//]]>

Evidence-Based Counterterrorism Policy (Record no. 15321)

000 -LEADER
fixed length control field 04396nam a22004215i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310145529.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111104s2012 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781461409533
978-1-4614-0953-3
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6001-7220.5
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364
Edition number 23
264 #1 -
-- New York, NY :
-- Springer New York,
-- 2012.
912 ## -
-- ZDB-2-SHU
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Lum, Cynthia.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Evidence-Based Counterterrorism Policy
Medium [electronic resource] /
Statement of responsibility, etc edited by Cynthia Lum, Leslie W. Kennedy.
300 ## - PHYSICAL DESCRIPTION
Extent VIII, 388 p.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Springer Series on Evidence-Based Crime Policy ;
Volume number/sequential designation 3
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface: Evidence-based policy movement -- A. Introduction -- 1. Evidence Based Counter Terrorism Policy: Issues and Prospects -- B. Obtaining Data for Counterterrorism Evaluations -- 2. Generating Evidence – A Review of Projects from the START Center -- 3. Data Archives for Terrorism Research -- 4. The Role of Fusion Centers as Sources of Information -- 5. Data from courts and prisons -- 6. Dynamic Data Analysis and Data Mining -- C. Methodological Concerns in Evaluating Counterterrorism Policy -- 7. Methodological Challenges of Evaluation: The Qualitative Critique of the Campbell Review -- 8. Quantitative Methods in Evaluating Counterterrorism policy -- 9. Longitudinal Methods of Evaluation: Hazard Modeling and Trajectory Analysis -- 10. Alternative Methods of Evaluation – Advanced Events Data Analysis and Simulations.
520 ## - SUMMARY, ETC.
Summary, etc Since the 9/11 terror attacks, the development and implementation of counterterrorism strategies has been a top priority in national security policies in many countries. Yet as the number and scope of these programs grow—with spending to match—few studies have determined whether they are productive, ineffectual, or even detrimental to security. For too many counterterrorism programs, serious steps toward evaluation have yet to be made.   Evidence-Based Counterterrorism Policy emphasizes the use of science, evaluation, and knowledge building to inspire improvements in our what we know about counterterrorism interventions.  Focusing on three key areas—identifying and accessing relevant data, using innovative methodologies for generating new interventions, and examining various perspectives to evaluation counterterrorism—the book combines a framework for using scientific findings to inform security policy with a best-practices approach to implementing programs. Strategies such as risk terrain modeling and validity testing for security screening instruments are shown as fostering improvements in threat assessment and in anticipating and responding to future events.  The editors also argue for a broader research infrastructure to encourage ongoing development.   Among the topics covered: ·         Assessment and comparison of terrorism data sources ·         Information sharing and Fusion Centers ·         Various longitudinal models for assessing counterterrorism policies and terrorism trends ·         Evidence-based evaluations and validity testing of airport security measures ·         Public opinion and criminological research application to counterinsurgency and counterterrorism ·         Police practices for understanding and managing terror risk ·         Counterterrorism finance and trade regulations ·         Legal challenges and evaluation of counterterrorism policy   Evidence-Based Counterterrorism Policy is an invaluable resource for researchers in criminology and political science, and for policymakers involved with counterterrorism programs.  
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Social sciences.
Topical term or geographic name as entry element Criminology.
Topical term or geographic name as entry element Social Sciences.
Topical term or geographic name as entry element Criminology & Criminal Justice.
Topical term or geographic name as entry element Political Science, general.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kennedy, Leslie W.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781461409526
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4614-0953-3
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-01AUM Main Library2014-04-01 2014-04-01 E-Book   AUM Main Library364

Languages: 
English |
العربية