Modeling Terrorist Beliefs and Motivations

Size: px
Start display at page:

Download "Modeling Terrorist Beliefs and Motivations"

Transcription

1 CREATE Research Archive Research Project Summaries 2010 Modeling Terrorist Beliefs and Motivations Richard John University of Southern California, Heather Rosoff University of Southern California, Follow this and additional works at: Recommended Citation John, Richard and Rosoff, Heather, "Modeling Terrorist Beliefs and Motivations" (2010). Research Project Summaries. Paper This Article is brought to you for free and open access by CREATE Research Archive. It has been accepted for inclusion in Research Project Summaries by an authorized administrator of CREATE Research Archive. For more information, please contact

2 Modeling Terrorist Beliefs and Motivations Richard John and Heather Rosoff, University of Southern California 1. Modeling Terrorist Beliefs and Motivations Overview Research Accomplishments Research Products Presentations Conferences Education and Outreach Products 6 1. Modeling Terrorist Beliefs and Motivations Overview The objective of this research is to further develop our pioneering approach to adversary threat assessment through the construction of random utility models of terrorist preferences. This work builds on previous research efforts (Rosoff, 2009; Rosoff & John, 2009) that have used decision analysis models and elicitation methods to: (1) construct of a value tree for a terrorist leader or organization using value focused thinking (VFT), (2) construct a random multi-attribute utility model (RMAUM) capturing trade-offs among conflicting objectives and single-attribute utility functions representing risk attitudes of terrorist leaders, (3) construct probability distributions capturing key uncertainties for terrorist leaders (e.g., attack success) and uncertainties in the utility function parameters provided by adversary experts. Understanding the objectives and motivations that drive terrorist group behavior is critical. Current methods for terrorism risk assessment focus on target vulnerability, terrorist capability and resources, and attack consequence. What many researchers have yet to consider is the influence of terrorist group values and beliefs in deciphering the root cause of their militant behavior. This understanding has the potential to contribute to probabilistic estimates of terrorist threats. During Year 6 we further developed the adversary preference modeling (APM) methodology by (1) evaluating how much the proxy terrorist utility model diverges from using a utility model for the US coupled with a zero-sum assumption, (2) assessing how anti-terrorism resource allocations impact terrorist preferences for different attack strategies and estimated relative likelihoods of various attack strategies, and (3) validating the APM through a case study with political/social/advocacy groups with an action oriented agenda that is driven by specific motives, values, and objectives. To address the first question, we developed (dis-)utility models for evaluating the same attack strategies from the perspective of the US, and compared the resulting risk profiles to those of a terrorist leader. To address the second question, we performed sensitivity analysis over parameters in the terrorist utility model that should be sensitive to different allocations of antiterrorist resources. Three anti-terrorist resources were considered (1) tagging of original radiological and biological sources terms, (2) hardening targets for better protection from attack, and (3) installing screening devices to improve detection of radiological and explosive materials. Each anti-terrorist resource was evaluated in terms of its impact upon proxy terrorist s attribute definitions, probability estimates and ultimately, estimates for the likelihood of various attack strategies. Lastly to address the third question, we opted to test the validity of our APM This research was supported by the United States Department of Homeland Security through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under award number 2010-ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security, or the University of Southern California, or CREATE.

3 methodology through the development of a model for a domestic political action group. Research progress and accomplishments made throughout Year 6 are described in the subsequent section. 2. Research Accomplishments A significant portion of Year 6 work was a continuation of Year 5 work related to the first two research questions described above. With respect to our evaluation of the zero-sum assumption, we demonstrate that quite different preferences and implied relative likelihoods result from our proxy decision analysis of terrorist preferences compared to a more standard economic evaluation of expected losses from the perspective of the US. It is clear from our analysis that terrorist organizations (and their leaders) have very different fundamental objectives that are not captured by a zero-sum assumption applied to an evaluation model constructed from the US perspective. Furthermore, even in cases where there terrorist objects are similar to the mirror (opposite) objectives of the US, there are remarkable differences in attribute scales, attribute weights, and attribute utility functions capturing attitudes toward risk. These differences in values contribute to large differences in the evaluation of alternative attack strategies based on the proxy terrorist decision analytic model and the model assuming US values and a zero-sum game. With respect to our sensitivity analysis of anti-terrorism initiatives, we demonstrate that preferences and relative likelihoods are altered depending upon the anti-terrorism resource under consideration and the proxy terrorist s perceived risk posed by that resource. For example, as seen in Figures 1 and 2, the analysis shows that the tagging countermeasure, did not impact Proxy 1 s attack preferences. However, Proxy 2 s likelihood estimates decreased for those alternatives directly impacted by the anti-terrorism resource (Port nuclear device, dirty bomb, smallpox attack and anthrax release). In doing so, the desirability of Proxy 2 s most preferred attack, the no attack alternative, increased. Probability of Attack With Tag Countermeasure No Countermeasure Figure 1: Proxy 1 Relative Likelihood for Tagging Countermeasure Page 2 of 6

