46 resultados para counter terrorism
Resumo:
This paper analyses tendencies in debates about cultural representations of terrorism to assume that artists make critical interventions, while the mass media circulates stereotypes. Some recent feminist analyses of female terrorist acts have re-instituted essentialist arguments in which violence and terrorism is described as inherently masculine, while women are by nature pacifist, so that femininity is the antithesis of militarism. More progressive analyses mostly tend to expose the circulation of stereotypes and their gender bias, in order to protest the misrepresentation of women in violence. These analyses do not construct alternative accounts. Through an analysis of two works by artists Hito Steyerl and Sharon Hayes, the paper argues that some of the moves to re-image the question of women, violence and agency have already been made in contemporary art practices. Through analysing legacies of terrorism and feminism, it becomes possible to rethink the question of agency, militancy and the nature of political art. The paper appears in an edited interdiscplinary collection arising from a conference at Universität der Bundeswehr in Munich. It relates to wider projects involving collaborations with Birkbeck and Edinburgh on representations of terrorism and on violence and contemporary art.
Resumo:
The purpose of the paper is to analyse different narratives about al Qaeda (AQ) in Terrorism Studies, and to demonstrate the methodological and empirical problems associated with them. It demonstrates that AQ as it emerges within Terrorism Studies is more of an artefact of preconceived notions about fundamentalist ideology than the result of rigid empirical research.
Resumo:
In 'Avalanche', an object is lowered, players staying in contact throughout. Normally the task is easily accomplished. However, with larger groups counter-intuitive behaviours appear. The paper proposes a formal theory for the underlying causal mechanisms. The aim is to not only provide an explicit, testable hypothesis for the source of the observed modes of behaviour-but also to exemplify the contribution that formal theory building can make to understanding complex social phenomena. Mapping reveals the importance of geometry to the Avalanche game; each player has a pair of balancing loops, one involved in lowering the object, the other ensuring contact. For more players, sets of balancing loops interact and these can allow dominance by reinforcing loops, causing the system to chase upwards towards an ever-increasing goal. However, a series of other effects concerning human physiology and behaviour (HPB) is posited as playing a role. The hypothesis is therefore rigorously tested using simulation. For simplicity a 'One Degree of Freedom' case is examined, allowing all of the effects to be included whilst rendering the analysis more transparent. Formulation and experimentation with the model gives insight into the behaviours. Multi-dimensional rate/level analysis indicates that there is only a narrow region in which the system is able to move downwards. Model runs reproduce the single 'desired' mode of behaviour and all three of the observed 'problematic' ones. Sensitivity analysis gives further insight into the system's modes and their causes. Behaviour is seen to arise only when the geometric effects apply (number of players greater than degrees of freedom of object) in combination with a range of HPB effects. An analogy exists between the co-operative behaviour required here and various examples: conflicting strategic objectives in organizations; Prisoners' Dilemma and integrated bargaining situations. Additionally, the game may be relatable in more direct algebraic terms to situations involving companies in which the resulting behaviours are mediated by market regulations. Finally, comment is offered on the inadequacy of some forms of theory building and the case is made for formal theory building involving the use of models, analysis and plausible explanations to create deep understanding of social phenomena.
Resumo:
This paper provides a comparative study of the performance of cross-flow and counter-flow M-cycle heat exchangers for dew point cooling. It is recognised that evaporative cooling systems offer a low energy alternative to conventional air conditioning units. Recently emerged dew point cooling, as the renovated evaporative cooling configuration, is claimed to have much higher cooling output over the conventional evaporative modes owing to use of the M-cycle heat exchangers. Cross-flow and counter-flow heat exchangers, as the available structures for M-cycle dew point cooling processing, were theoretically and experimentally investigated to identify the difference in cooling effectiveness of both under the parallel structural/operational conditions, optimise the geometrical sizes of the exchangers and suggest their favourite operational conditions. Through development of a dedicated computer model and case-by-case experimental testing and validation, a parametric study of the cooling performance of the counter-flow and cross-flow heat exchangers was carried out. The results showed the counter-flow exchanger offered greater (around 20% higher) cooling capacity, as well as greater (15%–23% higher) dew-point and wet-bulb effectiveness when equal in physical size and under the same operating conditions. The cross-flow system, however, had a greater (10% higher) Energy Efficiency (COP). As the increased cooling effectiveness will lead to reduced air volume flow rate, smaller system size and lower cost, whilst the size and cost are the inherent barriers for use of dew point cooling as the alternation of the conventional cooling systems, the counter-flow system is considered to offer practical advantages over the cross-flow system that would aid the uptake of this low energy cooling alternative. In line with increased global demand for energy in cooling of building, largely by economic booming of emerging developing nations and recognised global warming, the research results will be of significant importance in terms of promoting deployment of the low energy dew point cooling system, helping reduction of energy use in cooling of buildings and cut of the associated carbon emission.
