• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 166
  • 24
  • 19
  • 13
  • 8
  • 8
  • 8
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 322
  • 159
  • 146
  • 143
  • 139
  • 132
  • 46
  • 45
  • 40
  • 34
  • 34
  • 34
  • 31
  • 31
  • 30
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

The Origins of Ethno/National Separatist Terrorism: A Cross-National Analysis of the Background Conditions of Terrorist Campaigns

Snell, Brandon Charles 10 June 2009 (has links)
No description available.
162

Study on the effect of different arrival patterns on an emergency department's capacity using discrete event simulation

Joshi, Amita J. January 1900 (has links)
Master of Science / Department of Industrial & Manufacturing Systems Engineering / Malgorzata J. Rys / Emergency department (ED) overcrowding is a nationwide problem affecting the safety and preparedness of our health care system. Many hospital EDs face significant short and intense surges in demand on a daily basis. However, the surge in demand during disaster event is not short and intense, but it is a sustained one. In order to meet this sudden surge as defined above, hospital EDs need to be more prepared and efficient to cater to increased volume of demand involving huge uncertainties. This thesis looks at the creation and use of discrete event simulation modeling using ARENA 10.0 software. In this thesis, an attempt is made to show how the different arrival patterns and time durations for which victims keep arriving affect the EDs ability to treat the patients. It is shown, how the model can be used to estimate additional resources that would be required to accommodate additional patients within the ED. Various shapes of arrival distributions were tested for different time durations. It was found that the arrival distribution with parameters (3, 4), (3, 3), (4, 2) and (2, 4) did not challenge the institutional capacity. In other words, the hospital was able to treat all the patients without compromising the quality of care up to 24 hours. However, distribution with parameter (3, 2), (2, 2), (3, 1), (1, 2), (2, 3), (2, 1), (1, 4), (1, 3), (1, 1) and (0.5, 2) did affect the system performance. Under these distributions, there was at least one patient who was either dead, LWBS or diverted. This indicates the immediacy with which victims arriving under these distributions overwhelmed the limited resources Our aim was to study, how many more resources would the ED need in order to have zero critical expire, zero Left without Being Seen (LWBS) and zero patients diverted. Arrival distribution (1, 2) was randomly selected to study this objective and it was found that for a 24 hours of simulation run time, an additional of two full trauma resources were required in order to have zero critical expire in trauma rooms area and additional of five ED beds and three nurses were required in treatment area for patients with moderate severity to have zero LWBS. With these additional resources, the ED was also able to treat all the non disaster related patients thereby having zero patients diverted. The same procedure can be used to determine the number of additional resources ED would require to treat all the victims arriving with the rest of the arrival distribution for different time periods. The simulation model built would help the emergency planners to better allocate and utilize the limited ED resources in order to treat maximum possible patients. It also helps estimate the number of additional resources that would be required in a particular scenario.
163

NATO's role in the protection of the civil population against the consequences of chemical, biological, radiological, and nuclear terrorist attacks

Ovdiienko, Oleksandr 03 1900 (has links)
Approved for public release, distribution is unlimited / The rapidly growing threat to civilian populations from different terrorist organizations and nuclear states involved in regional conflicts require new unorthodox solutions. The purpose of this work is to analyze steps that have been taken on the European continent before and after September 11 in order to create a new, more efficient system of protection of the civilian population against CBRN terrorist attacks, and to explore NATO's role in the most problematic issues. The research examines what was done within NATO since 1998 by members of the Euro-Atlantic Partnership Council in the field of improving population protection against the consequences of CBRN terrorist attacks in two dimensions: national and international. This evaluation leads to the argument that supports the importance of the creation of an international system of mutual assistance in case of CBRN terrorist attacks under NATO's leading role. / Lieutenant Colonel, Ministry for Emergencies of Ukraine
164

Voices at the Borders, Prose on the Margins : Exploring the Contemporary Pashto Short Story in a Context of War and Crisis

Widmark, Anders January 2011 (has links)
This dissertation is a study of contemporary Pashto prose writing in a context of war and crisis based on a corpus of digitally published and/or printed short stories from the 1990s onwards. Out of this larger corpus, 16 stories have been selected and analysed under four topics: "The Terrorist", Female agency: Representations of and by, "The Madman", and Axtar: Longing for peace or imaging disillusion. A central idea is that the analysis should be text-oriented, but the contextualisation of the analysed texts is a secondary important focus. Chapter one presents the material and gives a general context to the study. In the second chapter, after a general conceptualisation of the short story genre, I discuss the borders between prose and poetry. In chapter three I provide an overview of Pashto literature where the aim is to pinpoint certain characteristics of literature in what I call a poeticised community, such as that of the Pashtuns. The fourth chapter contains an introduction to the four topics mentioned above, a summary of each of the four stories belonging to the specific topic with selected parts in direct translation from the Pashto original, as well as a discussion of form and contents of each topic separately. Chapter five consists of a general conclusion. An appendix with the original Pashto text of translated sections is found before the bibliography. One feature that has emerged from this study is the notion of how the narratives are often found to communicate and respond to their immediate surroundings, in time as well as in space. Another important conclusion is that devices normally regarded as belonging to the realm of poetry are not uncommon in Pashto short story writing.
165

Why Female Suicide Bombers? A Closer Look at the Liberation Tigers of Tamil Eelam and Chechen Separatists

Campbell, Latisha T 01 January 2014 (has links)
The central hypothesis of this study is that terrorist organizations choose to use females as suicide bombers not only as tactical innovation but also to “signal” or send a message to various audiences. In order to meet the research objectives of this study, two terrorist organizations—the Liberation Tigers of Tamil Eelam and the Chechen Separatists or those individuals associated with the Chechen Resistance—are examined in detail from their inception through 2013 using a structured focused comparison methodology. Evidence is found to support both of the studies’ main hypotheses. First, female suicide bombers are used by terrorist organizations because they are a 1) tactical advantage, and 2) to “signal” or send a message to various audiences. Their “entertainment” or shock value maximizes the psychological punch intended for delivery to a variety of audiences. These two reasons are not mutually exclusive but are colored by contextual considerations unique to each case. While deliberation was given to a variety of socio-political factors unique to each organization—such as popular support for suicide attacks perpetrated by females, indication of rival terrorist organizations, counterterrorism and political events that may have affected the terrorist organizations’ preference for females—insight into the operational characteristics surrounding individual suicide attacks was central in highlighting patterns in the organizational use of female suicide bombers. Those patterns are consistent across both cases and suggest that when females’ use is explained by the tactical innovation model, they are used overwhelmingly in suicide attacks where getting closer to intended targets—usually defined as security and political targets—matter. In contrast, suicide attacks explained by the signaling model are characterized by their novelty usually representing a deviation from terrorist organizations’ operational norms—deemed operational suicide attack anomalies in this study—characterized many times as “only” suicide attacks, “firsts [of that kind of],” or the most spectacular suicide attacks carried out by the organization.
166

Socio Demographic and Motivational Differences Between Active Participants And Supporters In PKK Terrorist Organization

KOCA, GOKHAN 25 April 2012 (has links)
Especially for last three decades many of the scholars have tried to provide general terrorist profile, which is commonly usable for all terrorists. They were seeking to identify the process of becoming terrorist (Sageman, 2004; Russel&Miller, 1977; Strentz, 1988; Hassan, 2001). The main problem on those studies is that, without looking at degree of involvement of terrorist they just focus on “who becomes a terrorist and why” and they prefer to ignore different type of characteristics about terrorist. Yilmaz (2009) tried to underline and answer this subject by studying on arrest results about DHKP/C and Hizbullah terrorist organizations in Turkey. This study aims to analyze socio-demographic and motivational differences of PKK terrorist organization members who are belong to different involvement degrees (active participant and supporter).
167

L'intelligence économique au service de la lutte contre le blanchiment de capitaux et le financement du terrorisme / Competititve and strategic intelligence for anti-money laundering - combating the financing of terrorism (AML/CFT)

Hane, Tafsir 09 September 2015 (has links)
L’intelligence économique (I.E) peut-elle contribuer à mieux lutter contre le blanchiment de capitaux et le financement du terrorisme (LBC/FT) et, si oui, comment ? Un diagnostic a permis de mettre en évidence des carences qui, au plan institutionnel se matérialisaient par des réponses insuffisantes en raison non seulement de l’absence de contraintes à l’échelle mondiale, mais aussi en raison de la primauté d’intérêts politico-économiques au détriment des dynamiques régionalistes et corporatives. Au plan opérationnel, il est apparu que les faiblesses sont liées à l’absence de prise en compte de l’I.E. Placée au cœur du renseignement, cette thèse soutient que l’I.E peut s’adapter au contexte de la lutte contre la criminalité financière et servir à mieux lutter contre le phénomène. Elle a cherché à montrer en quoi les méthodes et outils d’investigation, d’analyse de l’environnement, d’anticipation, d’influence et de contre-influence de l’I.E pouvaient répondre aux besoins des acteurs de la lutte contre le blanchiment de capitaux et le financement du terrorisme. Elle s’est également projetée sur le rôle que pourraient jouer les acteurs de l’I.E dans la LBC/FT. / Competitive and Strategic Intelligence (CST) can it contribute to better anti-money laundering - combating the financing of terrorism (AML / CFT), if so, how ? A diagnosis has helped highlight deficiencies that, institutionally are materialized by insufficient responses not only because of lack of constraints on a global scale, but also because of the primacy of political and economic interests to the detriment of regionalist and corporate dynamics. Operationally, it appeared that the weaknesses are related to the failure to take into account the CST. Placed at the heart of intelligence, this thesis argues that CST can adapt to the context of the fight against financial crime and serve to better the fight against the phenomenon. It sought to show how the methods and tools of investigation, analysis of the environment, anticipation, influence and influence-against CST could meet the needs of stakeholders in the AML/CFT. It also projected on the potential role of CST actors in AML / CFT.
168

