نتایج جستجو برای: counter terrorist
تعداد نتایج: 45045 فیلتر نتایج به سال:
A major concern in coalition peace-support operations is the incidence of terrorist activity. In this paper, we propose a generative model for the occurrence of the terrorist incidents, and illustrate that an increase in diversity, as measured by the number of different social groups to which that an individual belongs, is inversely correlated with the likelihood of a terrorist incident in the ...
We describe a quantitative methodology to characterize the vulnerability of U.S. urban centers to terrorist attack, using a place-based vulnerability index and a database of terrorist incidents and related human casualties. Via generalized linear statistical models, we study the relationships between vulnerability and terrorist events, and find that our place-based vulnerability metric signific...
Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorists’ attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow extraction of netwo...
I study how a variety of structural and strategic factors affect terroristmobilization, the likelihood of a splinter faction forming, and the positions adopted by terrorist leaders. The factors considered include the state of the economy, the viability of institutions for the nonviolent expression of grievance, the ability of the factional leaders to provide nonideological benefits, and the ris...
The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and their sympathizers have found a cost-effective resource to advance their courses by posting high-impact Websites with short shelf-lives. Because of their evanescent nature, terrorism research communities require unrestrained access ...
I present a model of the interaction between a government, a terrorist organization, and potential terrorist volunteers in which, as a result of an endogenous choice, individuals with low ability or little education are most likely to volunteer to join the terrorist organization. However, the terrorist organization screens the volunteers for quality. Consequently, the model is consistent with t...
The capture of power by the Taliban in Afghanistan has changed regional landscape and created new concerns. Some them are related to a possibility strengthening transnational terrorist organizations country. Others generated fear radical Islamism spreading guise or others its ilk. Meanwhile, various Islamist that resort “hard power” (armed violence, methods, etc.) their practices destabilizing ...
This paper studies the deterrent e↵ect of criminal enforcement on white-collar criminal activities. Using the 9/11 terrorist attacks as a shock to the FBI’s allocation of investigative resources and priorities, and variations in the Muslim population in the United States as a measure of geographic variations in the shock, I examine two questions: (1) Does the bureau’s shift to counter-terrorism...
Abstract Over the past few years, a number of major terrorist attacks have been accompanied by uploading detailed, online manifestos, which chart and publicise ideologies, motivations tactical choices in backdrop dehumanized foe. Such manifestos can also act as inspiration for potential copycats group-think style supporters within an insulated network. However types conclusions that be drawn fr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید