Search results
1 – 10 of over 1000John D Blair, Robert K Keel, Timothy W Nix and K.Wade Vlosich
When modeling environmental jolts from terrorist attacks, various aspects should be analyzed in order to properly present an accurate configuration. The following article…
Abstract
When modeling environmental jolts from terrorist attacks, various aspects should be analyzed in order to properly present an accurate configuration. The following article discusses how asymmetrical warfare has an impact on the outcomes of a terrorist attack. The several dimensions of terrorist attacks can be extracted to deduce the ways that asymmetrical warfare can damage the health care system. The article will relate real life terrorist attacks and hypothetical scenarios to better inform the reader about the weak attacking the strong, and then explain how this relates to health care providers.
An investigation of parallels between homegrown, international, and domestic terrorism.
Abstract
Purpose
An investigation of parallels between homegrown, international, and domestic terrorism.
Methodology/approach
A comparative method is used to analyze data from two main sources, ITERATE data on international and the TWEED data on domestic terrorism. The similarities are tested in various dimensions – target types, severity, and the method of the attacks.
Findings
Homegrown terrorism is inherently motivated by domestic issues. Moreover, variables of ethnic heterogeneity, political inclusiveness of fringe groups, and problems in the democratization process are good predictors of the occurrence of other forms of domestic and homegrown terrorism alike.
Research limitations/implications
Number of observable cases of homegrown terrorism are low. The two main datasets have potentially overlapping incidents.
Originality/value
Provides and operational definition of homegrown terrorism and test empirically the similarity between homegrown and other types of terrorisms.
Details
Keywords
John D. Blair and K.Wade Vlosich
Terrorists’ threats pose a grave danger to the health care environment in which we live. In the following paper, we look at how bioterrorist plots can effect a given population…
Abstract
Terrorists’ threats pose a grave danger to the health care environment in which we live. In the following paper, we look at how bioterrorist plots can effect a given population and show ways to dissect terrorist actions. We look at variables that use various cause and effect relationships, and lead the reader down a path of being able to use information presented in a real life or fictitious bioterrorist attacks. We seek to inform the reader reasons why preparedness is essential in dealing with the likelihood of the following scenarios.
The “war on terror” has nothing to do with protecting the U.S. and world's people from “terrorists”, and everything to do with securing the American empire abroad and muzzling…
Abstract
The “war on terror” has nothing to do with protecting the U.S. and world's people from “terrorists”, and everything to do with securing the American empire abroad and muzzling democracy and human rights at home. The 9-11 attacks were the pretext which sold the myth of evil Muslim terrorists imminently threatening Americans. That tale allowed the Cheney-led members of the Project for the New American Century (PNAC) to implement their 1990 DPG plan for world control. The “war on terror” is modelled on Islamophobic stereotypes, policies, and political structures developed by the Israeli Likkud and Bush Sr. in 1979. It is designed to inspire popular support for U.S. wars of world conquest. To defeat this plan, we must overcome our Islamophobic fear of “terrorists” and stand in solidarity with Muslims.
Carina Boufford and Noëlle O'Connor
This chapter examines the role that strategic marketing plans play throughout the process of destination recovery post terrorist attack for the purpose of encouraging the return…
Abstract
This chapter examines the role that strategic marketing plans play throughout the process of destination recovery post terrorist attack for the purpose of encouraging the return of tourists. It investigates the impact that strategic marketing plans have as a part of crisis management applying a mixed-method approach which utilises survey data examining future industry leaders to quantify perspectives regarding the relationship between terrorism, tourism and destination marketing. Furthermore, this chapter reviews destination marketing techniques employed by international locations to determine recovery strategies utilising marketing plans. Bali, Paris, Northern Ireland, New York, Sri Lanka, Syria, Tunisia and Turkey were selected as case studies because they have been the focus of significant research studies to date (Asia-Pacific Economic Cooperation (APEC): BBC News, 2019; Ferreira, Graciano, Leal, & Costa, 2019) which have primarily focused on the relationship between terrorism and tourism regarding the collapse of the tourism industry. A survey was issued to gain perspectives regarding the relationship between terrorism, tourism and destination marketing. Second, case study analysis was conducted to examine both successful and unsuccessful destination recovery strategies. Results indicate that destinations that utilised strategic marketing as a part of crisis management frameworks experienced the return of tourists and recovered. This research contributed to the development of an inclusive, universal crisis management framework encompassing strategic marketing plans as a tool for recovery.
Details
Keywords
John D Blair, Myron D Fottler and Albert C Zapanta
This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist…
Abstract
This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist activity within the United States, and how these events have led to current situations. It also provides a model for health care leaders to follow when looking at a bioterrorist attack. The model includes descriptions of how the articles within this book relate to an overall bioterrorist formula. Through this, the reader shall be able to deduce which individual article fits into the vastness of healthcare research pertaining to bioterrorism.
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak…
Abstract
Purpose
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.
Methodology/approach
Review of relevant literature.
Findings
The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.
Research limitations/implications
Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.
Originality/value of the chapter
The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.
Details