000 04553nam a22004575i 4500
001 978-1-4614-0953-3
003 DE-He213
005 20140220083240.0
007 cr nn 008mamaa
008 111104s2012 xxu| s |||| 0|eng d
020 _a9781461409533
_9978-1-4614-0953-3
024 7 _a10.1007/978-1-4614-0953-3
_2doi
050 4 _aHV6001-7220.5
072 7 _aJKV
_2bicssc
072 7 _aSOC004000
_2bisacsh
082 0 4 _a364
_223
100 1 _aLum, Cynthia.
_eeditor.
245 1 0 _aEvidence-Based Counterterrorism Policy
_h[electronic resource] /
_cedited by Cynthia Lum, Leslie W. Kennedy.
264 1 _aNew York, NY :
_bSpringer New York,
_c2012.
300 _aVIII, 388 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringer Series on Evidence-Based Crime Policy ;
_v3
505 0 _aPreface: Evidence-based policy movement -- A. Introduction -- 1. Evidence Based Counter Terrorism Policy: Issues and Prospects -- B. Obtaining Data for Counterterrorism Evaluations -- 2. Generating Evidence – A Review of Projects from the START Center -- 3. Data Archives for Terrorism Research -- 4. The Role of Fusion Centers as Sources of Information -- 5. Data from courts and prisons -- 6. Dynamic Data Analysis and Data Mining -- C. Methodological Concerns in Evaluating Counterterrorism Policy -- 7. Methodological Challenges of Evaluation: The Qualitative Critique of the Campbell Review -- 8. Quantitative Methods in Evaluating Counterterrorism policy -- 9. Longitudinal Methods of Evaluation: Hazard Modeling and Trajectory Analysis -- 10. Alternative Methods of Evaluation – Advanced Events Data Analysis and Simulations.
520 _aSince the 9/11 terror attacks, the development and implementation of counterterrorism strategies has been a top priority in national security policies in many countries. Yet as the number and scope of these programs grow—with spending to match—few studies have determined whether they are productive, ineffectual, or even detrimental to security. For too many counterterrorism programs, serious steps toward evaluation have yet to be made.   Evidence-Based Counterterrorism Policy emphasizes the use of science, evaluation, and knowledge building to inspire improvements in our what we know about counterterrorism interventions.  Focusing on three key areas—identifying and accessing relevant data, using innovative methodologies for generating new interventions, and examining various perspectives to evaluation counterterrorism—the book combines a framework for using scientific findings to inform security policy with a best-practices approach to implementing programs. Strategies such as risk terrain modeling and validity testing for security screening instruments are shown as fostering improvements in threat assessment and in anticipating and responding to future events.  The editors also argue for a broader research infrastructure to encourage ongoing development.   Among the topics covered: ·         Assessment and comparison of terrorism data sources ·         Information sharing and Fusion Centers ·         Various longitudinal models for assessing counterterrorism policies and terrorism trends ·         Evidence-based evaluations and validity testing of airport security measures ·         Public opinion and criminological research application to counterinsurgency and counterterrorism ·         Police practices for understanding and managing terror risk ·         Counterterrorism finance and trade regulations ·         Legal challenges and evaluation of counterterrorism policy   Evidence-Based Counterterrorism Policy is an invaluable resource for researchers in criminology and political science, and for policymakers involved with counterterrorism programs.  
650 0 _aSocial sciences.
650 0 _aCriminology.
650 1 4 _aSocial Sciences.
650 2 4 _aCriminology & Criminal Justice.
650 2 4 _aPolitical Science, general.
700 1 _aKennedy, Leslie W.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781461409526
830 0 _aSpringer Series on Evidence-Based Crime Policy ;
_v3
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4614-0953-3
912 _aZDB-2-SHU
999 _c100960
_d100960