Addressing potential risks posed by artificial intelligence (AI) could begin with simple steps like finding appropriate risk-management approaches, conducting research to determine how AI can better meet designers' intent, and devising responses to issues related to racism, sexism, and other biases within AI systems.
The need for AI-readiness in federal procurement will continue to grow with the capabilities of AI tools. There are concrete steps the government could take to ensure all development and implementation of AI-related laws, regulations, and executive branch policies include appropriate considerations.
In: New community: European journal on migration and ethnic relations ; the journal of the European Research Centre on Migration and Ethnic Relations, Volume 14, Issue Autumn 87
When President Barack Obama announced the assassination of Osama bin Laden, many Americans hoped the killing of al-Qaida's leader would sound the death knell for the organization. Since 9/11, killing and capturing terrorist leaders has been a central element in U.S. counterterrorism strategy. This practice, known as leadership decapitation, is based on the logic that removing key figures will disrupt the organization and contribute to its ultimate failure. Yet many scholars have argued that targeted killings are ineffective or counterproductive, questioning whether taking out a terror network's leaders causes more problems than it solves.In Targeting Top Terrorists, Bryan C. Price offers a rich, data-driven examination of leadership decapitation tactics, providing theoretical and empirical explanations of the conditions under which they can be successful. Analyzing hundreds of cases of leadership turnover from over two hundred terrorist groups, Price demonstrates that although the tactic may result in short-term negative side effects, the loss of top leaders significantly reduces terror groups' life spans. He explains vital questions such as: What factors make some terrorist groups more vulnerable than others? Is it better to kill or capture terrorist leaders? How does leadership decapitation compare to other counterterrorism options? With compelling evidence based on an original dataset along with an in-depth case study of Hamas, Targeting Top Terrorists contributes to scholarship on terrorism and organizational theory and provides insights for policy makers and practitioners on some of the most pressing debates in the field.
Access options:
The following links lead to the full text from the respective local libraries:
Machine generated contents note: 1.Overview of the Aviation Industry and Security in the Post-9/11 World -- Objectives -- Introduction -- Aviation Industry: An Overview -- Aviation Security and Responding to Threats -- Aviation Economics -- Aviation Security Funding -- Aircraft Operations: An Overview -- Airline Management -- Airline Economics -- Airports: An Overview -- Airport Ownership and Operation -- Agencies and Organizations -- Conclusion -- 2.Crime and Terrorism in Aviation: A Retrospective -- Objectives -- Introduction -- Historical Context on Acts of Air Terror -- 1990-2001: A False Sense of Security -- September 11, 2001 -- Post-9/11 Attacks -- Conclusion -- 3.Policies and Procedures: The Development of Aviation Security Practices -- Objectives -- Introduction -- International Civil Aviation Organization -- U.S. Aviation Policies -- Federal Government Takeover of the Screening Process -- International Aviation Policies -- Conclusion -- 4.The Role of Government in Aviation Security -- Objectives -- Introduction -- Transportation Security Regulations -- How Regulations are Changed -- Intelligence and Intervention -- Domestic and Regional Aviation Security -- Conclusion -- 5.Commercial Aviation Airport Security -- Objectives -- Introduction -- Challenge of Commercial Airport Security in the United States -- Airport Security Coordinator -- Airport Security Program -- Access Control Systems -- Incident Management -- Security Tools and Considerations -- Conclusion -- 6.Introduction to Screening -- Objectives -- Introduction -- Evolution of Screening in the United States -- Screening under the Transportation Security Administration -- Screening Checkpoint Operations and Design -- Screening: Terminal Operations and Profiling -- Conclusion -- 7.Passenger and Baggage Screening -- Objectives -- Screening Passenger and Carry-On Baggage -- Screening Checked Baggage -- Special Issues in Screening -- Conclusion -- 8.Commercial Aviation Aircraft Operator Security -- Objectives -- Introduction -- Airline Security: Historical Context -- Aircraft Operator Standard Security Program -- Title 49 CFR Part 1544-Aircraft Operator Security: Air Carriers and Commercial Operators -- Law Enforcement Operations Related to Airline Security -- Aircraft Security Requirements -- Airline Employee Safety -- Foreign Aircraft Operations -- Conclusion -- 9.General Aviation Security -- Objectives -- Introduction -- Securing General Aviation -- How 9/11 Changed General Aviation -- GA Airport Security Best Practices -- State of GA Security -- Attempts to Secure General Aviation -- Helicopter Security -- Training for GA Airport Security and Law Enforcement Personnel -- Alien Flight Student Program -- Flight School Security Awareness Training -- Maryland-3 -- Aircraft Security under General Operating and Flight Rules -- Agricultural Aircraft Security -- Corporate Aviation Security -- DCA Access Standard Security Program -- Conclusion -- 10.Air Cargo Security -- Objectives -- Introduction -- Terrorism and Crime in Air Cargo -- The Nature of Air Cargo -- Known Shipper Program -- Government Accountability Office on Air Cargo -- Aviation Security Advisory Committee: Air Cargo -- Summary of TSA Rulemaking -- Unknown Shippers and U.S. Mail -- Title 49 CFR Part 1548 Indirect Air Carrier Security -- Certified Cargo Screening Program -- Current Air Cargo Security Measures and Issues -- Conclusion -- 11.The Threat Matrix -- Objectives -- Introduction -- Threat Matrix -- Existing Threats: Aircraft Bombings, Aircraft Hijackings, and Airport Attacks -- Emerging Conventional Threats -- Emerging Asymmetrical Threats -- Counterterrorism: Terrorism Defense Planning -- Conclusion -- 12.Security Operations -- Objectives -- Introduction -- Aviation Policing Strategies -- Security Management Systems -- Airport Crimes -- Airport Policing Strategies -- Policing General Aviation -- Professional Security Officers -- Red Teaming -- Conclusion
Access options:
The following links lead to the full text from the respective local libraries: