Search results

1 – 10 of 42
Article
Publication date: 15 May 2017

Michael Egnoto, Gary Ackerman, Irina Iles, Holly Ann Roberts, Daniel Steven Smith, Brooke Fisher Liu and Brandon Behlendorf

Testing technologies for policing is costly and laborious. Previous research found that police can be reticent about technology adoption. The purpose of this paper is to examine…

Abstract

Purpose

Testing technologies for policing is costly and laborious. Previous research found that police can be reticent about technology adoption. The purpose of this paper is to examine law enforcement adoption of programmatic innovations focused on particular crime types (radiological and nuclear threats).

Design/methodology/approach

First, an expert police panel explored readiness to adopt an advanced technology (personal radiation detectors (PRDs)). A survey was then developed from the panel findings (n=101 sampled from East Coast metropolitan police).

Findings

Results indicated that on-duty device adoption was likely, but not off-duty. In addition, concerns about ease of carrying PRDs, personal health and security issues, and concerns about job performance were raised. Furthermore, findings suggest that police respond negatively to financial incentives, and focus instead on how innovations can contribute to their own safety and that of their immediate families. Additionally, results indicate that false positives are not a significant barrier to adoption, but device training is important.

Practical implications

This work gives insight how to engage officers more meaningfully in technology adoption for benefit of policing in the field.

Originality/value

This work expands previous police adoption literature and advances understanding of the increasing role officers are taking in counter-terrorism efforts in the USA with applications around the world.

Details

Policing: An International Journal of Police Strategies & Management, vol. 40 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Content available
Book part
Publication date: 14 November 2016

Robert H. Herz

Abstract

Details

More Accounting Changes
Type: Book
ISBN: 978-1-78635-629-1

Open Access

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

Abstract

Details

More Accounting Changes
Type: Book
ISBN: 978-1-78635-629-1

Book part
Publication date: 14 October 2011

Helen Fein, Walter Ezell and Herbert F. Spirer

The breakup of Yugoslavia and the development of conflict and massacres from 1991 to 1993 was widely reported in the West, in contrast with prior patterns of denial, concealment…

Abstract

The breakup of Yugoslavia and the development of conflict and massacres from 1991 to 1993 was widely reported in the West, in contrast with prior patterns of denial, concealment of evidence, lack of recognition, misperception, and avoidance of massacres and genocides since World War II. The chapter addresses reasons why bystanders did not intervene to stop the genocide and check war crimes by asking how the situation was framed by an influential segment of the press. An intensive content analysis in nine leading U.S. newspapers revealed that a majority of articles conformed to moral obligation and rational choice models. The study concludes with a critique of political will for action and the position that it was not the direct influence of the media, which reflected rather than refined perceptions and the recognition of genocide.

Details

Human Rights and Media
Type: Book
ISBN: 978-0-76230-052-5

Article
Publication date: 18 October 2019

Hamid Mohtadi and Bryan Weber

The proliferation of terrorism worldwide raises the risk that terrorist strategies could evolve from conventional methods (e.g. suicide attacks) to biological, chemical and even…

Abstract

Purpose

The proliferation of terrorism worldwide raises the risk that terrorist strategies could evolve from conventional methods (e.g. suicide attacks) to biological, chemical and even radioactive and nuclear attacks (commonly abbreviated as CBRN) which are potentially much more dangerous. The authors make three contributions toward a better understanding of this risk and how it responds to counterterrorism measures.

Design/methodology/approach

The authors develop a game that captures the terrorists’ potential strategic substitution between conventional and CBRN-type attacks; the authors calibrate the parameters of the game to real data using a novel calibration method and a partially unique dataset; they estimate the heavy-tailed distribution of attack severity and thus the probability of a successful attack, the underlying effort to launch an attack and the intrinsic difficulty of launching different types of attacks.

Findings

The authors find that in equilibrium, CBRN attacks, though less likely and more difficult to execute, are more deadly. In the end, the trade-off between, on one hand, the greater difficulty of carrying out a CBRN attack, and on the other, the greater deadliness of such an attack, points to a level of optimal counterterrorism spending by governments that weighs toward defending against CBRN attacks. The authors discuss these results and compare them with the actual level of counterterrorism spending by the US Government.

Originality/value

The framework of the game allows for substitution between the conventional and CBRN weapon types. These aspects of this paper, together with the unique calibration methodology, and the use of some unique terrorism data for the first time, are what distinguish this work from similar game theoretic papers in this area.

