Modeling Terrorist Beliefs and Motivations
|
|
- Anis Clark
- 6 years ago
- Views:
Transcription
1 CREATE Research Archive Research Project Summaries 2010 Modeling Terrorist Beliefs and Motivations Richard John University of Southern California, Heather Rosoff University of Southern California, Follow this and additional works at: Recommended Citation John, Richard and Rosoff, Heather, "Modeling Terrorist Beliefs and Motivations" (2010). Research Project Summaries. Paper This Article is brought to you for free and open access by CREATE Research Archive. It has been accepted for inclusion in Research Project Summaries by an authorized administrator of CREATE Research Archive. For more information, please contact
2 Modeling Terrorist Beliefs and Motivations Richard John and Heather Rosoff, University of Southern California 1. Modeling Terrorist Beliefs and Motivations Overview Research Accomplishments Research Products Presentations Conferences Education and Outreach Products 6 1. Modeling Terrorist Beliefs and Motivations Overview The objective of this research is to further develop our pioneering approach to adversary threat assessment through the construction of random utility models of terrorist preferences. This work builds on previous research efforts (Rosoff, 2009; Rosoff & John, 2009) that have used decision analysis models and elicitation methods to: (1) construct of a value tree for a terrorist leader or organization using value focused thinking (VFT), (2) construct a random multi-attribute utility model (RMAUM) capturing trade-offs among conflicting objectives and single-attribute utility functions representing risk attitudes of terrorist leaders, (3) construct probability distributions capturing key uncertainties for terrorist leaders (e.g., attack success) and uncertainties in the utility function parameters provided by adversary experts. Understanding the objectives and motivations that drive terrorist group behavior is critical. Current methods for terrorism risk assessment focus on target vulnerability, terrorist capability and resources, and attack consequence. What many researchers have yet to consider is the influence of terrorist group values and beliefs in deciphering the root cause of their militant behavior. This understanding has the potential to contribute to probabilistic estimates of terrorist threats. During Year 6 we further developed the adversary preference modeling (APM) methodology by (1) evaluating how much the proxy terrorist utility model diverges from using a utility model for the US coupled with a zero-sum assumption, (2) assessing how anti-terrorism resource allocations impact terrorist preferences for different attack strategies and estimated relative likelihoods of various attack strategies, and (3) validating the APM through a case study with political/social/advocacy groups with an action oriented agenda that is driven by specific motives, values, and objectives. To address the first question, we developed (dis-)utility models for evaluating the same attack strategies from the perspective of the US, and compared the resulting risk profiles to those of a terrorist leader. To address the second question, we performed sensitivity analysis over parameters in the terrorist utility model that should be sensitive to different allocations of antiterrorist resources. Three anti-terrorist resources were considered (1) tagging of original radiological and biological sources terms, (2) hardening targets for better protection from attack, and (3) installing screening devices to improve detection of radiological and explosive materials. Each anti-terrorist resource was evaluated in terms of its impact upon proxy terrorist s attribute definitions, probability estimates and ultimately, estimates for the likelihood of various attack strategies. Lastly to address the third question, we opted to test the validity of our APM This research was supported by the United States Department of Homeland Security through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under award number 2010-ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security, or the University of Southern California, or CREATE.
3 methodology through the development of a model for a domestic political action group. Research progress and accomplishments made throughout Year 6 are described in the subsequent section. 2. Research Accomplishments A significant portion of Year 6 work was a continuation of Year 5 work related to the first two research questions described above. With respect to our evaluation of the zero-sum assumption, we demonstrate that quite different preferences and implied relative likelihoods result from our proxy decision analysis of terrorist preferences compared to a more standard economic evaluation of expected losses from the perspective of the US. It is clear from our analysis that terrorist organizations (and their leaders) have very different fundamental objectives that are not captured by a zero-sum assumption applied to an evaluation model constructed from the US perspective. Furthermore, even in cases where there terrorist objects are similar to the mirror (opposite) objectives of the US, there are remarkable differences in attribute scales, attribute weights, and attribute utility functions capturing attitudes toward risk. These differences in values contribute to large differences in the