to o...

  18. Graduating to Postdoc: Information-Sharing in Support of Organizational Structures and Needs

    Science.gov (United States)

    Keller, Richard M.; Lucas, Paul J.; Compton, Michael M.; Stewart, Helen J.; Baya, Vinod; DelAlto, Martha

    1999-01-01

    The deployment of information-sharing systems in large organizations can significantly impact existing policies and procedures with regard to authority and control over information. Unless information-sharing systems explicitly support organizational structures and needs, these systems will be rejected summarily. The Postdoc system is a deployed Web-based information-sharing system created specifically to address organizational needs. Postdoc contains various organizational support features including a shared, globally navigable document space, as well as specialized access control, distributed administration, and mailing list features built around the key notion of hierarchical group structures. We review successes and difficulties in supporting organizational needs with Postdoc

  19. Integrating research, legal technical assistance, and advocacy to inform shared use legislation in Mississippi.

    Science.gov (United States)

    Spengler, John O; Frost, Natasha R; Bryant, Katherine K

    2014-01-01

    The purpose of this article was to describe the process by which research findings informed the successful passage of legislation designed to increase opportunities for physical activity in Mississippi, and discuss implications and lessons learned from this process. The article is descriptive and conceptual, and addresses the collaborative process by which research, legal technical assistance, and advocacy informed and shaped shared use legislation in Mississippi. Collaborators informing this article were an Active Living Research grantee, a staff attorney with the Public Health Law Center, the American Heart Association Mississippi Government Relations Director, and community partners. The American Heart Association and Public Health Law Center developed policy guidance in the form of sample language for legislation as a starting point for states in determining policy needed to eliminate or reduce barriers to the shared use of school recreational facilities. The policy guidance was informed by evidence from Active Living Research-funded research studies. The American Heart Association, supporting a bill shaped by the policy guidance, led the effort to advocate for successful shared use legislation in Mississippi. Research should be policy relevant and properly translated and disseminated. Legal technical assistance should involve collaboration with both researchers and advocates so that policymakers have the information to make evidence-based decisions. Government relations directors should collaborate with legal technical staff to obtain and understand policy guidance relevant to their advocacy efforts. Effective collaborations, with an evidence-based approach, can lead to informed, successful policy change.

  20. The Changing Nonlinear Relationship between Income and Terrorism

    Science.gov (United States)

    Enders, Walter; Hoover, Gary A.

    2014-01-01

    This article reinvestigates the relationship between real per capita gross domestic product (GDP) and terrorism. We devise a terrorism Lorenz curve to show that domestic and transnational terrorist attacks are each more concentrated in middle-income countries, thereby suggesting a nonlinear income–terrorism relationship. Moreover, this point of concentration shifted to lower income countries after the rising influence of the religious fundamentalist and nationalist/separatist terrorists in the early 1990s. For transnational terrorist attacks, this shift characterized not only the attack venue but also the perpetrators’ nationality. The article then uses nonlinear smooth transition regressions to establish the relationship between real per capita GDP and terrorism for eight alternative terrorism samples, accounting for venue, perpetrators’ nationality, terrorism type, and the period. Our nonlinear estimates are shown to be favored over estimates using linear or quadratic income determinants of terrorism. These nonlinear estimates are robust to additional controls. PMID:28579636

  1. 78 FR 16692 - Chemical Facility Anti-Terrorism Standards (CFATS)

    Science.gov (United States)

    2013-03-18

    ... trade secrets, confidential commercial or financial information, Chemical-terrorism Vulnerability... from other comments in response to this notice. Comments containing trade secrets, confidential... Burden Cost (operating/maintaining): $3,977. Instrument: Notification of a New Top Screen. Frequency: On...

  2. Terrorism in Australia: factors associated with perceived threat and incident-critical behaviours.

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Barr, Margo; Raphael, Beverley; Jorm, Louisa

    2009-03-27

    To help improve incident preparedness this study assessed socio-demographic and socio-economic predictors of perceived risk of terrorism within Australia and willingness to comply with public safety directives during such incidents. The terrorism perception question module was incorporated into the New South Wales Population Health Survey and was completed by a representative sample of 2,081 respondents in early 2007. Responses were weighted against the New South Wales population. Multivariate analyses indicated that those with no formal educational qualifications were significantly more likely (OR = 2.10, 95%CI:1.32-3.35, p terrorism risk perception and concerns regarding potential impacts. The pattern of concern and response among those of migrant background may reflect secondary social impacts associated with heightened community threat, rather than the direct threat of terrorism itself. These findings highlight the need for terrorism risk communication and related strategies to address the specific concerns of these sub-groups as a critical underpinning of population-level preparedness.

  3. Terrorism in Australia: factors associated with perceived threat and incident-critical behaviours

    Science.gov (United States)

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Barr, Margo; Raphael, Beverley; Jorm, Louisa

    2009-01-01

    Background To help improve incident preparedness this study assessed socio-demographic and socio-economic predictors of perceived risk of terrorism within Australia and willingness to comply with public safety directives during such incidents. Methods The terrorism perception question module was incorporated into the New South Wales Population Health Survey and was completed by a representative sample of 2,081 respondents in early 2007. Responses were weighted against the New South Wales population. Results Multivariate analyses indicated that those with no formal educational qualifications were significantly more likely (OR = 2.10, 95%CI:1.32–3.35, p terrorism risk perception and concerns regarding potential impacts. The pattern of concern and response among those of migrant background may reflect secondary social impacts associated with heightened community threat, rather than the direct threat of terrorism itself. These findings highlight the need for terrorism risk communication and related strategies to address the specific concerns of these sub-groups as a critical underpinning of population-level preparedness. PMID:19323842

  4. Library Learning: Undergraduate Students’ Informal, Self-directed, and Information Sharing Strategies

    Directory of Open Access Journals (Sweden)

    Jo Ann Murphy

    2014-04-01

    Full Text Available A focus group study of fourteen University of Saskatchewan second to fourth year humanities and social science undergraduate students was conducted in the fall of 2011. The purpose of the research was to determine how students learn about library resources and services. Findings indicate that the participants often use a variety of informal, self-directed and information sharing strategies. Seeking help from professors, peers, friends, and family members is a common practice. Convenience, familiarity, and perceived knowledge are key factors that determine who and how these students learn about the library. Formal instruction and seeking assistance from librarians did not resonate for participants as a typical approach for learning about the library. The author suggests that undergraduate students engage in informal learning and information sharing as many ‘adult learners’ do, similar to an employment setting. The library, within the formal educational structure, lends itself to a more informal learning context. The study concludes that libraries must continue to develop resources, services, and innovative programs that support students’ informal learning styles, while also providing formal instruction as part of the undergraduate curriculum ensuring students are exposed early on to core foundational skills that contribute to their success as informal and self-directed learners.

  5. “Counterterrorism Bookshelf” – 20 Important Books on Terrorism & Counterterrorism Related Subjects

    Directory of Open Access Journals (Sweden)

    Joshua Sinai

    2013-12-01

    Full Text Available This review column is the first in a series of columns that will provide a selective listing of important books by leading publishers on terrorism and counterterrorism-related subjects. The listings of publishers and their books are arranged in alphabetical order by publishers’ names, with their imprints included in their particular section. Within each section, the books are listed in alphabetical order, according to the lead author’s last name. Although most of the reviewed books are current, a few were published within the last several years, but are still considered to be important. Future columns will review books by publishers such as CRC Press, Hurst, Oxford University Press, Routledge, Stanford University Press, Springer, and University of Chicago Press.

  6. Hospitals: Soft Target for Terrorism?

    Science.gov (United States)

    De Cauwer, Harald; Somville, Francis; Sabbe, Marc; Mortelmans, Luc J

    2017-02-01

    In recent years, the world has been rocked repeatedly by terrorist attacks. Arguably, the most remarkable were: the series of four coordinated suicide plane attacks on September 11, 2001 on buildings in New York, Virginia, and Pennsylvania, USA; and the recent series of two coordinated attacks in Brussels (Belgium), on March 22, 2016, involving two bombings at the departure hall of Brussels International Airport and a bombing at Maalbeek Metro Station located near the European Commission headquarters in the center of Brussels. This statement paper deals with different aspects of hospital policy and disaster response planning that interface with terrorism. Research shows that the availability of necessary equipment and facilities (eg, personal protective clothing, decontamination rooms, antidotes, and anti-viral drugs) in hospitals clearly is insufficient. Emergency teams are insufficiently prepared: adequate and repetitive training remain necessary. Unfortunately, there are many examples of health care workers and physicians or hospitals being targeted in both political or religious conflicts and wars. Many health workers were kidnapped and/or killed by insurgents of various ideology. Attacks on hospitals also could cause long-term effects: hospital units could be unavailable for a long time and replacing staff could take several months, further compounding hospital operations. Both physical and psychological (eg, posttraumatic stress disorder [PTSD]) after-effects of a terrorist attack can be detrimental to health care services. On the other hand, physicians and other hospital employees have shown to be involved in terrorism. As data show that some offenders had a previous history with the location of the terror incident, the possibility of hospitals or other health care services being targeted by insiders is discussed. The purpose of this report was to consider how past terrorist incidents can inform current hospital preparedness and disaster response planning

  7. Space Sharing Between Formal and Informal Sectors In Kemang Area

    Science.gov (United States)

    Sihombing, Antony; Dewanti, Hafizka Chandra

    2018-01-01

    Sharing is a form of human activity as a social being, over resources or spaces. Humans generally define their space according to their psychological and biological needs. However, what if space sharing takes place in an urban scope? The phenomenon of space sharing happens in Kemang area done by two distinct sectors, formal and informal which both are engaged in commercial activities independently. In the study of territory and the behavior settings, the quality of environment can affect the formation of human activities in a space, occurs a phenomenon of space sharing. The researcher will discuss and present a form of the space sharing by the formal and informal sectors in a commercial area through different environmental qualities. In some circumstance, a form of space sharing can increase the value of space and obtain to a shared space, where both sectors mutually take benefits. Otherwise, it leads to an adverse impact in some others. It is clear that differences in the physical environment and social environment have an impact on the formation of space sharing and the value of space in an urban region.

  8. Terrorism, forgiveness and restorative justice

    NARCIS (Netherlands)

    Pemberton, A.

    2014-01-01

    This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly

  9. Animal rights and environmental terrorism

    Directory of Open Access Journals (Sweden)

    Steve Cooke

    2013-09-01

    Full Text Available Many paradigmatic forms of animal rights and environmental activism have been classed as terrorism both in popular discourse and in law. This paper argues that the labelling of many violent forms of direct action carried out in the name of animal rights or environmentalism as ‘terrorism’ is incorrect. Furthermore, the claim is also made that even those acts which are correctly termed as terrorism are not necessarily wrongful acts. The result of this analysis is to call into question the terms of public debate and the legitimacy of anti-terrorism laws targeting and punishing radical activism.

  10. Can or can not? Electronic information sharing influence the participation behavior of the employees

    International Nuclear Information System (INIS)

    Mohammed, M. A.; Eman, Y.; Huda, I.; Thamer, A.

    2015-01-01

    Information sharing refers to information being shared between employees inside or outside an agency, or by providing accessibility of their information and data to other agencies so as to allow effective decision making. Electronic information sharing is a key to effective government. This study is conducted to investigate the factors of electronic information sharing that influence the participation behavior so as to augment it amongst the employees in public organizations. Eleven domains of factors that are considered in this study are benefits, risk, social network, Information stewardship, information quality, trust, privacy, reciprocity. The paper proposes electronic information sharing factors in public sector to increase the participation

  11. Can or can not? Electronic information sharing influence the participation behavior of the employees

    Energy Technology Data Exchange (ETDEWEB)

    Mohammed, M. A., E-mail: mhmdaldbag@yahoo.com; Eman, Y., E-mail: emaroof94@yahoo.com; Huda, I., E-mail: huda753@uum.edu.my; Thamer, A. [University Utara Malaysia, UUM Sintok (Malaysia)

    2015-12-11

    Information sharing refers to information being shared between employees inside or outside an agency, or by providing accessibility of their information and data to other agencies so as to allow effective decision making. Electronic information sharing is a key to effective government. This study is conducted to investigate the factors of electronic information sharing that influence the participation behavior so as to augment it amongst the employees in public organizations. Eleven domains of factors that are considered in this study are benefits, risk, social network, Information stewardship, information quality, trust, privacy, reciprocity. The paper proposes electronic information sharing factors in public sector to increase the participation.

  12. The failure of international action against terrorism.

    Science.gov (United States)

    Suter, Keith

    2006-01-01

    Progress on the so-called 'War on Terrorism' is slow. There is no agreed definition of terrorism and no consistent government policy in respect of it. Consideration of terrorism ignores the role of some governments in what could be regarded as terrorist activity, often with the connivance of others for reasons of political expediency. The special case of suicide terrorism is discussed in detail. It is concluded that the world is now exposed to a new form of warfare, and that even with new military thinking this could continue for perhaps decades to come.

  13. Pathological responses to terrorism.

    Science.gov (United States)

    Yehuda, Rachel; Bryant, Richard; Marmar, Charles; Zohar, Joseph

    2005-10-01

    Many important gains have been made in understanding PTSD and other responses to trauma as a result of neuroscience-based observations. Yet there are many gaps in our knowledge that currently impede our ability to predict those who will develop pathologic responses. Such knowledge is essential for developing appropriate strategies for mounting a mental health response in the aftermath of terrorism and for facilitating the recovery of individuals and society. This paper reviews clinical and biological studies that have led to an identification of pathologic responses following psychological trauma, including terrorism, and highlights areas of future-research. It is important to not only determine risk factors for the development of short- and long-term mental health responses to terrorism, but also apply these risk factors to the prediction of such responses on an individual level. It is also critical to consider the full spectrum of responses to terrorism, as well as the interplay between biological and psychological variables that contribute to these responses. Finally, it is essential to remove the barriers to collecting data in the aftermath of trauma by creating a culture of education in which the academic community can communicate to the public what is and is not known so that survivors of trauma and terrorism will understand the value of their participation in research to the generation of useful knowledge, and by maintaining the acquisition of knowledge as a priority for the government and those involved in the immediate delivery of services in the aftermath of large-scale disaster or trauma.

  14. Terror.com

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    En stor del af terrorens formål er at skabe frygt. Frygt for gentagelse af terror handlinger og dermed opnåelsen af en psykologisk effekt på mennesker eller grupper af mennesker med henblik på at ændre deres holdninger eller adfærd. Et af de primære midler til at opnå denne psykologiske effekt er......, udover terror handlingerne selv, propaganda som opfølgning på terrorhandlinger for at forøge effekten af disse. Eller propaganda som slet og ret har til formål at skabe frygt og usikkerhed. Traditionelt set har meget af spredningen af terrorpropaganda beroet på, at medierne omtalte terrorhandlingerne og...

  15. Information and shared decision-making are top patients' priorities

    Directory of Open Access Journals (Sweden)

    Bronstein Alexander

    2006-02-01

    Full Text Available Abstract Background The profound changes in medical care and the recent stress on a patient-centered approach mandate evaluation of current patient priorities. Methods Hospitalized and ambulatory patients at an academic medical center in central Israel were investigated. Consecutive patients (n = 274 indicated their first and second priority for a change or improvement in their medical care out of a mixed shortlist of 6 issues, 3 related to patient-physician relationship (being better informed and taking part in decisions; being seen by the same doctor each time; a longer consultation time and 3 issues related to the organizational aspect of care (easier access to specialists/hospital; shorter queue for tests; less charges for drugs. Results Getting more information from the physician and taking part in decisions was the most desirable patient choice, selected by 27.4% as their first priority. The next choices – access and queue – also relate to more patient autonomy and control over that of managed care regulations. Patients studied were least interested in continuity of care, consultation time or cost of drugs. Demographic or clinical variables were not significantly related to patients' choices. Conclusion Beyond its many benefits, being informed by their doctor and shared decision making is a top patient priority.

  16. Sharing Water-related Information to Tackle Changes in the Hydrosphere - for Operational Needs (SWITCH-ON)

    Science.gov (United States)

    Arheimer, Berit

    2015-04-01

    Recently, a collaborative EU project started called SWITCH-ON (EU FP7 project No 603587) coordinated by SMHI to support the INSPIRE directive and the Open Data Strategy. The overall goal of the project is to establish a "one-stop-shop" web portal for easy access to European water information. The project will use open data, provide infrastructure for sharing and collaboration, and add value to society and research by repurposing and refining data from various sources. The SWITCH-ON project http://www.water-switch-on.eu/ will establish new forms of water research and facilitate the development of new products and services based on principles of sharing and community building in the water society. The SWITCH-ON objectives are to use open data for implementing: 1) an innovative spatial information platform (SIP) to find, bind, transform and publish data, 2) entirely new forms of collaborative research organised in a Virtual Water-Science Laboratory, open for any research group, 3) fourteen new operational products for water management and awareness, 4) outreach facilities for new water business and knowledge in line with the Europe's smart growth and environmental objectives. This poster will describe the overall project goals and especially the recent progress on developing a Virtual Water-Science Laboratory. Contact: waterswitchon@gmail.com

  17. Basic Research Needs for Countering Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, W.; Michalske, T.; Trewhella, J.; Makowski, L.; Swanson, B.; Colson, S.; Hazen, T.; Roberto, F.; Franz, D.; Resnick, G.; Jacobson, S.; Valdez, J.; Gourley, P.; Tadros, M.; Sigman, M.; Sailor, M.; Ramsey, M.; Smith, B.; Shea, K.; Hrbek, J.; Rodacy, P.; Tevault, D.; Edelstein, N.; Beitz, J.; Burns, C.; Choppin, G.; Clark, S.; Dietz, M.; Rogers, R.; Traina, S.; Baldwin, D.; Thurnauer, M.; Hall, G.; Newman, L.; Miller, D.; Kung, H.; Parkin, D.; Shuh, D.; Shaw, H.; Terminello, L.; Meisel, D.; Blake, D.; Buchanan, M.; Roberto, J.; Colson, S.; Carling, R.; Samara, G.; Sasaki, D.; Pianetta, P.; Faison, B.; Thomassen, D.; Fryberger, T.; Kiernan, G.; Kreisler, M.; Morgan, L.; Hicks, J.; Dehmer, J.; Kerr, L.; Smith, B.; Mays, J.; Clark, S.

    2002-03-01

    To identify connections between technology needs for countering terrorism and underlying science issues and to recommend investment strategies to increase the impact of basic research on efforts to counter terrorism.

  18. Can I help you? Information sharing in online discussion forums by people living with a long-term condition

    Directory of Open Access Journals (Sweden)

    Carol S Bond

    2016-11-01

    Full Text Available Background Peer-to-peer health care is increasing, especially amongst people living with a long-term condition. How information is shared is, however, sometimes of concern to health care professionals. Objective This study explored what information is being shared on health-related discussion boards and identified the approaches people used to signpost their peers to information. Methods This study was conducted using a qualitative content analysis methodology to explore information shared on discussion boards for people living with diabetes. Whilst there is debate about the best ethical lens to view research carried out on data posted on online discussion boards, the researchers chose to adopt the stance of treating this type of information as “personal health text”, a specific type of research data in its own right. Results Qualitative content analysis and basic descriptive statistics were used to analyse the selected posts. Two major themes were identified: ‘Information Sharing from Experience’ and ‘Signposting Other Sources of Information’. Conclusions People were actively engaging in information sharing in online discussion forums, mainly through direct signposting. The quality of the information shared was important, with reasons for recommendations being given. Much of the information sharing was based on experience, which also brought in information from external sources such as health care professionals and other acknowledged experts in the field. With the rise in peer-to-peer support networks, the nature of health knowledge and expertise needs to be redefined. People online are combining external information with their own personal experiences and sharing that for others to take and develop as they wish.

  19. Islamic Law and Terrorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Ramlani Lina Sinaulan

    2016-03-01

    Full Text Available Jihād and terrorism are not the same. In the context of sharia that implementation of the jihād has parameters measured with a layer of ethics based on the commands Al Quran and the Hadith of Prophet and the explanation the Ulama. Muslims in Indonesia views that the essentially not much different from the views on jihād and terror in other Islamic countries, especially the Middle East. In the context of Islamic law, jihād has multi spectral studies, but none of these studies that equate the meaning of jihād with terrorism, or none of them agreed that acts of terror as has been demonstrated by radical groups that are part of the concept Islam.

  20. 15 CFR 742.9 - Anti-terrorism: Syria.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Syria. 742.9 Section... BASED CONTROLS § 742.9 Anti-terrorism: Syria. (a) License requirements. (1) If AT Column 1 of the... required for export and reexport to Syria for anti-terrorism purposes. (2) The Secretary of State has...

  1. International Nuclear Information System: Researchers' Platform for Knowledge Sharing

    International Nuclear Information System (INIS)

    Mohd Hafizal Yusof; Habibah Adnan; Samsurdin Ahamad

    2011-01-01

    International Atomic Energy Agency (IAEA) is an organization under the United Nations (UN), which serves to disseminate accurate information about the nuclear world. In accordance with its role, an International Nuclear Information System (INIS) was established in 1970, provides the opportunities for member countries under the auspices of the IAEA to share information, expertise and knowledge, particularly in the nuclear field. Malaysia has become a member since 1978, and the first country input was posted in the 1980's. INIS member countries are supervised by a specially appointed liaison officers to monitor and oversee matters related to that. Each issue is associated with 49 subject matter (subject heading) will be checked and recorded by using Win fibre before being sent to the INIS database at IAEA headquarters in Vienna, Austria. Material received will be distributed directly to all IAEA member states through the INIS web site and CD distribution to subscribers countries. Today, INIS is still a successful nuclear-related information provider through nearly 3 million data have been recorded including journals, reports, scientific papers, patents, nuclear laws, the web sites contents, and many more. (author)

  2. Art, Terrorism and the Negative Sublime

    Directory of Open Access Journals (Sweden)

    Arnold Berleant

    2009-01-01

    Full Text Available The range of the aesthetic has expanded to cover not only a wider range of objects and situations of daily life but also to encompass the negative. This includes terrorism, whose aesthetic impact is central to its use as a political tactic. The complex of positive and negative aesthetic values in terrorism are explored, introducing the concept of the sublime as a negative category to illuminate the analysis and the distinctive aesthetic of terrorism.

  3. Cultures of Violence and Acts of Terror: Applying a Legitimation-Habituation Model to Terrorism

    Science.gov (United States)

    Mullins, Christopher W.; Young, Joseph K.

    2012-01-01

    Although uniquely positioned to provide insight into the nature and dynamics of terrorism, overall the field of criminology has seen few empirically focused analyses of this form of political violence. This article seeks to add to the understanding of terror through an exploration of how general levels of violence within a given society influence…

  4. The public production and sharing of medical information. An Australian perspective

    Directory of Open Access Journals (Sweden)

    Henry C.H. Ko

    2010-03-01

    Full Text Available There is a wealth of medical information now available to the public through various sources that are not necessarily controlled by medical or healthcare professionals. In Australia there has been a strong movement in the health consumer arena of consumer-led sharing and production of medical information and in healthcare decision-making. This has led to empowerment of the public as well as increased knowledge-sharing. There are some successful initiatives and strategies on consumer- and public-led sharing of medical information, including the formation of specialised consumer groups, independent medical information organisations, consumer peer tutoring, and email lists and consumer networking events. With well-organised public initiatives and networks, there tends to be fairly balanced information being shared. However, there needs to be caution about the use of publicly available scientific information to further the agenda of special-interest groups and lobbying groups to advance often biased and unproven opinions or for scaremongering. With the adoption of more accountability of medical research, and the increased public scrutiny of private and public research, the validity and quality of medical information reaching the public is achieving higher standards.

  5. Letting Your Personal Health Information Be Used and Shared for Research

    Science.gov (United States)

    ... research study as my okay to share my information for marketing? No. The Privacy Rule does not allow a ... use your authorization to use or share your information for research as an authorization for marketing. What can I do if I think someone ...

  6. 15 CFR 742.8 - Anti-terrorism: Iran.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Iran. 742.8 Section... BASED CONTROLS § 742.8 Anti-terrorism: Iran. (a) License Requirements. (1) A license is required for anti-terrorism purposes to export or reexport to Iran any item for which AT column 1 or AT column 2 is...

  7. 15 CFR 742.10 - Anti-terrorism: Sudan.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Sudan. 742.10 Section...-CCL BASED CONTROLS § 742.10 Anti-terrorism: Sudan. (a) License requirements. (1) If AT column 1 or AT... ECCN, a license is required for export to Sudan for anti-terrorism purposes. 1 AT column 1 refers to...

  8. Ethical dilemmas, work-related guilt, and posttraumatic stress reactions of news journalists covering the terror attack in Norway in 2011.

    Science.gov (United States)

    Backholm, Klas; Idås, Trond

    2015-04-01

    News journalists working on crisis-related assignments may experience dilemmas with regard to how to conduct their work without causing additional harm to first-hand victims. In this study, we investigated how exposure to journalistic ethical dilemmas during the Oslo/Utøya terror attack in 2011 and subsequent work-related guilt were related to the development of posttraumatic stress (PTS) reactions. Norwegian journalists (N = 371) covering the terror attack participated in a web-based survey 8-9 months after the incident. We found that females reported more ethical dilemmas during the assignment than males (n = 356, d = 0.51). We also found that being on the scene was not related to more exposure to dilemmas (n = 311, d = 0.01). Moreover, we discovered that work-related guilt had a significant indirect effect on the relationship between exposure to ethical dilemmas and severity of PTS reactions (n = 344, completely standardized indirect effect size = .11, 95% CI [.04, .19]. The results showed that exposure to ethical dilemmas may affect the development of long-term psychological impairment. We concluded that media organizations can prevent postcrisis impairment by preparing employees for possible exposure to dilemmas during crisis-related assignments. Copyright © 2015 Wiley Periodicals, Inc., A Wiley Company.

  9. The Impact of 'Narco-terrorism' on HRM

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Muñiz, Carlos

    This paper presents a mixed-method study that explores the configuration of human resource management (HRM) systems in “narco-terrorism” environments. The quantitative analysis focuses on 204 news stories. In addition, 25 interviews were conducted with managers and HR professionals at 20 firms...... in Mexico to explore the direct and indirect impacts of narco-terrorism on firms. Our analysis of firms’ responses in terms of HRM systems indicate that trust of formal and informal institutions seems to shape HRM system in the focal firms. More specifically, a combination of strict employee control......, an emphasis on soft-skills training and development, and a flexible work schedule seems to facilitate the building of trust in narco-terrorism contexts. It seems that the role of firms as social institutions integrate strategies, which seems to aim at avoid and manipulate the institutional constraints. Our...

  10. Responding to nuclear terrorism. Chapter 3. Combating radiological terrorism - A multi-faceted challenge

    International Nuclear Information System (INIS)

    Wolf, A.; Yaar, I.

    2006-01-01

    In the twentieth century, radioactive sources have become extensively used in everyday life. These sources, in the hand of terror organizations, can become a threat to the security of civilized nations, causing severe disruption to normal life. On of the main challenges of the civilized world is to keep ahead of the terrorist organizations and take appropriate preventive measures in order to prevent and reduce to minimum the impact of their actions. In order to succeed, a joint and comprehensive effort has to be undertaken to address the scientific, technological, organizational, sociological, psychological and educational aspects of the radiological terrorism threat. In this paper, some of the main activities required for preventing radiological terror events, and the way in which a modular response plan can be prepared are discussed

  11. The Development of a United Nations Counter-Terrorism Policy: A pragmatic approach to the problem of a definition of Terrorism

    OpenAIRE

    Turney-Harris, Latasha

    2014-01-01

    The primary object of this thesis is to propose a pragmatic solution to the legitimacy problems associated with the absence of a definition of Terrorism within United Nations Counter Terrorism Policy. It contends that the attempts to draft such a definition within the Ad Hoc Committee on Terrorism have now come to a political standstill and are unlikely to result in a strong legal definition of terrorism. Any outcome is likely to be a political compromise in nature. This thesis therefore ...

  12. Gratitude depends on the relational model of communal sharing.

    Science.gov (United States)

    Simão, Cláudia; Seibt, Beate

    2014-01-01

    We studied the relation between benefits, perception of social relationships and gratitude. Across three studies, we provide evidence that benefits increase gratitude to the extent to which one applies a mental model of a communal relationship. In Study 1, the communal sharing relational model, and no other relational models, predicted the amount of gratitude participants felt after imagining receiving a benefit from a new acquaintance. In Study 2, participants recalled a large benefit they had received. Applying a communal sharing relational model increased feelings of gratitude for the benefit. In Study 3, we manipulated whether the participant or another person received a benefit from an unknown other. Again, we found that the extent of communal sharing perceived in the relationship with the stranger predicted gratitude. An additional finding of Study 2 was that communal sharing predicted future gratitude regarding the relational partner in a longitudinal design. To conclude, applying a communal sharing model predicts gratitude regarding concrete benefits and regarding the relational partner, presumably because one perceives the communal partner as motivated to meet one's needs. Finally, in Study 3, we found in addition that being the recipient of a benefit without opportunity to repay directly increased communal sharing, and indirectly increased gratitude. These circumstances thus seem to favor the attribution of communal norms, leading to a communal sharing representation and in turn to gratitude. We discuss the importance of relational models as mental representations of relationships for feelings of gratitude.

  13. Terrorism and the behavioral sciences.

    Science.gov (United States)

    Schouten, Ronald

    2010-01-01

    Terrorism has existed for millennia and is a phenomenon well-known to many parts of the world. Americans were forced to recognize this phenomenon, and our vulnerability to it, by two sets of events in 2001: the attacks on New York City and Washington, DC, and the anthrax mailings that followed shortly thereafter. Psychiatry, psychology, and other behavioral and social sciences have been looked to for assistance in collecting and analyzing intelligence data, understanding terrorism, and developing strategies to combat terrorism. In addition to reviewing areas in which the behavioral sciences have made contributions in addressing this problem, this article discusses the developing roles for behavioral scientists in this field.

  14. Terror Operations: Case Studies in Terrorism (U.S. Army TRADOC G2 Handbook No. 1.01)

    Science.gov (United States)

    2007-07-25

    terrorism topics. Unless stated otherwise, masculine nouns or pronouns do not refer exclusively to men. Proponent Statement. Headquarters, U.S. Army...Economic and political disruptions can have profound global consequences. Sources of instability within the region include hegemony , terrorism

  15. Schmittian Politics in the Age of Drones: An Analysis of Obama's War on Terror

    OpenAIRE

    Fairhead, Edward

    2016-01-01

    This thesis evaluates the Obama administration's use of drone strikes in the 'war on terror' in relation to what Carl Schmitt called the 'concept of the political'. After arguing that the Schmittian distinction between friend and enemy underlined Bush's war on terror, as did many scholars, I interrogate whether this is still true for Obama's war on terror. Obama's rhetorical legitimising strategy creates the appearance of difference to Bush, and is also far less overtly Schmittian; focusing i...

  16. The influence of locative media on social information sharing: a review

    NARCIS (Netherlands)

    Keijl, Edwin; Klaassen, Randy; op den Akker, Hendrikus J.A.

    2013-01-01

    Mobile phones and social media enable people to share information with others whenever they want, wherever they want. More recent developments allow people to augment their sharing experience by geo-tagging their information through GPS enabled phones. These 'locative media' can be used to

  17. Domestic Violence as Everyday Terrorism

    DEFF Research Database (Denmark)

    Cooper-Cunningham, Dean

    2016-01-01

    Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society.......Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society....

  18. 75 FR 45563 - Terrorism Risk Insurance Program; Final Netting

    Science.gov (United States)

    2010-08-03

    ... DEPARTMENT OF THE TREASURY 31 CFR Part 50 RIN 1505-AC24 Terrorism Risk Insurance Program; Final... Title I of the Terrorism Risk Insurance Act of 2002 (``TRIA'' or ``the Act''), as amended by the Terrorism Risk Insurance Extension Act of 2005 (``Extension Act'') and the Terrorism Risk Insurance Program...

  19. Encouraging information sharing to boost the name-your-own-price auction

    Science.gov (United States)

    Chen, Yahong; Li, Jinlin; Huang, He; Ran, Lun; Hu, Yusheng

    2017-08-01

    During a name-your-own-price (NYOP) auction, buyers can learn a lot of knowledge from their socially connected peers. Such social learning process makes them become more active to attend the auction and also helps them make decisions on what price to submit. Combining an information diffusion model and a belief decision model, we explore three effects of bidders' information sharing on the buyers' behaviors and the seller profit. The results indicate that information sharing significantly increases the NYOP popularity and the seller profit. When enlarging the quality or quantity of information sharing, or increasing the spreading efficiency of the network topology, the number of attenders and the seller profit are increased significantly. However, the spread of information may make bidders be more likely to bid higher and consequently lose surplus. In addition, the different but interdependent influence of the successful information and failure information are discussed in this work.

  20. [Terrorism and human behavior].

    Science.gov (United States)

    Leistedt, S J

    2018-04-01

    Theories of religion are essential for understanding current trends in terrorist activities. The aim of this work is to clarify religion's role in facilitating terror and outline in parallel with recent theoretical developments on terrorism and human behaviour. Several databases were used such as PubCentral, Scopus, Medline and Science Direct. The search terms "terrorism", "social psychology", "religion", "evolution", and "cognition" were used to identify relevant studies in the databases. This work examines, in a multidimensional way, how terrorists employ these features of religion to achieve their goals. In the same way, it describes how terrorists use rituals to conditionally associate emotions with sanctified symbols that are emotionally evocative and motivationally powerful, fostering group solidarity, trust, and cooperation. Religious beliefs, including promised rewards in the afterlife, further serve to facilitate cooperation by altering the perceived payoffs of costly actions, including suicide bombing. The adolescent pattern of brain development is unique, and young adulthood presents an ideal developmental stage to attract recruits and enlist them in high-risk behaviors. This work offers insights, based on this translational analysis, concerning the links between religion, terrorism and human behavior. Copyright © 2017 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  1. Terrorism in Australia: factors associated with perceived threat and incident-critical behaviours

    Directory of Open Access Journals (Sweden)

    Raphael Beverley

    2009-03-01

    Full Text Available Abstract Background To help improve incident preparedness this study assessed socio-demographic and socio-economic predictors of perceived risk of terrorism within Australia and willingness to comply with public safety directives during such incidents. Methods The terrorism perception question module was incorporated into the New South Wales Population Health Survey and was completed by a representative sample of 2,081 respondents in early 2007. Responses were weighted against the New South Wales population. Results Multivariate analyses indicated that those with no formal educational qualifications were significantly more likely (OR = 2.10, 95%CI:1.32–3.35, p Conclusion Low education level is a risk factor for high terrorism risk perception and concerns regarding potential impacts. The pattern of concern and response among those of migrant background may reflect secondary social impacts associated with heightened community threat, rather than the direct threat of terrorism itself. These findings highlight the need for terrorism risk communication and related strategies to address the specific concerns of these sub-groups as a critical underpinning of population-level preparedness.

  2. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  3. Cyber security in nuclear industry – Analytic study from the terror incident in nuclear power plants (NPPs)

    International Nuclear Information System (INIS)

    Cho, Hyo Sung; Woo, Tae Ho

    2017-01-01

    Highlights: • The cyber terrorism in NPPs of South Korea shows the study motivations. • Analyses of the cyber terrorism in NPPs are investigated. • Designed solutions for the cyber terrorism in NPPs are discussed. • South Korean case is considered as the cyber terrorism in NPPs. - Abstract: The cyber terrorism for nuclear power plants (NPPs) is investigated for the analytic study following the South Korean case on December 2014. There are several possible cyber terror attacks in which the twelve cases are studied for the nuclear terror cases including the computer hacking and data stealing. The defense-in-depth concept is compared for cyber terrorism, which was imported from the physical terror analysis. The conventional three conditions of the physical protection system (PPS) are modified as prevention, detection, and response. The six cases are introduced for the solutions of the facility against the possible cyber terrorism in NPPs. The computer hacking methods and related solutions are analyzed for the applications in the nuclear industry. The nuclear security in the NPPs could be an extremely serious condition and the remedies are very important in the safe plant operations. In addition, the quantitative modeling study is performed.

