Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9780833080929 , 0833083368 , 083308092X , 9780833083364
    Language: English
    Pages: 1 Online-Ressource (xliii, 258 pages)
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: Violence Forecasting ; Criminal behavior Research ; Methodology ; Terrorists Psychology ; Terrorists Social conditions ; Criminal behavior, Prediction of ; Terrorism Prevention ; Violence ; Criminal behavior ; Terrorists ; Terrorists ; Criminal behavior, Prediction of ; Terrorism ; Behavioral Research ; Behavioral Sciences ; Crime ; Criminology ; Disciplines and Occupations ; Natural Science Disciplines ; Psychiatry and Psychology ; Research ; Science ; Social Problems ; Social Sciences ; Sociology ; Terrorism ; Violence ; Anthropology, Education, Sociology and Social Phenomena ; Behavioral Disciplines and Activities ; Criminal behavior, Prediction of ; Social Welfare & Social Work ; Social Sciences ; SOCIAL SCIENCE ; Criminology ; Criminology, Penology & Juvenile Delinquency ; Terrorists ; Psychology ; Criminal behavior ; Research ; Methodology ; Terrorism ; Prevention ; Violence ; Forecasting ; Electronic books
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Note: "RAND National Security Research Division , "The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , Includes bibliographical references (pages 225-258)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...