Matches in SemOpenAlex for { <https://semopenalex.org/work/W320533059> ?p ?o ?g. }
Showing items 1 to 71 of
71
with 100 items per page.
- W320533059 abstract "Terrorists' technology choices are a key part of their ability to create fear in target populations and audiences. Terrorists' interaction with technologies that perform key functions within modern society - e.g., communications or infrastructures - can also be strategies through which they can produce damage and fear. It is the way the terrorist chooses to apply technologies - to cause death and destruction - that sets him apart from the criminal who may be comparably armed and equipped but who uses those technologies for personal or material gain. For homeland security organizations, 1 responses to terrorist threats frequently gravitate toward the use of defensive technical systems. Significant sums of public and private funds have been allocated for development and fielding of security technologies and reduction of societal vulnerabilities. Making good decisions about investments in defensive systems - many of which are costly and intended to reduce the threat of terrorist attack over the long term - requires understanding the interaction between the technology strategies of the terrorist and those of the organizations charged with defending against them.Technical aspects of the fight between states and non-state groups are frequently portrayed as a discrete interaction between the capabilities of the terrorist and those of the defender. The vehicle bomb is pitted against the perimeter security and any protective blast-resistant features built into its target; the anthrax-containing letter against the detectors in the mail system; the weapon smuggled in hand luggage against the technologies and training of airport security systems and personnel. At the end of this one-on-one interaction between weapon and defense, the attacker and defender step back to see if the terrorist was successful. Drilling deeper, however, makes looking at the fight as a set of discrete interactions appear increasingly artificial. Examination of the technological elements of terrorism invariably highlights the dynamic nature of the problems faced by the defense. The bomb planted by a terrorist group tomorrow will frequently differ from the bomb planted today: the terrorists change the explosive composition, modify the detonator circuitry, and alter the tactics used. The next day, the bomb may be discarded entirely as the group shifts to new attack modes, alternative weapons, and novel tactics.Some of these adaptations will have nothing to do with the actions taken by the defender, resulting simply from the desire of the terrorists to be more effective or lethal. Detonator modifications may be an attempt to reduce premature explosions that kill only the terrorists. The appearance of a new weapon may simply mean that the group is seizing an opportunity, i.e. through theft, purchase, or gift; the organization obtains a new tool and wants to use it. Frequently, however, terrorists' adaptation has everything to do with the steps taken to defeat them. New remote-control initiators are needed because the defender is jamming the groups' current detonator or standoff weapons are acquired because security measures keep the terrorists away from desirable targets.The opportunity for each side of the conflict to influence the other means the interaction between them is more complex and much richer than merely a sequential set of discrete clashes - and that defensive planning cannot be approached as if the terrorism problem can be solved if simply the right defensive measure can be crafted and deployed. At the minimum, it is a multi-turn game involving many distinct players, where future clashes are informed by past actions - and by attempts to foresee future actions. But the depth of interaction goes further still: neither side limits its activities to perfecting its own future strategies based on the outcome of previous clashes, but also seeks to shape the environment of its opponent, even in the absence of direct interactions between them. …" @default.
- W320533059 created "2016-06-24" @default.
- W320533059 creator A5031488478 @default.
- W320533059 date "2009-01-01" @default.
- W320533059 modified "2023-09-24" @default.
- W320533059 title "Technology Strategies for Homeland Security Adaptation and Coevolution of Offense and Defense" @default.
- W320533059 hasPublicationYear "2009" @default.
- W320533059 type Work @default.
- W320533059 sameAs 320533059 @default.
- W320533059 citedByCount "1" @default.
- W320533059 crossrefType "journal-article" @default.
- W320533059 hasAuthorship W320533059A5031488478 @default.
- W320533059 hasConcept C108827166 @default.
- W320533059 hasConcept C11413529 @default.
- W320533059 hasConcept C144133560 @default.
- W320533059 hasConcept C154945302 @default.
- W320533059 hasConcept C17744445 @default.
- W320533059 hasConcept C199539241 @default.
- W320533059 hasConcept C203133693 @default.
- W320533059 hasConcept C207267971 @default.
- W320533059 hasConcept C2778880830 @default.
- W320533059 hasConcept C38652104 @default.
- W320533059 hasConcept C41008148 @default.
- W320533059 hasConcept C48103436 @default.
- W320533059 hasConcept C506469952 @default.
- W320533059 hasConcept C528167355 @default.
- W320533059 hasConcept C94625758 @default.
- W320533059 hasConceptScore W320533059C108827166 @default.
- W320533059 hasConceptScore W320533059C11413529 @default.
- W320533059 hasConceptScore W320533059C144133560 @default.
- W320533059 hasConceptScore W320533059C154945302 @default.
- W320533059 hasConceptScore W320533059C17744445 @default.
- W320533059 hasConceptScore W320533059C199539241 @default.
- W320533059 hasConceptScore W320533059C203133693 @default.
- W320533059 hasConceptScore W320533059C207267971 @default.
- W320533059 hasConceptScore W320533059C2778880830 @default.
- W320533059 hasConceptScore W320533059C38652104 @default.
- W320533059 hasConceptScore W320533059C41008148 @default.
- W320533059 hasConceptScore W320533059C48103436 @default.
- W320533059 hasConceptScore W320533059C506469952 @default.
- W320533059 hasConceptScore W320533059C528167355 @default.
- W320533059 hasConceptScore W320533059C94625758 @default.
- W320533059 hasIssue "1" @default.
- W320533059 hasLocation W3205330591 @default.
- W320533059 hasOpenAccess W320533059 @default.
- W320533059 hasPrimaryLocation W3205330591 @default.
- W320533059 hasRelatedWork W1590485696 @default.
- W320533059 hasRelatedWork W179115848 @default.
- W320533059 hasRelatedWork W1986213249 @default.
- W320533059 hasRelatedWork W2012921695 @default.
- W320533059 hasRelatedWork W2019176210 @default.
- W320533059 hasRelatedWork W209909954 @default.
- W320533059 hasRelatedWork W2146309611 @default.
- W320533059 hasRelatedWork W2279262227 @default.
- W320533059 hasRelatedWork W237806603 @default.
- W320533059 hasRelatedWork W2489171000 @default.
- W320533059 hasRelatedWork W2543247733 @default.
- W320533059 hasRelatedWork W2546558095 @default.
- W320533059 hasRelatedWork W2761304733 @default.
- W320533059 hasRelatedWork W2891140859 @default.
- W320533059 hasRelatedWork W302985343 @default.
- W320533059 hasRelatedWork W3164505755 @default.
- W320533059 hasRelatedWork W324704131 @default.
- W320533059 hasRelatedWork W756101424 @default.
- W320533059 hasRelatedWork W916258141 @default.
- W320533059 hasRelatedWork W190917316 @default.
- W320533059 hasVolume "5" @default.
- W320533059 isParatext "false" @default.
- W320533059 isRetracted "false" @default.
- W320533059 magId "320533059" @default.
- W320533059 workType "article" @default.