  4. Entering the Black Hole: The Taliban, Terrorism, and Organised Crime

    Directory of Open Access Journals (Sweden)

    Matthew D. Phillips

    2014-09-01

    Full Text Available 'Cooperation and imitation among crime and terror groups in recent years has given rise to a crime-terror nexus. A linear conceptualisation of a crime-terror spectrum, suggests that complete convergence of crime and terror in a failed state can give rise to a ‘black hole.’ Theoretical models of the crime-terror nexus, however, do not specify the means by which a crime-terror group enters this black hole state, yet others do not. Using the Taliban movement as a case study, this article presents a theoretical extension of black hole theory, using organisation-level characteristics to merge black hole theory with the crime-terror continuum.'

  5. Online GIS services for mapping and sharing disease information

    DEFF Research Database (Denmark)

    Gao, Sheng; Mioc, Darka; Anton, François

    2008-01-01

    Background Disease data sharing is important for the collaborative preparation, response, and recovery stages of disease control. Disease phenomena are strongly associated with spatial and temporal factors. Web-based Geographical Information Systems provide a real-time and dynamic way to represent...... and responding to disease outbreaks. To overcome these challenges in disease data mapping and sharing, the senior authors have designed an interoperable service oriented architecture based on Open Geospatial Consortium specifications to share the spatio-temporal disease information. Results A case study...... of infectious disease mapping across New Brunswick (Canada) and Maine (USA) was carried out to evaluate the proposed architecture, which uses standard Web Map Service, Styled Layer Descriptor and Web Map Context specifications. The case study shows the effectiveness of an infectious disease surveillance system...

  6. 15 CFR Supplement No. 2 to Part 742 - Anti-Terrorism Controls: North Korea, Syria and Sudan Contract Sanctity Dates and Related Policies

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-Terrorism Controls: North Korea... CONTROLS Pt. 742, Supp. 2 Supplement No. 2 to Part 742—Anti-Terrorism Controls: North Korea, Syria and... terrorism under section 6(j) of the Export Administration Act (EAA). (b) Items controlled under EAA sections...

  7. Using Information-Sharing Exchange Techniques from the Private Sector to Enhance Information Sharing Between Domestic Intelligence Organizations

    Science.gov (United States)

    2013-12-01

    Travel Alliance —Fast Res System Flow (From Open Travel, 2009a...Intelligence Center THN Tourism Harmonisation Network VCC Virtual Command Center xiii ACKNOWLEDGMENTS I would like to open with thanking my wife...HSIN) The HSIN brand is divided into two parts, HSIN and HSIN-Intel. The larger HSIN is devoted to information sharing amongst the public safety

  8. Comprehensive Study on Wastages of Supply Chain Information Sharing in Automotive Industries

    Science.gov (United States)

    Sendhil Kumar, R.; Pugazhendhi, S.; Muralidharan, C.; Murali, S.

    2017-03-01

    A supply chain is a very extensive concept, which encompasses many problems and features when it comes to controlling. Now a day’s lean concept is a very common method to several areas, such as service sectors and manufacturing. Applying the lean concept to supply chain management is a very popular study part, it has attracted many industrial practices and researchers with different applications. Information sharing and technology remain one of the key factors of integrating the supply chain members. Current scenario the competition is no longer between the competing companies, but it happens between the supply chains. So the efficiency of the supply chain is very important. And the effective sharing of information can enhance the supply chain efficiency through minimizing the inventories and Information sharing can increase supply chain efficiency by reducing inventories and stabilizing the production. This paper describes and discusses about the seven deadly wastes of supply chain information with the comparative principle of Toyota production system (TPS) principle approach. How the TPS can be applied to supply chain information sharing And lean tool of 5S concept possibility improve the information sharing.

  9. Library Information System Time-Sharing (LISTS) Project. Final Report.

    Science.gov (United States)

    Black, Donald V.

    The Library Information System Time-Sharing (LISTS) experiment was based on three innovations in data processing technology: (1) the advent of computer time-sharing on third-generation machines, (2) the development of general-purpose file-management software and (3) the introduction of large, library-oriented data bases. The main body of the…

  10. Terrorism and nuclear damage coverage

    International Nuclear Information System (INIS)

    Horbach, N. L. J. T.; Brown, O. F.; Vanden Borre, T.

    2004-01-01

    This paper deals with nuclear terrorism and the manner in which nuclear operators can insure themselves against it, based on the international nuclear liability conventions. It concludes that terrorism is currently not covered under the treaty exoneration provisions on 'war-like events' based on an analysis of the concept on 'terrorism' and travaux preparatoires. Consequently, operators remain liable for nuclear damage resulting from terrorist acts, for which mandatory insurance is applicable. Since nuclear insurance industry looks at excluding such insurance coverage from their policies in the near future, this article aims to suggest alternative means for insurance, in order to ensure adequate compensation for innocent victims. The September 11, 2001 attacks at the World Trade Center in New York City and the Pentagon in Washington, DC resulted in the largest loss in the history of insurance, inevitably leading to concerns about nuclear damage coverage, should future such assaults target a nuclear power plant or other nuclear installation. Since the attacks, some insurers have signalled their intentions to exclude coverage for terrorism from their nuclear liability and property insurance policies. Other insurers are maintaining coverage for terrorism, but are establishing aggregate limits or sublimits and are increasing premiums. Additional changes by insurers are likely to occur. Highlighted by the September 11th events, and most recently by those in Madrid on 11 March 2004, are questions about how to define acts of terrorism and the extent to which such are covered under the international nuclear liability conventions and various domestic nuclear liability laws. Of particular concern to insurers is the possibility of coordinated simultaneous attacks on multiple nuclear facilities. This paper provides a survey of the issues, and recommendations for future clarifications and coverage options.(author)

  11. Emergency communication and information issues in terrorist events involving radioactive materials.

    Science.gov (United States)

    Becker, Steven M

    2004-01-01

    With the threat posed by terrorism involving radioactive materials now high on the nation's agenda, local, state, and federal agencies are moving to enhance preparedness and response capabilities. Crucial to these efforts is the development of effective risk communication strategies. This article reports findings from an ongoing study of risk communication issues in nuclear/radiological terrorism situations. It is part of a larger CDC-funded effort that aims to better understand communication challenges associated with weapons of mass destruction terrorism incidents. Presented here are formative research findings from 16 focus groups (n = 163) in which a multi-part, hypothetical radioactive materials terrorism situation was discussed. Twelve of the focus groups were carried out with members of the general public (drawn from a variety of ethnic backgrounds and geographic locations), and four groups were composed of first responders, hospital emergency department personnel, and public health professionals. One aim of the focus groups was to elicit detailed information on people's knowledge, views, perceptions, reactions, and concerns related to a nuclear/radiological terrorism event, and to better understand people's specific information needs and preferred information sources. A second aim was to pretest draft informational materials prepared by CDC and NIOSH. Key findings for the public and professional groups are presented, and the implications of the research for developing messages in radiological/nuclear terrorism situations are explored.

  12. The Mediating Role of Knowledge Sharing on Information Technology and Innovation

    Directory of Open Access Journals (Sweden)

    Onwika Kaewchur

    2013-12-01

    Full Text Available This study aims to investigate the relationship between information technology, knowledge sharing, and a firm’s innovation. Knowledge sharing as a mediating effect is also simultaneously investigated with regard to the relationship between information technology and a firm’s innovation. In this research, the quantitative method was mainly employed. The data was collected with a survey. A total of 224 respondents from herbal manufacturing companies were included in the research. The results presented in this paper demonstrate that knowledge sharing and information technology can critically influence the organization’s innovation and can play a vital role as a significant success factor in this process.

  13. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  14. What is terrorism and can psychology do anything to prevent it?

    Science.gov (United States)

    Stevens, Michael J

    2005-01-01

    Terrorism has a long history, which continues to unfold, and takes many forms. Notwithstanding these facts, there is no generally accepted definition of terrorism. I set forth the definitional issues that underlie the current debate about terrorism. By comparing terrorism with various forms of violence, I argue that it is plausible to construe terrorism as crime and, in support of this, I demonstrate why terrorism cannot be morally justified. Next, I cluster various immediate and long-term approaches intended to prevent terrorism, highlighting psychologically based strategies, such as behavioral profiling, teaching tolerance and citizenship, modifying media images of terrorism, and building peace. In order to understand and respond more effectively to 21st-century terrorism, I advocate adoption of a multidisciplinary, contextually sensitive approach.

  15. Nuclear proliferation and terrorism

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    This section of the book, Part III, has two chapters (9 and 10). Chapter 9, Nuclear Power and Proliferation of Nuclear Weapons, is disucssed under these subjects: nuclear nonproliferation: origins and status; requirements for nuclear weapons manufacture; current nuclear programs and proliferation capabilities; encouraging decisions to forego weapons; arms control; safeguards; attitudes and expectations. Chapter 10, Nuclear Terrorism, discusses these areas: theft of nuclear materials; attacks on nuclear reactors; responding to nuclear terrorism; security and civil liberties

  16. Anonymity versus privacy: Selective information sharing in online cancer communities

    NARCIS (Netherlands)

    Frost, J.H.; Vermeulen, I.E.; Beekers, N.

    2014-01-01

    Background: Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient

  17. Dirty hands : Government torture and terrorism

    NARCIS (Netherlands)

    Daxecker, U.

    2017-01-01

    Existing research suggests that the use of harsh repression can exacerbate the incidence and duration of terrorism. Micro- and macro-level analyses have shown that coercive government responses to terrorism can radicalize sympathizers, increase recruitment, and undermine community support for

  18. Analysing Terrorism from a Systems Thinking Perspective

    Directory of Open Access Journals (Sweden)

    Lukas Schoenenberger

    2014-02-01

    Full Text Available Given the complexity of terrorism, solutions based on single factors are destined to fail. Systems thinking offers various tools for helping researchers and policy makers comprehend terrorism in its entirety. We have developed a semi-quantitative systems thinking approach for characterising relationships between variables critical to terrorism and their impact on the system as a whole. For a better understanding of the mechanisms underlying terrorism, we present a 16-variable model characterising the critical components of terrorism and perform a series of highly focused analyses. We show how to determine which variables are best suited for government intervention, describing in detail their effects on the key variable—the political influence of a terrorist network. We also offer insights into how to elicit variables that destabilise and ultimately break down these networks. Because we clarify our novel approach with fictional data, the primary importance of this paper lies in the new framework for reasoning that it provides.

  19. Sharing Information to Promote a Culture of Safety

    Science.gov (United States)

    Goodrum, Sarah; Woodward, William; Thompson, Andrew J.

    2017-01-01

    Much of the research on school shootings emphasizes the need for peers, not school officials, to share information about students of concern. This qualitative case study examined the information school officials had prior to a school shooting, which left two students dead. The data came from school officials' deposition testimony and school…

  20. IAEA to hold special session on nuclear terrorism

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA this week for an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. The Special Session, which will bring together experts on nuclear terrorism from around the world, will deal with the following issues: The Psychology of terrorism; Intelligence, police and border protection; Guarding nuclear reactors and material from terrorists and thieves; The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices; The threat of nuclear terrorism: Intentional dispersal of radioactive material - Sabotage of fixed installations or transport systems; The Legal Framework: Treaties and Conventions, Laws; Regulations and Codes of Practice; IAEA Nuclear Security and Safety Programmes

  1. International terrorism in the age of globalization

    OpenAIRE

    Aksoy, Ece

    2002-01-01

    Cataloged from PDF version of article. This thesis analyzes the concept of terrorism in the age of globalization. Terrorism, which has been motivated by ideological, religious and national reasons, has added to its concern issues like inequality, injustice, dissatisfaction and antiglobalist movements, due to development and technology in the world. In order to clarify this shift in the policy, the concepts of terrorism and globalization are first explained as distinct issues...

  2. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.

    Science.gov (United States)

    He, Meilin; Devine, Laura; Zhuang, Jun

    2018-02-01

    The government, private sectors, and others users of the Internet are increasingly faced with the risk of cyber incidents. Damage to computer systems and theft of sensitive data caused by cyber attacks have the potential to result in lasting harm to entities under attack, or to society as a whole. The effects of cyber attacks are not always obvious, and detecting them is not a simple proposition. As the U.S. federal government believes that information sharing on cybersecurity issues among organizations is essential to safety, security, and resilience, the importance of trusted information exchange has been emphasized to support public and private decision making by encouraging the creation of the Information Sharing and Analysis Center (ISAC). Through a decision-theoretic approach, this article provides new perspectives on ISAC, and the advent of the new Information Sharing and Analysis Organizations (ISAOs), which are intended to provide similar benefits to organizations that cannot fit easily into the ISAC structure. To help understand the processes of information sharing against cyber threats, this article illustrates 15 representative information sharing structures between ISAC, government, and other participating entities, and provide discussions on the strategic interactions between different stakeholders. This article also identifies the costs of information sharing and information security borne by different parties in this public-private partnership both before and after cyber attacks, as well as the two main benefits. This article provides perspectives on the mechanism of information sharing and some detailed cost-benefit analysis. © 2017 Society for Risk Analysis.

  3. SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud

    Directory of Open Access Journals (Sweden)

    Davide Albertini

    2014-10-01

    Full Text Available In last few years, Online Social Networks (OSNs have become one of the most used platforms for sharing data (e.g., pictures, short texts on the Internet. Nowadays Facebook and Twitter are the most popular OSN providers, though they implement different social models. However, independently from the social model they implement, OSN platforms have become a widespread repository of personal information. All these data (e.g., profile information, shared elements, users’ likes are stored in a centralized repository that can be exploited for data mining and marketing analysis. With this data collection process, lots of sensitive information are gathered by OSN providers that, in time, have become more and more targeted by malicious attackers. To overcome this problem, in this paper we present an architectural framework that, by means of a Social Application registered in Facebook, allows users to move their data (e.g., relationships, resources outside the OSN realm and to store them in the public Cloud. Given that the public Cloud is not a secure and private environment, our proposal provides users security and privacy guarantees over their data by encrypting the resources and by anonymizing their social graphs. The presented framework enforces Relationship-Based Access Control (ReBAC rules over the anonymized social graph, providing OSN users the possibility to selectively share information and resources as they are used to do in Facebook.

  4. Effectiveness of anonymised information sharing and use in health service, police, and local government partnership for preventing violence related injury: experimental study and time series analysis

    Science.gov (United States)

    Florence, Curtis; Brennan, Iain; Simon, Thomas

    2011-01-01

    Objective To evaluate the effectiveness of anonymised information sharing to prevent injury related to violence. Design Experimental study and time series analysis of a prototype community partnership between the health service, police, and local government partners designed to prevent violence. Setting Cardiff, Wales, and 14 comparison cities designated “most similar” by the Home Office in England and Wales. Intervention After a 33 month development period, anonymised data relevant to violence prevention (precise violence location, time, days, and weapons) from patients attending emergency departments in Cardiff and reporting injury from violence were shared over 51 months with police and local authority partners and used to target resources for violence prevention. Main outcome measures Health service records of hospital admissions related to violence and police records of woundings and less serious assaults in Cardiff and other cities after adjustment for potential confounders. Results Information sharing and use were associated with a substantial and significant reduction in hospital admissions related to violence. In the intervention city (Cardiff) rates fell from seven to five a month per 100 000 population compared with an increase from five to eight in comparison cities (adjusted incidence rate ratio 0.58, 95% confidence interval 0.49 to 0.69). Average rate of woundings recorded by the police changed from 54 to 82 a month per 100 000 population in Cardiff compared with an increase from 54 to 114 in comparison cities (adjusted incidence rate ratio 0.68, 0.61 to 0.75). There was a significant increase in less serious assaults recorded by the police, from 15 to 20 a month per 100 000 population in Cardiff compared with a decrease from 42 to 33 in comparison cities (adjusted incidence rate ratio 1.38, 1.13 to 1.70). Conclusion An information sharing partnership between health services, police, and local government in Cardiff, Wales, altered policing

  5. Fuzzy-rule-based Adaptive Resource Control for Information Sharing in P2P Networks

    Science.gov (United States)

    Wu, Zhengping; Wu, Hao

    With more and more peer-to-peer (P2P) technologies available for online collaboration and information sharing, people can launch more and more collaborative work in online social networks with friends, colleagues, and even strangers. Without face-to-face interactions, the question of who can be trusted and then share information with becomes a big concern of a user in these online social networks. This paper introduces an adaptive control service using fuzzy logic in preference definition for P2P information sharing control, and designs a novel decision-making mechanism using formal fuzzy rules and reasoning mechanisms adjusting P2P information sharing status following individual users' preferences. Applications of this adaptive control service into different information sharing environments show that this service can provide a convenient and accurate P2P information sharing control for individual users in P2P networks.

  6. Behavioral, Attitudinal, and Cultural Factors Influencing Interagency Information Sharing

    Science.gov (United States)

    2011-05-01

    Conflict ( Prosocial Behavior ) Cognitive Processes - Shared Team Mental Models, Transactive Memory Action Processes - Team Coordination...information sharing behaviors after the experiment unfolded. To explore this further, an independent sample t -test was conducted, where the difference in...U.S. Army Research Institute for the Behavioral and Social Sciences Research Report 1944 Behavioral , Attitudinal, and Cultural Factors

  7. 31 CFR 50.54 - Payment of Federal share of compensation.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Payment of Federal share of compensation. 50.54 Section 50.54 Money and Finance: Treasury Office of the Secretary of the Treasury TERRORISM... reimbursements to the insurer. (1) Definition of segregated account. For purposes of this section, a segregated...

  8. Shared decision-making and providing information among newly diagnosed patients with hematological malignancies and their informal caregivers: Not "one-size-fits-all".