4 With Tag Countermeasure No Countermeasure Probability of Attack Figure 2: Proxy 2 Relative Likelihood for Tagging Countermeasure Interestingly, while anti-terrorism resources alter attribute scales and uncertainties and attack probability estimates, attack strategies preferences could remain unaffected depending on the values assigned to attribute weights and attribute utility functions capturing attitudes toward risk for each alternative. Through the exploration of different anti-terrorism resources impact on proxy terrorist preferences, insight is gained as to the extent to which government actions might influence terrorist decision making. With respect to APM model validation, we took a two-phased approach; the first of which was completed in Year 6. During Year 6 we built a multi-attribute utility model based on PETA s presentation of itself and what could be found online from second-hand sources. Phase 2 is expected to be conducted throughout Year 7. Phase 2 is anticipated to involve interviewing a PETA stakeholder in order to demonstrate the accuracy and validity of the originally constructed second-hand model, and hence validate the APM modeling approach. A general search of online resources was conducted, leading to a first set of objectives and alternatives. Second-hand sources attempting to describe what PETA is and does agreed with PETA s self-publicized accounts on these objectives, although also including scandals and financial donations to activist groups that are willing to commit property damage that PETA understandably did not publicize. PETA s overall goal is improving animals rights. This is characterized by the four core values expressed in their motto - Animals are not ours to eat, wear, experiment on, or use for entertainment, as well as an emphasis on pet spay and neutering, to reduce the numbers of unwanted animals. The four motto objectives are folded into the Minimize Cruelty to Animals sub-objective to avoid model over-specification. PETA must also consider growing its organizational power. Maximize Organizational Power considers income, members and minimizing cost, as well as maximizing new volunteers and influence. Lastly, Perception of Group refers to the group s delicate balancing act of radical positioning and working with the system, and outreach. The twin perception objectives are an attempt to model the tension of Page 3 of 6

5 PETA s choice of positioning in the political spectrum; they want to bring the discussion to where they are, and have staked out a more radical position than the culture holds regarding treatment of animals. However, they want to be taken seriously; if they are perceived as too far out of the spectrum, then achieving successes inside the system via the traditional methods becomes impossible. The two metrics selected to characterize Perception of Group, maximize media hits and minimize negative press, cover the idea of getting attention but only the right kind of attention. Figure 3 is a graphic depiction of PETA s objectives hierarchy. Improve Animal Rights Maximize Organizational Power Max Incoming Money Max New Members Max New Volunteers Maximize Influence Network Minimize Costs Minimize Cruelty to Animals Max Changes to Industry Practices Max Educational Materials Max New Laws Perception of Group Max Media hits Minimize Negative Press Figure 3. PETA Objectives Hierarchy Alternatives as well as metrics and scales were identified for each of the attributes. In addition, estimates of attitudes toward risk, trade-offs among various objectives, and uncertainties about Page 4 of 6

6 the success of particular alternatives are included. The following are the ten attribute scales, ordered by the median values of the normalized weights assessed (Figure 4). Weight Max New Members 17.9 Max New Laws 16.1 Max Changes to Industry Practices 14.3 Max Media hits 12.5 Max New Volunteers 10.7 Max Incoming Money 8.9 Max Educational Materials Distributed 8.0 Maximize Influence Network 5.4 Minimize Costs 4.5 Minimize Negative Press 1.8 Figure 4. Weights for Adversary Value Expert Preference Set The aforementioned assessments were used to construct a random multi-attribute utility model (RMAUM). The RMAUM was estimated using a simulation model implemented within Excel 10,000 iterations. As seen in Figure 5, we found that the alternative with the highest mean utility estimate is Undercover Investigation (0.62), followed by New Campaign (0.49), New Ad and Publicity Study (both with a utility of 0.44) and Purchase Stock (0.36). Figure 5. CDF Utility Distributions Page 5 of 6

7 The risk profiles were then used to obtain attack probabilities over a fixed time period, given an assumption that one of the nine options (including no attack) will be selected. As seen in Table 1, 91% of the time Undercover Investigation was the most preferred alternative, and the only other alternative that achieved a meaningful preference ranking was a New Campaign, at 7%. Alternatives P(max j (u(x j )) = x i New Ad 0.01 New Campaign 0.07 Publicity Stunt 0.01 Purchase Stock 0.00 Undercover Investigation 0.91 Table 1. Probability of Alternative The second phase of this project and a submitted paper for publication on the overall project is planned for Year Research Products 3.1. Presentations Conferences 1. John, R. S. & Rosoff, H. Decision analysis by proxy for the rational terrorist, Poster presented at 30th annual meeting of the Society of Judgment and Decision Making, Boston, MA., November 20-23, John, R. S. & Rosoff, H. Value focused thinking for evaluating alternative counter-terrorism policies. Homeland Security and Counterinsurgency invited research presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), San Diego, California, October 11-14, Education and Outreach Products Education and Outreach Initiatives (Please detail below) # # of Postdoctoral Researchers 1 # of students supported (funded by CREATE) 1 Funded by CREATE Heather Rosoff, Postdoctoral Researcher. University of Southern California (USC) School of Policy, Planning and Development. Kacie Shelton, Master of Systems Architecting & Engineering Candidate, Expected August USC s Viterbi School of Engineering. Page 6 of 6

Modeling Terrorist Beliefs and Motivations

Modeling Terrorist Beliefs and Motivations CREATE Research Archive Research Project Summaries 2009 Modeling Terrorist Beliefs and Motivations Richard John University of Southern California, richardj@usc.edu Heather Rosoff University of Southern

More information

From Describing to Nudging: Choice of Transportation after a Terrorist Attack in London

From Describing to Nudging: Choice of Transportation after a Terrorist Attack in London CREATE Research Archive Research Project Summaries 2009 From Describing to Nudging: Choice of Transportation after a Terrorist Attack in London Barbara Fasolo London School of Economics and Political Science,

More information

The Effects of Time on Anticipated Consequences of Risks

The Effects of Time on Anticipated Consequences of Risks CREATE Research Archive Research Project Summaries 2011 The Effects of Time on Anticipated Consequences of Risks L. Robin Keller University of California - Irvine, Lrkeller@uci.edu Follow this and additional

