Strategic Significance of Pakistan’s Counter Terrorism Efforts Since 2014
نویسندگان
چکیده
منابع مشابه
Strategic Analysis of Terrorism
Two areas that are increasingly studied in the game-theoretic literature on terrorism and counterterrorism are collective action and asymmetric information. One contribution of this chapter is a survey and extension of continuous policy models with differentiable payoff functions. In this way, policies can be characterized as strategic substitutes (e. g., proactive measures), or strategic compl...
متن کاملData Mining for Counter-Terrorism
Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...
متن کاملThe Strategic Implications of Terrorism
and terrorism is generally used to try to influence political behaviour in some way: for example to force opponents into conceding some or all of the perpetrators demands, to provoke an over-reaction, to serve as a catalyst for a more general conflict or to publicise a political or religious cause, to inspire followers to emulate violent attacks, to give vent to deep hatred and the thirst for r...
متن کاملThe Jurisprudential Foundations of the Fight against Terrorism and Iran's Efforts in this Regard
Terrorism is an act whose nature and outcome is violence and fear. Regardless of the different forms of the realization of this act in the past, it has taken new forms in the contemporary era due to the advancement of sciences and technologies. To face this phenomenon, then, it is necessary to foresee and apply appropriate and favorable measures. As a victim of internal and external terrorism, ...
متن کاملA Neural Network for Counter-Terrorism
This article presents findings concerned with the use of neural networks in the identification of deceptive behaviour. A game designed by psychologists and criminologists was used for the generation of data used to test the appropriateness of different AI techniques in the quest for counter-terrorism. A feed forward back propagation network was developed and subsequent neural network experiment...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Global Regional Review
سال: 2018
ISSN: 2616-955X,2663-7030
DOI: 10.31703/grr.2018(iii-i).10