    Science.gov (United States)

    Rood, J A J; Nauta, I H; Witte, B I; Stam, F; van Zuuren, F J; Manenschijn, A; Huijgens, P C; Verdonck-de Leeuw, I M; Zweegman, S

    2017-12-01

    To optimize personalized medicine for patients with hematological malignancies (HM), we find that knowledge on patient preferences with regard to information provision and shared decision-making (SDM) is of the utmost importance. The aim of this study was to investigate the SDM preference and the satisfaction with and need for information among newly diagnosed HM patients and their informal caregivers, in relation to sociodemographic and clinical factors, cognitive coping style, and health related quality of life. Newly diagnosed patients and their caregivers were asked to complete the Hematology Information Needs Questionnaire, the Information Satisfaction Questionnaire, and the Threatening Medical Situations Inventory. Medical records were consulted to retrieve sociodemographic and clinical factors and comorbidity by means of the ACE-27. Questionnaires were completed by 138 patients and 95 caregivers. Shared decision-making was preferred by the majority of patients (75%) and caregivers (88%), especially patients treated with curative intent (OR = 2.7, P = .041), and patients (OR = 1.2, P information was related to MCCS (P = .012), and need for specific information was related to MCCS and several clinical factors. Importantly, dissatisfaction with the information they received was reported by a third of the patients and caregivers, especially patients who wanted SDM (χ 2  = 7.3, P = .007), and patients with a higher MCCS (OR = 0.94, P = .038). The majority of HM patients want to be involved in SDM, but the received information is not sufficient. Patient-tailored information is urgently needed, to improve SDM. Copyright © 2017 John Wiley & Sons, Ltd.

  9. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  10. Implication of information sharing on Bullwhip effects in a toy supply chain

    DEFF Research Database (Denmark)

    Wong, Chee Yew; El-Beheiry, Mohamed; Johansen, John

    2004-01-01

    Coordination of toy supply chains is challenged by volatile and seasonal demand with high forecast errors and bullwhip effects. This paper compares Bullwhip effects in a three-level divergent a toy supply chain between retailers who shared downstream demand information (consumer sales...... using early order commitment has decreased the Bullwhip effect for all supply chain members even if it is applied locally.......) and retailers who did not share. Bullwhip effect is reduced when the shared volume of retailers who shared downstream demand information increased; however, fill rate performance is not improved. Key causes of Bullwhip effect are identified - forecast updating, timeliness of demand signal, limited use of shared...

  11. Estimation of Radiological Terrorism Risk by Administrative Districts

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Suk Hoon; Kim, Ju Youl [Seoul National Univ., Seoul (Korea, Republic of); Yoo, Ho Sik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2008-10-15

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks.

  12. Estimation of Radiological Terrorism Risk by Administrative Districts

    International Nuclear Information System (INIS)

    Kim, Suk Hoon; Kim, Ju Youl; Yoo, Ho Sik

    2008-01-01

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks

  13. 15 CFR 742.19 - Anti-terrorism: North Korea.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: North Korea. 742.19...-CCL BASED CONTROLS § 742.19 Anti-terrorism: North Korea. (a) License Requirements. (1) All items on... anti-terrorism reasons require a license for export or reexport to North Korea. This includes all items...

  14. 31 CFR 50.72 - Establishment of Federal Terrorism Policy Surcharge.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Establishment of Federal Terrorism... TERRORISM RISK INSURANCE PROGRAM Recoupment and Surcharge Procedures § 50.72 Establishment of Federal Terrorism Policy Surcharge. (a) Treasury will establish the Federal Terrorism Policy Surcharge based on the...

  15. 6 CFR 25.4 - Designation of qualified anti-terrorism technologies.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Designation of qualified anti-terrorism... REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...

  16. The Influence of Information Behaviour on Information Sharing across Cultural Boundaries in Development Contexts

    Science.gov (United States)

    Meyer, Hester W. J.

    2009-01-01

    Introduction: Sharing of information across cultural boundaries does not always live up to expectations. Information behaviour is an underlying factor, which can contribute to poor use or non-use of the information or information services at the disposal of indigenous people in a development context. Method: A literature study of information…

  17. Risks of Terrorism, Homicide and Illness: a Methodological Consideration

    Directory of Open Access Journals (Sweden)

    Richard J. Chasdi

    2013-12-01

    Full Text Available A recurring question posed to researchers is whether or not terrorism poses similar degrees of risk as other man-made or natural disasters. There are some specialists, such as John Mueller, who argue that somewhat ironically, the threat of terrorism is vastly exaggerated.[1] This begs the question : compared to what? The underlying aim of this Research Note is to point out some basic methodological and contextual issues to consider, rather than making an attempt to provide hard answers regarding relative individual and collective risks. However, an effort is made to place some empirical findings into appropriate political and social contexts. The framework for discussion includes: basic conceptual problems regarding the notion of “risk”; a comparison of certain basic terrorism incident rates with rates for homicides and illness; and identification of possible future directions to gauge risk assessment within the context of a more holistic systems perspective. 

  18. War on Terror - war on democracy?

    DEFF Research Database (Denmark)

    Bondebjerg, Ib

    2009-01-01

    En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak......En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak...

  19. Development of the Informing Relatives Inventory (IRI): Assessing Index Patients' Knowledge, Motivation and Self-Efficacy Regarding the Disclosure of Hereditary Cancer Risk Information to Relatives

    NARCIS (Netherlands)

    de Geus, Eveline; Aalfs, Cora M.; Menko, Fred H.; Sijmons, Rolf H.; Verdam, Mathilde G. E.; de Haes, Hanneke C. J. M.; Smets, Ellen M. A.

    2015-01-01

    Despite the use of genetic services, counselees do not always share hereditary cancer information with at-risk relatives. Reasons for not informing relatives may be categorized as a lack of: knowledge, motivation, and/or self-efficacy. This study aims to develop and test the psychometric properties

  20. Development of the Informing Relatives Inventory (IRI) : Assessing Index Patients' Knowledge, Motivation and Self-Efficacy Regarding the Disclosure of Hereditary Cancer Risk Information to Relatives

    NARCIS (Netherlands)

    de Geus, Eveline; Aalfs, Cora M.; Menko, Fred H.; Sijmons, Rolf H.; Verdam, Mathilde G. E.; de Haes, Hanneke C. J. M.; Smets, Ellen M. A.

    Despite the use of genetic services, counselees do not always share hereditary cancer information with at-risk relatives. Reasons for not informing relatives may be categorized as a lack of: knowledge, motivation, and/or self-efficacy. This study aims to develop and test the psychometric properties

  1. Development of the Informing Relatives Inventory (IRI): Assessing index patients' knowledge, motivation and self-efficacy regarding the disclosure of hereditary cancer risk information to relatives

    NARCIS (Netherlands)

    de Geus, E.; Aalfs, C.M.; Menko, F.H.; Sijmons, R.H.; Verdam, M.G.E.; de Haes, H.C.J.M.; Smets, E.M.A.

    2015-01-01

    Background: Despite the use of genetic services, counselees do not always share hereditary cancer information with at-risk relatives. Reasons for not informing relatives may be categorized as a lack of: knowledge, motivation, and/or self-efficacy. Purpose: This study aims to develop and test the

  2. Terrorism and financial supervision

    Directory of Open Access Journals (Sweden)

    Anatoli van der Krans

    2005-12-01

    Full Text Available This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective, proportional and mutually harmonious. Now that many regulations in this field have been established by intra-national bodies, it is important to examine how these regulations are further elaborated in the respective national systems. This article gives a broad overview of legislative initiatives of the UN, USA, FATF, EU and Council of Europe. The Netherlands for numerous reasons serves as a legal example. It is concluded that measures taken or proposed to avoid or at least reduce the financing of terrorism are quite effective to prevent abuse of the financial system. On the other hand, these measures increase the risk of underground or illegal financing, which is even more difficult to control.

  3. 47 CFR 25.263 - Information sharing requirements for SDARS terrestrial repeater operators.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Information sharing requirements for SDARS terrestrial repeater operators. 25.263 Section 25.263 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.263 Information sharing...

  4. Reducing the risk of nuclear terrorism

    International Nuclear Information System (INIS)

    Hibbs, R.

    2005-01-01

    Full text: The March 2005 'International conference on nuclear security, global directions for the future' noted that nuclear terrorism is one of the greatest threats to society. Eminent members of a multi-national panel stated that there is no one principal activity to reduce the risk of nuclear terrorism and that a combination of activities is required. This paper seeks to identify those activities by analyzing the elements that comprise the risk of nuclear terrorism. For the purpose of the analysis, risk is the product of the probability of a terrorist attack (A p ), the success of a terrorist act (S p ) and the consequence (C) of the attack: R=A p * S p * C. The paper examines each of these three elements of risk with the objective of identifying what we are doing and what else we could be doing to reduce risk. It takes into consideration some historic catastrophes, examines how they might have been prevented or their consequences reduced, and if there are lessons that are applicable to reducing the risk of nuclear terrorism. The paper demonstrates that we have concentrated on only one of the three elements of risk and offer suggestions for diminishing the risk of nuclear terrorism by addressing all the elements. (author)

  5. Leader humility and team creativity: The role of team information sharing, psychological safety, and power distance.

    Science.gov (United States)

    Hu, Jia; Erdogan, Berrin; Jiang, Kaifeng; Bauer, Talya N; Liu, Songbo

    2018-03-01

    In this study, we identify leader humility, characterized by being open to admitting one's limitations, shortcomings, and mistakes, and showing appreciation and giving credit to followers, as a critical leader characteristic relevant for team creativity. Integrating the literatures on creativity and leadership, we explore the relationship between leader humility and team creativity, treating team psychological safety and team information sharing as mediators. Further, we hypothesize and examine team power distance as a moderator of the relationship. We tested our hypotheses using data gathered from 72 work teams and 354 individual members from 11 information and technology firms in China using a multiple-source, time-lagged research design. We found that the positive relationship between leader humility and team information sharing was significant and positive only within teams with a low power distance value. In addition, leader humility was negatively related to team psychological safety in teams with a high power distance value, whereas the relationship was positive yet nonsignificant in teams with low power distance. Furthermore, team information sharing and psychological safety were both significantly related to team creativity. We discuss theoretical and practical implications for leadership and work teams. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  6. The implications of information sharing on bullwhip effects in a toy supply chain

    DEFF Research Database (Denmark)

    Wong, Chee Yew; El-Beheiry, Mohamed Mostafa; Johansen, John

    2007-01-01

    This paper compares actual bullwhip effects provided by retailers who shared downstream demand information and retailers who did not share in a three-level (divergent) toy supply chain. The toy supply chain faces high forecast errors and bullwhip effects due to unpredictable and seasonal demand...... demand information. To reduce the bullwhip effect, two solutions using the shared information are tested. They are a proposed premature replenishment rule and a simple forecast updating mechanism. Both solutions are proven capable in reducing bullwhip effects of the toy supply chain even without...... patterns. The results indicate a reduction of the bullwhip effect and an improvement of the fill rate due to the increase of retailers who shared downstream demand information. This paper also addresses two main causes of the bullwhip effect, which are the supply variability and limited use of the shared...

  7. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    Directory of Open Access Journals (Sweden)

    Asadi NEJMAH

    2015-11-01

    Full Text Available The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the extensive publicity its activity gains in public, through electronic and printed media. In terrorism, a blow to the “soft stomach” of the state (civilians is performed, with the purpose of causing the state to give in to the demands of terrorism operators. In the basis of terrorism is also an objection to the basis of legitimacy of the ruling government, in that it is not capable of guarantying the safety of its citizens and maintain public order. This article presents the attitudes and ways of operation of terrorist organizations and how Western intelligence attempts to thwart, foil and prevent these organizations from casing for destruction and victims in human lives and state.COMBATEREA TERORISMULUI ISLAMIC PRIN WESTERN INTELLIGENCE Chiar de la înfiinţare, statul Israel s-a confruntat, în viaţa de zi cu zi, cu organizaţiile teroriste, care urmăresc să-l distrugă. Actele de terorism, aşa cum reiese din sensul originar al cuvântului – frică, anxietate, teroare, sunt menite să implanteze frica în rândul populaţiei, s-o demoralizeze şi să perturbeze viaţa cotidiană. Uneori teroarea se dovedeşte a fi un act de răzbunare. Prin acte de terorism se dă o lovitură la „stomacul moale” al statului, adică civililor. Actele de terorism sunt comise, de asemenea, pentru a „demonstra” lipsa de legitimitate a statului, incapacitatea lui de a asigura securitatea cetăţenilor săi. În articol sunt specificate modalităţile de func

  8. Mental health interventions for children exposed to disasters and terrorism.

    Science.gov (United States)

    Pfefferbaum, Betty; Newman, Elana; Nelson, Summer D

    2014-02-01

    The purpose of this review is to describe interventions used with children who are exposed to disasters and terrorism and to present information about the potential benefits of these interventions. A literature search conducted in January 2013 using relevant databases and literature known to the authors that was not generated by the search yielded a total of 85 studies appropriate for review. Intervention approaches used with children exposed to disasters and terrorism included preparedness interventions, psychological first aid, psychological debriefing, psychoeducation, cognitive behavioral techniques, exposure and narrative techniques, eye movement desensitization and reprocessing, and traumatic grief interventions. The investigation of these interventions is complex, and studies varied in methodological rigor (e.g., sample size, the use of control groups, outcomes measured). Given the limitations in the currently available empirical information, this review integrates the literature, draws tentative conclusions about the current state of knowledge, and suggests future directions for study.

  9. The Dilution of Terrorism - Internship report at the International Center for Terrorism Studies

    OpenAIRE

    Bærentzen, Marc Theis

    2012-01-01

    The focus of this report will be how theory and methodology is a necessary mean for an academic understanding of terrorism, using different theories and examples to substantiate my argument. Terrorism has become a diluted concept that is used in a variety of ways to define violence against civilians. But is this enough to claim that we are dealing with a terrorist threat? In academic work these kind of reflections are important to the drawn conclusion. The problematic issue of an absent metho...

  10. Approaches to Political Violence and Terrorism in former Yugoslavia

    OpenAIRE

    Bieber, Florian

    2003-01-01

    Discusses political violence and terrorism in Yugoslavia caused by ethnic nationalism in the 1990s. Kinds of political conflict; Comparison of political violence with war and terrorism in Yugoslavia; Concept of terrorism and its presence in Southeastern Europe.

  11. Israel's Counter-Terrorism Strategy and its Effectiveness

    National Research Council Canada - National Science Library

    Smith, Jerry D

    2005-01-01

    This thesis analyzes Israeli counter-terrorism strategy and its effectiveness. Because of ongoing suicide attacks from Palestinian and other terrorist organizations, Israel will continue to have an aggressive counter-terrorism strategy...

  12. Current Issues Concerning Korea’s Anti-Terrorism Programs

    Science.gov (United States)

    2011-06-10

    Terrorism. New York: Columbia University Press, 1998. Laitin, David. Hegemony and Culture : Politics and Religious Change Among the Yoruba . Chicago...such improvements might take. Definitions Terrorism: Definitions of terrorism differ among nations and organizations, because the social and cultural

  13. Deaths from international terrorism compared with road crash deaths in OECD countries.

    Science.gov (United States)

    Wilson, N; Thomson, G

    2005-12-01

    To estimate the relative number of deaths in member countries of the Organisation for Economic Co-operation and Development (OECD) from international terrorism and road crashes. Data on deaths from international terrorism (US State Department database) were collated (1994-2003) and compared to the road injury deaths (year 2000 and 2001 data) from the OECD International Road Transport Accident Database. In the 29 OECD countries for which comparable data were available, the annual average death rate from road injury was approximately 390 times that from international terrorism. The ratio of annual road to international terrorism deaths (averaged over 10 years) was lowest for the United States at 142 times. In 2001, road crash deaths in the US were equal to those from a September 11 attack every 26 days. There is a large difference in the magnitude of these two causes of deaths from injury. Policy makers need to be aware of this when allocating resources to preventing these two avoidable causes of mortality.

  14. Political Terrorism: A Mini-Course for High School Social Studies.

    Science.gov (United States)

    Ellington, Lucien

    By participating in the 2-week mini-course, high school students will learn that (1) there is a difference between political terror and other criminal activity; (2) governments as well as nongovernmental groups engage in political terrorism; (3) political terrorism has been present throughout history; (4) political terrorism is a world wide…

  15. Note Taking and Note Sharing While Browsing Campaign Information

    DEFF Research Database (Denmark)

    Robertson, Scott P.; Vatrapu, Ravi; Abraham, George

    2009-01-01

    Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private Notes, and Shared Notes. Note taking significantly influenced the manner in which participants browsed for information...

  16. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam; Beirami, Ahmad; Touri, Behrouz; Shamma, Jeff S.

    2015-01-01

    of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a

  17. 76 FR 19909 - International Terrorism Victim Expense Reimbursement Program

    Science.gov (United States)

    2011-04-11

    ... 1121-AA78 International Terrorism Victim Expense Reimbursement Program AGENCY: Office of Justice... promulgating this interim-final rule for its International Terrorism Victim Expense Reimbursement Program... international terrorism. DATES: Effective date: This interim-final rule is effective April 11, 2011. Comment...

  18. International Cyber Incident Repository System: Information Sharing on a Global Scale

    Energy Technology Data Exchange (ETDEWEB)

    Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.; Israeli, Daniel

    2017-02-02

    According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelated Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.

  19. 78 FR 15680 - Information Sharing With Agency Stakeholders: Public Meeting

    Science.gov (United States)

    2013-03-12

    ...] Information Sharing With Agency Stakeholders: Public Meeting AGENCY: Animal and Plant Health Inspection... stakeholders regarding cross-Agency strategic priorities. We are also announcing that APHIS is hosting a public... opportunity for stakeholders to ask questions and share their perspective. DATES: The meeting will be held on...

  20. "i'm not really afraid of Osama Bin Laden!" fear of terrorism in dutch children

    NARCIS (Netherlands)

    P.E.H.M. Muris (Peter); B.N. Mayer (Birgit); S. van Eijk (Sandra); M. Dongen (Marit)

    2008-01-01

    textabstractWe examined to what extent children in The Netherlands are affected by the threat of terrorism. For this purpose, a sample of school children living in Rotterdam or adjacent satellites (N = 216) completed a fear survey that included a number of terrorism-related items, and were

  1. An Examination of How the Availability of State-backed Terrorism Insurance Programs and Commercial Terrorism Insurance Affects the Operational Decisions of Multinational Companies.

    OpenAIRE

    GREY, William / WJG

    2011-01-01

    This dissertation explores the extent to which the operational decisions of multinational companies (MNCs) are affected by the availability of State-backed terrorism insurance programs and commercial terrorism insurance. The initial hypothesis made is that MNCs will be reluctant to invest in zones or countries with high terrorism or political risks, especially when insurance for these risks may be limited or unavailable. This investigation finds that the availability of State-backed terrorism...

