Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 0791440338 , 0791440346
    Language: English
    Pages: XII, 199 S. , graph. Darst.
    Series Statement: SUNY series in violence
    DDC: 303.6/0973
    RVK:
    Keywords: Conflicten ; Conflictmanagement ; Geweld ; Gewalt ; Aggressiveness ; Interpersonal conflict ; Social conflict ; Violence ; Gewalttätigkeit ; Sozialer Konflikt ; USA ; USA ; USA ; Gewalttätigkeit ; Sozialer Konflikt
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New York, NY : Springer Science+Business Media, LLC
    ISBN: 9781461409533
    Language: English
    Pages: Online-Ressource , v.: digital
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    Series Statement: Springer Series on Evidence-Based Crime Policy 3
    DDC: 363.325/17
    Keywords: Social sciences ; Criminology
    Abstract: "Since the 9/11 terror attacks, the development and implementation of counterterrorism strategies has been a top priority in national security policies in many countries. Yet as the number and scope of these programs grow--with spending to matc--few studies have determined whether they are productive, ineffectual, or even detrimental to security. For too many counterterrorism programs, serious steps toward evaluation have yet to be made. Evidence-Based Counterterrorism Policy emphasizes the use of science, evaluation, and knowledge building to inspire improvements in our what we know about counterterrorism interventions. Focusing on three key areas--identifying and accessing relevant data, using innovative methodologies for generating new interventions, and examining various perspectives to evaluation counterterrorism--the book combines a framework for using scientific findings to inform security policy with a best-practices approach to implementing programs. Strategies such as risk terrain modeling and validity testing for security screening instruments are shown as fostering improvements in threat assessment and in anticipating and responding to future events. The editors also argue for a broader research infrastructure to encourage ongoing development. Among the topics covered: Assessment and comparison of terrorism data sources; Information sharing and Fusion Centers; Various longitudinal models for assessing counterterrorism policies and terrorism trends; Evidence-based evaluations and validity testing of airport security measures; Public opinion and criminological research application to counterinsurgency and counterterrorism; Police practices for understanding and managing terror risk; Counterterrorism finance and trade regulations; Legal challenges and evaluation of counterterrorism policy. Evidence-Based Counterterrorism Policy is an invaluable resource for researchers in criminology and political science, and for policymakers involved with counterterrorism programs."--Publisher's website
    Abstract: In the past eight years, there has been a massive increase in government spending on counterterrorism intervention development and implementation. Given this increase, there are two evidence-based policy questions that are important to address: Is there evidence that any of these programs are effective - in other words, can they be shown to be linked to reducing terrorism, terrorist recruiting, or to improving the response and management of terrorist events? Do these interventions have secondary or collateral effects that may be costly, harmful, illegal, beneficial, or otherwise? As Lum and Ke
    Description / Table of Contents: Evidence-Based Counterterrorism Policy; Contents; Contributors; Part I: Introduction; Chapter 1: Evidence-Based Counterterrorism Policy; Innovation in Research; References; Part II: Data Sources for Evaluating Terrorism and Counterterrorism; Chapter 2: Assessing and Comparing Data Sources for Terrorism Research; Introduction; Developing Standards for Terrorism Data; Why Do We Need Them?; Practical Reasons; Theoretical Reasons; Developing Standards for Terrorism Data; The Case for a "Criterial Framework"; Proposed Criteria; Conceptual Clarity; Context and Immediacy of Observation
    Description / Table of Contents: Citation TransparencyCoding and Consistency; Certainty of Record; Conflict of Interest; Convenience/Accessibility/Functions; Application of the Framework; Assessment of Existing Terrorism Databases; General Comparisons; How Well Do the Five Events Databases Clarify the Concept of Terrorism That Informs Their Selection of Terrorist Acts or Incidents?; What Is the Context of the Data? How Was It Collected? Where Does It Come from? How Immediate Were the Sources?; Do the Authors Cite Their Sources?; How Consistent Is the Coding?; What About Handling of Uncertainty?