evaluation of alternative attack strategies based on the proxy terrorist decision analytic model and the model assuming US values and a zero-sum game. With respect to our sensitivity analysis of anti-terrorism initiatives, we demonstrate that preferences and relative likelihoods are altered depending upon the anti-terrorism resource under consideration and the proxy terrorist s perceived risk posed by that resource. For example, as seen in Figures 1 and 2, the analysis shows that the tagging countermeasure, did not impact Proxy 1 s attack preferences. However, Proxy 2 s likelihood estimates decreased for those alternatives directly impacted by the anti-terrorism resource (Port nuclear device, dirty bomb, smallpox attack and anthrax release). In doing so, the desirability of Proxy 2 s most preferred attack, the no attack alternative, increased. Probability of Attack With Tag Countermeasure No Countermeasure Figure 1: Proxy 1 Relative Likelihood for Tagging Countermeasure Page 2 of 6
4 With Tag Countermeasure No Countermeasure Probability of Attack Figure 2: Proxy 2 Relative Likelihood for Tagging Countermeasure Interestingly, while anti-terrorism resources alter attribute scales and uncertainties and attack probability estimates, attack strategies preferences could remain unaffected depending on the values assigned to attribute weights and attribute utility functions capturing attitudes toward risk for each alternative. Through the exploration of different anti-terrorism resources impact on proxy terrorist preferences, insight is gained as to the extent to which government actions might influence terrorist decision making. With respect to APM model validation, we took a two-phased approach; the first of which was completed in Year 6. During Year 6 we built a multi-attribute utility model based on PETA s presentation of itself and what could be found online from second-hand sources. Phase 2 is expected to be conducted throughout Year 7. Phase 2 is anticipated to involve interviewing a PETA stakeholder in order to demonstrate the accuracy and validity of the originally constructed second-hand model, and hence validate the APM modeling approach. A general search of online resources was conducted, leading to a first set of objectives and alternatives. Second-hand sources attempting to describe what PETA is and does agreed with PETA s self-publicized accounts on these objectives, although also including scandals and financial donations to activist groups that are willing to commit property damage that PETA understandably did not publicize. PETA s overall goal is improving animals rights. This is characterized by the four core values expressed in their motto - Animals are not ours to eat, wear, experiment on, or use for entertainment, as well as an emphasis on pet spay and neutering, to reduce the numbers of unwanted animals. The four motto objectives are folded into the Minimize Cruelty to Animals sub-objective to avoid model over-specification. PETA must also consider growing its organizational power. Maximize Organizational Power considers income, members and minimizing cost, as well as maximizing new volunteers and influence. Lastly, Perception of Group refers to the group s delicate balancing act of radical positioning and working with the system, and outreach. The twin perception objectives are an attempt to model the tension of Page 3 of 6
5 PETA s choice of positioning in the political spectrum; they want to bring the discussion to where they are, and have staked out a more radical position than the culture holds regarding treatment of animals. However, they want to be taken seriously; if they are perceived as too far out of the spectrum, then achieving successes inside the system via the traditional methods becomes impossible. The two metrics selected to characterize Perception of Group, maximize media hits and minimize negative press, cover the idea of getting attention but only the right kind of attention. Figure 3 is a graphic depiction of PETA s objectives hierarchy. Improve Animal Rights Maximize Organizational Power Max Incoming Money Max New Members Max New Volunteers Maximize Influence Network Minimize Costs Minimize Cruelty to Animals Max Changes to Industry Practices Max Educational Materials Max New Laws Perception of Group Max Media hits Minimize Negative Press Figure 3. PETA Objectives Hierarchy Alternatives as well as metrics and scales were identified for each of the attributes. In addition, estimates of attitudes toward risk, trade-offs among various objectives, and uncertainties about Page 4 of 6
6 the success of particular alternatives are included. The following are the ten attribute scales, ordered by the median values of the normalized weights assessed (Figure 4). Weight Max New Members 17.9 Max New Laws 16.1 Max Changes to Industry Practices 14.3 Max Media hits 12.5 Max New Volunteers 10.7 Max Incoming Money 8.9 Max Educational Materials Distributed 8.0 Maximize Influence Network 5.4 Minimize Costs 4.5 Minimize Negative Press 1.8 Figure 4. Weights for Adversary Value Expert Preference Set The aforementioned assessments were used to construct a random multi-attribute utility model (RMAUM). The RMAUM was estimated using a simulation model implemented within Excel 10,000 iterations. As seen in Figure 5, we found that the alternative with the highest mean utility estimate is Undercover Investigation (0.62), followed by New Campaign (0.49), New Ad and Publicity Study (both with a utility of 0.44) and Purchase Stock (0.36). Figure 5. CDF Utility Distributions Page 5 of 6