More information

1. Executive Summary. These findings, along with Gigerenzer s dread hypothesis, made us realize that

1. Executive Summary. These findings, along with Gigerenzer s dread hypothesis, made us realize that From describing to nudging: Choice of transportation after a terrorist attack in London Barbara Fasolo et al., London School of Economics, UK b.fasolo@lse.ac.uk 1. Executive Summary...1 2. Research Accomplishments...3

More information

White Paper. Human Behavior Analytics with Proxy Interrogatories

White Paper. Human Behavior Analytics with Proxy Interrogatories White Paper Human Behavior Analytics with Proxy Interrogatories Introduction Mission sets across defense, intelligence and security organizations would benefit from applying effective human behavior analytics

More information

ATTACK MODALITIES. Draft 1 Charles P. Blair

ATTACK MODALITIES. Draft 1 Charles P. Blair ATTACK MODALITIES Draft 1 Charles P. Blair ATTACK MODALITIES Attack Modalities refers to the actual methods and techniques that terrorists choose to employ to attack particular targets. There are several

More information

The Power of Feedback

The Power of Feedback The Power of Feedback 35 Principles for Turning Feedback from Others into Personal and Professional Change By Joseph R. Folkman The Big Idea The process of review and feedback is common in most organizations.

More information

OUR RECOMMENDED INDIVIDUAL S STRATEGY

OUR RECOMMENDED INDIVIDUAL S STRATEGY Chapter Four CONCLUSIONS OUR RECOMMENDED INDIVIDUAL S STRATEGY Our recommended strategy involves actions that individuals can take that can save lives, even in catastrophic terrorist attacks. This can

More information

Risk Perception October 1, 2012 to September 30, Heather Rosoff Richard John University of Southern California

Risk Perception October 1, 2012 to September 30, Heather Rosoff Richard John University of Southern California National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Risk Perception October 1, 2012 to September 30, 2013 Heather Rosoff Richard John University of Southern

More information

C/S/E/L :2008. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor. innovations at the intersection of people,

C/S/E/L :2008. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor. innovations at the intersection of people, C/S/E/L :2008 innovations at the intersection of people, technology, and work. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor Daniel J. Zelik The Ohio State University

More information

Module 2 - Public Health Preparedness

Module 2 - Public Health Preparedness Module 2 - Public Health Preparedness Objectives Define a public health emergency List examples of types of public health events and emergencies Overview Protecting the public from health threats involves

More information

TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS

TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS Samah Mansoour School of Computing and Information Systems, Grand Valley State University, Michigan,

More information

PRIVELEGED, NON-CLASSIFIED CARVER + SHOCK PRIMER

PRIVELEGED, NON-CLASSIFIED CARVER + SHOCK PRIMER CARVER + SHOCK PRIMER 1 CARVER PLUS SHOCK METHOD FOR FOOD SECTOR VULNERABILITY ASSESSMENTS 1 Overview The CARVER plus Shock method is an offensive targeting prioritization tool that has been adapted for

More information

Alternative Threat Methodology

Alternative Threat Methodology Volume 4 Number 1 Volume 4, No. 1: Spring 2011 Article 5 Alternative Threat Methodology Charles B. King III Transportation Security Administration, chas.king@dhs.gov Follow this and additional works at:

More information

Beyond the Realist Model

Beyond the Realist Model Beyond the Realist Model Realist Model National Interests Dominate National Security Policy-Making States have clear unambiguous goals Changes in leaders and institutions are overshadowed by national interests

More information

Toronto Mental Health and Addictions Supportive Housing Network TERMS OF REFERENCE

Toronto Mental Health and Addictions Supportive Housing Network TERMS OF REFERENCE 1 Toronto Mental Health and Addictions Supportive Housing Network BACKGROUND: TERMS OF REFERENCE The Toronto Mental Health and Addictions Supportive Housing Network (TMHASHN), is a network of organizations

More information

Expert judgements in risk and reliability analysis

Expert judgements in risk and reliability analysis Expert judgements in risk and reliability analysis Jan-Erik Holmberg M2-E2117 Risk analysis, April 17, 2016 Aalto university Contents Definitions Applications Bayesian approach Examples 2 Background Objective,

More information

Statistical Audit. Summary. Conceptual and. framework. MICHAELA SAISANA and ANDREA SALTELLI European Commission Joint Research Centre (Ispra, Italy)

Statistical Audit. Summary. Conceptual and. framework. MICHAELA SAISANA and ANDREA SALTELLI European Commission Joint Research Centre (Ispra, Italy) Statistical Audit MICHAELA SAISANA and ANDREA SALTELLI European Commission Joint Research Centre (Ispra, Italy) Summary The JRC analysis suggests that the conceptualized multi-level structure of the 2012

More information

Grant Competition: AARP Foundation Seeks Evidence-Based Solutions for Vulnerable Older Adults Applicant Webinar

Grant Competition: AARP Foundation Seeks Evidence-Based Solutions for Vulnerable Older Adults Applicant Webinar Grant Competition: AARP Foundation Seeks Evidence-Based Solutions for Vulnerable Older Adults Applicant Webinar Presented by Matt D Amico, Grant Program Officer October 11, 2016 Webinar Agenda AARP Foundation

More information

Position Profile Chief Executive Officer Feeding America San Diego San Diego, CA

Position Profile Chief Executive Officer Feeding America San Diego San Diego, CA Position Profile Chief Executive Officer Feeding America San Diego San Diego, CA Feeding America San Diego is seeking an experienced and inspirational Chief Executive Officer to lead this impactful and

More information

Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game

Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game Ivaylo Vlaev (ivaylo.vlaev@psy.ox.ac.uk) Department of Experimental Psychology, University of Oxford, Oxford, OX1

More information

Kevin Murphy The Pennsylvania State University, International Center for the Study of Terrorism. June 2008

Kevin Murphy The Pennsylvania State University, International Center for the Study of Terrorism. June 2008 Evaluation of Methods for Drawing Inferences about Non-State Actors Perceptions of the Risks and Benefits of Seeking and Acquiring Weapons of Mass Destruction Kevin Murphy The Pennsylvania State University,

More information

FY2015 Annual Report. Risk Perception and Communication: Near-Misses and Risk Inoculation Robin Dillon-Merrill, Georgetown University

FY2015 Annual Report. Risk Perception and Communication: Near-Misses and Risk Inoculation Robin Dillon-Merrill, Georgetown University FY2015 Annual Report Risk Perception and Communication: Near-Misses and Risk Inoculation Robin Dillon-Merrill, Georgetown University Contents 1. Executive Summary... 1 2. Research and Research Transition

More information

The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options

The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options Executive Summary: The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options Overview This is the first Deliberative Poll (DP) anywhere in the world that was

More information

Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory

Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory Forensic Issues Regarding the Analysis of Evidence in Support of Agroterrorism Investigations Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory 703-632-7770 mwilson@fbiacademy.edu

More information

The lenses through which threat assessment and resolution must be viewed are a critical component and perhaps the most fundamental aspect of the frame

The lenses through which threat assessment and resolution must be viewed are a critical component and perhaps the most fundamental aspect of the frame Introduction The current and evolving body of work in the social and behavioral sciences offers tremendous potential for gaining an in-depth understanding of global adversaries and allies; and their future

More information

Problems and challenges faced by professional working women in food processing companies in Gujarat Mr. Deval Patel 1, Dr.

Problems and challenges faced by professional working women in food processing companies in Gujarat Mr. Deval Patel 1, Dr. Problems and challenges faced by professional working women in food processing companies in Gujarat Mr. Deval Patel 1, Dr. Samit Dutta 2 1 Asstt. Prof., FPT & BE, AAU, Anand, 2 Asso. Prof., FPT & BE, AAU,

More information

W. Brooke Elliott 2012 Audit Symposium

W. Brooke Elliott 2012 Audit Symposium Discussion of The Effects of Environmental Attitudes, Perceived Environmental Information Importance, Corporate Environmental Performance, and Independent Assurance on Investor Judgments W. Brooke Elliott

More information

Improving rapid counter terrorism decision making

Improving rapid counter terrorism decision making Improving rapid counter terrorism decision making COGITO Artificial Intelligence based human pattern recognition General Terrorists are threatening world peace. While intelligence is limited and cultural

More information

Establishing a Best-in-Class Workplace Violence Prevention Program. Matthew Doherty, Senior Vice President, Hillard Heintze

Establishing a Best-in-Class Workplace Violence Prevention Program. Matthew Doherty, Senior Vice President, Hillard Heintze Establishing a Best-in-Class Matthew Doherty, Senior Vice President, Hillard Heintze Agenda Employee Safety Is a Top Priority Protecting the Workplace What We Learned about Attackers Behavioral Threat

More information

Committed to Environment, Health and Safety

Committed to Environment, Health and Safety Committed to Environment, Health and Safety Environment, Health and Safety Management System and Policy of GCP Applied Technologies Inc. SEPTEMBER 1, 2017 The GCP Environment, Health, and Safety Management

More information

Coping with Threats of Terrorism A Protocol for Group Intervention by Richard J. Ottenstein, Ph.D., CEAP, CTS

Coping with Threats of Terrorism A Protocol for Group Intervention by Richard J. Ottenstein, Ph.D., CEAP, CTS Journal Submission: International Journal of Emergency Mental Health Published: Volume 5, Number 1, Winter 2003 Submitted by: Richard J. Ottenstein, Ph.D., CEAP, CTS Address: The Workplace Trauma Center

More information

The competitive advantages of a spatially centralized entity versus a decentralized entity

The competitive advantages of a spatially centralized entity versus a decentralized entity The competitive advantages of a spatially centralized entity versus a decentralized entity New England Complex Systems Institute One-Week Intensive Course: Complex Physical, Biological and Social Systems

More information

360 Degree Feedback Assignment. Robert M. Clarkson. Virginia Commonwealth University. EDLP 703 Understanding Self as Leader: Practical Applications

360 Degree Feedback Assignment. Robert M. Clarkson. Virginia Commonwealth University. EDLP 703 Understanding Self as Leader: Practical Applications Running head: 360 DEGREE FEEDBACK 1 360 Degree Feedback Assignment Robert M. Clarkson Virginia Commonwealth University EDLP 703 Understanding Self as Leader: Practical Applications Commented [O1]: All

More information

Homo economicus is dead! How do we know how the mind works? How the mind works

Homo economicus is dead! How do we know how the mind works? How the mind works Some facts about social preferences, or why we're sometimes nice and sometimes not Karthik Panchanathan buddha@ucla.edu Homo economicus is dead! It was a mistake to believe that individuals and institutions

More information

Chapter 1: Thinking critically with. Introduction

Chapter 1: Thinking critically with. Introduction Chapter 1: Thinking critically with psychological science Introduction Fact or Falsehood 1. Human intuition is remarkable accurate and free from error. 2. Most people seem to lack confidence in the accuracy

More information

Survey Research. We can learn a lot simply by asking people what we want to know... THE PREVALENCE OF SURVEYS IN COMMUNICATION RESEARCH

Survey Research. We can learn a lot simply by asking people what we want to know... THE PREVALENCE OF SURVEYS IN COMMUNICATION RESEARCH Survey Research From surveys we can learn how large groups of people think and act. To trust generalizations made on the basis of surveys, however, the sample must be representative, the response rate

More information

CRIMINAL JUSTICE (CJ)

CRIMINAL JUSTICE (CJ) Criminal Justice (CJ) 1 CRIMINAL JUSTICE (CJ) CJ 500. Crime and Criminal Justice in the Cinema Prerequisite(s): Senior standing. Description: This course examines media representations of the criminal

More information

What is analytical sociology? And is it the future of sociology?