    Description / Table of Contents: Do the Authors Disclose Funding and Potential Conflict of Interest?How Convenient and Accessible Are the Different Databases?; Conclusion and Challenges for the Future; Appendix; Definitions of Terrorism; References; Chapter 3: Generating Terrorism Event Databases: Results from the Global Terrorism Database, 1970 to 2008; The Extent of Terrorism; The Global and Regional Distribution of Terrorism; The Most Active Terrorist Organizations; Terrorist Fatalities; Terrorist Targets; Terrorist Tactics; Terrorist Weapons; Discussion and Conclusions; Appendix; Countries Listed Within Each Region
    Description / Table of Contents: ReferencesChapter 4: Evidence-Based Intelligence Practices: Examining the Role of Fusion Centers as a Critical Source of Information; The Current State of Information Sharing for Counterterrorism in the United States; The Role of Fusion Centers; Information Sharing; What Is Good Intelligence?; The Need for Assessment; A Survey of Fusion Centers; Protection of Civil Rights; Fusion Centers' Current State of Information Sharing; Fusion Center Data Analysis; Potential for Fusion Center and Academic Partnerships; Discussion and Conclusion; Conclusion; References
    Description / Table of Contents: Part III: Methodological Innovations for Counterterrorism PolicyChapter 5: Innovative Methods for Terrorism and Counterterrorism Data; Introduction; Measuring Terrorism; Point Process; Marked Point Process; Impact Score; Further Considerations; Measuring Counterterrorism; Example: Detachment-88; Assessing Effectiveness; Intervention Analysis; Change Point Analysis; Testing Change in Attack Rate; Testing Change in Impact Distribution; Testing Change in Compound Score; Discussion/Conclusion; An Afterthought; References
    Description / Table of Contents: Chapter 6: Introducing Group-Based Trajectory Analysis and Series Hazard Modeling: Two Innovative Methods to Systematically Examine Terrorism Over Time
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Albany, NY : State University of New York Press
    ISBN: 0585107890 , 9780585107899
    Language: English
    Pages: Online Ressource (xii, 199 pages) , illustrations.
    Edition: Online-Ausg.
    Series Statement: SUNY series in violence
    Parallel Title: Print version When push comes to shove
    DDC: 303.60973
    Keywords: Violence United States ; Interpersonal conflict United States ; Social conflict United States ; Aggressiveness United States ; Violence ; Interpersonal conflict ; Social conflict ; Aggressiveness ; Violence ; Aggressiveness ; Social conflict ; Interpersonal conflict ; Violence United States ; Interpersonal conflict United States ; United States ; Interpersonal conflict ; Social conflict ; Violence ; Geweld ; Conflicten ; Conflictmanagement ; Gewalttätigkeit ; Sozialer Konflikt ; SOCIAL SCIENCE ; Violence in Society ; Aggressiveness ; United States ; USA ; Electronic books
    Abstract: 1.Violence in Everyday Life1 --2.Learning Aggression and Violence12 --3.Elements of Routine Conflict: Social Construction, Coercion, and the Social Event21 --4.Studying Routine Conflict and Violence37 --5.Attitudes Toward Violence: Setting Up Routines50 --6.Experience with Violence: Routine Aspects of Conflict76 --7.Street Youth and Violence108 --8.Routine Conflict in Theory and Practice124.
    Description / Table of Contents: 1.Violence in Everyday Life12.Learning Aggression and Violence123.Elements of Routine Conflict: Social Construction, Coercion, and the Social Event214.Studying Routine Conflict and Violence375.Attitudes Toward Violence: Setting Up Routines506.Experience with Violence: Routine Aspects of Conflict767.Street Youth and Violence1088.Routine Conflict in Theory and Practice124.
    Note: Includes bibliographical references (pages 183-191) and indexes. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781461455561
    Language: English
    Pages: 1 online resource (72 pages) , illustrations.
    Series Statement: SpringerBriefs in Criminology. Translational Criminology
    Parallel Title: Erscheint auch als
    DDC: 364
    RVK:
    Keywords: Criminology ; Terrorism ; Prevention ; Electronic books
    Note: Includes bibliographical references and index. Description based on print version record
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...