933 resultados para Terrorist attacks


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Japan is an important ally of the United States–the world’s third biggest economy, and one of the regional great powers in Asia. Making sense of Japan’s foreign and security policies is crucial for the future of peace and stability in Northeast Asia, where the possible sources of conflict such as territorial disputes or the disputes over Japan’s war legacy issues are observed.^ This dissertation explored Japan’s foreign and security policies based on Japan’s identities and unconscious ideologies. It employed an analysis of selected Japanese films from the late 1940s to the late 1950s, as well as from the late 1990s to the mid-2000s. The analysis demonstrated that Japan’s foreign and security policies could be understood in terms of a broader social narrative that was visible in Japanese popular cultural products, including films and literatures. Narratives of Japanese families from the patriarch’s point of view, for example, had constantly shaped Japan’s foreign and security policies. As a result, the world was ordered hierarchically in the eyes of the Japan Self. In the 1950s, Japan tenaciously constructed close but asymmetrical security relations with the U.S. in which Japan willingly subjugated itself to the U.S. In the 2000s, Japan again constructed close relations with the U.S. by doing its best to support American responses to the 9/11 terrorist attacks by mobilizing Japan’s SDFs in the way Japan had never done in the past.^ The concepts of identity and unconscious ideology are helpful in understanding how Japan’s own understanding of self, of others, and of the world have shaped its own behaviors. These concepts also enable Japan to reevaluate its own behaviors reflexively, which departs from existing alternative approaches. This study provided a critical analytical explanation of the dynamics at work in Japan’s sense of identity, particularly with regard to its foreign and security policies.^

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This qualitative study charts the lived narratives of twelve participants, six teachers and six students from urban and rural Victoria, Australia. The study examines in detail the question ‘How do teachers teach, post 9/11?’. 9/11 has become accepted shorthand for September 11th 2001, in which terrorist attacks took place in the United States of America. The attacks heralded a ‘post- 9/11 world, [in which] threats are defined more by the fault lines within societies than by the territorial boundaries between them’ (National Commission on Terrorist Attacks, 2011, p. 361). The study is embedded in the values that have come to the fore in the wake of the 9/11 attacks and the ideological shifts that have occurred globally. These values and ideologies are reflected via issues of culture and consumption. In education this is particularly visible through pedagogy. The research employs a multimethodological (Esteban-Guitart, 2012) form of inquiry through the use of bricolage (Kincheloe & Berry, 2004) which is comprised at the intersectional points of critical pedagogy (Kincheloe, 2008b), public pedagogy (Sandlin, Schultz, & Burdick, 2010b) and cultural studies (Hall, Hobson, Lowe, & Willis, 1992). This study adopts a critical ontological perspective, and is grounded in qualitative research approaches (Lather & St. Pierre, 2013). The methods of photo elicitation, artefact analysis, video observation and semi-structured interviews are used to critically examine the ways in which teacher and student identities are shaped by the pedagogies of contemporary schooling, and how they form common sense understandings of the world and themselves, charting possibilities between accepted common sense beliefs and 21st century neoliberal capitalism. The research is presented through a prototypical form of literary journalism and intertextuality which examines the interrelationship between teaching and social worlds exposing the hidden influence of enculturation and addressing the question ‘How do teachers teach, post 9/11?’