7 The risk profiles were then used to obtain attack probabilities over a fixed time period, given an assumption that one of the nine options (including no attack) will be selected. As seen in Table 1, 91% of the time Undercover Investigation was the most preferred alternative, and the only other alternative that achieved a meaningful preference ranking was a New Campaign, at 7%. Alternatives P(max j (u(x j )) = x i New Ad 0.01 New Campaign 0.07 Publicity Stunt 0.01 Purchase Stock 0.00 Undercover Investigation 0.91 Table 1. Probability of Alternative The second phase of this project and a submitted paper for publication on the overall project is planned for Year Research Products 3.1. Presentations Conferences 1. John, R. S. & Rosoff, H. Decision analysis by proxy for the rational terrorist, Poster presented at 30th annual meeting of the Society of Judgment and Decision Making, Boston, MA., November 20-23, John, R. S. & Rosoff, H. Value focused thinking for evaluating alternative counter-terrorism policies. Homeland Security and Counterinsurgency invited research presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), San Diego, California, October 11-14, Education and Outreach Products Education and Outreach Initiatives (Please detail below) # # of Postdoctoral Researchers 1 # of students supported (funded by CREATE) 1 Funded by CREATE Heather Rosoff, Postdoctoral Researcher. University of Southern California (USC) School of Policy, Planning and Development. Kacie Shelton, Master of Systems Architecting & Engineering Candidate, Expected August USC s Viterbi School of Engineering. Page 6 of 6
Modeling Terrorist Beliefs and Motivations
CREATE Research Archive Research Project Summaries 2009 Modeling Terrorist Beliefs and Motivations Richard John University of Southern California, richardj@usc.edu Heather Rosoff University of Southern
More informationFrom Describing to Nudging: Choice of Transportation after a Terrorist Attack in London
CREATE Research Archive Research Project Summaries 2009 From Describing to Nudging: Choice of Transportation after a Terrorist Attack in London Barbara Fasolo London School of Economics and Political Science,
More informationThe Effects of Time on Anticipated Consequences of Risks
CREATE Research Archive Research Project Summaries 2011 The Effects of Time on Anticipated Consequences of Risks L. Robin Keller University of California - Irvine, Lrkeller@uci.edu Follow this and additional
More information1. Executive Summary. These findings, along with Gigerenzer s dread hypothesis, made us realize that
From describing to nudging: Choice of transportation after a terrorist attack in London Barbara Fasolo et al., London School of Economics, UK b.fasolo@lse.ac.uk 1. Executive Summary...1 2. Research Accomplishments...3
More informationWhite Paper. Human Behavior Analytics with Proxy Interrogatories
White Paper Human Behavior Analytics with Proxy Interrogatories Introduction Mission sets across defense, intelligence and security organizations would benefit from applying effective human behavior analytics
More informationATTACK MODALITIES. Draft 1 Charles P. Blair
ATTACK MODALITIES Draft 1 Charles P. Blair ATTACK MODALITIES Attack Modalities refers to the actual methods and techniques that terrorists choose to employ to attack particular targets. There are several
More informationThe Power of Feedback
The Power of Feedback 35 Principles for Turning Feedback from Others into Personal and Professional Change By Joseph R. Folkman The Big Idea The process of review and feedback is common in most organizations.
More informationOUR RECOMMENDED INDIVIDUAL S STRATEGY
Chapter Four CONCLUSIONS OUR RECOMMENDED INDIVIDUAL S STRATEGY Our recommended strategy involves actions that individuals can take that can save lives, even in catastrophic terrorist attacks. This can
More informationRisk Perception October 1, 2012 to September 30, Heather Rosoff Richard John University of Southern California
National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Risk Perception October 1, 2012 to September 30, 2013 Heather Rosoff Richard John University of Southern
More informationC/S/E/L :2008. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor. innovations at the intersection of people,
C/S/E/L :2008 innovations at the intersection of people, technology, and work. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor Daniel J. Zelik The Ohio State University
More informationModule 2 - Public Health Preparedness
Module 2 - Public Health Preparedness Objectives Define a public health emergency List examples of types of public health events and emergencies Overview Protecting the public from health threats involves
More informationTERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS
TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS Samah Mansoour School of Computing and Information Systems, Grand Valley State University, Michigan,
More informationPRIVELEGED, NON-CLASSIFIED CARVER + SHOCK PRIMER
CARVER + SHOCK PRIMER 1 CARVER PLUS SHOCK METHOD FOR FOOD SECTOR VULNERABILITY ASSESSMENTS 1 Overview The CARVER plus Shock method is an offensive targeting prioritization tool that has been adapted for
More informationAlternative Threat Methodology