What is analytical sociology? And is it the future of sociology? What is analytical sociology? And is it the future of sociology? Twan Huijsmans Sociology Abstract During the last few decades a new approach in sociology has been developed, analytical sociology (AS).

More information

CHAPTER 3 RESEARCH METHODOLOGY

CHAPTER 3 RESEARCH METHODOLOGY CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction 3.1 Methodology 3.1.1 Research Design 3.1. Research Framework Design 3.1.3 Research Instrument 3.1.4 Validity of Questionnaire 3.1.5 Statistical Measurement

More information

Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health. By Resiliency Initiatives and Ontario Public Health

Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health. By Resiliency Initiatives and Ontario Public Health + Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health By Resiliency Initiatives and Ontario Public Health + Presentation Outline Introduction The Need for a Paradigm Shift Literature

More information

Construction of Theoretical Model for Antiterrorism: From Reflexive Game Theory Viewpoint

Construction of Theoretical Model for Antiterrorism: From Reflexive Game Theory Viewpoint 1 Construction of Theoretical Model for Antiterrorism: From Reflexive Game Theory Viewpoint Vladimir Lefebvre, PhD University of California, Irvine Kofi Nyamekye, PhD Integrated Activity-Based Simulation

More information

Systems Engineering Guide for Systems of Systems. Summary. December 2010

Systems Engineering Guide for Systems of Systems. Summary. December 2010 DEPARTMENT OF DEFENSE Systems Engineering Guide for Systems of Systems Summary December 2010 Director of Systems Engineering Office of the Director, Defense Research and Engineering Washington, D.C. This

More information

8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict

8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict Threat Assessment & Response to Mass Violence Mario J. Scalora, Ph.D. Agenda Brief Overview of Threat Assessment Principles Recent Trends in Targeted Violence Application to Mass Casualty Response Targeted

More information

Checklist for assessing the gender responsiveness of sexual and reproductive health policies. Pilot document for adaptation to national contexts

Checklist for assessing the gender responsiveness of sexual and reproductive health policies. Pilot document for adaptation to national contexts Checklist for assessing the gender responsiveness of sexual and reproductive health policies Pilot document for adaptation to national contexts Address requests about publications of the WHO Regional Office

More information

2013 NEHA AEC July 9 11, One Health and All-Hazards: the New Environmental Health. Want this on you?

2013 NEHA AEC July 9 11, One Health and All-Hazards: the New Environmental Health. Want this on you? One Health and All-Hazards: the New Environmental Health Christopher Eddy, MPH, REHS, RS, M.B.A. (candidate) Erik Balster, MPH, REHS, RS July 11, 2013 Next best thing to the Cover of the Rolling Stone?

More information

CSE468 Information Conflict

CSE468 Information Conflict CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 06 Hypergames vs Information Conflict Strategies Reference Sources and Bibliography There are few references dealing with

More information

NWT SPCA. Advocates for Animals of the North. Strategic Plan Charitable Registration #BN RR0001

NWT SPCA. Advocates for Animals of the North. Strategic Plan Charitable Registration #BN RR0001 NWT SPCA Advocates for Animals of the North Strategic Plan 2016-2020 Charitable Registration #BN 886100791 RR0001 PO Box 2278 Yellowknife, NT X1A 2P7 Ph:(867) 444-8444 fx: (867)920-7723 nwtspcayk@gmail.com

More information

RESEARCH PAPER. The psychological basis for terrorism and terrorists

RESEARCH PAPER. The psychological basis for terrorism and terrorists RESEARCH PAPER The psychological basis for terrorism and terrorists 2 1.0 Introduction The present research paper sheds light on the evidences that explain the psychological basis for terrorism and terrorists.

More information

Chapter 7 Motivation and Emotion

Chapter 7 Motivation and Emotion Chapter 7 Motivation and Emotion Emotion Emotion a response of the whole organism physiological arousal expressive behaviors conscious experience Eight Basic Emotions Fear Surprise Disgust Anger Sadness

More information

National Center for Risk and Economic Analysis of Terrorism Events University of Southern California

National Center for Risk and Economic Analysis of Terrorism Events University of Southern California National Center for Risk and Economic Analysis of Terrorism Events University of Southern California The Perception of Terrorist Events to Improve Risk Communication: Understanding the Impact of Near-Miss

More information

Shaping the Economics of Happiness: The Fundamental Contributions of Richard A. Easterlin

Shaping the Economics of Happiness: The Fundamental Contributions of Richard A. Easterlin I Shaping the Economics of Happiness: The Fundamental Contributions of Richard A. Easterlin Holger Hinte and Klaus F. Zimmermann Did it take a global economic and financial crisis to remind us that money

More information

Conducting Effective Emergency Management Tabletops, Drills and Other Exercises

Conducting Effective Emergency Management Tabletops, Drills and Other Exercises U.S. Department of Education Office of Safe and Drug-Free Schools Conducting Effective Emergency Management Tabletops, Drills and Other Exercises Matt Taylor, Associate Director, Montana Safe Schools Center

More information

How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis?