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Goncalo de Melo Bandeira Counter-Terrorism, State of Emergency and Human Rights. In the global cities, the fight against terrorism is a way forward. Prevention of terrorism is another possible way. There are legal systems where the prevailing idea is combating terrorism. Fight, because is possible: life imprisonment or informal death penalty or even torture. While other jurisdictions only follow the prevention of terrorist crime: the retribution and positive general prevention and the resocialization. There may be extreme cases also in restorative justice. The recent terrorist attacks in Paris on 11.13.2015 have shown to the different types of police several problems. Some of those are: the declaration of State of emergency and the consequent restriction of human rights as the privacy of human communication or the liberty of travel by local city citizens or foreign citizens or the public entertainment shows, the problem of money laundering and the restriction of the business as usual, the vicious circle of more isolation from some urban communities, v.g. muslims, and other citizens also; and, brevitatis causa, the criminological problem of the causes and consequences of terrorism.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Esta investigación analiza el impacto del Programa de Alimentación Escolar en el trabajo infantil en Colombia a través de varias técnicas de evaluación de impacto que incluyen emparejamiento simple, emparejamiento genético y emparejamiento con reducción de sesgo. En particular, se encuentra que este programa disminuye la probabilidad de que los escolares trabajen alrededor de un 4%. Además, se explora que el trabajo infantil se reduce gracias a que el programa aumenta la seguridad alimentaria, lo que consecuentemente cambia las decisiones de los hogares y anula la carga laboral en los infantes. Son numerosos los avances en primera infancia llevados a cabo por el Estado, sin embargo, estos resultados sirven de base para construir un marco conceptual en el que se deben rescatar y promover las políticas públicas alimentarias en toda la edad escolar.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Recommendations for citizens in case of disaster and terrorist attacks, including prevention measures. Recomendaçoes para se comportar em caso de catástrofe, incluindo medidas de prevençao.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Suicide attacks have raised the stakes for officers deciding whether or not to shoot a suspect ('Police Officer's Terrorist Dilemma'). Despite high-profile errors we know little about how trust in the police is affected by their response to the terrorist threat. Building on a conceptualisation of lay observers as intuitive signal detection theorists, a general population sample (N= 1153) were presented with scenarios manipulated in terms of suspect status (Armed/Unarmed), officer decision (Shoot/Not Shoot) and outcome severity (e.g. suspect armed with Bomb/Knife; police shoot suspect/ suspect plus child bystander). Supporting predictions, people showed higher trust in officers who made correct decisions. reflecting good discrimination ability and who decided to shoot, reflecting an 'appropriate' response bias given the relative costs and benefits. This latter effect was moderated by (a) outcome severity, suggesting it did not simply reflect a preference for a particular type of action, and (b) preferences for a tough stance towards terrorism indexed by Right-Wing Authoritarianism (RWA). Despite loss of civilian life, failure to prevent minor terror attacks resulted in no loss of trust amongst people low in RWA. whereas among people high in RWA trust was positive when police erroneously shot all unarmed suspect. Relations to alternative definitions of trust and procedural justice research are discussed. Copyright (C),. 2007 John Wiley & Sons, Ltd.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fourteen non-terrorist attackers of public figures in Germany between 1968 and 2004 were intensively studied, with a particular focus on warning behaviors, attack behaviors, and the relationship between psychiatric diagnosis, symptoms, and motivations for the assault. A large proportion of the attackers were severely mentally ill, and most likely to be in the potentially lethal rather than the non-lethal group. A new typology of seven warning behaviors was applied to the data, and all were present, most frequently fixation and pathway warning behavior, and least frequently a direct threat. Psychiatric diagnosis could be closely linked to motivation when analyzed at the level of symptom and content of thought, often delusional. Most of the attacks were directed at political figures, and the majority occurred after 1995.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the characteristics of suicide bombers as reflected in the Israeli press during the Second Intifada in Israel. The analysis aims to determine whether there were significant differences in the characteristics of suicide bombers with religious motives versus those with nationalist motives. The findings reveal that gender, education level, and organizational affiliation correlated significantly with motives for carrying out suicide attacks. Most of the suicide bombers with religious motives were men with elementary education. In addition, the results show that most of the suicide bombers who were affiliated with the Hamas organization acted out of religious motives. No significant differences were found between suicide bombers with religious and those with nationalist motives with regard to age, marital status, and prior activity in terrorist organizations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Adaptability and invisibility are hallmarks of modern terrorism, and keeping pace with its dynamic nature presents a serious challenge for societies throughout the world. Innovations in computer science have incorporated applied mathematics to develop a wide array of predictive models to support the variety of approaches to counterterrorism. Predictive models are usually designed to forecast the location of attacks. Although this may protect individual structures or locations, it does not reduce the threat—it merely changes the target. While predictive models dedicated to events or social relationships receive much attention where the mathematical and social science communities intersect, models dedicated to terrorist locations such as safe-houses (rather than their targets or training sites) are rare and possibly nonexistent. At the time of this research, there were no publically available models designed to predict locations where violent extremists are likely to reside. This research uses France as a case study to present a complex systems model that incorporates multiple quantitative, qualitative and geospatial variables that differ in terms of scale, weight, and type. Though many of these variables are recognized by specialists in security studies, there remains controversy with respect to their relative importance, degree of interaction, and interdependence. Additionally, some of the variables proposed in this research are not generally recognized as drivers, yet they warrant examination based on their potential role within a complex system. This research tested multiple regression models and determined that geographically-weighted regression analysis produced the most accurate result to accommodate non-stationary coefficient behavior, demonstrating that geographic variables are critical to understanding and predicting the phenomenon of terrorism. This dissertation presents a flexible prototypical model that can be refined and applied to other regions to inform stakeholders such as policy-makers and law enforcement in their efforts to improve national security and enhance quality-of-life.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.