979 resultados para panic attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The English cleric Matthew Sutcliffe arguably produced the first comprehensive security concept in history. It had at its centre the war between England and Spain (1585-1604), and Sutcliffe advocated taking the war to the Iberian Peninsula to seize Philip II's main Atlantic ports, rather than remaining satisfied with the indirect combat of Spain in Flanders, defensive action against naval attacks on England and the guerre de course on Spanish shipping at sea. This approach seems to be at the heart of Essex's 1596 naval campaing against Spanish ports, which foundered on the bureaucratic politics of the Elizabethan government.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using panel data for 111 countries over the period 1982–2002, we employ two indexes that cover a wide range of human rights to empirically analyze whether and to what extent terrorism affects human rights. According to our results,terrorism significantly, but not dramatically, diminishes governments’ respect for basic human rights such as the absence of extrajudicial killings, political imprisonment, and torture. The result is robust to how we measure terrorist attacks, to the method of estimation, and to the choice of countries in our sample. However, we find no effect of terrorism on empowerment rights.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of Terrorist Transgressions is to analyse the myths inscribed in images of the terrorist and identify how agency is attributed to representation through invocations and inversions of gender stereotypes. In modern discourses on the terrorist the horror experienced in Western societies was the appearance of a new sense of the vulnerability of the body politic, and therefore of the modern self with its direct dependency on security and property. The terrorist has been constructed as the epitome of transgression against economic resources and moral, physical and political boundaries. Although terrorism has been the focus of intense academic activity, cultural representations of the terrorist have received less attention. Yet terrorism is dependent on spectacle and the topic is subject to forceful exposure in popular media. While the terrorist is predominantly aligned with masculinity, women have been active in terrorist organisations since the late 19th century and in suicidal terrorist attacks since the 1980s. Such attacks have confounded constructions of femininity and masculinity, with profound implications for the gendering of violence and horror. The publication arises from an AHRC networking grant, 2011-12, with Birkbeck, and includes collaboration with the army at Sandhurst RMA. The project relates to a wider investigation into feminism, violence and contemporary art.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What are the main causes of international terrorism? Despite the meticulous examination of various candidate explanations, existing estimates still diverge in sign, size, and significance. This article puts forward a novel explanation and supporting evidence. We argue that domestic political instability provides the learning environment needed to successfully execute international terror attacks. Using a yearly panel of 123 countries over 1973–2003, we find that the occurrence of civil wars increases fatalities and the number of international terrorist acts by 45%. These results hold for alternative indicators of political instability, estimators, subsamples, subperiods, and accounting for competing explanations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We assess the robustness of previous findings on the determinants of terrorism. Using extreme bound analysis, the three most comprehensive terrorism datasets, and focusing on the three most commonly analyzed aspects of terrorist activity, i.e., location, victim, and perpetrator, we re-assess the effect of 65 proposed correlates. Evaluating around 13.4 million regressions, we find 18 variables to be robustly associated with the number of incidents occurring in a given country-year, 15 variables with attacks against citizens from a particular country in a given year, and six variables with attacks perpetrated by citizens of a particular country in a given year.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We analyze the impact of political proximity to the United States on the occurrence and severity of terror. Employing panel data for 116 countries over the period 1975–2001 we find that countries voting in line with the U.S. are victims of more and deadlier attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, are becoming increasingly complex. With ever-growing data processing functionalities in these implants, privacy and security become vital concerns. Electronic attacks on human ICT implants can cause significant harm, both to implant subjects and to their environment. This paper explores the vulnerabilities which human implants pose to crime victimisation in light of recent technological developments, and analyses how the law can deal with emerging challenges of what may well become the next generation of cybercrime: attacks targeted at technology implanted in the human body. After a state-of-the-art description of relevant types of human implants and a discussion how these implants challenge existing perceptions of the human body, we describe how various modes of attacks, such as sniffing, hacking, data interference, and denial of service, can be committed against implants. Subsequently, we analyse how these attacks can be assessed under current substantive and procedural criminal law, drawing on examples from UK and Dutch law. The possibilities and limitations of cybercrime provisions (eg, unlawful access, system interference) and bodily integrity provisions (eg, battery, assault, causing bodily harm) to deal with human-implant attacks are analysed. Based on this assessment, the paper concludes that attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks. Traditional distinctions between physical and non-physical modes of attack, between human bodies and things, between exterior and interior of the body need to be re-interpreted in light of developments in human implants. As the human body and technology become increasingly intertwined, cybercrime legislation and body-integrity crime legislation will also become intertwined, posing a new puzzle that legislators and practitioners will sooner or later have to solve.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anxiety disorders in childhood and adolescence are extremely common and are often associated with lifelong psychiatric disturbance. Consistent with DSM-5 and the extant literature, this review concerns the assessment and treatment of specific phobias, separation anxiety disorder, generalised anxiety disorder, social anxiety disorder, panic disorder and agoraphobia. Evidence-based psychological treatments (cognitive behaviour therapy; CBT) for these disorders have been developed and investigated, and in recent years promising low-intensity versions of CBT interventions have been proposed that offer a means to increase access to evidence-based treatments. There is some evidence of effectiveness of pharmacological treatments for anxiety disorders in children and young people, however, routine prescription is not recommended due to concerns about potential harm.