76,124 research outputs found

    Values Following a Major Terrorist Incident: Finnish Adolescent and Student Values Before and After September 11, 2001

    Get PDF
    The horrific terrorist attacks on the United States on September 11, 2001, left an indelible mark on perceptions of security and threat across the world. This paper uses Schwartz’s (1992) value circumplex model to examine value change across matched high school and university student samples in Finland, questioned before and after the World Trade Center (WTC) and associated attacks. In Study 1 (N5419), security values of adolescents were higher the day following the WTC attacks than before, but fell back toward pre-attack levels in the subsequent two samples. In contrast, levels of stimulation were lower following the terrorist incidents. In Study 2 (N5222), security levels of students were also higher following the WTC attacks, but again were closer to pre-attack levels in a subsequent cohort

    The Lived Experience of Cultural Immersion

    Get PDF
    This article presents the findings of a grounded theory study of 3 graduate students\u27 lived experience of cultural immersion. Results indicated that participants experienced 3 phases (goal setting, interaction, and evaluation) and 4 themes (bias, gender, barriers, and self-awareness) during immersion. Recommendations for the implementation of immersion experiences are discussed

    Understanding The Decision-Making Process of Local Level Emergency Managers and Future Impacts of Social Data

    Get PDF
    During the course of a natural disaster, affected populations turn to different avenues to attempt to communicate their needs and locations while emergency managers are faced with the task of making quick decisions to aid in the response effort. The decisions that emergency managers face are affected by factors such as available resources, responder safety, and source of information. In this research, we interview emergency managers about the 2009 North American Ice Storm and a flooding event in late April of 2017 to understand the decisions made and the factors that affected these decisions. Using these interviews, a list of interview questions using the Critical Decision Method were created that could be used to more deeply understand the decisions and decision-making process of a local-level emergency manager during a disaster response event. Additionally, animations were created to illustrate the comparative effectiveness of disaster response routing plans developed with and without the consideration of social data based on data inspired by a real event

    Teaching Information Security Management Using an Incident of Intellectual Property Leakage

    Get PDF
    Case-based learning (CBL) is a powerful pedagogical method of creating dialogue between theory and practice. CBL is particularly suited to executive learning as it instigates critical discussion and draws out relevant experiences. In this paper we used a real-world case to teach Information Security Management to students in Management Information Systems. The real-world case is described in a legal indictment (T-mobile USA Inc v. Huawei Device USA Inc. and Huawei Technologies Co. LTD) alleging theft of intellectual property (trade secrets) and breaches of contract concerning confidentiality and disclosure of sensitive information. The incident concerns a mobile phone testing robot (Tappy) developed by T-mobile USA to automate testing of mobile phones prior to launch. Tmobile alleges Huawei stole the technology by copying the robot’s specifications and stealing parts and software to develop its own testing robot. The incident scenario is interesting as it relates to a business asset that has both digital and physical components that has been compromised through an unconventional cyber-physical attack facilitated by insiders. The scenario sparked an interesting debate among students about the scope and definition of security incidents, the role and structure of the security unit, the utility of compliance-based approaches to security, and the inadequate use of threat intelligence in modern security strategies

    Toward a Strategic Human Resource Management Model of High Reliability Organization Performance

    Get PDF
    In this article, we extend strategic human resource management (SHRM) thinking to theory and research on high reliability organizations (HROs) using a behavioral approach. After considering the viability of reliability as an organizational performance indicator, we identify a set of eight reliability-oriented employee behaviors (ROEBs) likely to foster organizational reliability and suggest that they are especially valuable to reliability seeking organizations that operate under “trying conditions”. We then develop a reliability-enhancing human resource strategy (REHRS) likely to facilitate the manifestation of these ROEBs. We conclude that the behavioral approach offers SHRM scholars an opportunity to explain how people contribute to specific organizational goals in specific contexts and, in turn, to identify human resource strategies that extend the general high performance human resource strategy (HPHRS) in new and important ways

    The assessment of treatment-related issues and risk in sex offenders and abusers with intellectual disability

    Get PDF

    First Responder Training Transfer: Does Training Delivery Method Matter?

    Get PDF
    Technology-based training solutions are increasingly being utilized by organizations to achieve training objectives at lower costs as compared to traditional instructor-led training (ILT). This is especially true for the Nation’s first responder agencies that continue to face difficulties related to expanding training requirements that are pitted against limitations in agency financial and human resources. Despite the proliferation in the use of technology-based training solutions, such as web-based training (WBT), there is little research within the first responder community as to whether WBT is as effective as ILT in enabling trainees to transfer essential knowledge, skills, abilities (KSAs) from a training course to daily job settings. This study addressed this research gap through secondary data analysis of ILT and WBT courses developed by the Rural Domestic Preparedness Consortium (RDPC), a Federal Emergency Management Agency (FEMA) training provider, and subsequently delivered to first responders in rural communities across the United States. The secondary data analyzed within this study was originally obtained through the RDPC Level 3 Course Evaluation Program, which evaluates the training effectives of delivered courses. Although the RDPC program captures training transfer-related data for its courses, a comparative analysis of training delivery method has not been completed. Therefore, this analysis enabled the determination as to whether training transfer within the first responder community is affected by the training delivery method as well as other trainee characteristics (e.g., responder discipline and geographical region). Overall, the research findings suggest that training transfer is unaffected by training delivery method (ILT and WBT within this study) within the first responder community. The study results are important for first responder agencies in light of budget limitations, which tend to be exaggerated in small and rural areas. For example, the results illustrate that first responder agencies can utilize cost-effective WBT and experience no drop-off in training transfer. This finding provides justification to training providers, such as the RDPC, to invest in WBT course development and expanded delivery mechanisms to help provide training in more effective and efficient ways, which is important in small, rural, and remote communities. Lastly, this research provides valuable insight for both the first responder and academic communities by presenting information to help ensure the right trainee takes the right training at the right time for the right investment

    Gender and the Enactment of Suicide Bombings by Boko Haram

    Get PDF
    The Boko Haram terror group has utilized more women as suicide bombers than any other group in history. While prior research has examined why this phenomenon is occurring, and what makes Boko Haram a unique terror group, the present study examines how these attacks are being perpetrated, or enacted, by the female bombers. Utilizing the Global Terrorism Database (GTD), which is the largest terrorism incident database available, the study examined the incidents of female suicide bombings perpetrated by Boko Haram. The open-sourced citations provided by the GTD were compiled and turned into a complementary qualitative dataset. Overall, there were 151 incidents of female suicide bombings by Boko Haram between 2014 and 2017, of which 102 were included in the final sample for the study. Results of content analysis indicate that there are similarities between the perpetration of suicide bombings by females and other acts of crime, violence, and terrorist acts committed by other women, but there are also distinct differences. The cultural and social constructs of the region create a unique situation for Boko Haram compared to other terrorist groups that have deployed the female suicide bombing tactic; however, these features also make it difficult to flesh out the overarching issues of coercion, victimization, and kidnapping that the group heavily relies on. Though the ways in which the suicide attacks are enacted can be examined, at this point, it is still unclear whether the young women and girls perpetrating the attacks are acting out of their own volition, high levels of coercion, or a blend of the two
    corecore