1,215 research outputs found
Bombers and bystanders in suicide attacks in Israel, 2000 to 2003
The paper analyses the results of interaction between suicide operatives and
bystanders in the course of 103 suicide attacks in Israel over a recent threeyear
period. It shows that bystandersâ intervention tended to reduce the
casualties arising by numbers that were both statistically and practically
significant. When bystanders intervened, however, this was often at the cost of
their own lives. The value of a challenge was particularly large for suicide
missions associated with Hamas, but Hamas operations were also less likely to
meet a challenge in the first place. These findings, while preliminary, may
have implications for counter-terrorism. More systematic collection of
statistical data relating to suicide incidents would be of benefit
Palestinian Film: Hyperreality, Narrative, and Ideology
Both sides of the Israeli-Palestinian conflict have developed diametrically opposed national narratives and identities that are both predicated on the concept of victimization. These narratives have developed into simulacral narratives as the result of the nature of their development. This paper deals with the Palestinian simulacral narrative which bolsters societal values, particularly the value of victimhood, that are crucial to coping with the prolonged conflict. The Western media, at any given moment during the conflict, has either accepted the concept of Palestinian\u27s as victims of the conflict and the Palestinian simulacral narrative, or rejected it. The media then produces a hyperreality of the conflict for its Western viewers which influences the West\u27s acceptance or rejection of the Palestinian simulacral narrative. This paper uses Michel Khleifi\u27s Canticle of the Stones, Hany Abu-Assad\u27s Paradise Now, and Elia Sulieman\u27s Chronicle of a Disappearance and Divine Intervention to examine the degree to which Palestinian films confirm or contradict the societal beliefs that contribute to the prolongation of the conflict and the relationship between the presentation of those beliefs, the hyperreality of the Western community, and Western public opinion. It also examines the relationship between the presentation of violence in the films and the presence of violence in Palestine
Suicide bomb attack identification and analytics through data mining techniques
Suicide bomb attacks are a high priority concern nowadays for every country in the world. They are a massively destructive criminal activity known as terrorism where one explodes a bomb attached to himself or herself, usually in a public place, taking the lives of many. Terrorist activity in different regions of the world depends and varies according to geopolitical situations and significant regional factors. There has been no significant work performed previously by utilizing the Pakistani suicide attack dataset and no data mining-based solutions have been given related to suicide attacks. This paper aims to contribute to the counterterrorism initiative for the safety of this world against suicide bomb attacks by extracting hidden patterns from suicidal bombing attack data. In order to analyze the psychology of suicide bombers and find a correlation between suicide attacks and the prediction of the next possible venue for terrorist activities, visualization analysis is performed and data mining techniques of classification, clustering and association rule mining are incorporated. For classification, NaĂŻve Bayes, ID3 and J48 algorithms are applied on distinctive selected attributes. The results exhibited by classification show high accuracy against all three algorithms applied, i.e., 73.2%, 73.8% and 75.4%. We adapt the K-means algorithm to perform clustering and, consequently, the risk of blast intensity is identified in a particular location. Frequent patterns are also obtained through the Apriori algorithm for the association rule to extract the factors involved in suicide attacks
Designing and Operating Safe and Secure Transit Systems: Assessing Current Practices in the United States and Abroad, MTI Report 04-05
Public transit systems around the world have for decades served as a principal venue for terrorist acts. Today, transit security is widely viewed as an important public policy issue and is a high priority at most large transit systems and at smaller systems operating in large metropolitan areas. Research on transit security in the United States has mushroomed since 9/11; this study is part of that new wave of research. This study contributes to our understanding of transit security by (1) reviewing and synthesizing nearly all previously published research on transit terrorism; (2) conducting detailed case studies of transit systems in London, Madrid, New York, Paris, Tokyo, and Washington, D.C.; (3) interviewing federal officials here in the United States responsible for overseeing transit security and transit industry representatives both here and abroad to learn about efforts to coordinate and finance transit security planning; and (4) surveying 113 of the largest transit operators in the United States. Our major findings include: (1) the threat of transit terrorism is probably not universalâmost major attacks in the developed world have been on the largest systems in the largest cities; (2) this asymmetry of risk does not square with fiscal politics that seek to spread security funding among many jurisdictions; (3) transit managers are struggling to balance the costs and (uncertain) benefits of increased security against the costs and (certain) benefits of attracting passengers; (4) coordination and cooperation between security and transit agencies is improving, but far from complete; (5) enlisting passengers in surveillance has benefits, but fearful passengers may stop using public transit; (6) the role of crime prevention through environmental design in security planning is waxing; and (7) given the uncertain effectiveness of antitransit terrorism efforts, the most tangible benefits of increased attention to and spending on transit security may be a reduction in transit-related person and property crimes
Recommended from our members
Children as Potential Targets of Terrorism: Conference Report
The working group was an assembly of top thinkers who through their professional and personal endeavours stand poised to consider the implications of children as explicit targets of terrorism and provide directions for research and policy. The group was structured to be a small, select convergence of high-level persons situated in a forum of free discussion. An underlying objective of the group is for participants to be a resource for each other as well as select communities including policy makers and media. The group will convene periodically as issues emerge and research directions develop. The meeting was structured around four conversations: Veracity of the threat; Prevention and Preparedness; Health System Response; and Psychological Consequences. This meeting report will follow the order of the speakers
