نتایج جستجو برای: anti terrorist strategies
تعداد نتایج: 744058 فیلتر نتایج به سال:
Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both expe...
After the terrorist attack on September 11, 2001 in U.S., the container security issue got high attention, especially by U.S. government, which deployed a lot of measures to promote or improve security systems. U.S. government not only enhances its national security system, but allies with other countries against the potential terrorist attacks in the future. For example CSI (Container Security...
It is now widely understood that extremists use the Internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the Terrorism and Extremism Network Extractor (TENE), designed to gather information about extremist activities on the Internet. In particular, this chapter will focus on how TENE may help differentiate terrorist websites from anti-terr...
Recent terrorist attacks demonstrated that even sophisticated terrorists capable of planning and executing multiple, coordinated attacks continue to rely on traditional weapons rather than risk the uncertainty of chemical, biological, radiological or nuclear (CBRN) weapons. While some terrorist organizations have the motivations and capabilities to conduct large attacks worldwide, we have not y...
To achieve overall business goals, GQM+Strategies® is an approach that aligns the business goals at each level of an organization to strategies and assesses the achievement of goals. Strategies derived from business goals are based on rationales (context factors and assumptions). Because extracting all rationales is an important process in the GQM+Strategies approach, we propose Context-Assumpt...
Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure, This paper describes simulation experime...
Terrorism is defined by the Federal Bureau of Investigation (FBI) as “ the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives” (1). Since the terrorist attacks that occurred in the United States on September 11, 2001, attempts have been made to devel...
Conservation tillage (CT) systems have a number of potential benefits including lower crop production costs and the ability to reduce soil erosion that have made them common in several regions of the world. Although CT systems have been researched and successfully implemented on some farms in California's San Joaquin Valley (SJV), overall adoption is low and the reasons for the region's compara...
Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist goals. Among the countless cyber-terrorist cases and scenarios of only this last decade, the paper discusses four cyber-terrorism cases tha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید