• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 501
  • 120
  • 66
  • 35
  • 30
  • 28
  • 18
  • 15
  • 10
  • 5
  • 4
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 1018
  • 216
  • 211
  • 164
  • 142
  • 123
  • 120
  • 103
  • 98
  • 92
  • 79
  • 77
  • 77
  • 72
  • 67
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe

Wolfberg, William 01 January 2012 (has links)
Western nations continue to face potential attacks from violent extremist organizations waging a campaign of violence in the name of political Islam. Though these attacks are traditionally labeled as originating from abroad, leaders of these extremist organizations are utilizing a new tactic of radicalizing native or naturalized citizens from within Western countries in an effort to bypass the massive defensive security apparatus Western governments have put in place since the September 11 attacks. These undistinguishable citizens turned radical jihadists, better known as homegrown terrorists, represent a clear and present danger to the security of the United States. In an effort to understand the problem, this paper seeks to identify patterns common amongst these individuals and addresses the question "How does a Muslim youth become radicalized into a homegrown terrorist?" This research will use a case study approach to identify patterns of radicalization in convicted homegrown terrorist and test the hypothesis that a failure of integration will cause some Western Muslim youth to radicalize and in some cases, commit violent crimes of terrorism.
332

Communicative strategies for organizational survival : an analysis of stereotype threat of women in petroleum engineering

Heller, Abigail A. 03 July 2012 (has links)
This study investigated stereotype threat of women in petroleum engineering, a traditionally male-dominated industry. There were two main purposes to understanding communicative aspects of stereotype threat: 1) the creation of a typology of stereotype threats received and 2) the elaboration of coping strategies used to mitigate threats. This research examined contextual factors that influence women’s coping, including socialization, psychological inoculations, and memorable messages. This work is a contribution to communication research as it examines these components through the lens of scripts, which considers stereotype threat from a new perspective that suggests people are active participants in mitigating threats. To complete this study, I performed 61 in-depth, semi-structured interviews with current or former female petroleum engineers. Through constant comparison (Glaser & Strauss, 1967) I analyzed the data and produced an initial set of 13 different stereotype threats and 11 distinct coping strategies. Upon further comparison, the threats and coping strategies were each consolidated further to five core categories. This typology aligns threats on a spectrum that runs from passive actions to overt actions, and threats closely adhere to the underperformance benchmarks of previous stereotype threat research (Aronson & McGlone, 2009). The coping strategies address specific actions women take to mitigate threats, and the strategies align with the long-term responses to stereotype threat proposed by Block, Koch, Liberman, Merriweather, and Roberson (2011). In addition, the coping strategies execute problem- and emotion-based coping (Folkman and Lazarus, 1980). A distinctive feature of coping is dualistic subversions, which is when women use a subverted stereotype threat to mitigate it. Finally, this study suggests that stereotype threats and coping strategies result from childhood socialization practices, a process that writes scripts workers rely upon throughout their careers. This study is a contribution to organizational communication in how it examines ways messages are communicated in male-dominated careers and how women can use communication to mitigate negative expectations that arise in those environments. In addition, it looks at communication events that encourage women to enter male-dominated careers. Finally, it adds to communication theory because it uncovers additional ways that people use scripts to mitigate stereotyping. / text
333

Testosterone's effect on physiological and behavioral responses to threat

Liening, Scott Henry, 1983- 23 October 2012 (has links)
Across three studies, the role that testosterone plays in how individuals respond psychologically, behaviorally, and physiologically to status challenges was investigated. Preliminary Studies 1 focused on how testosterone related to physiological and psychological responses to a medical threat. Preliminary 2 replicated the psychological effects observed in Preliminary Study 1. Study 3 examined how experimentally manipulated testosterone levels corresponded to responses to a socially judged physical endurance task across all three response types. Preliminary Study 1 examined the relationship between testosterone and conscious evaluations of and physiological reactions to a health threat. Participants were diagnosed with a fictitious enzyme deficiency before rating their views of the deficiency, as well as providing saliva samples before and after diagnosis. Basal testosterone was negatively associated with the belief that one actually had the deficiency, despite the diagnosis. Testosterone was also positively associated with a greater increase in salivary cortisol levels following the diagnosis. Self-reported anxiety was found to be positively associated with evaluating the deficiency as threatening. Preliminary Study 2 replicated the findings observed in Preliminary Study 1 regarding conscious evaluations of a medical threat. Using the same experimental manipulation, testosterone was again found to be negatively associated with ratings of the enzyme deficiency. In Preliminary Study 2, high levels of testosterone were associated with viewing the deficiency as less serious and viewing medical conditions, in general, as less threatening. Study 3 used a transdermal administration procedure to artificially elevate individuals’ testosterone levels before completing a socially evaluated task. Participants who received the testosterone administration showed greater physiological responses to the task, including cardiovascular responses and cortisol responses, compared to the placebo group. Unlike Preliminary Studies 1 and 2, Study 3 did not show any effect of testosterone on conscious evaluations of the task nor behavioral measures of performance. Taken together, the three studies highlight the different ways in which testosterone is related to responding to social threats. Testosterone appears to be associated with mobilizing physiological systems to theoretically facilitate behavioral responses to status threats. Testosterone also appears to be negatively associated with consciously evaluating certain types of threats. / text
334