Volume 4 Number 1 Volume 4, No. 1: Spring 2011 Article 5 Alternative Threat Methodology Charles B. King III Transportation Security Administration, chas.king@dhs.gov Follow this and additional works at:
More informationBeyond the Realist Model
Beyond the Realist Model Realist Model National Interests Dominate National Security Policy-Making States have clear unambiguous goals Changes in leaders and institutions are overshadowed by national interests
More informationToronto Mental Health and Addictions Supportive Housing Network TERMS OF REFERENCE
1 Toronto Mental Health and Addictions Supportive Housing Network BACKGROUND: TERMS OF REFERENCE The Toronto Mental Health and Addictions Supportive Housing Network (TMHASHN), is a network of organizations
More informationExpert judgements in risk and reliability analysis
Expert judgements in risk and reliability analysis Jan-Erik Holmberg M2-E2117 Risk analysis, April 17, 2016 Aalto university Contents Definitions Applications Bayesian approach Examples 2 Background Objective,
More informationStatistical Audit. Summary. Conceptual and. framework. MICHAELA SAISANA and ANDREA SALTELLI European Commission Joint Research Centre (Ispra, Italy)
Statistical Audit MICHAELA SAISANA and ANDREA SALTELLI European Commission Joint Research Centre (Ispra, Italy) Summary The JRC analysis suggests that the conceptualized multi-level structure of the 2012
More informationGrant Competition: AARP Foundation Seeks Evidence-Based Solutions for Vulnerable Older Adults Applicant Webinar
Grant Competition: AARP Foundation Seeks Evidence-Based Solutions for Vulnerable Older Adults Applicant Webinar Presented by Matt D Amico, Grant Program Officer October 11, 2016 Webinar Agenda AARP Foundation
More informationPosition Profile Chief Executive Officer Feeding America San Diego San Diego, CA
Position Profile Chief Executive Officer Feeding America San Diego San Diego, CA Feeding America San Diego is seeking an experienced and inspirational Chief Executive Officer to lead this impactful and
More informationEffects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game
Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game Ivaylo Vlaev (ivaylo.vlaev@psy.ox.ac.uk) Department of Experimental Psychology, University of Oxford, Oxford, OX1
More informationKevin Murphy The Pennsylvania State University, International Center for the Study of Terrorism. June 2008
Evaluation of Methods for Drawing Inferences about Non-State Actors Perceptions of the Risks and Benefits of Seeking and Acquiring Weapons of Mass Destruction Kevin Murphy The Pennsylvania State University,
More informationFY2015 Annual Report. Risk Perception and Communication: Near-Misses and Risk Inoculation Robin Dillon-Merrill, Georgetown University
FY2015 Annual Report Risk Perception and Communication: Near-Misses and Risk Inoculation Robin Dillon-Merrill, Georgetown University Contents 1. Executive Summary... 1 2. Research and Research Transition
More informationThe National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options
Executive Summary: The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options Overview This is the first Deliberative Poll (DP) anywhere in the world that was
More informationMark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory
Forensic Issues Regarding the Analysis of Evidence in Support of Agroterrorism Investigations Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory 703-632-7770 mwilson@fbiacademy.edu
More informationThe lenses through which threat assessment and resolution must be viewed are a critical component and perhaps the most fundamental aspect of the frame
Introduction The current and evolving body of work in the social and behavioral sciences offers tremendous potential for gaining an in-depth understanding of global adversaries and allies; and their future
More informationProblems and challenges faced by professional working women in food processing companies in Gujarat Mr. Deval Patel 1, Dr.
Problems and challenges faced by professional working women in food processing companies in Gujarat Mr. Deval Patel 1, Dr. Samit Dutta 2 1 Asstt. Prof., FPT & BE, AAU, Anand, 2 Asso. Prof., FPT & BE, AAU,
More informationW. Brooke Elliott 2012 Audit Symposium
Discussion of The Effects of Environmental Attitudes, Perceived Environmental Information Importance, Corporate Environmental Performance, and Independent Assurance on Investor Judgments W. Brooke Elliott
More informationImproving rapid counter terrorism decision making
Improving rapid counter terrorism decision making COGITO Artificial Intelligence based human pattern recognition General Terrorists are threatening world peace. While intelligence is limited and cultural
More informationEstablishing a Best-in-Class Workplace Violence Prevention Program. Matthew Doherty, Senior Vice President, Hillard Heintze
Establishing a Best-in-Class Matthew Doherty, Senior Vice President, Hillard Heintze Agenda Employee Safety Is a Top Priority Protecting the Workplace What We Learned about Attackers Behavioral Threat
More informationCommitted to Environment, Health and Safety
Committed to Environment, Health and Safety Environment, Health and Safety Management System and Policy of GCP Applied Technologies Inc. SEPTEMBER 1, 2017 The GCP Environment, Health, and Safety Management