Exitus: An Agent-Based Evacuation Simulation Model For Heterogeneous Populations
Evacuation planning for private-sector organizations is an important consideration given the continuing occurrence of both natural and human-caused disasters that inordinately affect them. Unfortunately, the traditional management approach that is focused on fire drills presents several practical challenges at the scale required for many organizations but especially those responsible for national critical infrastructure assets such as airports and sports arenas. In this research we developed Exitus, a comprehensive decision support system that may be used to simulate large-scale evacuations of such structures. The system is unique because it considers individuals with disabilities explicitly in terms of physical and psychological attributes. It is also capable of classifying the environment in terms of accessibility characteristics encompassing various conditions that have been shown to have a disproportionate effect upon the behavior of individuals with disabilities during an emergency. The system was applied to three unique test beds: a multi-story office building, an international airport, and a major sports arena. Several simulation experiments revealed specific areas of concern for both building managers and management practice in general. In particular, we were able to show (a) how long evacuations of heterogeneous populations may be expected to last, (b) who the most vulnerable groups of people are, (c) the risk engendered from particular design features for individuals with disabilities, and (d) the potential benefits from adopting alternate evacuation strategies, among others. Considered together, the findings provide a useful foundation for the development of best practices and policies addressing the evacuation concerns surrounding heterogeneous populations in large, complex environments. Ultimately, a capabilities based approach featuring both tactical and strategic planning with an eye toward the unique problems presented by individuals with disabilities is recommended
Recommended from our members
Data-driven System Design in Service Operations
The service industry has become an increasingly important component in the world's economy. Simultaneously, the data collected from service systems has grown rapidly in both size and complexity due to the rapid spread of information technology, providing new opportunities and challenges for operations management researchers. This dissertation aims to explore methodologies to extract information from data and provide powerful insights to guide the design of service delivery systems. To do this, we analyze three applications in the retail, healthcare, and IT service industries. In the first application, we conduct an empirical study to analyze how waiting in queue in the context of a retail store affects customers' purchasing behavior. The methodology combines a novel dataset collected via video recognition technology with traditional point-of-sales data. We find that waiting in queue has a nonlinear impact on purchase incidence and that customers appear to focus mostly on the length of the queue, without adjusting enough for the speed at which the line moves. We also find that customers' sensitivity to waiting is heterogeneous and negatively correlated with price sensitivity. These findings have important implications for queueing system design and pricing management under congestion. The second application focuses on disaster planning in healthcare. According to a U.S. government mandate, in a catastrophic event, the New York City metropolitan areas need to be capable of caring for 400 burn-injured patients during a catastrophe, which far exceeds the current burn bed capacity. We develop a new system for prioritizing patients for transfer to burn beds as they become available and demonstrate its superiority over several other triage methods. Based on data from previous burn catastrophes, we study the feasibility of being able to admit the required number of patients to burn beds within the critical three-to-five-day time frame. We find that this is unlikely and that the ability to do so is highly dependent on the type of event and the demographics of the patient population. This work has implications for how disaster plans in other metropolitan areas should be developed. In the third application, we study workers' productivity in a global IT service delivery system, where service requests from possibly globally distributed customers are managed centrally and served by agents. Based on a novel dataset which tracks the detailed time intervals an agent spends on all business related activities, we develop a methodology to study the variation of productivity over time motivated by econometric tools from survival analysis. This approach can be used to identify different mechanisms by which workload affects productivity. The findings provide important insights for the design of the workload allocation policies which account for agents' workload management behavior
Religion, Terrorism and Public Goods: Testing the Club Model
Can rational choice modeling explain why Hamas, Taliban, Hezbollah and other radical religious rebels are so lethal? The literature rejects theological explanations. We propose a club framework, which emphasizes the function of voluntary religious organizations as efficient providers of local public goods in the absence of government provision. The sacrifices religious clubs require are economically efficient (Iannaccone (1992)), making them well suited for solving the extreme principal-agent problems faced by terrorist and insurgent organizations. Thus religious clubs can be potent terrorists. That explanation is supported by data on terrorist lethality in the Middle East. The same approach explains why religious clubs often choose suicide attacks. Using three data sources spanning a half century, and comparing suicide attackers to civil war insurgents, we show that suicide attacks are chosen when targets are "hard," i.e., difficult to destroy. Data from Israel/Palestine confirm that prediction. To explain why radical religious clubs specialize in suicide attacks we model the choice of tactics by rebels attacking hard targets, considering the human costs and tactical benefits of suicide attacks. We ask what a suicide attacker would have to believe to be rational. We then embed that attacker and other operatives in a club model. The model has testable implications for tactic choice and damage achieved by clubs and other rebels, which are supported by data on terrorist attacks in the Middle East: Radical religious clubs are more lethal and choose suicide terrorism more often, when they provide benign local public goods. Our results suggest benign tactics to counter terrorism by religious radicals.
- âŠ