Details

Indian Growth and Development Review, vol. 13 no. 2
Type: Research Article
ISSN: 1753-8254

Keywords

Article
Publication date: 1 February 2003

Gary N. Powell and D. Anthony Butterfield

Data gathered by the authors from undergraduate and part‐time graduate business students in 1976‐1977 suggested that men were more likely than women to aspire to top management…

10045

Abstract

Data gathered by the authors from undergraduate and part‐time graduate business students in 1976‐1977 suggested that men were more likely than women to aspire to top management and that, consistent with traditional stereotypes of males and managers, a gender identity consisting of high masculinity and low femininity was associated with aspirations to top management. As a result of gender‐related social changes, we expected the gender difference in aspirations to top management but not the importance of gender identity to have decreased over time. We collected data in 1999 from the same two populations to test these notions. In newly collected data, high masculinity (but not low femininity) was still associated with such aspirations, and men still aspired to top management positions more than women. However, the gender difference in aspirations to top management did not decrease over time.

Details

Women in Management Review, vol. 18 no. 1/2
Type: Research Article
ISSN: 0964-9425

Keywords

Book part
Publication date: 25 July 2008

Barbara J. Jago

This autoethnography considers the role of human relationships in the educational process. Approaching learning as a transformational process rooted in human experience and…

Abstract

This autoethnography considers the role of human relationships in the educational process. Approaching learning as a transformational process rooted in human experience and interaction, I explore the central role of emotion in learning relationships. Through an analysis of a learnable moment experienced in a relational communication course on language, I theorize new ways of “doing” learning relationships.

Details

Studies in Symbolic Interaction
Type: Book
ISBN: 978-1-84663-931-9

Article
Publication date: 1 March 1999

Allan Metz

President Bill Clinton has had many opponents and enemies, most of whom come from the political right wing. Clinton supporters contend that these opponents, throughout the Clinton…

Abstract

President Bill Clinton has had many opponents and enemies, most of whom come from the political right wing. Clinton supporters contend that these opponents, throughout the Clinton presidency, systematically have sought to undermine this president with the goal of bringing down his presidency and running him out of office; and that they have sought non‐electoral means to remove him from office, including Travelgate, the death of Deputy White House Counsel Vincent Foster, the Filegate controversy, and the Monica Lewinsky matter. This bibliography identifies these and other means by presenting citations about these individuals and organizations that have opposed Clinton. The bibliography is divided into five sections: General; “The conspiracy stream of conspiracy commerce”, a White House‐produced “report” presenting its view of a right‐wing conspiracy against the Clinton presidency; Funding; Conservative organizations; and Publishing/media. Many of the annotations note the links among these key players.

Details

Reference Services Review, vol. 27 no. 1
Type: Research Article
ISSN: 0090-7324

Keywords

Book part
Publication date: 6 May 2008

George Thomas

Popular constitutionalists seek to recover the popular sovereignty foundations of American constitutionalism, bringing the people in as active participants in the constitutional…

Abstract

Popular constitutionalists seek to recover the popular sovereignty foundations of American constitutionalism, bringing the people in as active participants in the constitutional enterprise as they create and refashion the Constitution by “majoritarian and populist mechanisms” (Amar, 1995, p. 89). The result is to recover an understanding, in FDR's words, of constitution as a “layman's document, not a lawyer's contract” (Kramer, 2004, p. 207). This understanding has deep roots in American constitutionalism, tracing its lineage back to the founding and, as popular constitutionalists insist, finds powerful expression in the likes of The Federalist and Abraham Lincoln (Ackerman, 1991; Tushnet, 1998). In exercising popular sovereignty, the people founded the Constitution, but they did not simply retreat from the trajectory of constitutional development. Rather, as Bruce Ackerman argues, since the Constitution of 1787 the people have spoken in a manner that has re-founded the Constitution giving us a “multiple origins originalism” (Kersch, 2006a, p. 801; see also Amar, 1998 and 2005). In turning to founding era thought and the notion of constitutional foundations, popular constitutionalists like Ackerman and Amar make common cause with conservatives who turn to original intent, but then they seek to synthesize this understanding with democratic expressions of popular will by emphasizing both formal and informal constitutional change, giving us layered “foundings,” and a more complex version of “living constitutionalism.” Such constitutional change, however, can only legitimately come from an authentic expression of “We the People.”

Details

Special Issue Constitutional Politics in a Conservative Era
Type: Book
ISBN: 978-0-7623-1486-7

1 – 10 of 42