Att hantera det okontrollerbara : Terrorattentat, rädsla och coping

Salokanto, Frida, Sand, Sebastian January 2019 (has links)
Terrorattentat orsakar ofta massförstörelse med civila offer, det sprider rädsla och leder till allvarliga konsekvenser för de som drabbas. För att hantera rädslan använder människor olika strategier. Syftet med studien var således att bidra till en nyanserad bild av människors rädsla för terrorattentat och hur de hanterar rädslan. Detta undersöktes genom semi-strukturerade intervjuer där frågorna baserades utifrån tre frågeställningar, “Hur beskriver människor sin rädsla för terrorattentat och vilka känslor beskrivs i relation till rädslan?”, “Varför upplever människor rädsla för terrorattentat?” och “Hur använder människor copingstrategier för att hantera rädslan för terrorattentat?” För att besvara dessa intervjuades tre kvinnor och tre män mellan åldrarna 21 och 29. Resultaten visade att rädslan dels innefattade indirekt och direkt utsatthet samt känslor som sårbarhet och ångest. Rädslan var också kopplad till särskilda platser och situationer. Vidare identifierades också att deltagarna använde sig av känslo- och problemfokuserad coping samt undvikande beteende för att hantera rädslan. Dessa resultat bekräftas i stort av tidigare forskning. / Terrorist attacks often causes mass destruction with civilian casualties, it spreads fear and leads to severe consequences for those who are victimized. To handle the fear, people use different strategies. The aim of this study was therefore to contribute to a nuanced depiction of people’s fear of terrorist attacks and how they handle the fear. This was examined through semi-structured interviews based on three issues; “How do people describe their fear of terrorist attacks and what emotions are described in relation to the fear?”, “Why do people experience fear of terrorist attacks?” and “Which coping strategies are being used to handle the fear of terrorist attacks?” To answer these, three women and three men between the ages 21 and 29 were interviewed. The results showed that fear partially included indirect and direct victimization as well as vulnerability and anxiety. Fear was also linked to specific places and situations. Furthermore, was also identified that the participants used emotion- and problem focused coping as well as avoidance behaviour to handle the fear. These results are mostly confirmed by previous research.
169

Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning

Weil, Ari 01 January 2018 (has links)
Shifts in culture and technology have changed the manifestation of celebrity in modern society, culminating in the practice of internet microcelebrity, where one views followers as fans, produces content consistent with a personal brand, and engages in strategic interaction with devotees. This thesis examines how those effects have also changed how terrorists present themselves and operationalize celebrity status. An original typology of terrorist celebrity is presented: traditional, martyr, and internet micro-celebrity. Two in-depth case studies of terrorist micro-celebrities are analyzed: Anwar al-Awlaki of Al Qaeda in the Arabian Peninsula and Junaid Hussain of the Islamic State. The case studies are examined through content analysis of social media postings, personal chat transcripts, as well as mainstream media coverage of the individuals used to reconstruct their biographies. Following mainstream trends, these terrorist internet celebrities have built personal brands that target specific communities. Awlaki targeted English-speaking Muslims living in the West and IS foreign fighters like Hussain often target young people in the fighter’s countries of origin. Their online personas are created to be relatable and engaging to those specific audiences. Ultimately, mainstream celebrity trends have bled into terrorist behavior. By creating brands and managing them through micro-celebrity practices, terrorists have effectively weaponized online celebrity, using it for recruitment and planning.
170

Compliance Strategies to Reduce the Risks of Money Laundering and Terrorist Financing

Nottage, Cassandra 01 January 2018 (has links)
Ineffective compliance programs expose banking and trust companies to increased risk of money laundering (ML) and terrorist financing (TF). Using risk management theory, the purpose of this multiple case study was to explore compliance strategies that Bahamian bank and trust company managers use to reduce ML/TF risks. Study participants comprised 7 senior risk and compliance managers experienced in risk strategy development and implementation. Semistructured interview data were triangulated with data collected from internal policy and procedural documents, publicly available papers of the Financial Action Task Force on Money Laundering (FATF), the Basel Committee on Banking Supervision (BCBS), and the Central Bank of The Bahamas. Thematic coding resulted in 3 emergent themes including developing compliance strategies, overcoming operational challenges, and strategy success and measurement. Findings showed that effective compliance strategies resulted from risk and compliance managers' assessments of ML/TF risks posed by potential and existing clients. The implications for social change include the potential to prevent reputation damage attributed to ML/TF risks, reduce the failure rate of Bahamian bank and trust companies, and thus positively impact employment and tax revenue used for social programs in The Bahamas.

Page generated in 0.0486 seconds