Reframing the academic trends of African American college students : applications of academic disidentification

Hurst, Ashley Nicole 26 November 2013 (has links)
The current report examines the components and implications of the existing research utilizing the theory of academic disidentification. The theory of academic disidentification proposes a process that accounts for the academic disparity between the academic achievement levels of White and ethnic minority students. The premise hypothesizes that academic achievement only results from an individual’s adaptive integration of their performance in the academic domain with their identity. For ethnic minority students the academic domain presents frequent exposure to stereotype threat whether it occurs on exams or in class participation. Over time, the accumulation of these experiences promote a maladaptive process by which ethnic minority students separate their overall identity from the academic domain, thus undermining the importance of academic achievement. In addition to the analysis of the research, this paper propose a process of academic disidentification and present implications for counselors working with ethnic minority students. / text
335

Normal operations safety survey : measuring system performance in air traffic control

Henry, Christopher Steven 17 April 2014 (has links)
The Normal Operations Safety Survey (NOSS) is an observational methodology to collect safety data during normal Air Traffic Control (ATC) operations. It aims to inform organizations about safety matters by using trained ATC staff to take a structured look at everyday operations. By monitoring normal operations through the use of direct over-the-shoulder observations, it is believed that safety deficiencies can be identified in a proactive manner prior to the occurrence of accidents or incidents. NOSS was developed as a collaborative effort between the International Civil Aviation Organization, ATC providers, controller representatives, government regulators, and academics to fill a gap in available ATC safety information. System designers consider three basic assumptions: the technology needed to achieve the system production goals, the training necessary for people to operate the technology, and the regulations that dictate system behavior. These assumptions represent the expected performance. When systems are deployed, however, particularly in realms as complex as ATC, they do not perform quite as designed. NOSS aims to capture the operational drift that invariably occurs upon system deployment. NOSS captures how the ATC system operates in reality, as opposed to how it was intended to operate. NOSS is premised on the Threat and Error Management (TEM) framework. TEM frames human performance in complex and dynamic settings from an operational perspective by simultaneously focusing on the environment and how operators respond to that environment. TEM posits that threats and errors are a part of everyday operations in ATC and must be managed in order to maintain safety margins. This dissertation describes NOSS and its contributions to ATC safety management systems. It addresses the validity and reliability of NOSS data and presents case studies from field trials conducted by a number of ATC providers. / text
336

Threat Construction inside Bureaucracy : A Bourdieusian Study of the European Commission and the Framing of Irregular Immigration 1974-2009

Svantesson, Monica January 2014 (has links)
This dissertation examines how we construct security threats. Theoretically, it contributes to the literature on securitization and threat construction, which has hitherto overlooked how influential bureaucracies that – in contrast to the police and the military – have little to gain from widened threat perceptions, may still contribute to threat construction. The dissertation studies the European Commission and the issue of irregular immigration. By using frame analysis, it firstly explores what constructions of irregular immigration that the Commission generates and to what extent these contribute to threat construction. Using the Bourdieusian concepts of field, capital and habitus, it secondly analyzes how certain constructions of irregular immigration are authorized at the expense of others, due to the inner bureaucratic logic of the Commission. The empirical result reveals that the Commission mostly defines irregular immigrants as victims, yet simultaneously favors policy solutions that mainly seek to avert immigration. The Commission thus contributes to threat construction primarily through its policy solutions. Studying the inner logic of the Commission field highlights how informal routines and tacit power relations between Commission departments authorize certain frames over others. Importantly, the analysis shows how the naming of irregular immigrants as victims tends not to cost the officials anything in terms of symbolic capital, whereas the suggesting of less restrictive solutions tends to do so. Definitions and policy solutions thus follow different bureaucratic logics, which enables a mismatch between them. Moreover, the threat construction appears not because Commission officials believe that restrictive measures are the only way to solve problems linked to irregular immigration. On the contrary, officials believe that a multitude of solutions are needed. Instead, the threat construction is an unintended consequence of the logic of the field.
337

Improving the performance of airport luggage inspection by providing cognitive and perceptual supports to screeners