How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis? How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis? Richards J. Heuer, Jr. Version 1.2, October 16, 2005 This document is from a collection of works by Richards J. Heuer, Jr.

More information

Assessment and Estimation of Risk Preferences (Outline and Pre-summary)

Assessment and Estimation of Risk Preferences (Outline and Pre-summary) Assessment and Estimation of Risk Preferences (Outline and Pre-summary) Charles A. Holt and Susan K. Laury 1 In press (2013) for the Handbook of the Economics of Risk and Uncertainty, Chapter 4, M. Machina

More information

New Effects-Based Operations Models in War Games. Lee W. Wagenhals Larry K. Wentz

New Effects-Based Operations Models in War Games. Lee W. Wagenhals Larry K. Wentz New Effects-Based Operations Models in War Games Lee W. Wagenhals Larry K. Wentz 2003 ICCRTS 8th International Command and Control Research and Technology Symposium June 19, 2002 National Defense University

More information

Motivation Motivation

Motivation Motivation This should be easy win What am I doing here! Motivation Motivation What Is Motivation? Motivation is the direction and intensity of effort. Direction of effort: Whether an individual seeks out, approaches,

More information

The Plan Putting the Pieces Together

The Plan Putting the Pieces Together The Plan Putting the Pieces Together Threat and Hazard Identification and Risk Assessment THIRA Where it all begins Threat and Hazard Identification and Risk Assessment (THIRA) Natural or manmade occurrence,

More information

Confirmation Bias. this entry appeared in pp of in M. Kattan (Ed.), The Encyclopedia of Medical Decision Making.

Confirmation Bias. this entry appeared in pp of in M. Kattan (Ed.), The Encyclopedia of Medical Decision Making. Confirmation Bias Jonathan D Nelson^ and Craig R M McKenzie + this entry appeared in pp. 167-171 of in M. Kattan (Ed.), The Encyclopedia of Medical Decision Making. London, UK: Sage the full Encyclopedia

More information

A BOLD VENTURE: Principles of Social Ecology Relevant to Solving Complex Problems in a Globalized World

A BOLD VENTURE: Principles of Social Ecology Relevant to Solving Complex Problems in a Globalized World A BOLD VENTURE: Principles of Social Ecology Relevant to Solving Complex Problems in a Globalized World The 2018 book Social Ecology in the Digital Age by Daniel Stokols is a rich source for understanding

More information

BEHAVIOR CHANGE THEORY

BEHAVIOR CHANGE THEORY BEHAVIOR CHANGE THEORY An introduction to a behavior change theory framework by the LIVE INCITE team This document is not a formal part of the LIVE INCITE Request for Tender and PCP. It may thus be used

More information

CHAPTER 3 METHOD AND PROCEDURE

CHAPTER 3 METHOD AND PROCEDURE CHAPTER 3 METHOD AND PROCEDURE Previous chapter namely Review of the Literature was concerned with the review of the research studies conducted in the field of teacher education, with special reference

More information

Active Bystander Behavior: Extended Analysis from the Sexual Conduct: Culture and Respect Survey Tyler Anderson 16 Grinnell College

Active Bystander Behavior: Extended Analysis from the Sexual Conduct: Culture and Respect Survey Tyler Anderson 16 Grinnell College Active Bystander Behavior: Extended Analysis from the Sexual Conduct: Culture and Respect Survey Tyler Anderson 16 Grinnell College Author s note: This document represents the results of a Mentored Advanced

More information

The Effectiveness of Pre-Driver Training

The Effectiveness of Pre-Driver Training 67 th ROAD SAFETY CONGRESS 4 th 6 th MARCH 2002 Safer Driving The Road to Success The Effectiveness of Pre-Driver Training Dr Bill Carcary Tayside Police NEW DRIVER PROJECT Dr. Bill Carcary Tayside Police

More information

Title: Understanding consumer acceptance of intervention strategies for healthy food choices: a qualitative study

Title: Understanding consumer acceptance of intervention strategies for healthy food choices: a qualitative study Author's response to reviews Title: Understanding consumer acceptance of intervention strategies for healthy food choices: a qualitative study Authors: Colin Bos (colin.bos@wur.nl) Ivo A. Van der Lans

More information

2014 Hong Kong Altruism Index Survey

2014 Hong Kong Altruism Index Survey 2014 Hong Kong Altruism Index Survey Compiled by: Prof. Paul S.F. Yip & Dr. Qijin Cheng August 2014 Funded by Table of Contents Executive Summary... 1 Chapter I. Introduction... 5 Survey objectives...

More information

CONFLICT MANAGEMENT Fourth Edition

CONFLICT MANAGEMENT Fourth Edition Assessment CONFLICT MANAGEMENT Fourth Edition Complete this book, and you ll know how to: 1) Catch disagreement before it escalates into dysfunctional conflict. 2) Replace habitual styles of handling differences

More information

What Counts as Credible Evidence in Contemporary Evaluation Practice?

