Results 61 to 70 of about 48,100 (298)

Art as a Means to Disrupt Routine Use of Space [PDF]

open access: yes, 2013
This paper examines the publicly visible aspects of counter-terrorism activity in pedestrian spaces as mechanisms of disruption. We discuss the objectives of counter-terrorism in terms of disruption of routine for both hostile actors and general ...
A Adriaansens   +28 more
core   +1 more source

Kryptonite for Cryptocurrencies? What Are the Effects of Regulatory Controls on Bitcoin Returns and Volatility?

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This paper examines the impact of regulatory controls on Bitcoin's excess returns and volatility. The paper innovates by proxying changes in the regulatory environment using global Google search volume intensity data. The generated regulatory indices accurately identify episodes of regulatory tightening within cryptocurrency markets.
Robert Mullings
wiley   +1 more source

Recognition of printed small texture modules based on dictionary learning

open access: yesEURASIP Journal on Image and Video Processing, 2021
Quick Response (QR) codes are designed for information storage and high-speed reading applications. To store additional information, Two-Level QR (2LQR) codes replace black modules in standard QR codes with specific texture patterns.
Lifang Yu   +5 more
doaj   +1 more source

Action Stories for Counter Terrorism (extended abstract) [PDF]

open access: yes, 2009
Due to the raised terrorist threat worldwide, there is an urgent need to research that assists security and police services to protect the public and key assets and to prevent attacks from taking place.
Guest, E
core  

Realistic Representation, Dynamic Evolution and Determinants of Institutional Quality in China

open access: yesInternational Studies of Economics, EarlyView.
ABSTRACT The paper delves into the role of institutional quality in bolstering China's economic resilience post‐COVID‐19, CITIC‐Entropy. It divides institutions into basic and changeable categories, establishing an index system via the CITIC‐Entropy TOPSIS model.
Susu Wang, Qidi Zhang, Jing Fang
wiley   +1 more source

The march of the Mehteran<br>Rethinking the human rights critiques of counter-terrorism

open access: yesUtrecht Law Review, 2011
Since 9/11 counter-terrorism laws adopted by Western democracies have been criticised intensively, producing a large body of theoretical and practical analysis. However, the material focusing on these issues through the lens of racism is limited.
Can Öztaş
doaj   +1 more source

What Explains International Interest Rate Co‐Movement?

open access: yesJournal of Applied Econometrics, EarlyView.
ABSTRACT The international co‐movement of interest rates reflects correlated business‐cycle fluctuations, largely driven by demand shocks. Monetary policy in advanced economies follows domestic mandates—inflation and the output gap—and does not respond to foreign policy shocks.
Annika Camehl, Gregor von Schweinitz
wiley   +1 more source

Positive developmental cascades: Strength development reduces support needs in children

open access: yesJCPP Advances, EarlyView.
Abstract Background Strength development in children across a range of psychiatric diagnoses may reduce needs for mental health, social, and functioning support over time. A strength‐based adjunct to child and adolescent mental health may foster the developmental context most helpful for achieving desired outcomes with positive developmental cascading ...
Melody R. Altschuler   +12 more
wiley   +1 more source

EN(COUNTERING) TERRORISM

open access: yesThe Journal of Intelligence, Conflict, and Warfare, 2023
On November 23, 2022, Dr. Mia Bloom, Communications and Middle East Studies professor at Georgia State University, presented on “En(countering) Terrorism” at the 2022 Annual CASIS Vancouver West Coast Security Conference. The key points discussed were the changing roles of women in terrorist groups, the relationship between social media and terrorist ...
openaire   +2 more sources

Disrupting the Chain of Displaced Aggression: A Review and Agenda for Future Research

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT Displaced aggression refers to instances in which a person redirects their harm‐doing behavior from a primary to a secondary, substitute target. Since the publication of the first empirical article in 1948, there has been a noticeable surge in research referencing this theory in both management and psychology journals.
Constantin Lagios   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy