ISBN:
9781461409533
Language:
English
Pages:
Online-Ressource
,
v.: digital
Edition:
Online-Ausg. Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
Series Statement:
Springer Series on Evidence-Based Crime Policy 3
DDC:
363.325/17
Keywords:
Social sciences
;
Criminology
Abstract:
"Since the 9/11 terror attacks, the development and implementation of counterterrorism strategies has been a top priority in national security policies in many countries. Yet as the number and scope of these programs grow--with spending to matc--few studies have determined whether they are productive, ineffectual, or even detrimental to security. For too many counterterrorism programs, serious steps toward evaluation have yet to be made. Evidence-Based Counterterrorism Policy emphasizes the use of science, evaluation, and knowledge building to inspire improvements in our what we know about counterterrorism interventions. Focusing on three key areas--identifying and accessing relevant data, using innovative methodologies for generating new interventions, and examining various perspectives to evaluation counterterrorism--the book combines a framework for using scientific findings to inform security policy with a best-practices approach to implementing programs. Strategies such as risk terrain modeling and validity testing for security screening instruments are shown as fostering improvements in threat assessment and in anticipating and responding to future events. The editors also argue for a broader research infrastructure to encourage ongoing development. Among the topics covered: Assessment and comparison of terrorism data sources; Information sharing and Fusion Centers; Various longitudinal models for assessing counterterrorism policies and terrorism trends; Evidence-based evaluations and validity testing of airport security measures; Public opinion and criminological research application to counterinsurgency and counterterrorism; Police practices for understanding and managing terror risk; Counterterrorism finance and trade regulations; Legal challenges and evaluation of counterterrorism policy. Evidence-Based Counterterrorism Policy is an invaluable resource for researchers in criminology and political science, and for policymakers involved with counterterrorism programs."--Publisher's website
Abstract:
In the past eight years, there has been a massive increase in government spending on counterterrorism intervention development and implementation. Given this increase, there are two evidence-based policy questions that are important to address: Is there evidence that any of these programs are effective - in other words, can they be shown to be linked to reducing terrorism, terrorist recruiting, or to improving the response and management of terrorist events? Do these interventions have secondary or collateral effects that may be costly, harmful, illegal, beneficial, or otherwise? As Lum and Ke
Description / Table of Contents:
Evidence-Based Counterterrorism Policy; Contents; Contributors; Part I: Introduction; Chapter 1: Evidence-Based Counterterrorism Policy; Innovation in Research; References; Part II: Data Sources for Evaluating Terrorism and Counterterrorism; Chapter 2: Assessing and Comparing Data Sources for Terrorism Research; Introduction; Developing Standards for Terrorism Data; Why Do We Need Them?; Practical Reasons; Theoretical Reasons; Developing Standards for Terrorism Data; The Case for a "Criterial Framework"; Proposed Criteria; Conceptual Clarity; Context and Immediacy of Observation
Description / Table of Contents:
Citation TransparencyCoding and Consistency; Certainty of Record; Conflict of Interest; Convenience/Accessibility/Functions; Application of the Framework; Assessment of Existing Terrorism Databases; General Comparisons; How Well Do the Five Events Databases Clarify the Concept of Terrorism That Informs Their Selection of Terrorist Acts or Incidents?; What Is the Context of the Data? How Was It Collected? Where Does It Come from? How Immediate Were the Sources?; Do the Authors Cite Their Sources?; How Consistent Is the Coding?; What About Handling of Uncertainty?
Description / Table of Contents:
Do the Authors Disclose Funding and Potential Conflict of Interest?How Convenient and Accessible Are the Different Databases?; Conclusion and Challenges for the Future; Appendix; Definitions of Terrorism; References; Chapter 3: Generating Terrorism Event Databases: Results from the Global Terrorism Database, 1970 to 2008; The Extent of Terrorism; The Global and Regional Distribution of Terrorism; The Most Active Terrorist Organizations; Terrorist Fatalities; Terrorist Targets; Terrorist Tactics; Terrorist Weapons; Discussion and Conclusions; Appendix; Countries Listed Within Each Region
Description / Table of Contents:
ReferencesChapter 4: Evidence-Based Intelligence Practices: Examining the Role of Fusion Centers as a Critical Source of Information; The Current State of Information Sharing for Counterterrorism in the United States; The Role of Fusion Centers; Information Sharing; What Is Good Intelligence?; The Need for Assessment; A Survey of Fusion Centers; Protection of Civil Rights; Fusion Centers' Current State of Information Sharing; Fusion Center Data Analysis; Potential for Fusion Center and Academic Partnerships; Discussion and Conclusion; Conclusion; References
Description / Table of Contents:
Part III: Methodological Innovations for Counterterrorism PolicyChapter 5: Innovative Methods for Terrorism and Counterterrorism Data; Introduction; Measuring Terrorism; Point Process; Marked Point Process; Impact Score; Further Considerations; Measuring Counterterrorism; Example: Detachment-88; Assessing Effectiveness; Intervention Analysis; Change Point Analysis; Testing Change in Attack Rate; Testing Change in Impact Distribution; Testing Change in Compound Score; Discussion/Conclusion; An Afterthought; References
Description / Table of Contents:
Chapter 6: Introducing Group-Based Trajectory Analysis and Series Hazard Modeling: Two Innovative Methods to Systematically Examine Terrorism Over Time
Note:
Description based upon print version of record
,
Electronic reproduction; Available via World Wide Web
DOI:
10.1007/978-1-4614-0953-3
URL:
Volltext
(lizenzpflichtig)
Permalink