نتایج جستجو برای: counter terrorism
تعداد نتایج: 46496 فیلتر نتایج به سال:
BACKGROUND Chemical, biological, radiological and nuclear terrorism poses considerable threat throughout the world. AIM To provide occupational physicians with an understanding of this threat and its main forms and what action can be taken to counter this threat. METHODS Presenters at a conference on chemical, biological, radiological and nuclear terrorism were asked to contribute their evi...
Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a more quantitative and integrated understanding, we constructed a simple dynamic model where equations describe how these processes change an o...
Damascus Station: A NovelDavid McCloskey. New York: W. Norton & Co., 2021. $27.95. 419 pp.The Happy Traitor: Spies, Lies and Exile in Russia – The Extraordinary Story of George BlakeSimon Kuper. London: Profile Books, £14.99. 270 pp.Errand into the Wilderness Mirrors: Religion History CIAMichael Graziano. Chicago, IL: University Chicago Press, $45.00. 251 pp.Hate Homeland: Global Far RightCynth...
in the 21st century, distinctions and boundaries between global health, international politics, and the broader interests of the global community are harder to define and enforce than ever before. as a result, global health workers, leaders, and institutions face pressing questions around the nature and extent of their involvement with non-health endeavors, including international conflict reso...
Abstract Privacy is an important moral right but so security, including security from terrorist attacks. Encryption protects privacy rights also affords protection to terrorists and impedes legitimate counter-terrorist operations. This chapter analyses this ethical dilemma.
Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید