It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:884360525:3397
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:884360525:3397?format=raw

LEADER: 03397cam a2200421 i 4500
001 013790722-2
005 20131002093618.0
008 130614s2013 caua b 000 0 eng
010 $a 2013024014
020 $a9780833080929 (pbk. : alk. paper)
020 $a083308092X (pbk. : alk. paper)
035 0 $aocn848393355
040 $aDLC$beng$erda$cDLC$dOCLCO$dYDXCP$dOUN$dTXA
042 $apcc
043 $an-us---
050 00 $aHV6431$b.D3268 2013
060 00 $a2014 M-080
060 10 $aHV 6431
082 00 $a363.325/12$223
100 1 $aDavis, Paul K.,$d1952-
245 10 $aUsing behavioral indicators to help detect potential violent acts :$ba review of the science base /$cPaul K. Davis, Walter L. Perry, Ryan Andrew Brown, Douglas Yeung, Parisa Roshan, Phoenix Voorhies.
264 1 $aSanta Monica :$bRAND,$c[2013]
300 $axliii, 258 pages :$billustrations (some color) ;$c25 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
504 $aIncludes bibliographical references (pages 225-258).
505 0 $aPreface -- Figures -- Tables -- Summary -- Acknowledgements -- Abbreviations -- Introduction -- Developing intent -- Planning & laying groundwork -- Immediate pre-execution -- Execution and aftermath -- Technologies and methods -- Cross-cutting issues -- Conclusions -- Appendix A. Methodological notes -- Appendix B. References and cases to support historic examples -- Appendix C. References and cases to support indicator tables -- Appendix D. Information fusion methods -- Bibliography.
520 $aGovernment organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might -- along with other information -- help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist.
650 0 $aTerrorism$xPrevention.
650 0 $aBehavioral assessment.
650 0 $aPsychology$xMethodology.
650 12 $aTerrorism$xprevention & control.
650 22 $aBehavioral Research.
650 22 $aTerrorism$xpsychology.
988 $a20131002
049 $aKSGG
906 $0DLC