More informationCoping with Threats of Terrorism A Protocol for Group Intervention by Richard J. Ottenstein, Ph.D., CEAP, CTS
Journal Submission: International Journal of Emergency Mental Health Published: Volume 5, Number 1, Winter 2003 Submitted by: Richard J. Ottenstein, Ph.D., CEAP, CTS Address: The Workplace Trauma Center
More informationThe competitive advantages of a spatially centralized entity versus a decentralized entity
The competitive advantages of a spatially centralized entity versus a decentralized entity New England Complex Systems Institute One-Week Intensive Course: Complex Physical, Biological and Social Systems
More information360 Degree Feedback Assignment. Robert M. Clarkson. Virginia Commonwealth University. EDLP 703 Understanding Self as Leader: Practical Applications
Running head: 360 DEGREE FEEDBACK 1 360 Degree Feedback Assignment Robert M. Clarkson Virginia Commonwealth University EDLP 703 Understanding Self as Leader: Practical Applications Commented [O1]: All
More informationHomo economicus is dead! How do we know how the mind works? How the mind works
Some facts about social preferences, or why we're sometimes nice and sometimes not Karthik Panchanathan buddha@ucla.edu Homo economicus is dead! It was a mistake to believe that individuals and institutions
More informationChapter 1: Thinking critically with. Introduction
Chapter 1: Thinking critically with psychological science Introduction Fact or Falsehood 1. Human intuition is remarkable accurate and free from error. 2. Most people seem to lack confidence in the accuracy
More informationSurvey Research. We can learn a lot simply by asking people what we want to know... THE PREVALENCE OF SURVEYS IN COMMUNICATION RESEARCH
Survey Research From surveys we can learn how large groups of people think and act. To trust generalizations made on the basis of surveys, however, the sample must be representative, the response rate
More informationCRIMINAL JUSTICE (CJ)
Criminal Justice (CJ) 1 CRIMINAL JUSTICE (CJ) CJ 500. Crime and Criminal Justice in the Cinema Prerequisite(s): Senior standing. Description: This course examines media representations of the criminal
More informationWhat is analytical sociology? And is it the future of sociology?
What is analytical sociology? And is it the future of sociology? Twan Huijsmans Sociology Abstract During the last few decades a new approach in sociology has been developed, analytical sociology (AS).
More informationCHAPTER 3 RESEARCH METHODOLOGY
CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction 3.1 Methodology 3.1.1 Research Design 3.1. Research Framework Design 3.1.3 Research Instrument 3.1.4 Validity of Questionnaire 3.1.5 Statistical Measurement
More informationMapping A Pathway For Embedding A Strengths-Based Approach In Public Health. By Resiliency Initiatives and Ontario Public Health
+ Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health By Resiliency Initiatives and Ontario Public Health + Presentation Outline Introduction The Need for a Paradigm Shift Literature
More informationConstruction of Theoretical Model for Antiterrorism: From Reflexive Game Theory Viewpoint
1 Construction of Theoretical Model for Antiterrorism: From Reflexive Game Theory Viewpoint Vladimir Lefebvre, PhD University of California, Irvine Kofi Nyamekye, PhD Integrated Activity-Based Simulation
More informationSystems Engineering Guide for Systems of Systems. Summary. December 2010
DEPARTMENT OF DEFENSE Systems Engineering Guide for Systems of Systems Summary December 2010 Director of Systems Engineering Office of the Director, Defense Research and Engineering Washington, D.C. This
More information8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict
Threat Assessment & Response to Mass Violence Mario J. Scalora, Ph.D. Agenda Brief Overview of Threat Assessment Principles Recent Trends in Targeted Violence Application to Mass Casualty Response Targeted
More informationChecklist for assessing the gender responsiveness of sexual and reproductive health policies. Pilot document for adaptation to national contexts
Checklist for assessing the gender responsiveness of sexual and reproductive health policies Pilot document for adaptation to national contexts Address requests about publications of the WHO Regional Office
More information2013 NEHA AEC July 9 11, One Health and All-Hazards: the New Environmental Health. Want this on you?
One Health and All-Hazards: the New Environmental Health Christopher Eddy, MPH, REHS, RS, M.B.A. (candidate) Erik Balster, MPH, REHS, RS July 11, 2013 Next best thing to the Cover of the Rolling Stone?
More informationCSE468 Information Conflict
CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 06 Hypergames vs Information Conflict Strategies Reference Sources and Bibliography There are few references dealing with
More informationNWT SPCA. Advocates for Animals of the North. Strategic Plan Charitable Registration #BN RR0001
NWT SPCA Advocates for Animals of the North Strategic Plan 2016-2020 Charitable Registration #BN 886100791 RR0001 PO Box 2278 Yellowknife, NT X1A 2P7 Ph:(867) 444-8444 fx: (867)920-7723 nwtspcayk@gmail.com
More informationRESEARCH PAPER. The psychological basis for terrorism and terrorists
RESEARCH PAPER The psychological basis for terrorism and terrorists 2 1.0 Introduction The present research paper sheds light on the evidences that explain the psychological basis for terrorism and terrorists.
