• No results found

terrorist attack in Paris

The impact of the Paris terrorist attacks on the mental health of resident physicians

The impact of the Paris terrorist attacks on the mental health of resident physicians

... We documented substantial psychological symptoms among Parisian resident physicians two months after the Paris terrorist attacks. We found that 18.5% of the ex- posed residents, either those at the scene of ...

8

Arab Audiences' Dependency on Traditional and New Media as Information Sources about Terrorist Attacks in Paris 2015

Arab Audiences' Dependency on Traditional and New Media as Information Sources about Terrorist Attacks in Paris 2015

... RQ3 asked the effects of respondents' dependency on both traditional and new media as a source of information about these attacks. Media effects on respondents regarding aforementioned attacks were measured by nine ...

26

Arab Audiences' Dependency on Traditional and New Media as Information Sources about Terrorist Attacks in Paris 2015

Arab Audiences' Dependency on Traditional and New Media as Information Sources about Terrorist Attacks in Paris 2015

... An Evaluation of Health News in Turkey in Terms of Media Ethics and Science Journalism.. Ahmet Ender Uysal 1.[r] ...

27

Arab Audiences' Dependency on Traditional and New Media as Information Sources about Terrorist Attacks in Paris 2015

Arab Audiences' Dependency on Traditional and New Media as Information Sources about Terrorist Attacks in Paris 2015

... Zavattini here defines the ethical thinking as well as the humanistic and cinematic approach behind the neo-realist revolution that transformed the practice of fic[r] ...

7

Terrorist Attack in France: A Lesson to India

Terrorist Attack in France: A Lesson to India

... Terrorism today poses the gravest threat to a country’s sovereignty and integrity. It subverts the fundamental Rule of Law, denies rights to the citizens, endangers the social fabric and threatens political and economic ...

16

Aviation Law: Warsaw Convention Liability Principles Extend to Damage from Terrorist Attack

Aviation Law: Warsaw Convention Liability Principles Extend to Damage from Terrorist Attack

... Before plain- tiff could complete the required processing and begin her flight to New York on defendant TransWorld Airlines, two Jordanian terrorists entered the term[r] ...

10

An Evaluation of Hybrid Machine Learning Classifier Models for Identification of Terrorist Groups in the Aftermath of an Attack

An Evaluation of Hybrid Machine Learning Classifier Models for Identification of Terrorist Groups in the Aftermath of an Attack

... In this study the problem of terrorism is addressed by using machine learning techniques. The GTD dataset is used to build machine learning algorithms. The dataset has been processed by using various pre-processing ...

9

Christchurch Terrorist Attack, The Far Right and Social Media: What can we learn?

Christchurch Terrorist Attack, The Far Right and Social Media: What can we learn?

... Christchurch attack being filmed on a live Facebook stream by the gunman, there have been calls for regulation of social media and internet companies to minimise the posting of hate inspired ...

14

Military aid, direct intervention and counterterrorism

Military aid, direct intervention and counterterrorism

... We assume that direct intervention by the home government could have ”blowback” effects that help the terrorists. For instance, the continued US drone strikes in Pakistan, despite repeated protests by the Pakistani ...

49

Terrorism and relative justice

Terrorism and relative justice

... perpetrator. Terrorist communities become the victims in very similar contexts but from the perspective of victor’s justice little regard is paid to their ‘victimisation’, evolving as a necessary consequence of ...

14

FIGHTING SOCIAL TERRORISM THROUGH CYBER SECURITY

FIGHTING SOCIAL TERRORISM THROUGH CYBER SECURITY

... of attack by hostile ...for terrorist groups to gain access to ...Determined terrorist groups can also gain access to WMD through covert independent research efforts or by hiring technically skilled ...

7

important to participate in the building of new ideas, to criticize the established order and

Download Download PDF

... terrorist attack. Major variables include the location of the attack, the lethality of the attack, and political party of the president at the time of the ...

67

Terrorist transgressions: exploring the gendered representations of the terrorist

Terrorist transgressions: exploring the gendered representations of the terrorist

... the Terrorist Trans- gressions network which is presented here was to analyse the myths inscribed in images of the terrorist and identify how agency is attributed to representa- tion through invocations and ...

16

Anycast for DDoS

Anycast for DDoS

... For all prepending strategies, the primary goal, i.e. moving the DDoS traffic to a predefined site, was reached in 12 out of 24 cases. This means that for most prepending strategies the success rate was not very high. ...

66

The lone wolf terrorist: sprees of violence

The lone wolf terrorist: sprees of violence

... the attack method of choice for many of the lone wolf terrorists whose behaviour has been documented in both the United States and throughout ...dominant attack methods deployed by the lone wolves active in ...

11

POST TRAUMATIC STRESS DISORDERS AMONG STUDENTS AFTER ARMY PUBLIC SCHOOL PESHAWAR ATTACK 2014

POST TRAUMATIC STRESS DISORDERS AMONG STUDENTS AFTER ARMY PUBLIC SCHOOL PESHAWAR ATTACK 2014

... Main study limitation included a moderate re- sponse rate and a cross-sectional design. Thus, we cannot exclude the possibility of sampling bias and only discussed possible causal direction. The present study might also ...

5

Real Time Detection, Tracking, and Monitoring of Automatically Discovered Events in Social Media

Real Time Detection, Tracking, and Monitoring of Automatically Discovered Events in Social Media

... For example, taking the Tweet about the Westgate terrorist attack used in the previous section as input on September 21st 2013 at 10:15am, the real-time tracking subcomponent retrieved t[r] ...

6

Population characteristics of golden retriever lifetime study enrollees

Population characteristics of golden retriever lifetime study enrollees

... the terrorist attack sites [3, 4], Generation Pup, a study following dogs of all breeds from puppy- to adulthood, and Dogslife, a web-based study, which reported data re- garding about 4300 Labrador ...

7

Vigilant Spy Robot used in Warfield

Vigilant Spy Robot used in Warfield

... We propose a new tanker robot to detect and attack the intruder in the battle area. We can control the tanker from remote area using Zigbee wireless technology. Wireless CCTV camera is placed on the tanker. The ...

8

Policing Cyber Terrorism

Policing Cyber Terrorism

... After information has been gained on the system an attack is launched into the targeted system. The purpose of the attack is to penetrate the defenses of the system. This phase evaluates the targets ...

7

Show all 10000 documents...

Related subjects