  2. Sharing Family Life Information Through Video Calls and Other Information and Communication Technologies and the Association With Family Well-Being: Population-Based Survey.

    Science.gov (United States)

    Shen, Chen; Wang, Man Ping; Chu, Joanna Tw; Wan, Alice; Viswanath, Kasisomayajula; Chan, Sophia Siu Chee; Lam, Tai Hing

    2017-11-23

    The use of information and communication technologies (ICTs) for information sharing among family members is increasing dramatically. However, little is known about the associated factors and the influence on family well-being. The authors investigated the pattern and social determinants of family life information sharing with family and the associations of different methods of sharing with perceived family health, happiness, and harmony (3Hs) in Hong Kong, where mobile phone ownership and Internet access are among the most prevalent, easiest, and fastest in the world. A territory-wide population-based telephone survey was conducted from January to August 2016 on different methods of family life information (ie, information related to family communication, relationships with family members, emotion and stress management) sharing with family members, including face-to-face, phone, instant messaging (IM), social media sites, video calls, and email. Family well-being was assessed by three single items on perceived family health, happiness, and harmony, with higher scores indicating better family well-being. Adjusted prevalence ratios were used to assess the associations of sociodemographic factors with family life information sharing, and adjusted beta coefficients for family well-being. Of 2017 respondents, face-to-face was the most common method to share family life information (74.45%, 1502/2017), followed by IM (40.86%, 824/2017), phone (28.10%, 567/2017), social media sites (11.91%, 240/2017), video calls (5.89%, 119/2017), and email (5.48%, 111/2017). Younger age and higher education were associated with the use of any (at least one) method, face-to-face, IM, and social media sites for sharing family life information (all P for trend face-to-face, and IM (all P for trend face-to-face (beta=0.62, 95% CI 0.45-0.80) and video calls (beta=0.34, 95% CI 0.04-0.65). The combination of face-to-face and video calls was most strongly associated with a higher level of

  3. Report of the Project Research on Disaster Reduction using Disaster Mitigating Information Sharing Technology

    Science.gov (United States)

    Suzuki, Takeyasu

    For the purpose of reducing disaster damage by applying information sharing technologies, "the research on disaster reduction using crisis-adaptive information sharing technologies" was carried out from July, 2004 through March 2007, as a three year joint project composed of a government office and agency, national research institutes, universities, lifeline corporations, a NPO and a private company. In this project, the disaster mitigating information sharing platform which is effective to disaster response activities mainly for local governments was developed, as a framework which enables information sharing in disasters. A prototype of the platform was built by integrating an individual system and tool. Then, it was applied to actual local governments and proved to be effective to disaster responses. This paper summarizes the research project. It defines the platform as a framework of both information contents and information systems first and describes information sharing technologies developed for utilization of the platform. It also introduces fields tests in which a prototype of the platform was applied to local governments.

  4. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    OpenAIRE

    Asadi NEJMAH

    2015-01-01

    The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the ext...

  5. Characterising the UK Terrorist Threat: The Problem with Non-Violent Ideology as a Focus for Counter-Terrorism and Terrorism as the product of ‘Vulnerability’

    Directory of Open Access Journals (Sweden)

    Anthony Richards

    2012-07-01

    Full Text Available This article investigates two particular aspects as to how the terrorist threat in the UK has been characterised, arguing that they both challenge conventional academic wisdom as to how terrorism should be conceptualised. While such conventional wisdom should always be open to challenge, and policymaking perspectives are different to those of academics, these two particular aspects as to how the terrorist threat has been perceived in the UK merit scrutiny, especially as counter-terrorism strategies have been premised on them. They are: i the contemporary and explicit concern with ‘extremist’ but 'non-violent' ideas that are said to be ‘conducive’ to terrorism as a focus for a counter-terrorism response and ii the notion that terrorism has increasingly been seen as the product of ‘vulnerability’. The first, and the main focus of this article, appears to challenge the widely held view within terrorism studies that, when defining terrorism, reference to the cause or the perpetrator is unhelpful because terrorism should first and foremost (and more objectively be seen as a particular 'method' of violence that has been used by a wide variety of actors, regardless of the ideology or the belief systems of its perpetrators. The second aspect – the impetus towards viewing terrorism as the product of vulnerability or individual fallibility - arguably implies a diminished capacity for rational behaviour, which challenges a further commonly held view within terrorism studies: that terrorism entails the use of calculated and rational acts of violence.

  6. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  7. Techniques for cost-effective electric information sharing; Cost balance wo koryoshita denshi joho kyoyuka gijutsu

    Energy Technology Data Exchange (ETDEWEB)

    Shinohara, Y. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-04-01

    The key technology that can effectively support the sharing of each information such as documents, data, and know-how was rearranged to clarify how to utilize it for constructing an electronic information sharing system. The key technology that supports the sharing of electronic information was rearranged from the viewpoint of information gathering, information rearrangement, and information utilization. The reduction in cost for information gathering and rearrangement is indispensable to the promotion of much information sharing. However, each automation method presently causes the deterioration in quality of the rearranged information and the increase in cost for information utilization. To realize a practical electronic information sharing system, it is important to combine the key technologies properly so that the total cost balance of information gathering and information utilization is improved. Therefore, the combination of character recognition by OCR and unpreciseness retrieval, and the complementary combination of automatic document sorting, based on multiple incomplete rearrangement systems, and multiple sorting menus were proposed. 23 refs., 5 figs., 2 tabs.

  8. Roots of terrorism: a reassessment after September 11th

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F.

    2002-01-01

    The brutal terrorist attacks of September 11th, the anthrax attacks that followed and growing knowledge of al Qaeda's pursuit of nuclear, biological and chemical weapons have not only intensified concerns about terrorism but also created doubts about our understanding of terrorism. These attacks were in many ways unprecedented, and ultimately raise the question of the roots or causes of terrorism. Historically and today, there have been divergent views on this question, which reflect philosophical, religious, political, sociological and other differences. These differences are not merely academic, as they can affect our understanding of both the threat and of responses to terrorism in the aftermath of September 11th, Terrorism is too complex and diverse a phenomenon to speak easily of causes. But we may be able to discern the causes of specific acts. Our response to 9/11 and other acts of terrorism will be affected by our understanding of their causes. If 9/11 was caused by US Middle East policies, the response must involve a review of these policies. If it is a backlash against globalization, the response must address the realities underlying anti-globalization sentiments. Addressing causes will not in any case end terrorism, and addressing the wrong causes will be counterproductive. Actions to reduce those conditions that create support for terrorism and aid its recruitment, which need to be clearly identified, are critical in any counterterrorism strategy. So we must understand the reasons for terrorism and, in particular, for the attacks of September 11th.T his paper will look at the question of the roots of terrorism and then look to the specific case of 911 and its aftermath, with a special view to the impact of globalization.

  9. Terrorism and the adolescent: a review.

    Science.gov (United States)

    Abo, Alyssa; Zalsman, Gil

    2003-01-01

    In recent years suicide bombings have became a part of life in Israel. Adolescents seem to be more vulnerable to the issues of life and death since they have to choose psychologically whether to live or die ("the fourth organizer"). The reaction to terrorism in this age group is unique. After September 11th, a great interest on the subject has arisen in the United States and some new data has been gathered. One of the important messages is that terrorism does not simply equal trauma. The aim of this article is to review current literature on emotional reaction, impact, and therapeutic strategies to terrorism in the adolescent population.

  10. Information And Data-Sharing Plan of IPY China Activity

    Science.gov (United States)

    Zhang, X.; Cheng, W.

    2007-12-01

    Polar Data-Sharing is an effective resolution to global system and polar science problems and to interdisciplinary and sustainable study, as well as an important means to deal with IPY scientific heritages and realize IPY goals. Corresponding to IPY Data-Sharing policies, Information and Data-Sharing Plan was listed in five sub-plans of IPY Chinese Programme launched in March, 2007,they are Scientific research program of the Prydz Bay, Amery Ice Shelf and Dome A transects(short title:'PANDA'), the Arctic Scientific Research Expedition Plan, International Cooperation Plan, Information and Data-Sharing Plan, Education and Outreach. China, since the foundation of Antarctic Zhongshan Station in 1989, has carried out systematic scientific expeditions and researches in Larsemann Hills, Prydz Bay and the neighbouring sea areas, organized 14 Prydz Bay oceanographic investigations, 3 Amery Ice Shelf expeditions, 4 Grove Mountains expeditions and 5 inland ice cap scientific expeditions. 2 comprehensive oceanographic investigations in the Arctic Ocean were conducted in 1999 and 2003, acquired a large amount of data and samples in PANDA section and fan areas of Pacific Ocean in the Arctic Ocean. A mechanism of basic data submitting ,sharing and archiving has been gradually set up since 2000. Presently, Polar Science Database and Polar Sample Resource Sharing Platform of China with the aim of sharing polar data and samples has been initially established and began to provide sharing service to domestic and oversea users. According to IPY Chinese Activity, 2 scientific expeditions in the Arctic Ocean, 3 in the South Ocean, 2 at Amery Ice Shelf, 1 on Grove Mountains and 2 inland ice cap expeditions on Dome A will be carried out during IPY period. According to the experiences accumulated in the past and the jobs in the future, the Information and Data- Sharing Plan, during 2007-2010, will save, archive, and provide exchange and sharing services upon the data obtained by scientific

  11. Design of a Business-to-Government Information Sharing Architecture Using Business Rules

    NARCIS (Netherlands)

    Van Engelenburg, S.H.; Janssen, M.F.W.H.A.; Klievink, A.J.

    2016-01-01

    Information sharing between businesses and government agencies is of vital importance, yet business are often reluctant to share information, e.g. as it might be misused. Taking this into account is however often overlooked in the design of software architectures. In this research we apply a design

  12. The Mega-Terrorism - The Challenge of the Third Millennium

    Directory of Open Access Journals (Sweden)

    Daniel Andrișan

    2011-06-01

    Full Text Available The aim of this article is to describe the "new face" of terrorism in the twenty-first centuryindicating the transition to mass destruction weapons (nuclear terrorism, chemical, biological, toethnic-religious terrorism, the occurrence of massive gray area phenomena of terrorism and how thisphenomenon became a strategic weapon. Mega-terrorism has been existing, at a conceptual level,ever since the 70’s, when the experts of this phenomenon tried to find a semantic cover for thesituations that certain organizations, groups or terrorist or extremist sections would get someWeapons of Mass Destruction Systems. Actually, the 11th of September tragedy proves that megaterrorismrepresents the premeditated destruction, the lack of negotiations, of a tactical goal that wasto be accomplished by means of a threat. The mega-terrorism actors do not intend to get themselvesknown to the public, do not require anything, do not see the threat as means or device to reach theirpurpose. The 21 st century mega-terrorism simple logic is materialized in the systemic destroying ofthe enemy, no longer representing a political power or a government, but an entire ‘disobeying’,‘corrupted’, ‘unfaithful’ population indifferent to the mega-terrorist actors’ desires. New dimensionagainst mega-terrorism determines not only a rethinking of how to combat it, but also the realizationof a conceptual legal framework and measures established to materialize the political decision.

  13. 31 CFR 50.51 - Adjustments to the Federal share of compensation.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Adjustments to the Federal share of compensation. 50.51 Section 50.51 Money and Finance: Treasury Office of the Secretary of the Treasury TERRORISM... and the insurer's recoveries for insured losses from other sources shall not be greater than the...

  14. 16 CFR 313.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Limits on sharing account number information... REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 313.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on...

  15. 12 CFR 40.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Limits on sharing account number information... OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 40.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on disclosure of...

  16. Prior adversities predict posttraumatic stress reactions in adolescents following the Oslo Terror events 2011

    Science.gov (United States)

    Nordanger, Dag Ø.; Breivik, Kyrre; Haugland, Bente Storm; Lehmann, Stine; Mæhle, Magne; Braarud, Hanne Cecilie; Hysing, Mari

    2014-01-01

    Background Former studies suggest that prior exposure to adverse experiences such as violence or sexual abuse increases vulnerability to posttraumatic stress reactions in victims of subsequent trauma. However, little is known about how such a history affects responses to terror in the general adolescent population. Objective To explore the role of prior exposure to adverse experiences as risk factors for posttraumatic stress reactions to the Oslo Terror events. Method We used data from 10,220 high school students in a large cross-sectional survey of adolescents in Norway that took place seven months after the Oslo Terror events. Prior exposure assessed was: direct exposure to violence, witnessing of violence, and unwanted sexual acts. We explored how these prior adversities interact with well-established risk factors such as proximity to the events, perceived life threat during the terror events, and gender. Results All types of prior exposure as well as the other risk factors were associated with terror-related posttraumatic stress reactions. The effects of prior adversities were, although small, independent of adolescents’ proximity to the terror events. Among prior adversities, only the effect of direct exposure to violence was moderated by perceived life threat. Exposure to prior adversities increased the risk of posttraumatic stress reactions equally for both genders, but proximity to the terror events and perceived life threat increased the risk more in females. Conclusions Terror events can have a more destabilizing impact on victims of prior adversities, independent of their level of exposure. The findings may be relevant to mental health workers and others providing post-trauma health care. PMID:24872862

  17. Prior adversities predict posttraumatic stress reactions in adolescents following the Oslo Terror events 2011.

    Science.gov (United States)

    Nordanger, Dag Ø; Breivik, Kyrre; Haugland, Bente Storm; Lehmann, Stine; Mæhle, Magne; Braarud, Hanne Cecilie; Hysing, Mari

    2014-01-01

    Former studies suggest that prior exposure to adverse experiences such as violence or sexual abuse increases vulnerability to posttraumatic stress reactions in victims of subsequent trauma. However, little is known about how such a history affects responses to terror in the general adolescent population. To explore the role of prior exposure to adverse experiences as risk factors for posttraumatic stress reactions to the Oslo Terror events. We used data from 10,220 high school students in a large cross-sectional survey of adolescents in Norway that took place seven months after the Oslo Terror events. Prior exposure assessed was: direct exposure to violence, witnessing of violence, and unwanted sexual acts. We explored how these prior adversities interact with well-established risk factors such as proximity to the events, perceived life threat during the terror events, and gender. All types of prior exposure as well as the other risk factors were associated with terror-related posttraumatic stress reactions. The effects of prior adversities were, although small, independent of adolescents' proximity to the terror events. Among prior adversities, only the effect of direct exposure to violence was moderated by perceived life threat. Exposure to prior adversities increased the risk of posttraumatic stress reactions equally for both genders, but proximity to the terror events and perceived life threat increased the risk more in females. Terror events can have a more destabilizing impact on victims of prior adversities, independent of their level of exposure. The findings may be relevant to mental health workers and others providing post-trauma health care.

  18. American Jihadist Terrorism: Combating a Complex Threat

    Science.gov (United States)

    2010-12-07

    Goodnough, and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/2009/10/22/us...Abby Goodnough and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/ 2009/10/22/us...July 8, 2009); Tony Allen-Mills, “FBI ‘Lured Dimwits’ into Terror Plot,” The Sunday Times, London, May 24, 2009, http://www.timesonline.co.uk/tol/news

  19. Medical mitigation model: quantifying the benefits of the public health response to a chemical terrorism attack.

    Science.gov (United States)

    Good, Kevin; Winkel, David; VonNiederhausern, Michael; Hawkins, Brian; Cox, Jessica; Gooding, Rachel; Whitmire, Mark

    2013-06-01

    The Chemical Terrorism Risk Assessment (CTRA) and Chemical Infrastructure Risk Assessment (CIRA) are programs that estimate the risk of chemical terrorism attacks to help inform and improve the US defense posture against such events. One aspect of these programs is the development and advancement of a Medical Mitigation Model-a mathematical model that simulates the medical response to a chemical terrorism attack and estimates the resulting number of saved or benefited victims. At the foundation of the CTRA/CIRA Medical Mitigation Model is the concept of stock-and-flow modeling; "stocks" are states that individuals progress through during the event, while "flows" permit and govern movement from one stock to another. Using this approach, the model is able to simulate and track individual victims as they progress from exposure to an end state. Some of the considerations in the model include chemical used, type of attack, route and severity of exposure, response-related delays, detailed treatment regimens with efficacy defined as a function of time, medical system capacity, the influx of worried well individuals, and medical countermeasure availability. As will be demonstrated, the output of the CTRA/CIRA Medical Mitigation Model makes it possible to assess the effectiveness of the existing public health response system and develop and examine potential improvement strategies. Such a modeling and analysis capability can be used to inform first-responder actions/training, guide policy decisions, justify resource allocation, and direct knowledge-gap studies.

  20. THE ROLE OF INFORMATION SHARING IN SUPPLY CHAIN MANAGEMENT: THE SECURESCM APPROACH

    OpenAIRE

    ERNESTO DAMIANI; FULVIO FRATI; ROMARIC TCHOKPON

    2011-01-01

    Information sharing plays a role of paramount importance in modern supply chain environments. In fact, the elements that compose the chain need to share information about sensitive aspects of their business in order to build more accurate and profitable supply plans. In this paper, we describe how the increasing of information released increases the overall economic results of the whole chain, and how this information can be protected, exploiting secure computation techniques, to reduce the r...

  1. 12 CFR 216.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Limits on sharing account number information... GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Limits on Disclosures § 216.12 Limits on sharing account number information for marketing purposes. (a) General...

  2. 12 CFR 573.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Limits on sharing account number information..., DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 573.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on disclosure of...

  3. 12 CFR 332.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Limits on sharing account number information... REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 332.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on...

  4. Dismantling Terrorism: Developing Actionable Solutions for Today's Plague of Violence

    National Research Council Canada - National Science Library

    Scott, Frances K

    2007-01-01

    .... The bibliography is divided into the following sections: causes and origins of terrorism, geographical distribution of terrorist groups, terrorist financing, terrorist groups and networks, the psychology of terrorism, prevention of terrorism, remedies...

  5. Probabilistic risk analysis and terrorism risk.

    Science.gov (United States)

    Ezell, Barry Charles; Bennett, Steven P; von Winterfeldt, Detlof; Sokolowski, John; Collins, Andrew J

    2010-04-01

    Since the terrorist attacks of September 11, 2001, and the subsequent establishment of the U.S. Department of Homeland Security (DHS), considerable efforts have been made to estimate the risks of terrorism and the cost effectiveness of security policies to reduce these risks. DHS, industry, and the academic risk analysis communities have all invested heavily in the development of tools and approaches that can assist decisionmakers in effectively allocating limited resources across the vast array of potential investments that could mitigate risks from terrorism and other threats to the homeland. Decisionmakers demand models, analyses, and decision support that are useful for this task and based on the state of the art. Since terrorism risk analysis is new, no single method is likely to meet this challenge. In this article we explore a number of existing and potential approaches for terrorism risk analysis, focusing particularly on recent discussions regarding the applicability of probabilistic and decision analytic approaches to bioterrorism risks and the Bioterrorism Risk Assessment methodology used by the DHS and criticized by the National Academies and others.

  6. EU’s Role in Fighting Terrorism

    Directory of Open Access Journals (Sweden)

    Jana Maftei

    2009-06-01

    Full Text Available International terrorism, a phenomenon with constant development, is today acertainty and has dramatically marked the beginning of this century and millennium. Thisproblem has reached a global dimension and it represents a concern to the entire internationalcommunity. Over the time, numerous international and regional regulations have been framed, inorder to prevent and combat terrorism. The European Union condemns terrorist acts andrecognizes the central role of the United Nations, in fighting against terrorism and promotingsecurity, as well as the contribution of the new NATO in what concerns the defense and securitypromotion. Europe has to act more firmly in order to consolidate the defense against terrorismand the European Union’s borders. At the same time, the European Union considers that only aconcerted and firm action from all the states and the major actors on the international scenewould lead to the identification of the solutions which can contribute to the efficient fight againstterrorism and, by these means, provide for the international peace and security. The proportion ofthe danger terrorism represents has turned the fight against this phenomenon in an internationalcommunity’s desideratum.

  7. On immorality of terrorism and war

    Directory of Open Access Journals (Sweden)

    Čičovački Predrag

    2003-01-01

    Full Text Available The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable moral implications with regards to the treatment of other human beings, a further common and troubling implication of terrorism and war consists in the fact that dehumanization of others leads also to a dehumanization of ourselves. .

  8. The Czech National Action Plan on Combating Terrorism: Political and Legal Point of Outcome in Responding to CBRNE-Terrorism

    International Nuclear Information System (INIS)

    Matousek, J.

    2007-01-01

    After the events of September 2001 starting new era in the global terrorism, pursuant to the UN Security Council Resolutions 1368, 1373, and 1377 (2001), new security threats were identified and needs to fight against international terrorism were stressed. In the Czech Republic, a complex approach and broad institutional co-operation including inputs of scientific research (including authors involvement) to analyse endangered critical infrastructures and respective countermeasures had led to strengthening national measures in implementing respective international agreements dealing with WMD non-proliferation under deepening the co-operation within EU and NATO. The concrete complex programme of harmonised effort of all state organs in combating international terrorism resulted in the Czech National Action Plan on Combating Terrorism (2002). This (yearly updated) binding political document (issued by the Czech Government) identifies threats to all sectors of society and contains agreed harmonised active measures to be undertaken by involved organisations and institutions in all aspects of prevention, repression, protection, rescue and recovery for cases of terrorist attacks. The contents and respective measures are presented and discussed in detail with special emphasis on the aspects of CBRNE terrorism and role of Integrated Rescue System.(author)

  9. Information Sharing: Practices That Can Benefit Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    2001-01-01

    .... Information sharing and coordination are key elements in developing comprehensive and practical approaches to defending against computer-based, or cyber, attacks, which could threaten the national welfare...

  10. Infectious Cognition: Risk Perception Affects Socially Shared Retrieval-Induced Forgetting of Medical Information.

    Science.gov (United States)

    Coman, Alin; Berry, Jessica N

    2015-12-01

    When speakers selectively retrieve previously learned information, listeners often concurrently, and covertly, retrieve their memories of that information. This concurrent retrieval typically enhances memory for mentioned information (the rehearsal effect) and impairs memory for unmentioned but related information (socially shared retrieval-induced forgetting, SSRIF), relative to memory for unmentioned and unrelated information. Building on research showing that anxiety leads to increased attention to threat-relevant information, we explored whether concurrent retrieval is facilitated in high-anxiety real-world contexts. Participants first learned category-exemplar facts about meningococcal disease. Following a manipulation of perceived risk of infection (low vs. high risk), they listened to a mock radio show in which some of the facts were selectively practiced. Final recall tests showed that the rehearsal effect was equivalent between the two risk conditions, but SSRIF was significantly larger in the high-risk than in the low-risk condition. Thus, the tendency to exaggerate consequences of news events was found to have deleterious consequences. © The Author(s) 2015.

  11. Understanding Information Sharing Among Scientists Through a Professional Online Community: Analyses on Interaction Patterns and Contents

    Directory of Open Access Journals (Sweden)

    Shin, Eun-Ja

    2017-12-01

    Full Text Available Even through many professional organizations increasingly use Q&A sites in their online communities for information sharing, there are few studies which examine what is really going on in the Q&A activities in professional online communities (POC. This study aims to examine the interaction patterns and contents posted in the Q&A site of a POC, KOSEN, a science and technology online community in South Korea, focusing on how actively scientific information and knowledge are shared. The interaction patterns among the participants were identified through social network analysis (SNA and the contents in the Q&As were examined by content analysis. The results show that the overall network indicated a moderate level of participation and connection and answerers especially tended to be active. Also, there are different interaction patterns depending on academic fields. Relatively few participants were posting leaders who seemed to steer the overall interactions. Furthermore, some content related to manipulation and explanation for experiments, which are in urgent need, seem to be posted in the sites more frequently with more amounts. Combining both SNA and content analysis, this study demonstrated how actively information and knowledge is shared and what types of contents are exchanged. The findings have practical implications for POC managers and practitioners.

  12. Global application of disorders of sex development-related electronic resources: e-learning, e-consultation and e-information sharing.

    Science.gov (United States)

    Muscarella, Miriam; Kranenburg-van Koppen, Laura; Grijpink-van den Biggelaar, Kalinka; Drop, Stenvert L S

    2014-01-01

    The past 20 years have seen proliferation of electronic (e) resources that promote improved understanding of disorders of sex development (DSD): e-learning for physicians and trainees, e-consultation between clinicians, and e-information for families and affected individuals. Recent e-learning advances have emerged from the European Society for Pediatric Endocrinology's online learning portal for current physicians and trainees. Developed with attention to developing clinical competencies incorporating learning theory, and presenting material that represents international best practice, this e-learning portal offers advances in training, making information more accessible for clinicians and trainees. Multiple levels of instruction, authentic case examples, collaborative forums for physicians and trainees, individualized feedback and user-friendly tools represent advances in trainee and physician learning that can take place in any location. e-consultation is an emerging tool that aims to connect physicians with specialists experienced in DSD care. Although it faces logistical challenges, e-consultation carries the potential to improve DSD care, especially in remote areas with limited access to DSD specialists. e-information for families and patients of all ages is widely accessible online, often with focus on DSD biology, medical care, and psychological and social support. e-information tools aid self-management and support of those affected by DSD. Efforts to improve these resources should aim to map information to individual users, incorporate optimally clear nomenclature, and continue as a 'shared enterprise' of clinicians, affected individuals, families and researchers. Improving the quality of DSD-related e-learning and e-information and developing e-consultation carries the potential to transform DSD care and support for patients, families and physicians worldwide. © 2014 S. Karger AG, Basel.

  13. Classification of Information Threats to Modern Society

    Directory of Open Access Journals (Sweden)

    А -АВ Таран

    2009-06-01

    One of the main problems in the struggle against criminality, including against cyber terrorism in the information society is that it is difficult to find the guilty person and estimate the scale of aftermaths of a crime. Thus, one can say that any state is not able to withstand by itself efficiently information terrorism and cyber terrorism, only efficient international cooperation is possible.

  14. Health implications of radiological terrorism: Perspectives from Israel

    Directory of Open Access Journals (Sweden)

    Hagby Moti

    2009-01-01

    simulated casualties that will follow the evacuation route from point zero to the ED. Knowledge and exercise will reduce terror (fear from radiation and help the community as a whole better cope with such an event. This article will review the general information of radiation types, their biological damage, clinical appearance and general concepts of nuclear event planning, focusing on medical response and focus on the Israeli perspective.

  15. Normative Bias and Adaptive Challenges: A Relational Approach to Coalitional Psychology and a Critique of Terror Management Theory

    Directory of Open Access Journals (Sweden)

    Carlos David Navarrete

    2005-01-01

    Full Text Available Adherence to ingroup ideology increases after exposure to death-related stimuli, a reaction that proponents of terror management theory (TMT explain as a psychological defense against the uniquely human existential fear of death. We argue that existential concerns are not the relevant issue; rather, such concepts can be subsumed under a larger category of adaptive challenges that prime coalitional thinking. We suggest that increases in adherence to ingroup ideology in response to adaptive challenges are manifestations of normative mental representations emanating from psychological systems designed to enhance coordination and membership in social groups. In providing an alternative to TMT, we (1 explain why the theory is inconsistent with contemporary evolutionary biology, (2 demonstrate that mortality-salience does not have the unique evocative powers ascribed to it by TMT advocates, and (3 discuss our approach to coalitional psychology, a framework consistent with modern evolutionary theory and informed by a broad understanding of cultural variation, can be employed to help account for both the corpus of results in TMT research and the growing body of findings inconsistent with TMT's predictions.

  16. The use of information technologies for knowledge sharing by secondary healthcare organisations in New Zealand.

    Science.gov (United States)

    Ali, Nor'ashikin; Whiddett, Dick; Tretiakov, Alexei; Hunter, Inga

    2012-07-01

    To explore the extent of use of information technologies (ITs) for knowledge sharing by secondary healthcare organisations in New Zealand. We used a self-administered questionnaire to survey Chief Information Officers at all 21 of New Zealand's District Health Boards regarding the extent to which their organisations use knowledge sharing activities involving ITs. The list of activities to include in the questionnaire was compiled by reviewing the literature. We analysed the extent of use of the knowledge sharing activities using descriptive statistics, repeated measures ANOVA, and correlation analysis. The response rate was 76%. Although all the responding organisations reported using ITs to share knowledge, they used ITs to share documents significantly more than to support discussions or to connect employees to experts. Discussions via teleconferencing, videoconferencing, and email lists were significantly more common than discussions via social media technologies: electronic discussion forums, blogs, and on-line chatrooms. There were significant positive correlations between publishing and accessing documents, between using teleconferencing and using videoconferencing, and between publishing and finding contact details of experts. New Zealand's District Health Boards are using a range of ITs to share knowledge. Knowledge sharing activities emphasising the sharing of explicit knowledge (via exchanging documents in electronic form) are significantly more common than knowledge sharing activities emphasising the sharing of tacit knowledge (via technology-mediated discussions and via using technology to connect employees to experts). In view of the evidence in the literature that information technology may be highly effective in supporting tacit knowledge exchanges, our results suggest that health organisations should consider greater adoption of ITs for sharing tacit knowledge. The finding that several organisations are currently making extensive use of

  17. Prior adversities predict posttraumatic stress reactions in adolescents following the Oslo Terror events 2011

    Directory of Open Access Journals (Sweden)

    Dag Ø. Nordanger

    2014-05-01

    Full Text Available Background: Former studies suggest that prior exposure to adverse experiences such as violence or sexual abuse increases vulnerability to posttraumatic stress reactions in victims of subsequent trauma. However, little is known about how such a history affects responses to terror in the general adolescent population. Objective: To explore the role of prior exposure to adverse experiences as risk factors for posttraumatic stress reactions to the Oslo Terror events. Method: We used data from 10,220 high school students in a large cross-sectional survey of adolescents in Norway that took place seven months after the Oslo Terror events. Prior exposure assessed was: direct exposure to violence, witnessing of violence, and unwanted sexual acts. We explored how these prior adversities interact with well-established risk factors such as proximity to the events, perceived life threat during the terror events, and gender. Results: All types of prior exposure as well as the other risk factors were associated with terror-related posttraumatic stress reactions. The effects of prior adversities were, although small, independent of adolescents’ proximity to the terror events. Among prior adversities, only the effect of direct exposure to violence was moderated by perceived life threat. Exposure to prior adversities increased the risk of posttraumatic stress reactions equally for both genders, but proximity to the terror events and perceived life threat increased the risk more in females. Conclusions: Terror events can have a more destabilizing impact on victims of prior adversities, independent of their level of exposure. The findings may be relevant to mental health workers and others providing post-trauma health care.

  18. The Politics of Terrorism: Power, Legitimacy, and Violence

    Directory of Open Access Journals (Sweden)

    Richard A. Couto

    2010-03-01

    Full Text Available This paper examines and juxtaposes discourses about terrorism, violence, and political leadership. It presents generalizations about terrorism—a form of political violence by, for, and against the state—and politics and violence based on the theories of Max Weber and Hannah Arendt. The stark contrasts drawn from these theories include power as non-violent strength (Arendt versus power as violence-dependent (Weber and the struggle for legitimacy between different agents (states and individuals as well as terrorism by, for, and against the state. This reframing of power leads to judging a lack of power where there is violence, and the presence of power where one observes non-violence. An examination of political and criminal violence leads to questions about deliberate and purposeful violence, indirect and structural violence that has political consequences, and their relationship to terrorism. It expands the application of terrorism to include indirect structural violence by indicating its relationship to direct violence, not only in traditionally-viewed terrorist action but in the ignored terror of, for example, inner cities. Terrorism has many forms by many actors. To synthesize the results of these lines of reasoning leads to a conclusion with considerable implications for politics and for political leadership. The politics of terrorism suggest a central counter-terrorist approach: de-politicizing the violence of terrorists whenever possible and using the authority and power of the state to institutionalize it as criminal violence. This, in turn, also means politicizing other forms of violence, such as capital punishment, and their indirect and structural forms, such as the inner city.

  19. 75 FR 72871 - Survey of Information Sharing Practices With Affiliates

    Science.gov (United States)

    2010-11-26

    ... minimize the burden of the information collection on respondents, including through the use of information... completed by financial institutions and other persons that are creditors or users of consumer reports. The Agencies will use the Survey responses to prepare a report to Congress on the information sharing practices...

  20. "I'm Not Really Afraid of Osama Bin Laden!" Fear of Terrorism in Dutch Children

    Science.gov (United States)

    Muris, Peter; Mayer, Birgit; van Eijk, Sandra; van Dongen, Marit

    2008-01-01

    We examined to what extent children in The Netherlands are affected by the threat of terrorism. For this purpose, a sample of school children living in Rotterdam or adjacent satellites (N = 216) completed a fear survey that included a number of terrorism-related items, and were confronted with ambiguous vignettes to measure threat-related…

  1. An Inter-Personal Information Sharing Model Based on Personalized Recommendations

    Science.gov (United States)

    Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji

    In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated

  2. How Does Electronic Health Information Exchange Affect Hospital Performance Efficiency? The Effects of Breadth and Depth of Information Sharing.

    Science.gov (United States)

    Cho, Na-Eun; Ke, Weiling; Atems, Bebonchu; Chang, Jongwha

    2018-01-01

    This research was motivated by the large investment in health information technology (IT) by hospitals and the inconsistent findings related to the effects of health IT adoption on hospital performance. Building on resource orchestration theory and the information systems literature, the authors developed a research model to investigate how the configuration strategies for sharing information under health IT systems affect hospital efficiency. The hypotheses were tested using data from the 2010 annual and IT surveys of the American Hospital Association, Centers for Medicare & Medicaid Services case mix index, and U.S. Census Bureau's small-area income and poverty estimates. The study revealed that in health IT systems, the breadth (extent) and depth (level of detail) of digital information sharing among stakeholders each has a curvilinear relationship with hospital efficiency. In addition, breadth and depth reinforce each other's positive effects and attenuate each other's negative effects, and their balance has a positive effect on hospital efficiency. The results of this research have the potential to enrich the literature on the value of adopting health IT systems as well as in providing practitioner guidelines for meaningful use.

  3. Risk sharing relations and enforcement mechanisms

    NARCIS (Netherlands)

    Barr, A.; Dekker, M.; Fafchamps, M.

    2008-01-01

    We investigate whether the set of available enforcement mechanisms affects the formation of risk sharing relations by applying dyadic regression analysis to data from a specifically designed behavioural experiment, two surveys and a genealogical mapping exercise. During the experiment participants

  4. A dynamical model of terrorism

    Directory of Open Access Journals (Sweden)

    Firdaus Udwadia

    2006-01-01

    Full Text Available This paper develops a dynamical model of terrorism. We consider the population in a given region as being made up of three primary components: terrorists, those susceptible to both terrorist and pacifist propaganda, and nonsusceptibles, or pacifists. The dynamical behavior of these three populations is studied using a model that incorporates the effects of both direct military/police intervention to reduce the terrorist population, and nonviolent, persuasive intervention to influence the susceptibles to become pacifists. The paper proposes a new paradigm for studying terrorism, and looks at the long-term dynamical evolution in time of these three population components when such interventions are carried out. Many important features—some intuitive, others not nearly so—of the nature of terrorism emerge from the dynamical model proposed, and they lead to several important policy implications for the management of terrorism. The different circumstances in which nonviolent intervention and/or military/police intervention may be beneficial, and the specific conditions under which each mode of intervention, or a combination of both, may be useful, are obtained. The novelty of the model presented herein is that it deals with the time evolution of terrorist activity. It appears to be one of the few models that can be tested, evaluated, and improved upon, through the use of actual field data.