More informationChapter 7 Motivation and Emotion
Chapter 7 Motivation and Emotion Emotion Emotion a response of the whole organism physiological arousal expressive behaviors conscious experience Eight Basic Emotions Fear Surprise Disgust Anger Sadness
More informationNational Center for Risk and Economic Analysis of Terrorism Events University of Southern California
National Center for Risk and Economic Analysis of Terrorism Events University of Southern California The Perception of Terrorist Events to Improve Risk Communication: Understanding the Impact of Near-Miss
More informationShaping the Economics of Happiness: The Fundamental Contributions of Richard A. Easterlin
I Shaping the Economics of Happiness: The Fundamental Contributions of Richard A. Easterlin Holger Hinte and Klaus F. Zimmermann Did it take a global economic and financial crisis to remind us that money
More informationConducting Effective Emergency Management Tabletops, Drills and Other Exercises
U.S. Department of Education Office of Safe and Drug-Free Schools Conducting Effective Emergency Management Tabletops, Drills and Other Exercises Matt Taylor, Associate Director, Montana Safe Schools Center
More informationHow Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis?
How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis? Richards J. Heuer, Jr. Version 1.2, October 16, 2005 This document is from a collection of works by Richards J. Heuer, Jr.
More informationAssessment and Estimation of Risk Preferences (Outline and Pre-summary)
Assessment and Estimation of Risk Preferences (Outline and Pre-summary) Charles A. Holt and Susan K. Laury 1 In press (2013) for the Handbook of the Economics of Risk and Uncertainty, Chapter 4, M. Machina
More informationNew Effects-Based Operations Models in War Games. Lee W. Wagenhals Larry K. Wentz
New Effects-Based Operations Models in War Games Lee W. Wagenhals Larry K. Wentz 2003 ICCRTS 8th International Command and Control Research and Technology Symposium June 19, 2002 National Defense University
More informationMotivation Motivation
This should be easy win What am I doing here! Motivation Motivation What Is Motivation? Motivation is the direction and intensity of effort. Direction of effort: Whether an individual seeks out, approaches,
More informationThe Plan Putting the Pieces Together
The Plan Putting the Pieces Together Threat and Hazard Identification and Risk Assessment THIRA Where it all begins Threat and Hazard Identification and Risk Assessment (THIRA) Natural or manmade occurrence,
More informationConfirmation Bias. this entry appeared in pp of in M. Kattan (Ed.), The Encyclopedia of Medical Decision Making.
Confirmation Bias Jonathan D Nelson^ and Craig R M McKenzie + this entry appeared in pp. 167-171 of in M. Kattan (Ed.), The Encyclopedia of Medical Decision Making. London, UK: Sage the full Encyclopedia
More informationA BOLD VENTURE: Principles of Social Ecology Relevant to Solving Complex Problems in a Globalized World
A BOLD VENTURE: Principles of Social Ecology Relevant to Solving Complex Problems in a Globalized World The 2018 book Social Ecology in the Digital Age by Daniel Stokols is a rich source for understanding
More informationBEHAVIOR CHANGE THEORY
BEHAVIOR CHANGE THEORY An introduction to a behavior change theory framework by the LIVE INCITE team This document is not a formal part of the LIVE INCITE Request for Tender and PCP. It may thus be used
More informationCHAPTER 3 METHOD AND PROCEDURE
CHAPTER 3 METHOD AND PROCEDURE Previous chapter namely Review of the Literature was concerned with the review of the research studies conducted in the field of teacher education, with special reference
More informationActive Bystander Behavior: Extended Analysis from the Sexual Conduct: Culture and Respect Survey Tyler Anderson 16 Grinnell College
Active Bystander Behavior: Extended Analysis from the Sexual Conduct: Culture and Respect Survey Tyler Anderson 16 Grinnell College Author s note: This document represents the results of a Mentored Advanced
More informationThe Effectiveness of Pre-Driver Training
67 th ROAD SAFETY CONGRESS 4 th 6 th MARCH 2002 Safer Driving The Road to Success The Effectiveness of Pre-Driver Training Dr Bill Carcary Tayside Police NEW DRIVER PROJECT Dr. Bill Carcary Tayside Police
More informationTitle: Understanding consumer acceptance of intervention strategies for healthy food choices: a qualitative study
Author's response to reviews Title: Understanding consumer acceptance of intervention strategies for healthy food choices: a qualitative study Authors: Colin Bos (colin.bos@wur.nl) Ivo A. Van der Lans
More information2014 Hong Kong Altruism Index Survey
2014 Hong Kong Altruism Index Survey Compiled by: Prof. Paul S.F. Yip & Dr. Qijin Cheng August 2014 Funded by Table of Contents Executive Summary... 1 Chapter I. Introduction... 5 Survey objectives...
