Search results

1 – 10 of over 1000
Book part
Publication date: 1 June 2004

John D Blair, Robert K Keel, Timothy W Nix and K.Wade Vlosich

When modeling environmental jolts from terrorist attacks, various aspects should be analyzed in order to properly present an accurate configuration. The following article…

Abstract

When modeling environmental jolts from terrorist attacks, various aspects should be analyzed in order to properly present an accurate configuration. The following article discusses how asymmetrical warfare has an impact on the outcomes of a terrorist attack. The several dimensions of terrorist attacks can be extracted to deduce the ways that asymmetrical warfare can damage the health care system. The article will relate real life terrorist attacks and hypothetical scenarios to better inform the reader about the weak attacking the strong, and then explain how this relates to health care providers.

Details

Bioterrorism Preparedness, Attack and Response
Type: Book
ISBN: 978-1-84950-268-9

Book part
Publication date: 21 June 2014

Kaisa Hinkkainen

An investigation of parallels between homegrown, international, and domestic terrorism.

Abstract

Purpose

An investigation of parallels between homegrown, international, and domestic terrorism.

Methodology/approach

A comparative method is used to analyze data from two main sources, ITERATE data on international and the TWEED data on domestic terrorism. The similarities are tested in various dimensions – target types, severity, and the method of the attacks.

Findings

Homegrown terrorism is inherently motivated by domestic issues. Moreover, variables of ethnic heterogeneity, political inclusiveness of fringe groups, and problems in the democratization process are good predictors of the occurrence of other forms of domestic and homegrown terrorism alike.

Research limitations/implications

Number of observable cases of homegrown terrorism are low. The two main datasets have potentially overlapping incidents.

Originality/value

Provides and operational definition of homegrown terrorism and test empirically the similarity between homegrown and other types of terrorisms.

Book part
Publication date: 1 June 2004

John D. Blair and K.Wade Vlosich

Terrorists’ threats pose a grave danger to the health care environment in which we live. In the following paper, we look at how bioterrorist plots can effect a given population…

Abstract

Terrorists’ threats pose a grave danger to the health care environment in which we live. In the following paper, we look at how bioterrorist plots can effect a given population and show ways to dissect terrorist actions. We look at variables that use various cause and effect relationships, and lead the reader down a path of being able to use information presented in a real life or fictitious bioterrorist attacks. We seek to inform the reader reasons why preparedness is essential in dealing with the likelihood of the following scenarios.

Details

Bioterrorism Preparedness, Attack and Response
Type: Book
ISBN: 978-1-84950-268-9

Abstract

Details

Terrorism and Counter-Terrorism
Type: Book
ISBN: 978-0-76231-040-1

Abstract

Details

Multinational Enterprises and Terrorism
Type: Book
ISBN: 978-1-83867-585-1

Book part
Publication date: 14 July 2006

Diana Ralph

The “war on terror” has nothing to do with protecting the U.S. and world's people from “terrorists”, and everything to do with securing the American empire abroad and muzzling…

Abstract

The “war on terror” has nothing to do with protecting the U.S. and world's people from “terrorists”, and everything to do with securing the American empire abroad and muzzling democracy and human rights at home. The 9-11 attacks were the pretext which sold the myth of evil Muslim terrorists imminently threatening Americans. That tale allowed the Cheney-led members of the Project for the New American Century (PNAC) to implement their 1990 DPG plan for world control. The “war on terror” is modelled on Islamophobic stereotypes, policies, and political structures developed by the Israeli Likkud and Bush Sr. in 1979. It is designed to inspire popular support for U.S. wars of world conquest. To defeat this plan, we must overcome our Islamophobic fear of “terrorists” and stand in solidarity with Muslims.

Details

The Hidden History of 9-11-2001
Type: Book
ISBN: 978-1-84950-408-9

Abstract

Details

Challenges of the Muslim World
Type: Book
ISBN: 978-0-444-53243-5

Book part
Publication date: 7 November 2022

Carina Boufford and Noëlle O'Connor

This chapter examines the role that strategic marketing plans play throughout the process of destination recovery post terrorist attack for the purpose of encouraging the return…

Abstract

This chapter examines the role that strategic marketing plans play throughout the process of destination recovery post terrorist attack for the purpose of encouraging the return of tourists. It investigates the impact that strategic marketing plans have as a part of crisis management applying a mixed-method approach which utilises survey data examining future industry leaders to quantify perspectives regarding the relationship between terrorism, tourism and destination marketing. Furthermore, this chapter reviews destination marketing techniques employed by international locations to determine recovery strategies utilising marketing plans. Bali, Paris, Northern Ireland, New York, Sri Lanka, Syria, Tunisia and Turkey were selected as case studies because they have been the focus of significant research studies to date (Asia-Pacific Economic Cooperation (APEC): BBC News, 2019; Ferreira, Graciano, Leal, & Costa, 2019) which have primarily focused on the relationship between terrorism and tourism regarding the collapse of the tourism industry. A survey was issued to gain perspectives regarding the relationship between terrorism, tourism and destination marketing. Second, case study analysis was conducted to examine both successful and unsuccessful destination recovery strategies. Results indicate that destinations that utilised strategic marketing as a part of crisis management frameworks experienced the return of tourists and recovered. This research contributed to the development of an inclusive, universal crisis management framework encompassing strategic marketing plans as a tool for recovery.

Details

The Emerald Handbook of Destination Recovery in Tourism and Hospitality
Type: Book
ISBN: 978-1-80262-073-3

Keywords

Book part
Publication date: 1 June 2004

John D Blair, Myron D Fottler and Albert C Zapanta

This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist…

Abstract

This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist activity within the United States, and how these events have led to current situations. It also provides a model for health care leaders to follow when looking at a bioterrorist attack. The model includes descriptions of how the articles within this book relate to an overall bioterrorist formula. Through this, the reader shall be able to deduce which individual article fits into the vastness of healthcare research pertaining to bioterrorism.

Details

Bioterrorism Preparedness, Attack and Response
Type: Book
ISBN: 978-1-84950-268-9

Book part
Publication date: 21 June 2014

Giampiero Giacomello

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak…

Abstract

Purpose

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.

Methodology/approach

Review of relevant literature.

Findings

The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.

Research limitations/implications

Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.

Originality/value of the chapter

The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.

1 – 10 of over 1000