scholarly journals Morale and Perceived Threats as Predictors of Psychological Coping with Distress in Pandemic and Armed Conflict Times

Author(s):  
Yohanan Eshel ◽  
Shaul Kimhi ◽  
Hadas Marciano ◽  
Bruria Adini

The present study investigated predictors of psychological coping with adversity responses during the COVID-19 pandemic and an armed conflict. Two paired samples that represented the Israeli population that was exposed to both adversities were compared. Respondents rated five different psychological coping responses associated with the two adversities, such as anxiety or individual resilience. Perceived security, pandemic, economic, and political risks, as well as level of morale, were rated. Two major findings were disclosed by two path analyses. Morale improved the predictions of the varied coping responses in both the pandemic and conflict and was the best predictor of four out of five responses and the second-best predictor of the fifth response. Contrary to previous studies, our findings revealed that the concept of a single major predictor of coping responses under distress is an overgeneralization. In both cases, the coping responses were better explained by other perceived risks rather than by the risk of the investigated adversity. Rather than assume that a perceived security threat accounts for low levels of public moods, it is vital to study the antecedents of coping responses and to empirically examine additional potential predictors.

Author(s):  
Harry Hammitt

Since the terrorist attacks of September 11, 2001, there has been a tightening of public access. In response to perceived security threats, government agencies have taken information down from Web sites, curtailed or restricted access to electronic sources of information, broadened the interpretation of FOIA exemptions, created or augmented new categories of restricted information, and prohibited public access for critical infrastructure information. These policy responses have been based both on the perceived security threat and an inhospitable attitude toward open government on the part of the Bush administration.


2003 ◽  
Vol 17 (4) ◽  
pp. 406-425 ◽  
Author(s):  
Mi-Sook Kim ◽  
Joan L. Duda

This study examined the effectiveness of the reported coping responses utilized by 318 U.S. and 404 Korean athletes based on the Outcome model (i.e., considers perceived immediate and long-term outcomes) and the Goodness-of-Fit model (i.e., considers the fit between situational appraisal and coping strategies employed). Intercollegiate athletes provided information regarding frequency of psychological difficulties experienced during competition, their perceived controllability over such difficulties, and the reported coping strategies utilized to counter this particular stressor. Recursive path analyses revealed that both Active/Problem-Focused and Avoidance/Withdrawal coping were deemed immediately effective during competition. Active/Problem-Focused and Avoidance/Withdrawal coping strategies were, respectively, positively and negatively associated with all three long-term variables. Results partially supported the Goodness-of-Fit model among both Korean and U.S. athletes.


2009 ◽  
Vol 91 (873) ◽  
pp. 127-142 ◽  
Author(s):  
Robin Geiβ

AbstractThe gradual process of state failure is commonly accompanied by armed violence. Apart from occasional outbreaks, armed violence in fragile states tends to smoulder with relatively low intensity, often over an extended period of time. The actual level of violence may oscillate around the level of violence that is commonly accepted as triggering the application of international humanitarian law (IHL). In addition, because of the specific objectives typically – though not necessarily always – pursued by armed groups in failed state conflict scenarios, cross-border spillover effects are fairly frequent. The qualification of armed violence in such scenarios according to the conflict categories laid down in IHL thus raises some rather specific issues. Moreover, weak states, failing states, and ultimately failed states are increasingly perceived as a key threat to international security. States seem increasingly inclined to assume sporadic order maintenance functions in the place of disabled governments so as to maintain the perceived security threat at a tolerable level. Current efforts to repress acts of piracy off the coast of Somalia are an evident case in point. Since the Security Council, in Resolution 1851, at least implied the possibility of applying IHL in that specific context, the application of this legal regime to sporadic law enforcement operations by third parties also demands further scrutiny.


2010 ◽  
Vol 2 (3) ◽  
pp. 351-380 ◽  
Author(s):  
Wouter G. Werner

The past few decades have witnessed a renewed interest in the work of Carl Schmitt. Scholars from various disciplines have claimed that Schmitt’s critique of universalism, together with his analysis of irregular warfare, provides useful lenses to make sense of the post 9/11 world. In this article, I will critically assess whether Schmitt’s work is indeed useful for understanding the post 9/11 world. To that end, I will concentrate on one of the core arguments put forward by Schmitt: that the laws of armed conflict are unable to regulate irregular warfare, including acts of terrorism. In order to determine the validity of Schmitt’s arguments, I will focus on one of the instruments used in contemporary counter-terrorism policies: the deliberate killing of specific individuals who are regarded as a security threat (‘targeted killing’). Based on an analysis of US and Israeli practice, the article argues that using Schmitt’s work as an analytical tool yields mixed results. While his analysis of irregular warfare remains relevant for contemporary conflicts, his denouncement of universalism blinds us to the transformational potential of international law.


2017 ◽  
Vol 22 (5) ◽  
pp. 778-800 ◽  
Author(s):  
Janine Natalya Clark

Sexual violence remains a persistent scourge of war. The use of sexual violence against men in armed conflict, however, remains underresearched and is often sidelined. As an explanation, this interdisciplinary article situates the issue of sexual violence against men within a new analytical framework. It does so through a focus on the core subtext which this violence reveals—the vulnerability of the penis. Highlighting critical disconnects between what the penis is and what it is constructed as being, it argues that the vulnerable penis destabilizes the edifice of phallocentric masculinity, and hence it has wider security implications. Conflict-related sexual violence has increasingly been securitized within the framework of human security. The concept of human security, however, is deeply gendered and often excludes male victims of sexual violence. This gendering, in turn, reflects a broader gendered relationship between sexual violence and security. Sexual violence against women manifests and reaffirms their long-recognized vulnerability in war. Sexual violence against men, in contrast, exposes the vulnerability of the penis and thus represents a deeper security threat. Fundamentally, preserving the integrity and power of the phallus is critical to the security and integrity of phallocentric masculinity and thus to maintaining a systemic stability that is crucial in situations of war and armed conflict.


2019 ◽  
Vol 19 (5) ◽  
pp. 783-818
Author(s):  
Noura Erakat

In the Gaza Strip, Israel’s military used lethal force against civilian protestors engaged in the ‘Great Return March’ of 2018. In its late May 2018 ruling, the Israeli Supreme Court held this use of force as legitimate self-defense. This article challenges Israel’s security response to these protests in an attempt to both unsettle a warfare discourse and to urge for a distinct ontological approach. The article argues that an ongoing settler-colonial project has racialised the Palestinian body as a security threat, and historicises Israel’s shoot-to-kill policy as merely one contemporary mode of dispossessing the native body. This includes a novel framework of armed conflict that has diminished the category of the civilian and expanded the scope of legitimate targets permitting the killing of greater numbers of Palestinians in the language of law; the article calls this legal technology the ‘shrinking civilian’.


Author(s):  
Narasimha Paravastu ◽  
Claire A. Simmers ◽  
Murugan Anandarajan

This study tested the context of employees using their devices for both work and personal use, and non-compliant device usage of a person potentially resulting in Information Systems (IS) security threat to personal as well as work data and/or the devices. Integrating bystander and protection motivation theory (PMT) perspectives this paper studies bystanders' responses to IS security threats and the extent to which a perceived security threat motivates individual intention to act, in the context of non-compliant mobile device usage behaviors. It tests the role of an individual's threat perceptions to protect their own IS security, and as a bystander, protecting their peers or the IS security of their organization. Data collected from 431 individuals support the hypotheses that security awareness predicts perceived severity and protection motivation. Evaluation apprehension and diffusion of responsibility inhibit bystander's intentions to act against non-compliant mobile device usage behaviors, while awareness facilitates it. Theoretical contributions and practical implications of the research are discussed.


2018 ◽  
Vol III (I) ◽  
pp. 434-446
Author(s):  
Sarwat Rauf ◽  
Inayat Kalim ◽  
Muhammad Mubeen

To control the mindset of any society, media plays an important role due to its ability to transfer information and thereby transform societies. Electronic media which thrives on conspiracies, has not lost its importance and TV is still a popular means of communication. By virtue of technological innovations, electronic media has a vast impact on all segments of society (exposure to modern technology and becoming vulnerable). In the contemporary world, terrorism is a major security threat in Pakistan. Continuous open electronic media coverage of issues occur with inherent bias. Against this backdrop, the role of media becomes crucial as the media agenda is gradually turning into the public agenda. Electronic media is inherently biases to the opinions of those reporting the situation. Admittedly, media can influence a large chunk of society. Importantly, Pakistan’s private TV channels while giving an insight to the audience, intentionally or unintentionally, may drive a negative mindset and give birth to perceived security threats. This paper attempts to ascertain the complex connection between security and the electronic media and also highlights the negative impacts of media on the security of Pakistan.


Author(s):  
Narasimha Paravastu ◽  
Claire A. Simmers ◽  
Murugan Anandarajan

This study tested the context of employees using their devices for both work and personal use, and non-compliant device usage of a person potentially resulting in Information Systems (IS) security threat to personal as well as work data and/or the devices. Integrating bystander and protection motivation theory (PMT) perspectives this paper studies bystanders' responses to IS security threats and the extent to which a perceived security threat motivates individual intention to act, in the context of non-compliant mobile device usage behaviors. It tests the role of an individual's threat perceptions to protect their own IS security, and as a bystander, protecting their peers or the IS security of their organization. Data collected from 431 individuals support the hypotheses that security awareness predicts perceived severity and protection motivation. Evaluation apprehension and diffusion of responsibility inhibit bystander's intentions to act against non-compliant mobile device usage behaviors, while awareness facilitates it. Theoretical contributions and practical implications of the research are discussed.


Sign in / Sign up

Export Citation Format

Share Document