More informationCONFLICT MANAGEMENT Fourth Edition
Assessment CONFLICT MANAGEMENT Fourth Edition Complete this book, and you ll know how to: 1) Catch disagreement before it escalates into dysfunctional conflict. 2) Replace habitual styles of handling differences
More informationWhat Counts as Credible Evidence in Contemporary Evaluation Practice?
What Counts as Credible Evidence in Contemporary Evaluation Practice? Stewart I. Donaldson, Ph.D. Claremont Graduate University stewart.donaldson@cgu.edu Hawaii-Pacific Evaluation Association Annual Conference
More informationAn Overview of Message Mapping: Framing and Coordinating Messaging Efforts , passcode April 27, :45 PM ET
An Overview of Message Mapping: Framing and Coordinating Messaging Efforts 866-519-2796, passcode 154986 April 27, 2018 2 2:45 PM ET Virtual Training Logistics Join by both Adobe Connect and phone line:
More informationReflect on the Types of Organizational Structures. Hierarch of Needs Abraham Maslow (1970) Hierarchy of Needs
Reflect on the Types of Organizational Structures 1 Hierarch of Needs Abraham Maslow (1970) Self- Actualization or Self- Fulfillment Esteem Belonging, Love, and Social Activities Safety and Security Psychological
More informationAssessment of Impact on Health and Environmental Building Performance of Projects Utilizing the Green Advantage LEED ID Credit
July 26, 2009 Assessment of Impact on Health and Environmental Building Performance of Projects Utilizing the Green Advantage LEED ID Credit This study, undertaken collaboratively by the s Powell Center
More informationVerbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London. Harvey Toulouse October 2009
Verbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London Outline Definitions of trust Some research issues for psychologists Ways of studying trust
More informationDepartment of Defense System of Systems Challenges
Department of Defense of s Challenges NASA Johnson Space Flight Center s Engineering Seminar August 2, 2007 Dr. Judith Dahmann MITRE Corporation Software and s Engineering DoD Acquisition, Technology and
More informationEU-SILC 2013 MODULE ON WELL-BEING DESCRIPTION OF SILC SECONDARY TARGET VARIABLES Version 5 March 2012
EUROPEAN COMMISSION EUROSTAT Directorate F: Social and information society statistics Unit F-3: Living conditions and social protection EU-SILC 2013 MODULE ON WELL-BEING DESCRIPTION OF SILC SECONDARY TARGET
More informationON SHELF AVAILABILITY ALIGNMENT PROJECT 2011 ASIA PAC SURVEY RESULTS
ON SHELF AVAILABILITY ALIGNMENT PROJECT 2011 ASIA PAC SURVEY RESULTS Introduction The ECR Asia Pacific OSA working group conducted an online survey between July and September 2011 aimed at gaining insights
More informationHIV AIDS & ADVOCACY. Jubilee Centre (Zambia) Case Study
HIV AIDS & ADVOCACY Jubilee Centre (Zambia) Case Study Jubilee Centre Jubilee Centre is a Christian organization committed to building relationships with churches, organizations and individual Christian
More informationSampling Methodology
Background CCMTA s Drugs and Driving Framework identified need to raise public s awareness regarding risks associated with drug-impaired driving Purpose of Survey: To determine drivers knowledge, perceptions,
More informationImplementing Lean Six Sigma in Organizations. Dhr. B.A. Lameijer
Implementing Lean Six Sigma in Organizations. Dhr. B.A. Lameijer Summary of implementing LSS in organizations Due to a variety of reasons such as increased competition, resource scarcity and transparency
More informationChief Development Officer National Brain Tumor Society
Send Nominations or Cover Letter and Resume to: Lisa Vuona Vice President 617-262-1102 lvuona@lllsearches.com Chief Development Officer National Brain Tumor Society Newton, MA http://braintumor.org/ The
More informationInterview with Ragnhildur Helgadóttir, Reykjavik, 23d February 2009
Interview with Ragnhildur Helgadóttir, Reykjavik, 23d February 2009 Proscovia Svärd: What do you do for a living? Ragnhildur Helgadóttir: I am a law professor. Proscovia Svärd: At what university? Ragnhildur
More informationUpdate from IMI PREFER: Patient preferences in benefitrisk assessments during the medical product lifecycle
1 1 Update from IMI PREFER: Patient preferences in benefitrisk assessments during the medical product lifecycle Presenter: Chiara Whichello on behalf of the PREFER consortium June 5, 2018 The statements
More informationFlightfax R Online newsletter of Army aircraft mishap prevention information
Number 32 December 2013 Flightfax R Online newsletter of Army aircraft mishap prevention information In this month s issue of Flightfax, we are focusing on individual and aircrew situational awareness
More informationNATIONAL COMMITTEE ON AIDS, DRUGS AND PROSTITUTE CONTROL OF VIETNAM
NATIONAL COMMITTEE ON AIDS, DRUGS AND PROSTITUTE CONTROL OF VIETNAM CEREMONY FOR THE PUBLIC ANNOUNCEMENT OF THE STRATEGY ON PREVENTING, COMBATING AND CONTROLLING DRUG ABUSE IN VIETNAM TILL 2020 AND ORIENTATION
More informationE x e c u t i v e S u m m a r y. P o w e r e d b y
E x e c u t i v e S u m m a r y P o w e r e d b y COPYRIGHT BRAINWAVE SCIENCE 2016 Our Company Founded in 2012, Brainwave Science offers its ground-breaking Brain Fingerprinting Technology with applications
More informationIFIC Foundation Food Label Consumer Research Project: Qualitative Research Findings
: Qualitative Research Findings Introduction Today s food labels provide nutrition information to help consumers make food choices to achieve a healthful diet. The Nutrition Facts Panel (NFP) contains
More informationTHE CUSTOMER SERVICE ATTRIBUTE INDEX
THE CUSTOMER SERVICE ATTRIBUTE INDEX Jane Doe Customer Service XYZ Corporation 7-22-2003 CRITICAL SUCCESS ATTRIBUTES ATTITUDE TOWARD OTHERS: To what extent does Jane tend to maintain a positive, open and
More informationINTRODUCTION. Evidence standards for justifiable evidence claims, June 2016
EVIDENCE STANDARDS: A DIMENSIONS OF DIFFERENCE FRAMEWORK FOR APPRAISING JUSTIFIABLE EVIDENCE CLAIMS 1 David Gough, EPPI-Centre, SSRU, UCL Institute of Education, University College London INTRODUCTION
More informationcan CAMPAIGN STRATEGY PAPER
e can CAMPAIGN STRATEGY PAPER This paper outlines the proposition, approach, and methodology for the South Asia regional campaign to end violence against women (the WE CAN campaign) that will be implemented
More informationLearning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior
Chapter 4 Perspectives on Consumer Behavior Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Learning
More informationThis is copyrighted material. Women and Men in U.S. Corporate Leadership. Same Workplace, Different Realities?
Women and Men in U.S. Corporate Leadership Same Workplace, Different Realities? INTRODUCTION Although women occupy one-half (50.5 percent) of managerial and professional specialty positions in the United
More informationChild Mental Health: A Review of the Scientific Discourse
Child Mental Health: A Review of the Scientific Discourse Executive Summary and Excerpts from A FrameWorks Research Report Prepared for the FrameWorks Institute by Nat Kendall-Taylor and Anna Mikulak February
More informationUsing Risk Analysis to Manage Terrorism Risk
CREATE Research Archive Research Project Summaries 2010 Using Risk Analysis to Manage Terrorism Risk Henry H. Willis RAND, hwillis@rand.org Follow this and additional works at: http://research.create.usc.edu/project_summaries
More informationTobacco-Control Policy Workshop:
Tobacco-Control Policy Workshop: Goal: to introduce Mega-Country leaders to an effective policy framework for tobacco control and to develop skills to promote policy implementation. Objectives: As a result
More informationWhy do Psychologists Perform Research?
PSY 102 1 PSY 102 Understanding and Thinking Critically About Psychological Research Thinking critically about research means knowing the right questions to ask to assess the validity or accuracy of a
More informationSYSTEM-OF-SYSTEMS (SOS) WORKSHOP 3 SICS & INCOSE
SYSTEM-OF-SYSTEMS (SOS) WORKSHOP 3 SICS & INCOSE 2015-04-22 AGENDA 10.00-10.10: Introduction Short presentation of everyone Background: The SoS Agenda project 10.10-11.00: Summary and analysis of WS1-2
More informationJournal of Political Economy, Vol. 93, No. 2 (Apr., 1985)
Confirmations and Contradictions Journal of Political Economy, Vol. 93, No. 2 (Apr., 1985) Estimates of the Deterrent Effect of Capital Punishment: The Importance of the Researcher's Prior Beliefs Walter
More informationUsing Health Economics to Inform the Development of Medical Devices. Matthew Allsop MATCH / BITECIC
Using Health Economics to Inform the Development of Medical Devices Matthew Allsop MATCH / BITECIC Overview Background to MATCH Overview of health economics in product development Concepts relating to
More informationLessons from Risk Perception in Other Contexts
Lessons from Risk Perception in Other Contexts V. KERRY SMITH North Carolina State University Raleigh, NC I will draw inferences from lessons that are associated not with biotechnology, but with how consumers
More informationRepresentation pathways for marginalised women survivors of conflict Terms of Reference
Representation pathways for marginalised women survivors of conflict Terms of Reference Women for Women International (WfWI) is looking for a UK-based, experienced, feminist consultant to deliver a desk-based
More information