Liu, Xi January 2008 (has links)
Recently concern about aviation security has focused on the work of airport security screeners who detect threat items in passengers' luggage. An effective method of training and screening is required for improving screeners' detection abilities and performance to cope with the unreliable human performance of screening. The overall aim of this thesis is to understand and define the potential visual and cognitive factors in the task of inspecting airport passengers' X-ray luggage images, examine usability of perceptual feedback in this demanding task and develop a new method of salient regions which assist screeners to detect targets. The result of this work would obtain knowledge and skills of X-ray luggage images examination, provide insight into the design of training system and develop a method to significantly enhance screeners' detection ability. A questionnaire was developed for screeners to extract the expertise of the screening task and investigate the effect of image features on visual attention. A series of experiments were designed to understand the screening task and explore how knowledge and skills are developed with practice. Results indicated that training under time stressed conditions is recommended for ensuring adequate high detection ability in real life situation as screeners have to balance accuracy and speed in time pressure. The advantages of screeners are better detection ability and search skills which were gained by experience of the search task. Hit rate of naive people was improved with the perceptual exposure of images of threat items. However, scanning did not become efficient. It has demonstrated that detection performance and search skills are improved by the practice of frequency exposure targets in the search task and such ability partly transfer to novel targets. Learning in visual search of threat items is stimuli specific such that familiarity with stimulus and task is the source of performance enhancement. Threat items should be updated constantly and massive amount of X-ray threat objects should be employed for airport security screeners training so as to enlarge object knowledge and enhance recognition ability. Perceptual feedback of circling areas with dwell duration longer than 1000ms does not Significantly improve observers' detection ability in the airport screening task. Features of bags and threat items influence initial attention and attention allocation in the search process. Salient regions, based on the pure stimulus properties, not only contain most of targets in X-ray images but also improve observers' detection performance of high hit rate by forcing observers to scrutinize these areas carefully.
338

Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials

Durán, Felicia Angélica 09 February 2011 (has links)
Safeguards and security (S&S) systems for nuclear facilities include material control and accounting (MC&A) and a physical protection system (PPS) to protect nuclear materials from theft, sabotage and other malevolent human acts. The PPS for a facility is evaluated using probabilistic analysis of adversary paths on the basis of detection, delay, and response timelines to determine timely detection. The path analysis methodology focuses on systematic, quantitative evaluation of the physical protection component for potential external threats, and often calculates the probability that the PPS is effective (PE) in defeating an adversary who uses that attack path. By monitoring and tracking critical materials, MC&A activities provide additional protection against inside adversaries, but have been difficult to characterize in ways that are compatible with the existing path analysis methods that are used to systematically evaluate the effectiveness of a site’s protection system. This research describes and demonstrates a new method to incorporate MC&A protection elements explicitly within the existing probabilistic path analysis methodology. MC&A activities, from monitoring to inventory measurements, provide many, often recurring opportunities to determine the status of critical items, including detection of missing materials. Human reliability analysis methods are applied to determine human error probabilities to characterize the detection capabilities of MC&A activities. An object-based state machine paradigm was developed to characterize the path elements and timing of an insider theft scenario as a race against MC&A activities that can move a facility from a normal state to a heightened alert state having additional detection opportunities. This paradigm is coupled with nuclear power plant probabilistic risk assessment techniques to incorporate the evaluation of MC&A activities in the existing path analysis methodology. Event sequence diagrams describe insider paths through the PPS and also incorporate MC&A activities as path elements. This work establishes a probabilistic basis for incorporating MC&A activities explicitly within the existing path analysis methodology to extend it to address insider threats. The analysis results for this new method provide an integrated effectiveness measure for a safeguards and security system that addresses threats from both outside and inside adversaries. / text
339

"The illegal alien" : how stereotypes in the media can undermine communication performance

Breckinridge, Barbara LeDoux 17 June 2011 (has links)
This report explored the effects of stereotype threat—i.e., the apprehension associated with the possibility of confirming a self-relevant negative stereotype—on the stigmatized group Latinos as they were interviewed about their academic achievements and career aspirations. Latino participants were exposed to a self-relevant negative stereotype in the news, an illegal immigrant crossing the Mexican-American border smuggling drugs, as a stimulus activating stereotype threat. The study used deception as participants were unaware of the connection between the news article and the interview thus ensuring stereotype threat activation. Latino participants in the illegal immigrant/criminal condition displayed more verbal disfluency and tentative language than those in the control condition demonstrating evidence for media’s ability to stereotype threat. / text
340

Monte Carlo based Threat Assessment: An in depth Analysis

Danielsson, Simon January 2007 (has links)
This thesis presents improvements and extensions of a previously presented threat assessment algorithm. The algorithm uses Monte Carlo simulation to find threats in a road scene. It is shown that, by using a wider sample distribution and only apply the most likely samples from the Monte Carlo simulation, for the threat assessment, improved results are obtained. By using this method more realistic paths will be chosen by the simulated vehicles and more complex traffic situations will be adequately handled. An improvement of the dynamic model is also suggested, which improves the realism of the Monte Carlo simulations. Using the new dynamic model less false positive and more valid threats are detected. A systematic method to choose parameters in a stochastic space, using optimisation, is suggested. More realistic trajectories can be chosen, by applying this method on the parameters that represents the human behaviour, in the threat assessment algorithm. A new definition of obstacles in a road scene is suggested, dividing them into two groups, Hard and Soft obstacles. A change to the resampling step, in the Monte Carlo simulation, using the soft and hard obstacles is also suggested.

Page generated in 0.036 seconds