Resumo:
That adult and child language acquisitions differ in route and outcome is observable. Notwithstanding, there is controversy as to what this observation means for the Critical Period Hypothesis’ (CPH) application to adult second language acquisition (SLA). As most versions of the CPH applied to SLA claim that differences result from maturational effects on in-born linguistic mechanisms, the CPH has many implications that are amendable to empirical investigation. To date, there is no shortage of literature claiming that the CPH applies or does not apply to normal adult SLA. Herein, I provide an epistemological discussion on the conceptual usefulness of the CPH in SLA (cf. Singleton 2005) coupled with a review of Long's (2005) evaluation of much available relevant research. Crucially, I review studies that Long did not consider and conclude differently that there is no critical/sensitive period for L2 syntactic and semantic acquisition.
Resumo:
Atmospheric profiles of cosmic rays and radioactivity can be obtained using adapted meteorologi- cal radiosondes, for which Geiger tubes remain widely used detectors. Simultaneous triggering of two tubes provides an indication of energetic events. As, however, only small volume detectors can be carried, the event rate is small, which, due to the rapid balloon ascent, cannot be circumvented using long averaging periods. To derive count rates at low altitudes, a microcontroller is used to de- termine the inter-event time. This yields estimates of the coincidence rate below 5 km, where the coincidence rate is too small to determine solely by event counting
Resumo:
Terrorism can strengthen or weaken electoral support for ruling governments. We show in a simple model of coalition formation that, regardless of the direction of a public opinion shock, the impact of terrorism on cabinet duration is ambiguous. However, in an analysis of a data set including 2,400 cabinets in over 150 countries in the period 1970–2002, we find that terrorism, on average, shortens cabinet duration. This result is robust for a range of alternative terror measures and is present in both democratic as well as autocratic political regimes.
Resumo:
Using panel data for 111 countries over the period 1982–2002, we employ two indexes that cover a wide range of human rights to empirically analyze whether and to what extent terrorism affects human rights. According to our results,terrorism significantly, but not dramatically, diminishes governments’ respect for basic human rights such as the absence of extrajudicial killings, political imprisonment, and torture. The result is robust to how we measure terrorist attacks, to the method of estimation, and to the choice of countries in our sample. However, we find no effect of terrorism on empowerment rights.
Resumo:
What are the main causes of international terrorism? Despite the meticulous examination of various candidate explanations, existing estimates still diverge in sign, size, and significance. This article puts forward a novel explanation and supporting evidence. We argue that domestic political instability provides the learning environment needed to successfully execute international terror attacks. Using a yearly panel of 123 countries over 1973–2003, we find that the occurrence of civil wars increases fatalities and the number of international terrorist acts by 45%. These results hold for alternative indicators of political instability, estimators, subsamples, subperiods, and accounting for competing explanations.
Resumo:
We examine the relationship between terrorism and electoral accountability. We find that terror has a robust positive effect on the probability that the incumbent government is replaced. The magnitude of the effect increases with the severity of the terrorist attack.
Resumo:
Automated border control (ABC) is concerned with fast and secure processing for intelligence-led identification. The FastPass project aims to build a harmonised, modular reference system for future European ABC. When biometrics is taken on board as identity, spoofing attacks become a concern. This paper presents current research in algorithm development for counter-spoofing attacks in biometrics. Focussing on three biometric traits, face, fingerprint, and iris, it examines possible types of spoofing attacks, and reviews existing algorithms reported in relevant academic papers in the area of countering measures to biometric spoofing attacks. It indicates that the new developing trend is fusion of multiple biometrics against spoofing attacks.