  5. Creating the sustainable conditions for knowledge information sharing in virtual community.

    Science.gov (United States)

    Wang, Jiangtao; Yang, Jianmei; Chen, Quan; Tsai, Sang-Bing

    2016-01-01

    Encyclopedias are not a new platform for the distribution of knowledge, but they have recently drawn a great deal of attention in their online iteration. Peer production in particular has emerged as a new mode of providing information with value and offering competitive advantage in information production. Large numbers of volunteers actively share their knowledge by continuously editing articles in Baidu encyclopedias. Most articles in the online communities are the cumulative and integrated products of the contributions of many coauthors. Email-based surveys and objective data mining were here used to collect analytical data. Critical mass theory is here used to analyze the characteristics of these collective actions and to explain the emergence and sustainability of these actions in the Baidu Encyclopedia communities. These results show that, based on the collective action framework, the contributors group satisfied the two key characteristics that ensure the collective action of knowledge contribution will both take place and become self-sustaining. This analysis not only facilitates the identification of collective actions related to individuals sharing knowledge in virtual communities, but also can provide an insight for other similar virtual communities' management and development.

  6. Ownership as an Issue in Data and Information Sharing: a philosophically based review

    Directory of Open Access Journals (Sweden)

    Dennis Hart

    2002-11-01

    Full Text Available It has long been an aim of information management and information systems development to enable more effective and efficient data and information sharing within organisations. A commonplace assertion has been that data and information belong, or should belong, to the organisation as a whole as opposed to any individual or stakeholder within it. Nevertheless, despite the potential benefits of data and information sharing within organisations, efforts to achieve it have typically run into more difficulty than expected and have frequently been less successful than the technological capabilities would, at least prima facie, allow. This paper is based on the proposition that perceptions of ownership can have an important influence on data and information sharing behaviour, and explores philosophical theories of ownership and property with the aim of better understanding the origins of such behaviour. It is further proposed that what are here called “implicit” theories of information ownership on the part of different individuals or parties within an organisation can lead to varying perceptions as to who is the legitimate owner of particular data or information, and that this view is illuminating of the difficulties that have often been experienced in trying to achieve effective organisational data and information sharing.

  7. Alert but less alarmed: a pooled analysis of terrorism threat perception in Australia

    Directory of Open Access Journals (Sweden)

    Barr Margo

    2011-10-01

    Full Text Available Abstract Background Previous Australian research has highlighted disparities in community perceptions of the threat posed by terrorism. A study with a large sample size is needed to examine reported concerns and anticipated responses of community sub-groups and to determine their consistency with existing Australian and international findings. Methods Representative samples of New South Wales (NSW adults completed terrorism perception questions as part of computer assisted telephone interviews (CATI in 2007 (N = 2081 and 2010 (N = 2038. Responses were weighted against the NSW population. Data sets from the two surveys were pooled and multivariate multilevel analyses conducted to identify health and socio-demographic factors associated with higher perceived risk of terrorism and evacuation response intentions, and to examine changes over time. Results In comparison with 2007, Australians in 2010 were significantly more likely to believe that a terrorist attack would occur in Australia (Adjusted Odd Ratios (AOR = 1.24, 95%CI:1.06-1.45 but felt less concerned that they would be directly affected by such an incident (AOR = 0.65, 95%CI:0.55-0.75. Higher perceived risk of terrorism and related changes in living were associated with middle age, female gender, lower education and higher reported psychological distress. Australians of migrant background reported significantly lower likelihood of terrorism (AOR = 0.52, 95%CI:0.39-0.70 but significantly higher concern that they would be personally affected by such an incident (AOR = 1.57, 95%CI:1.21-2.04 and having made changes in the way they live due to this threat (AOR = 2.47, 95%CI:1.88-3.25. Willingness to evacuate homes and public places in response to potential incidents increased significantly between 2007 and 2010 (AOR = 1.53, 95%CI:1.33-1.76. Conclusion While an increased proportion of Australians believe that the national threat of terrorism remains high, concern about being personally affected

  8. Discussing Terrorism: A Pupil-Inspired Guide to UK Counter-Terrorism Policy Implementation in Religious Education Classrooms in England

    Science.gov (United States)

    Quartermaine, Angela

    2016-01-01

    My research into pupils' perceptions of terrorism and current UK counter-terrorism policy highlights the need for more detailed and accurate discussions about the implementation of the educational aims, in particular those laid out by the Prevent Strategy. Religious education (RE) in England is affected by these aims, specifically the challenging…

  9. Public Trust in Health Information Sharing: A Measure of System Trust.

    Science.gov (United States)

    Platt, Jodyn E; Jacobson, Peter D; Kardia, Sharon L R

    2018-04-01

    To measure public trust in a health information sharing in a broadly defined health system (system trust), inclusive of health care, public health, and research; to identify individual characteristics that predict system trust; and to consider these findings in the context of national health initiatives (e.g., learning health systems and precision medicine) that will expand the scope of data sharing. Survey data (n = 1,011) were collected in February 2014. We constructed a composite index of four dimensions of system trust-competency, fidelity, integrity, and trustworthiness. The index was used in linear regression evaluating demographic and psychosocial predictors of system trust. Data were collected by GfK Custom using a nationally representative sample and analyzed in Stata 13.0. Our findings suggest the public's trust may not meet the needs of health systems as they enter an era of expanded data sharing. We found that a majority of the U.S. public does not trust the organizations that have health information and share it (i.e., the health system) in one or more dimensions. Together, demographic and psychosocial factors accounted for ~18 percent of the observed variability in system trust. Future research should consider additional predictors of system trust such as knowledge, attitudes, and beliefs to inform policies and practices for health data sharing. © Health Research and Educational Trust.

  10. Protecting facilities against terrorism and sabotage. Is Jamaica prepared to deal with this potential threat?

    International Nuclear Information System (INIS)

    Powell, E.D.

    2001-01-01

    Full text: Jamaica, a developing Caribbean country, is presently experiencing an economic recession. This has lead to the government having considerable difficulty in acquiring much needed financing, even financing that is necessary to protect the county's resources and facilities from terrorist and sabotage. Essential national facilities include our international airports, embassies and High Commission, hospitals, utility plants - electricity, water and telecommunications, oil-refineries, government ministries, parliamentary houses and educational facilities. These facilities are vulnerable to terrorist attacks and sabotages. Terrorist acts and acts of sabotage can come from internal as well as external sources, they can be commandeered from the air, land or sea. They can be politically, socio-economically or otherwise motivated. As a third world developing nation, Jamaica does not have the capability or the resources necessary to secure all its assets, the government must prioritize on such resource allocation. With its high level of debt servicing, dealing with recurrent and capital expenditure and addressing other social issues, some important issues will be placed on the back burner, dealing with terrorism and sabotage will fall in the category. One contributing factor is the fact that to date the incidents of terrorism and sabotage have been few to non-existent. This has encouraged the government to become somewhat complacent, subscribing to the belief that acts of terrorism and sabotage will never happen. This practice can be detrimental to the country, as one cannot underestimate the threat of terrorism and sabotage. With the steady increase in drug related incidents and with the deportation agreement the government has with some first world countries such as the USA and England, this threat is very realistic. Drug 'Lords'/'Dons' are known to promote terrorism and sabotage as revenge mechanism against governments for unfavorable decision handed down by the

  11. Nuclear safety shall face the challenge given by terrorism

    International Nuclear Information System (INIS)

    Yang Mengzhuo

    2003-01-01

    A nuclear power plant is a large economic department that has an important bearing on the national economy and the people's livelihood as well as the science and technology progress, and it can lead to grave radioactive pollution for environment after being destroyed, thus it must be an important objective that terrorism hatches a raid. To combat and forestall terrorism well are new requirements to nuclear safety raised by the international and national situation progress. On the bases of internal and external whole relations, the severe damage to NPPs and the theory of grave radioactive pollution to environment can be caused by sabotage are discussed, and then put forward the proposals about the graded protective measures. (author)

  12. A Criminal Law Approach to Terrorism in Brazil

    Science.gov (United States)

    2014-12-01

    2 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram Como Age a Rede do Terror Islamico no Brasil” [Exclusive: Documents from CIA, FBI...exclusivo-documentos-da-cia-fbi-e-pf-mostram-como-age-a- rede - do-terror-islamico-no-brasil. 3 Ibid. 4 Brazilian Federal Government,” Legislacao/Lei 7170/83...60 Ibid. 61 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram como Age a Rede do Terror Islamico no Brasil.” April

  13. On the origin of domestic and international terrorism

    OpenAIRE

    Kis-Katos, Krisztina; Liebert, Helge; Schulze, Günther G.

    2010-01-01

    We analyze the determinants of the origin of domestic and international terrorism in a large panel data set of 159 countries spanning from 1970 to 2007. We show that terror increases with GDP per capita, a higher POLITY score measuring a more open and competitive political system and experiences of domestic conflict, anarchy and regime transitions. Our evidence thus contradicts the notion that terrorism is rooted in economic deprivation or that strongly autocratic regimes breed more terrorist...

  14. Sustainable Regulation of Information Sharing with Electronic Data Interchange by a Trust-Embedded Contract

    Directory of Open Access Journals (Sweden)

    Guanghua Han

    2017-06-01

    Full Text Available This paper studies the risks in demand information sharing applications by electronic soft-orders using electronic data interchange (EDI systems in e-commerce and aims to suggest a sustainable regulation mechanism with a trust-embedded contract. In a supply chain with one retailer and one supplier, the retailer solicits private forecasted demand and places soft-orders via EDI to the supplier. To ensure abundant supply, the retailer has an incentive to inflate her soft-orders, which potentially harms the credible information sharing and sustainability of business cooperation. Normally, the degree to which the supplier relies on the retailer’s order information is specified by trust, which is evaluated according to the retailer’s reputation and supplier’s intuition in this study. Based on standard game theory, we find that both the retailer’s order and the quantity of supplier prepared materials are independent of the retailer’s forecast. Therefore, EDI based information sharing in e-commerce without a regulation mechanism leads to inefficient demand information sharing. Since both the supplier and retailer are proved to faces huge of potential profit losses due to the failure of information sharing, the commerce by EDI based information sharing is full of risk and unsustainable. Therefore, a regulation mechanism that leaded by the retailer is proposed to establish ‘win-win’ sustainable cooperation. Numerical experiments highlight the value of trust, the impact of reputation and intuition in decisions, and the effectiveness of the regulation mechanism by a cost-sharing contract.

  15. On-site equipment and materials against CBRNE terrorism

    International Nuclear Information System (INIS)

    Yamamoto, Soichiro; Tokita, Kenichi

    2016-01-01

    There is no almighty field service equipment that can handle by itself all CBRNE (Chemical, Biological, Radiological, Nuclear, Explosive) terrorism. Since there is merit and demerit for each of equipment, operation methods and linkage of material/equipment based on detection principle are indispensable. This paper explained the principle and operation method of detection equipment, operation using multiple material/equipment, and system construction to facilitate cooperation with related ministries and agencies. There are six examples as typical material/equipment and detection principle for handling CBRNE as shown below: (1) ion mobility spectrometer, (2) infrared spectroscopy, (3) Raman scattering spectroscopy, (4) gas chromatographic mass spectrometry, (5) fluorescent reactive dye classification method, and (6) antigen antibody reaction method. This paper shows a flowchart that can measure within the duration of a respirator while wearing Level A protective clothing (about 15 to 20 min) by the combination of detector/analyzer based on these methods. The authors developed an information system that allows prompt information exchange between the on-site administrative agencies, research institutes, and other related organizations via network, in the case when substances etc. could not be specified in the above flowchart. (A.O.)

  16. BIOLOGICAL TERRORISM: THE NOTION, ESSENCE AND MAIN AREAS OF COUNTER

    Directory of Open Access Journals (Sweden)

    Julia Sarankina

    2016-10-01

    Full Text Available The article issued theoretical and practice problems of combating terrorism in current conditions, in particular, analyzes the concept of bio-terrorism as a form of terrorism, we investigate its nature, characteristics, and also referred to the major directions of countering.

  17. Security Guards and Counter-terrorism: Tourism and Gaps in Terrorism Prevention

    Directory of Open Access Journals (Sweden)

    Luke Howie

    2014-11-01

    Full Text Available Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terrorism preparedness exists. I argue that protecting tourism destinations is only possible if consideration is given the effectiveness of security guards and understanding that their well-being will impact upon their ability to deliver security. I want to draw attention to the often ignored social role of security guards. On 9/11, 42 security guards died whilst helping save the lives of thousands. They performed their jobs admirably, despite being low-paid, under-appreciated workers. In this paper I explore the social role of security guards in the context of tourism security. By drawing on representations of security guards in popular culture and reports on the state of the security guard industry. I argue that the lack of attention on the quality and well-being of guards is a significant black-spot in tourism security and terrorism preparedness.

  18. The human rights and the terrorism

    Directory of Open Access Journals (Sweden)

    Hamidreza Rafiei Fanood

    2016-12-01

    Full Text Available Regarding Human rights has been emphasized by governments through universal declaration human rights and its violations faced the global reaction in any case. From this perspective; the necessity of observing human rights against terrorism has been emphasized by many resolutions of the General Assembly, the Security Council and many regional resolutions. But, today especially after the September 11 events and America unilateral attacks by resorting to human rights and of course by considering the lack of international agreement on the norms, strategies and principles of human rights, the campaign against terrorism has started on the basis of its obligations, regardless to existing norms. So it would be said that today; the war against terrorism more than any other terrorist attacks threatens the security and human rights. However, human rights framework has never prevented effective and legitimate actions to the terrorist attacks. In other words; in the human right framework, there is no conflict with the campaign against terrorism, it emphasizes on identifying and fighting and even it guarantees the effectiveness of such a fight. As a result, Human rights violations at the expense of security, certainly associated with the destruction of both.

  19. Terrorism and anti-terror legislation - the terrorised legislator? A comparison of counter-terrorism legislation and its implications on human rights in the legal systems of the United Kingdom, Spain, Germany, and France

    NARCIS (Netherlands)

    Oehmichen, Anna

    2009-01-01

    The thesis deals with the history of terrorism and counter-terrorism legislation, focussing on the legislation in the UK, Spain, Germany and France, in the last 30 years, and analysing its compatibility with national and European human rights standards.

  20. 17 CFR 160.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-04-01

    ....12 Limits on sharing account number information for marketing purposes. (a) General prohibition on... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Limits on sharing account number information for marketing purposes. 160.12 Section 160.12 Commodity and Securities Exchanges...

  1. 75 FR 30106 - Terrorism Risk Insurance Program; Litigation Management Submissions

    Science.gov (United States)

    2010-05-28

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Litigation Management Submissions... U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program Office is seeking comments... or by mail (if hard copy, preferably an original and two copies) to: Terrorism Risk Insurance Program...

  2. 75 FR 58468 - Terrorism Risk Insurance Program; Program Loss Reporting

    Science.gov (United States)

    2010-09-24

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Program Loss Reporting AGENCY: Departmental Offices, Terrorism Risk Insurance Program Office, Treasury. ACTION: Notice and request for... 1995, Public Law 104-13 (44 U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program...

  3. Decomposing executive stock option exercises: relative information and incentives to manage earnings

    NARCIS (Netherlands)

    Veenman, D.; Hodgson, A.; van Praag, B.; Zhang, W.

    2011-01-01

    This paper examines the information content of stock option exercises versus regular insider share trades by corporate executives. We argue that the asymmetric payoff structure of options makes managerial wealth - compared to holdings of shares - relatively more sensitive to stock price changes and

  4. 76 FR 79114 - Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-Information Sharing Environment...

    Science.gov (United States)

    2011-12-21

    ...] Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-- Information Sharing Environment (ISE... titled, ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting (SAR... exempts portions of the ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting...

  5. Improbable Success: Risk Communication and the Terrorism Hazard

    Science.gov (United States)

    2010-03-01

    never aspired to be anything more than a bureaucratic construct partnered with the media. It has taken years to fully understand the unintended...terrorism plan. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP /(3273BD3F76A7A5DEDA E36942A54D7D90)~National+Counter-Terrorism+Plan+- +Alert+System...Australian Government National Security. (2009a). National Counter-Terrorism Alert System Fact Sheet. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP

  6. The Need for a United Nations Global Counter-Terrorism Coordinator

    Directory of Open Access Journals (Sweden)

    Howard Stoffer

    2013-08-01

    Full Text Available The case for a high level United Nations (UN Counter-Terrorism Coordinator position within the UN system has become increasingly urgent in 2013. This need has diluted some Member State reticence to creating a new Assistant Secretary-General position that would supervise and manage the existing counter-terrorism structures in the UN system. A Coordinator would have a basic responsibility to keep track of all of the activities of many formal inter-governmental organisations operating at the international, regional and sub-regional level and would also work closely with national counter-terrorism focal points. In this Policy Brief, Dr. Howard Stoffer reviews the debate among Security Council and Fifth Committee members about the efficacy of establishing a senior UN Global Counter-Terrorism Coordinator. He argues that the creation of such a position could lead to a restructuring of the UN counter-terrorism architecture as well as its funding within the UN budget and among donors. The position would eventually make the UN overall counter-terrorism effort, under the UN Global Counter-Terrorism Strategy, a stronger, more effective and more efficient process with measurable impact on the ground among Member States.

  7. Research on Visual Analysis Methods of Terrorism Events

    Science.gov (United States)

    Guo, Wenyue; Liu, Haiyan; Yu, Anzhu; Li, Jing

    2016-06-01

    Under the situation that terrorism events occur more and more frequency throughout the world, improving the response capability of social security incidents has become an important aspect to test governments govern ability. Visual analysis has become an important method of event analysing for its advantage of intuitive and effective. To analyse events' spatio-temporal distribution characteristics, correlations among event items and the development trend, terrorism event's spatio-temporal characteristics are discussed. Suitable event data table structure based on "5W" theory is designed. Then, six types of visual analysis are purposed, and how to use thematic map and statistical charts to realize visual analysis on terrorism events is studied. Finally, experiments have been carried out by using the data provided by Global Terrorism Database, and the results of experiments proves the availability of the methods.

  8. Development and validation of the coping with terror scale.

    Science.gov (United States)

    Stein, Nathan R; Schorr, Yonit; Litz, Brett T; King, Lynda A; King, Daniel W; Solomon, Zahava; Horesh, Danny

    2013-10-01

    Terrorism creates lingering anxiety about future attacks. In prior terror research, the conceptualization and measurement of coping behaviors were constrained by the use of existing coping scales that index reactions to daily hassles and demands. The authors created and validated the Coping with Terror Scale to fill the measurement gap. The authors emphasized content validity, leveraging the knowledge of terror experts and groups of Israelis. A multistep approach involved construct definition and item generation, trimming and refining the measure, exploring the factor structure underlying item responses, and garnering evidence for reliability and validity. The final scale comprised six factors that were generally consistent with the authors' original construct specifications. Scores on items linked to these factors demonstrate good reliability and validity. Future studies using the Coping with Terror Scale with other populations facing terrorist threats are needed to test its ability to predict resilience, functional impairment, and psychological distress.