What Counts as Credible Evidence in Contemporary Evaluation Practice? What Counts as Credible Evidence in Contemporary Evaluation Practice? Stewart I. Donaldson, Ph.D. Claremont Graduate University stewart.donaldson@cgu.edu Hawaii-Pacific Evaluation Association Annual Conference

More information

An Overview of Message Mapping: Framing and Coordinating Messaging Efforts , passcode April 27, :45 PM ET

An Overview of Message Mapping: Framing and Coordinating Messaging Efforts , passcode April 27, :45 PM ET An Overview of Message Mapping: Framing and Coordinating Messaging Efforts 866-519-2796, passcode 154986 April 27, 2018 2 2:45 PM ET Virtual Training Logistics Join by both Adobe Connect and phone line:

More information

Reflect on the Types of Organizational Structures. Hierarch of Needs Abraham Maslow (1970) Hierarchy of Needs

Reflect on the Types of Organizational Structures. Hierarch of Needs Abraham Maslow (1970) Hierarchy of Needs Reflect on the Types of Organizational Structures 1 Hierarch of Needs Abraham Maslow (1970) Self- Actualization or Self- Fulfillment Esteem Belonging, Love, and Social Activities Safety and Security Psychological

More information

Assessment of Impact on Health and Environmental Building Performance of Projects Utilizing the Green Advantage LEED ID Credit

Assessment of Impact on Health and Environmental Building Performance of Projects Utilizing the Green Advantage LEED ID Credit July 26, 2009 Assessment of Impact on Health and Environmental Building Performance of Projects Utilizing the Green Advantage LEED ID Credit This study, undertaken collaboratively by the s Powell Center

More information

Verbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London. Harvey Toulouse October 2009

Verbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London. Harvey Toulouse October 2009 Verbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London Outline Definitions of trust Some research issues for psychologists Ways of studying trust

More information

Department of Defense System of Systems Challenges

Department of Defense System of Systems Challenges Department of Defense of s Challenges NASA Johnson Space Flight Center s Engineering Seminar August 2, 2007 Dr. Judith Dahmann MITRE Corporation Software and s Engineering DoD Acquisition, Technology and

More information

EU-SILC 2013 MODULE ON WELL-BEING DESCRIPTION OF SILC SECONDARY TARGET VARIABLES Version 5 March 2012

EU-SILC 2013 MODULE ON WELL-BEING DESCRIPTION OF SILC SECONDARY TARGET VARIABLES Version 5 March 2012 EUROPEAN COMMISSION EUROSTAT Directorate F: Social and information society statistics Unit F-3: Living conditions and social protection EU-SILC 2013 MODULE ON WELL-BEING DESCRIPTION OF SILC SECONDARY TARGET

More information

ON SHELF AVAILABILITY ALIGNMENT PROJECT 2011 ASIA PAC SURVEY RESULTS

ON SHELF AVAILABILITY ALIGNMENT PROJECT 2011 ASIA PAC SURVEY RESULTS ON SHELF AVAILABILITY ALIGNMENT PROJECT 2011 ASIA PAC SURVEY RESULTS Introduction The ECR Asia Pacific OSA working group conducted an online survey between July and September 2011 aimed at gaining insights

More information

HIV AIDS & ADVOCACY. Jubilee Centre (Zambia) Case Study

HIV AIDS & ADVOCACY. Jubilee Centre (Zambia) Case Study HIV AIDS & ADVOCACY Jubilee Centre (Zambia) Case Study Jubilee Centre Jubilee Centre is a Christian organization committed to building relationships with churches, organizations and individual Christian

More information

Sampling Methodology

Sampling Methodology Background CCMTA s Drugs and Driving Framework identified need to raise public s awareness regarding risks associated with drug-impaired driving Purpose of Survey: To determine drivers knowledge, perceptions,

More information

Implementing Lean Six Sigma in Organizations. Dhr. B.A. Lameijer

Implementing Lean Six Sigma in Organizations. Dhr. B.A. Lameijer Implementing Lean Six Sigma in Organizations. Dhr. B.A. Lameijer Summary of implementing LSS in organizations Due to a variety of reasons such as increased competition, resource scarcity and transparency

More information

Chief Development Officer National Brain Tumor Society

Chief Development Officer National Brain Tumor Society Send Nominations or Cover Letter and Resume to: Lisa Vuona Vice President 617-262-1102 lvuona@lllsearches.com Chief Development Officer National Brain Tumor Society Newton, MA http://braintumor.org/ The

More information

Interview with Ragnhildur Helgadóttir, Reykjavik, 23d February 2009

Interview with Ragnhildur Helgadóttir, Reykjavik, 23d February 2009 Interview with Ragnhildur Helgadóttir, Reykjavik, 23d February 2009 Proscovia Svärd: What do you do for a living? Ragnhildur Helgadóttir: I am a law professor. Proscovia Svärd: At what university? Ragnhildur

More information

Update from IMI PREFER: Patient preferences in benefitrisk assessments during the medical product lifecycle

Update from IMI PREFER: Patient preferences in benefitrisk assessments during the medical product lifecycle 1 1 Update from IMI PREFER: Patient preferences in benefitrisk assessments during the medical product lifecycle Presenter: Chiara Whichello on behalf of the PREFER consortium June 5, 2018 The statements

More information

Flightfax R Online newsletter of Army aircraft mishap prevention information

Flightfax R Online newsletter of Army aircraft mishap prevention information Number 32 December 2013 Flightfax R Online newsletter of Army aircraft mishap prevention information In this month s issue of Flightfax, we are focusing on individual and aircrew situational awareness

More information

NATIONAL COMMITTEE ON AIDS, DRUGS AND PROSTITUTE CONTROL OF VIETNAM

NATIONAL COMMITTEE ON AIDS, DRUGS AND PROSTITUTE CONTROL OF VIETNAM NATIONAL COMMITTEE ON AIDS, DRUGS AND PROSTITUTE CONTROL OF VIETNAM CEREMONY FOR THE PUBLIC ANNOUNCEMENT OF THE STRATEGY ON PREVENTING, COMBATING AND CONTROLLING DRUG ABUSE IN VIETNAM TILL 2020 AND ORIENTATION

