Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   22  
      CriminologyPsychologyLawViolence
    • by 
    •   21  
      EpidemiologyPovertyGlobal HealthPolitics
    • by 
    •   20  
      Emergency MedicineViolenceAdolescentMultivariate Analysis
Firearms were associated with 30, 136 deaths in the United States in 2003. Most guns are initially sold to the public through a network of retail dealers. Licensed firearm dealers are an important source of guns for criminals and gun... more
    • by 
    •   14  
      LawApplied EthicsSocial ResponsibilityCommerce
    • by 
    •   20  
      AlgorithmsArtificial IntelligencePhotographyMotion Analysis
    • by  and +1
    •   32  
      TerrorismMental HealthResilienceHealth Planning
    • by 
    •   17  
      Animal HusbandryPreventive Veterinary MedicineAnimalsData Collection
    • by 
    •   20  
      ReligionTerrorismPersonalityBehavior
    • by  and +1
    •   25  
      GeneticsEthicsHuman GeneticsInformed Consent
Patient characteristics associated with the clinical prediction of assaultive behavior in a forensic psychiatric hospital were compared with characteristics associated with actual assaultive behavior. Treating psychiatrists at a New York... more
    • by 
    •   17  
      ViolenceSchizophreniaRisk assessmentHumans
    • by 
    •   19  
      Information SystemsAlgorithmsArtificial IntelligenceComputer Vision
    • by 
    •   17  
      PsychologyCognitive SciencePoliceSocial Perception
    • by 
    •   22  
      EpidemiologyPovertyGlobal HealthPolitics
    • by 
    •   24  
      NursingViolenceOccupational HealthFamily
The Republic of China on the island of Taiwan has experienced at least 20 terrorist events since 1979, including 13 aircraft hijackings and five bombings. Factors responsible for the relatively small burden of terrorism on Taiwan in the... more
    • by 
    •   13  
      TerrorismRisk assessmentEmergency Medical ServicesHumans
    • by 
    •   30  
      PsychologyCognitive SciencePsychometricsSchizophrenia
    • by 
    •   18  
      EngineeringTerrorismRisk assessmentScience and Technology
    • by 
    •   12  
      Invasive SpeciesMolecular DiagnosticsBiological SciencesMitochondrial DNA
    • by 
    •   10  
      Health PolicyPrisonsHumansMental Disorders
    • by 
    •   10  
      LawCriminal LawForensic psychiatryGermany
    • by 
    •   16  
      NursingViolenceOccupational HealthAustralia
    • by 
    •   4  
      NetworkingHackingIT SecuritySecurity Measures
    • by 
    •   24  
      LawHomicideRapePersonality Disorders
    • by 
    •   18  
      PsychologyCognitive SciencePsychometricsPersonality Assessment
It is unclear how international donors' stated commitment to ownership and partnership ‘translates’ in fragile state or ‘post-conflict’ settings. The very notion of ownership is violently contested in Afghanistan and donors have to... more
    • by 
    •   10  
      GovernmentAfghanistanPoliticsInternational Cooperation
We extend the design of radially symmetric three-dimensional invisibility cloaks through transformation optics to cloaks with a surface of revolution. We derive the expression of the transformation matrix and show that one of its... more
    • by 
    •   20  
      Electrical EngineeringApplied MathematicsElectromagnetic metamaterialsComputational Electromagnetics
    • by 
    •   5  
      Legal HistorySecurity MeasuresEnrico FerriHistory of Criminal Law
    • by 
    •   7  
      ViolenceHumansUnited StatesSafety Management
RESUMEN Las cuestiones relativas a la peligrosidad criminal, el riesgo de reiteración delictiva, la imposición de medidas de seguridad post-delictuales como la libertad vigilada, son cuestiones de gran actualidad y la valoración del... more
    • by 
    •   5  
      Sexual ViolenceRisk, dangerousness and public protectionSecurity MeasuresPeligrosidad
George Orwell's 'Big Brother' and Michel Foucault's 'panopticon' have dominated discussion of contemporary developments in surveillance. While such metaphors draw our attention to important... more
    • by 
    •   18  
      SociologyMedical SociologySocial TheoryTechnology
On September 2013 an attack on the Westgate mall in Kenya led to a four day siege, resulting in 67 fatalities and 175 wounded. During the crisis, Twitter became a crucial channel of communication between the government, emergency... more
    • by  and +1
    •   25  
      Emergency MedicineTerrorismInternational TerrorismData Mining
    • by 
    •   4  
      ArchaeologyWWII ArchaeologySecurity MeasuresKunstschutz
    • by 
    •   25  
      LawPhilosophyApplied EthicsTerrorism
    • by 
    •   13  
      PsychologyCognitive SciencePoliticsEmotions
    • by  and +1
    •   11  
      Global HealthForeign PolicyInternational CooperationHealth Policy
    • by 
    •   5  
      Critical CriminologyCriminology and Criminal JusticeSecurity MeasuresCriminal Inquiry
Since its discovery in Nigeria in 1956 crude oil has been a source of mixed blessing to the country. It is believed to have generated enormous wealth, but it has also claimed a great many lives. Scholarly attention on the impact of oil... more
    • by 
    •   15  
      TerrorismPovertyPetroleumVulnerability
    • by  and +1
    •   13  
      United NationsLife SciencesInternational CooperationHumans
    • by 
    •   6  
      HumansMoral ObligationsSecurity MeasuresEthics Research
    • by 
    •   15  
      Animal HusbandryPreventive Veterinary MedicineAnimalsData Collection
    • by 
    •   8  
      Public OpinionBrainHumansDiagnostic Imaging
    • by 
    •   21  
      PsychologyAbnormal PsychologyGame TheoryPersonality Assessment
    • by 
    •   45  
      DentistrySocial WorkVaccinesGlobal Health
    • by 
    •   9  
      CommunicationTransportationDisastersHumans
    • by 
    •   7  
      Human RightsTranscultural PsychiatryInternal migrationHumans
    • by 
    •   10  
      TerrorismHumansNeeds AssessmentProgram Development
    • by 
    •   28  
      CriminologyPsychologyCriminal JusticeViolence
The growth in online transactions is accompanied with an increase in the incidences of fraud. In the online marketplace, fraudsters are using sophisticated malware to take over accounts and commit fraud related activities. At the global... more
    • by 
    •   6  
      Security MeasuresSecurity RisksInternet FraudE Commerce
For a sound and working democratic system, citizen engagement in politics is of utmost importance. Especially in today’s world where international politics are interrupted by populist political elites and authoritarian governments, civic... more
    • by 
    •   19  
      European StudiesPolitical ParticipationHuman RightsEthiopian Studies
    • by 
    •   11  
      LawSocial JusticeForensic psychiatryProfessional Ethics