  9. 78 FR 64145 - 30-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-10-25

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Chief Information... Title of Information Collection: Housing Finance Agency Risk- Sharing Program. OMB Approval Number: 2502... sharing with State and local housing finance agencies (HFAs). Under this program, HUD provides full...

  10. Information Sharing in the Field of Design Research

    Science.gov (United States)

    Pilerot, Ola

    2015-01-01

    Introduction: This paper reports on an extensive research project which aimed at exploring information sharing activities in a scholarly context. The paper presents and synthesises findings from a literature review and three qualitative case studies. The empirical setting is a geographically distributed Nordic network of design scholars. Method:…

  11. Shared "core" areas between the pain and other task-related networks.

    Directory of Open Access Journals (Sweden)

    Franco Cauda

    Full Text Available The idea of a 'pain matrix' specifically devoted to the processing of nociceptive inputs has been challenged. Alternative views now propose that the activity of the primary and secondary somatosensory cortices (SI, SII, the insula and cingulate cortex may be related to a basic defensive system through which significant potentially dangerous events for the body's integrity are detected. By reviewing the role of the SI, SII, the cingulate and the insular cortices in the perception of nociceptive and tactile stimuli, in attentional, emotional and reward tasks, and in interoception and memory, we found that all these task-related networks overlap in the dorsal anterior cingulate cortex, the anterior insula and the dorsal medial thalamus. A thorough analysis revealed that the 'pain-related' network shares important functional similarities with both somatomotor-somatosensory networks and emotional-interoceptive ones. We suggest that these shared areas constitute the central part of an adaptive control system involved in the processing and integration of salient information coming both from external and internal sources. These areas are activated in almost all fMRI tasks and have been indicated to play a pivotal role in switching between externally directed and internally directed brain networks.

  12. Sharing Law Enforcement and Intelligence Information: The Congressional Role

    National Research Council Canada - National Science Library

    Best Jr., Richard A

    2007-01-01

    Almost all assessments of the attacks of September 11, 2001, have concluded that U.S. intelligence and law enforcement agencies had failed to share information that might have provided advance warning of the plot...

  13. El cine de terror español

    OpenAIRE

    Gómez Llorente, Tatiana

    2015-01-01

    La autora comienza haciendo un estudio del cine de terror desde sus inicios, sus subgéneros, mecanimos utilizados para provocar el miedo en el espectador para finalmente centrarse en el cine de terror español a través de cinco películas representativas del género.

  14. Youth, Terrorism and Education: Britain's Prevent Programme

    Science.gov (United States)

    Thomas, Paul

    2016-01-01

    Since the 7/7 bombings of July 2005, Britain has experienced a domestic terror threat posed by a small minority of young Muslims. In response, Britain has initiated "Prevent," a preventative counter-terrorism programme. Building on previous, general critiques of Prevent, this article outlines and critically discusses the ways in which…

  15. Knowledge-Sharing Intention among Information Professionals in Nigeria: A Statistical Analysis

    Science.gov (United States)

    Tella, Adeyinka

    2016-01-01

    In this study, the researcher administered a survey and developed and tested a statistical model to examine the factors that determine the intention of information professionals in Nigeria to share knowledge with their colleagues. The result revealed correlations between the overall score for intending to share knowledge and other…

  16. Information-sharing tendency on Twitter and time evolution of tweeting

    Science.gov (United States)

    Kwon, H. W.; Kim, H. S.; Lee, K.; Choi, M. Y.

    2013-03-01

    While topics on Twitter may be categorized according to their predictability and sustainability, some topics have characteristics depending on the time scale. Here we propose a good measure for the transition of sustainability, which we call the information-sharing tendency, and find that the unpredictability on Twitter is provoked by the exposure of Twitter users to external environments, e.g., mass media and other social network services. In addition, it is demonstrated that the numbers of articles and comments on on-line newspapers serve as plausible measures of exposure. From such measures of exposure, the time evolution of tweeting can be described, when the information-sharing tendency is known.

  17. INTERFIRM COOPERATION AND INFORMATION SHARING THROUGH INTERLOCKING DIRECTORATES

    Directory of Open Access Journals (Sweden)

    Mohammed Belal UDDIN

    2012-01-01

    Full Text Available When firms engage in cooperative efforts, interfirm relations get particular interest to be studied. A direct interlock occurs when an executive or director of one firm sits on the board of another firm, and an indirect interlock occurs when two firms have directors or executives who sit on the board of a third firm. The three commonly used theoretical models such as social network theory, learning theory, and theory of strategic choice are more relevant for the formation and management of interlocking directorates. Uncertainty, resource scarcity, mutual trust, dependency, etc. influence the formation of interlocking directorates. Consequently, interlocking directorates allow sharing of information and overall cooperation between partners through learning, collaboration, networking, and effective relationship, etc. Proper management of interlocking directorates requires communication and collaboration among partners that enhance exchange of knowledge and cooperation.

  18. A Study of Terrorism Emergency Preparedness Policies in School Districts

    Science.gov (United States)

    Umoh, Emmanuel

    2013-01-01

    The threat of terrorism is a concern in public facilities including schools. This study focused on school districts in a southwestern state. Terrorism emergency preparedness policies are well-documented as measures to protect students and staff in school districts from terrorism threats and vulnerabilities. However, those threats and…

  19. 12 CFR 716.12 - Limits on sharing of account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Limits on sharing of account number information... REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 716.12 Limits on sharing of account number information for marketing purposes. (a) General prohibition on...

  20. Terrorism, civil war, one-sided violence and global burden of disease.

    Science.gov (United States)

    Kerridge, Bradley T; Khan, Maria R; Sapkota, Amir

    2012-01-01

    Armed conflict and related violence, including terrorism and one-sided violence, has profound effects on people's health and lives. The purpose of this study was to determine the relationship between deaths due to terrorism, civil war and one-sided violence from 1994-2000 and disability-adjusted life years (DALYs) occurring in 2002 attributable to all causes and specific communicable and noncommunicable diseases. Deaths resulting from terrorism, war and one-sided violence were positively associated with all cause as well as a number of communicable and noncommunicable disease-specific DALYs across the majority of sex and age subgroups of the populace, controlling for an array of economic factors empirically shown to affect public health. Overall, a 1.0% increase in deaths due to terrorism, civil war and one-sided violence from 1994-2000 was associated with a 0.16% increase in DALYs lost to all causes in 2002 in the total world population. There was little variation in the magnitude of these associations between males and females and between communicable and noncommunicable diseases. The results of the present study can begin to guide post-conflict recovery by focusing on interventions targeting both noncommunicable as well as communicable diseases, thereby highlighting the full health costs of war and ultimately providing a strong rationale for promoting peace.

  1. Modeling a Strategy for the War on Terrorism

    National Research Council Canada - National Science Library

    Henderson, Darral

    2002-01-01

    .... This paper discusses a strategy for conducting the war on terrorism in terms of a system and how that strategy must be adjusted over the long-term to compensate for fluctuating components of the war on terrorism...

  2. Nuclear terrorism

    International Nuclear Information System (INIS)

    2002-01-01

    Recent reports of alleged terrorist plans to build a 'dirty bomb' have heightened longstanding concerns about nuclear terrorism. This briefing outlines possible forms of attack, such as: detonation of a nuclear weapon; attacks involving radioactive materials; attacks on nuclear facilities. Legislation addressing these risks and the UK's strategy for coping with them are also considered

  3. Terrorism and poverty: double trouble for macroeconomic ...

    African Journals Online (AJOL)

    This article investigates poverty and terrorism as allies in hindering economic growth in African countries. This study uses data for 22 African countries from 1970 to 2013 i.e. 44 years. Data for terrorism, poverty and national income is taken from GTD and WDI. Panel cointegration techniques of dynamic fixed effect, mean ...

  4. Terrorism as a Social and Legal Phenomenon

    Science.gov (United States)

    Serebrennikova, Anna; Mashkova, Yekaterina

    2017-01-01

    This article examines the concept of terrorism as a social and legal phenomenon, its international legal and criminal-legal characteristics. Highlighted are the main aspects of cooperation of the states and the international community to counter terrorist activities. Terrorism as a social phenomenon is determined by paragraph 1 of article 3 of the…

  5. 30 CFR 280.73 - Will MMS share data and information with coastal States?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS share data and information with coastal States? 280.73 Section 280.73 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE... Data Requirements Protections § 280.73 Will MMS share data and information with coastal States? (a) We...

  6. Systems Approach to Terrorism: Countering the Terrorist Training Subsystem

    Science.gov (United States)

    2006-12-01

    37 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich, (Washington D.C.: Woodrow...52 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich (Washington D.C.: Woodrow Wilson Center...Hitler?” in Mass Hate: the Global Rise of Genocide and Terror (New York , London: Plennium Press), p.165 55 Albert Bandura p.45 56 Ibid. 32 As

  7. Knowledge sharing and innovation in relationships interorganizational type of information technology outsourcing

    OpenAIRE

    Roberta Rodrigues Faoro; Mírian Oliveira; Marcelo Faoro de Abreu

    2017-01-01

    Introduction: this paper presents an analysis of the sharing of knowledge and innovation in the inter-relationships of the type outsourcing of Information Technology. Objective: analyze the existence of relationship between knowledge sharing and innovation in the inter-relationships of the type of outsourcing information technology (IT). Methodology: research is exploratory, qualitative and using as a strategy the multiple case study, which analyzed 12 companies in IT outsourci...

  8. International Terrorism and Mental Health: Recent Research and Future Directions

    Science.gov (United States)

    Fischer, Peter; Ai, Amy L.

    2008-01-01

    International terrorism has become a major global concern. Several studies conducted in North America and Europe in the aftermath of terrorist attacks reveal that international terrorism represents a significant short-term and long-term threat to mental health. In the present article, the authors clarify the concept and categories of terrorism and…

  9. Making Sense of Information Sharing in E-Government Inter-Organizational Collaborations: A Malaysian Perspective

    Science.gov (United States)

    Harold, Dolly Amy

    2011-01-01

    Information sharing is a fundamental goal of information systems (IS). Yet information sharing, although critical and much acclaimed, is complex in terms of its concepts and implementation. How to leverage this phenomenon while implementing an IS is discussed at length in the literature. Both academics and practitioners in IS are striving to…

  10. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  11. Research on Cost Information Sharing and Channel Choice in a Dual-Channel Supply Chain

    Directory of Open Access Journals (Sweden)

    Huihui Liu

    2016-01-01

    Full Text Available Many studies examine information sharing in an uncertain demand environment in a supply chain. However there is little literature on cost information sharing in a dual-channel structure consisting of a retail channel and a direct sales channel. Assuming that the retail sale cost and direct sale cost are random variables with a general distribution, the paper investigates the retailer’s choice on cost information sharing in a Bertrand competition model. Based on the equilibrium outcome of information sharing, the manufacturer’s channel choice is discussed in detail. Our paper provides several interesting conclusions. In both single- and dual-channel structures, the retailer has little motivation to share its private cost information which is verified to be valuable for the manufacturer. When the cost correlation between the two channels increases, our analyses show that the manufacturer’s profit improves. However, when channel choice is involved, the value of information could play a different role. The paper finds that a dual-channel structure can benefit the manufacturer only when the cost correlation is sufficiently low. In addition, if the cost correlation is weak, the cost fluctuation will bring out the advantage of a dual-channel structure and adding a new direct channel will help in risk pooling.

  12. ADDRESSING THE SPECTRE OF CYBER TERRORISM: A COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2012-08-01

    Full Text Available This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.

  13. Education in petrochemical industry as prevention from chemical terrorism

    International Nuclear Information System (INIS)

    Mesaric, B.; Habek, R.; Loncarevic, M.

    2009-01-01

    Technical and technological accidents in petrochemical industry, with possible catastrophic consequences, caused by anthropogenic activity (technical or technological malfunction, terror, or war destruction ), usually accompanied by great human losses and material damage and high intensity of events in a relatively short period of time, which requires a quick action of emergency responders, process personnel and the high degree of self-organized endangered population for treatment in these kind of accidents. This implies a high qualification and skills for the treatment of accidents of all factors of rescue and protection such as: process personnel, emergency responders (fire-fighters, technical services), other workers as well as the endangered population. Managing the system of protection and rescue in communities with such risks requires maximum responsibility of local authorities and management of petrochemical plants. Petrokemija Kutina, with its many years of experience as a target for military and terrorist attacks, actively participated in the creation of laws and systems of protection and rescue in the Republic of Croatia, and also in creating standard operating procedures on local and regional level, and is also ready to share its own experiences with other similar factories using toxic substances in the production processes.(author)

  14. Reframing domestic violence as torture or terrorism

    Directory of Open Access Journals (Sweden)

    Marcus Isabel

    2014-01-01

    Full Text Available This paper focuses on the analysis of the phenomenon of domestic violence and the distinctive features for which is it may be recognized as a specific form of torture and/or terrorism at home. The author provides an overview of the scientific debate among feminist authors on this conception which has given rise to an innovative approach to understanding the concept of domestic violence. Underscoring the substantive similarity of domestic violence with the acts of torture and/or terrorism, the author urges for state action arguing that domestic violence as a form of gender-based violence should be approached by applying the same logic and strategies which are employed in response to traditional torture and terrorism.

  15. IAEA Director General welcomes landmark convention to combat nuclear terrorism

    International Nuclear Information System (INIS)

    2005-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the adoption of an International convention against nuclear terrorism. 'This is a landmark achievement which will bolster global efforts to combat nuclear terrorism,' Dr. ElBaradei said. 'It will be a key part of international efforts to prevent terrorists from gaining access to nuclear weapons'. The United Nations General Assembly adopted the convention, The International Convention for the Suppression of Acts of Nuclear Terrorism, on 13 April 2005. The Convention strengthens the global legal framework to counter terrorist threats. Based on a proposal by the Russian Federation in 1998, the Convention focuses on criminal offences related to nuclear terrorism and covers a broad range of possible targets, including nuclear reactors as well as nuclear material and radioactive substances. Under its provisions, alleged offenders - for example any individual or group that unlawfully and intentionally possesses or uses radioactive material with the intent to cause harm - must be either extradited or prosecuted. States are also encouraged to cooperate with each other in connection with criminal investigations and extradition proceedings. The Convention further requires that any seized nuclear or radiological material be held in accordance with IAEA safeguards, and handled in keeping with the IAEA's health, safety and physical protection standards. Dr. ElBaradei also recalled that the Agency is in the process of amending the Convention on the Physical Protection of Nuclear Material, in order to broaden its scope, and in so doing, strengthen the current legal framework for securing nuclear material against illicit uses. A conference will be held from 4 to 8 July in Vienna to consider and adopt the amendments. The Convention opens for signature in September this year. Dr ElBaradei urged all States to 'sign and ratify the Convention without delay so nuclear terrorism will have no chance'. (IAEA)

  16. 76 FR 4750 - Survey of Information Sharing Practices With Affiliates

    Science.gov (United States)

    2011-01-26

    ... information by means of a Survey to be completed by financial institutions and other persons that are creditors or users of consumer reports. The OTS will use the Survey responses to prepare a report to Congress on the information sharing practices by financial institutions, creditors, or users of consumer...

  17. 75 FR 75725 - Survey of Information Sharing Practices With Affiliates

    Science.gov (United States)

    2010-12-06

    ... to minimize the burden of the information collection on respondents, including through the use of... by financial institutions and other persons that are creditors or users of consumer reports. The OTS will use the Survey responses to prepare a report to Congress on the information sharing practices by...

  18. Sharing for Health: A Study of Chinese Adolescents' Experiences and Perspectives on Using Social Network Sites to Share Health Information.

    Science.gov (United States)

    Zhang, Ni; Teti, Michele; Stanfield, Kellie; Campo, Shelly

    2017-07-01

    This exploratory qualitative study examines Chinese adolescents' health information sharing habits on social network sites. Ten focus group meetings with 76 adolescents, ages 12 to 17 years, were conducted at community-based organizations in Chicago's Chinatown. The research team transcribed the recording and analyzed the transcripts using ATLAS.ti. Chinese adolescents are using different social network sites for various topics of health information including food, physical activity, and so on. Adolescents would share useful and/or interesting health information. Many adolescents raised credibility concerns regarding health information and suggested evaluating the information based on self-experience or intuition, word-of-mouth, or information online. The findings shed lights on future intervention using social network sites to promote health among Chinese adolescents in the United States. Future interventions should provide adolescents with interesting and culturally sensitive health information and educate them to critically evaluate health information on social network sites.

  19. Technical considerations in nuclear terrorism

    International Nuclear Information System (INIS)

    Velardo, G.

    2007-01-01

    Nuclear terrorism is an evil application of nuclear energy, in the same way that chemical and biological terrorism could be considered as the evil side of chemistry and biology. This paper presents two effects of nuclear terrorism. First, dirty bombs or radioactive bombs or radiological dispersion devices (RDDs), and second, crude atom bombs or improvised nuclear devices (INDs). The paper analyses as well the probabilities of an attack, its biological effects and nuclear risk. Experiments carried out so far indicate that the lethal effects produced by RDDs are likely the same that the effects produced by the chemical explosive used in the bomb. These type of bombs are rather bounded to generate panic and have implicit a high cost of decontamination. It will be described the measures to be adopted. INDs will be also considered. Uranium INDs by gun-method are more feasible to be made. They can be disassembled and their components transported to the target place. Plutonium INDs by the implosion-method are complex and required high precision technology. Their disassembly is very difficult

  20. Lessons from History for Counter- Terrorism Strategic Communications

    NARCIS (Netherlands)

    Ingram, H.J.; Reed, A.G.

    2016-01-01

    Drawing on the Counter-terrorism Strategic Communication (CTSC) Project’s research paper “A Brief History of Propaganda during Conflict“, this Policy Brief lays out the key policy-relevant lessons for developing effective counter-terrorism strategic communications. It presents a framework of