More information

E x e c u t i v e S u m m a r y. P o w e r e d b y

E x e c u t i v e S u m m a r y. P o w e r e d b y E x e c u t i v e S u m m a r y P o w e r e d b y COPYRIGHT BRAINWAVE SCIENCE 2016 Our Company Founded in 2012, Brainwave Science offers its ground-breaking Brain Fingerprinting Technology with applications

More information

IFIC Foundation Food Label Consumer Research Project: Qualitative Research Findings

IFIC Foundation Food Label Consumer Research Project: Qualitative Research Findings : Qualitative Research Findings Introduction Today s food labels provide nutrition information to help consumers make food choices to achieve a healthful diet. The Nutrition Facts Panel (NFP) contains

More information

THE CUSTOMER SERVICE ATTRIBUTE INDEX

THE CUSTOMER SERVICE ATTRIBUTE INDEX THE CUSTOMER SERVICE ATTRIBUTE INDEX Jane Doe Customer Service XYZ Corporation 7-22-2003 CRITICAL SUCCESS ATTRIBUTES ATTITUDE TOWARD OTHERS: To what extent does Jane tend to maintain a positive, open and

More information

INTRODUCTION. Evidence standards for justifiable evidence claims, June 2016

INTRODUCTION. Evidence standards for justifiable evidence claims, June 2016 EVIDENCE STANDARDS: A DIMENSIONS OF DIFFERENCE FRAMEWORK FOR APPRAISING JUSTIFIABLE EVIDENCE CLAIMS 1 David Gough, EPPI-Centre, SSRU, UCL Institute of Education, University College London INTRODUCTION

More information

can CAMPAIGN STRATEGY PAPER

can CAMPAIGN STRATEGY PAPER e can CAMPAIGN STRATEGY PAPER This paper outlines the proposition, approach, and methodology for the South Asia regional campaign to end violence against women (the WE CAN campaign) that will be implemented

More information

Learning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior

Learning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior Chapter 4 Perspectives on Consumer Behavior Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Learning

More information

This is copyrighted material. Women and Men in U.S. Corporate Leadership. Same Workplace, Different Realities?

This is copyrighted material. Women and Men in U.S. Corporate Leadership. Same Workplace, Different Realities? Women and Men in U.S. Corporate Leadership Same Workplace, Different Realities? INTRODUCTION Although women occupy one-half (50.5 percent) of managerial and professional specialty positions in the United

More information

Child Mental Health: A Review of the Scientific Discourse

Child Mental Health: A Review of the Scientific Discourse Child Mental Health: A Review of the Scientific Discourse Executive Summary and Excerpts from A FrameWorks Research Report Prepared for the FrameWorks Institute by Nat Kendall-Taylor and Anna Mikulak February

More information

Using Risk Analysis to Manage Terrorism Risk

Using Risk Analysis to Manage Terrorism Risk CREATE Research Archive Research Project Summaries 2010 Using Risk Analysis to Manage Terrorism Risk Henry H. Willis RAND, hwillis@rand.org Follow this and additional works at: http://research.create.usc.edu/project_summaries

More information

Tobacco-Control Policy Workshop:

Tobacco-Control Policy Workshop: Tobacco-Control Policy Workshop: Goal: to introduce Mega-Country leaders to an effective policy framework for tobacco control and to develop skills to promote policy implementation. Objectives: As a result

More information

Why do Psychologists Perform Research?

Why do Psychologists Perform Research? PSY 102 1 PSY 102 Understanding and Thinking Critically About Psychological Research Thinking critically about research means knowing the right questions to ask to assess the validity or accuracy of a

More information

SYSTEM-OF-SYSTEMS (SOS) WORKSHOP 3 SICS & INCOSE

SYSTEM-OF-SYSTEMS (SOS) WORKSHOP 3 SICS & INCOSE SYSTEM-OF-SYSTEMS (SOS) WORKSHOP 3 SICS & INCOSE 2015-04-22 AGENDA 10.00-10.10: Introduction Short presentation of everyone Background: The SoS Agenda project 10.10-11.00: Summary and analysis of WS1-2

More information

Journal of Political Economy, Vol. 93, No. 2 (Apr., 1985)

Journal of Political Economy, Vol. 93, No. 2 (Apr., 1985) Confirmations and Contradictions Journal of Political Economy, Vol. 93, No. 2 (Apr., 1985) Estimates of the Deterrent Effect of Capital Punishment: The Importance of the Researcher's Prior Beliefs Walter

More information

Using Health Economics to Inform the Development of Medical Devices. Matthew Allsop MATCH / BITECIC

Using Health Economics to Inform the Development of Medical Devices. Matthew Allsop MATCH / BITECIC Using Health Economics to Inform the Development of Medical Devices Matthew Allsop MATCH / BITECIC Overview Background to MATCH Overview of health economics in product development Concepts relating to

More information

Lessons from Risk Perception in Other Contexts

Lessons from Risk Perception in Other Contexts Lessons from Risk Perception in Other Contexts V. KERRY SMITH North Carolina State University Raleigh, NC I will draw inferences from lessons that are associated not with biotechnology, but with how consumers

More information

Representation pathways for marginalised women survivors of conflict Terms of Reference

Representation pathways for marginalised women survivors of conflict Terms of Reference Representation pathways for marginalised women survivors of conflict Terms of Reference Women for Women International (WfWI) is looking for a UK-based, experienced, feminist consultant to deliver a desk-based

More information