Counter-Terrorism, Technology and Transparency: Reconsidering State Accountability

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transparency and accountability

EMBO Molecular Medicine is enriched by a number of innovative policies designed to enhance the editorial process: peer review process files, de-emphasis of confidential referee comments and cross-refereeing.

متن کامل

Rules transparency and political accountability

Rules of allocation and redistribution in the public sector are often less contingent on available information than normative theory would suggest. This paper offers a political economy explanation. Under different rules, even if the observable outcomes of policies remain the same, the informational content which can be extracted by these observations is different. Less contingent rules allow c...

متن کامل

Accountability, Transparency, and Inßation Targeting

Inßation targeting regimes deÞne a performance measure for the central bank. A regime that places a large (small) weight on achieivng the target is analogous to a high (low) power incentive scheme. High powered incentive structures promote accountability but may distort stabilization policy. The optimal power under inßation targeting is derived under perfect and imperfect information. The funda...

متن کامل

Accounting , Accountability , Closeness and Transparency

[The] understanding which is relevant to the sciences of man is something more than this implicit grasp on things. It is related rather to the kind of understanding we invoke in personal relations when we say, for instance: ‘I find him hard to understand’; or at last I understand her’. To switch for a minute to another language, it is the kind of understanding one invokes in French when one say...

متن کامل

Data Mining for Counter-Terrorism

Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Terrorism and Counter-Terrorism Studies

سال: 2012

ISSN: 2468-0664

DOI: 10.19165/2012.1.01