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Automated border control (ABC) is concerned with fast and secure processing for intelligence-led identification. The FastPass project aims to build a harmonised, modular reference system for future European ABC. When biometrics is taken on board as identity, spoofing attacks become a concern. This paper presents current research in algorithm development for counter-spoofing attacks in biometrics. Focussing on three biometric traits, face, fingerprint, and iris, it examines possible types of spoofing attacks, and reviews existing algorithms reported in relevant academic papers in the area of countering measures to biometric spoofing attacks. It indicates that the new developing trend is fusion of multiple biometrics against spoofing attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB MSDs has been prohibited in many commercial and everyday environments primarily due to security concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this new security protocol for consumer USB MSDs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The late eighties and early nineties in Germany were not only marked by the fall of the Wall and German unification, but also by the dramatization of the political issue of asylum, resulting in outbreaks of xenophobic violence. In the context of the asylum debate of the early nineties, a number of punk bands produced songs between 1991 and 1994 which criticise the xenophobic climate created by the asylum debate and undermine an exculpatory official discourse about the violent attacks. The lyrics of these songs will be analysed as instances of counter-discourse emerging from a subcultural sphere that nurtures a critical distance towards hegemonic public and political discourse, arguing that Critical Discourse Analysis should pay more attention to defiance of hegemonic discourse.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter evaluates the potential for legal regulation of the resort to cyber warfare between states under the ‘jus ad bellum’ (the law on the use of force). Debate in the literature has largely concerned whether cyber warfare falls within the scope of Article 2(4) UNC. The first part of this chapter sets out this debate. It then goes on to argue that the ‘Article 2(4) debate’ often misses the fact that an act of cyber warfare can be considered a breach of a different legal rule: the principle of non-intervention. The chapter further considers some of the issues in applying either the prohibition of the use of force or the principle of non-intervention to cyber warfare, and then concludes by arguing that the debate should be reoriented to focus on another existing international legal obligation: the duty to prevent cyber-attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social anxiety disorder is one of the most persistent and common of the anxiety disorders, with lifetime prevalence rates in Europe of 6.7% (range 3.9-13.7%).1 It often coexists with depression, substance use disorder, generalised anxiety disorder, panic disorder, and post-traumatic stress disorder.2 It can severely impair a person’s daily functioning by impeding the formation of relationships, reducing quality of life, and negatively affecting performance at work or school. Despite this, and the fact that effective treatments exist, only about half of people with this condition seek treatment, many after waiting 10-15 years.3 Although about 40% of those who develop the condition in childhood or adolescence recover before adulthood,4 for many the disorder persists into adulthood, with the chance of spontaneous recovery then limited compared with other mental health problems. This article summarises the most recent recommendations from the National Institute for Health and Care Excellence (NICE) on recognising, assessing, and treating social anxiety disorder in children, young people, and adults.5

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Social networks are common in digital health. A new stream of research is beginning to investigate the mechanisms of digital health social networks (DHSNs), how they are structured, how they function, and how their growth can be nurtured and managed. DHSNs increase in value when additional content is added, and the structure of networks may resemble the characteristics of power laws. Power laws are contrary to traditional Gaussian averages in that they demonstrate correlated phenomena. OBJECTIVES: The objective of this study is to investigate whether the distribution frequency in four DHSNs can be characterized as following a power law. A second objective is to describe the method used to determine the comparison. METHODS: Data from four DHSNs—Alcohol Help Center (AHC), Depression Center (DC), Panic Center (PC), and Stop Smoking Center (SSC)—were compared to power law distributions. To assist future researchers and managers, the 5-step methodology used to analyze and compare datasets is described. RESULTS: All four DHSNs were found to have right-skewed distributions, indicating the data were not normally distributed. When power trend lines were added to each frequency distribution, R(2) values indicated that, to a very high degree, the variance in post frequencies can be explained by actor rank (AHC .962, DC .975, PC .969, SSC .95). Spearman correlations provided further indication of the strength and statistical significance of the relationship (AHC .987. DC .967, PC .983, SSC .993, P<.001). CONCLUSIONS: This is the first study to investigate power distributions across multiple DHSNs, each addressing a unique condition. Results indicate that despite vast differences in theme, content, and length of existence, DHSNs follow properties of power laws. The structure of DHSNs is important as it gives insight to researchers and managers into the nature and mechanisms of network functionality. The 5-step process undertaken to compare actor contribution patterns can be replicated in networks that are managed by other organizations, and we conjecture that patterns observed in this study could be found in other DHSNs. Future research should analyze network growth over time and examine the characteristics and survival rates of superusers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper looks at the blockages to the publication of children’s literature caused by the intellectual climate of the postwar era, through a case study of the editorial policy of Hachette, the largest publisher for children at this time. This period witnessed heightened tensions surrounding the social and humanitarian responsibilities of literature. Writers were blamed for having created a culture of defeatism, and collaborationist authors were punished harshly in the purges. In the case of children’s literature, the discourse on responsibility was made more urgent by the assumption that children were easily influenced by their reading material, and by the centrality of the young to the discourse on the moral reconstruction of France. As the politician and education reformer Gustave Monod put it: “penser l’avenir, c’est penser le sort des enfants et de la jeunesse.” These concerns led to the expansion of associations and publications dedicated to protecting children and promoting “good” reading matter for them, and, famously, to the 1949 law regulating publications for children, which banned the depiction of crime, debauchery and violence that might demoralise young readers. Using the testimonials of former employees, along with readers’ reports and editorial correspondence preserved in the Hachette archives, this paper will examine how individual editorial decisions and self-censorship strategies were shaped by the 1949 law with its attendant discourse of moral panic on children’s reading, and how national concerns for future citizens were balanced with commercial imperatives.