Internet Use and Violent Extremism

2019 ◽  
pp. 43-61
Author(s):  
D. Elaine Pressman ◽  
Cristina Ivan

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.

Author(s):  
D. Elaine Pressman ◽  
Cristina Ivan

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.


Author(s):  
D. Elaine Pressman ◽  
Cristina Ivan

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.


2019 ◽  
pp. 231-249
Author(s):  
D. Elaine Pressman ◽  
Cristina Ivan

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.


2021 ◽  
Vol 107 ◽  
pp. 10001
Author(s):  
Oleg Pursky ◽  
Tatiana Dubovyk ◽  
Iryna Buchatska ◽  
Iryna Lutsenko ◽  
Hanna Danylchuk

In this study, we present the computational method for risk assessment of the socio-economic development of regions. An attempt has been made to develop a method for the determination of integral risk indicators of socio-economic development based on the joint use of the methods of factor analysis and expert evaluation. This approach has increased the reliability of the calculations and made it possible to analyze the influence of socio-economic indicators on the risk level of socio-economic development. The integral risk indicator shows the effect of the inconsistency in the level of factor provision on the socio-economic development of the j-th region (district) in comparison with the general situation in the country (regions). The closer the value of integral risk indicator is to 1, the higher the level of risk in this region. Using Kyiv region districts as an example, the process of risk assessment for regional socio-economic development has been considered. The results obtained in this investigation demonstrate that the presented computational method solves the problem of formalization of risk assessment for the socio-economic development of regions.


Agronomy ◽  
2020 ◽  
Vol 10 (8) ◽  
pp. 1070 ◽  
Author(s):  
Angelika Astaykina ◽  
Rostislav Streletskii ◽  
Mikhail Maslov ◽  
Svetlana Kazantseva ◽  
Elizabeth Karavanova ◽  
...  

There are many approaches of pesticide risk assessment. Despite their variation in difficulty and information complexity, all of them are intended to predict the actual pesticide risk as accurately as possible, i.e., to predict the behavior and hazard of a pesticide in the environment with high precision. The aim of this study was to develop a risk indicator of pesticide’s negative impact on soil and aquatic organisms. The developed pesticide risk indicator constitutes the sum of points of acute toxicity exposure ratio, long-term toxicity exposure ratio, and the bioconcentration factor. To develop the indicator, mathematical models were used; the input data included the soil and climate conditions of a specific region. Combining the data of pesticide toxicity in the environment allowed for a more accurate risk assessment in terms of using plant protection products. The toxicity and behavior in soil and water of 200 widespread pesticides were studied. It could be concluded that a mathematical model, PEARL 4.4.4, calibrated for region-specific soil-climate conditions, provides a relevant description of the natural translocation and decomposition of pesticides in soils. In addition, the output data of this model can be applied to calculate the risk indicators. The combination of these parameters with pesticide toxicity for non-target groups of organisms allows the risk indicator to be a universal tool for predicting the negative impact of pesticides on the environment at the regional level.


Author(s):  
Garth Davies ◽  
Sara Doering ◽  
Christine Neudecker

The following chapter provides an overview of approaches and tactics commonly used in programs developed to counter radicalization and violent extremism, with a particular emphasis on the role of risk/threat assessments used within existing programs. The purpose of this chapter is to understand to what extent existing radicalization prevention, deradicalization, and disengagement programs are using some form of individual-level risk assessment for terrorism or other forms of violence, or if any psychological assessments or interventions are used. The results indicate that the overwhelming majority of current programs do not explicitly include individual risk assessments. This is a critical oversight, one which hampers the potential efficacy of disengagement efforts.


2021 ◽  
pp. 107780122098834
Author(s):  
Kirk R. Williams ◽  
Richard Stansfield ◽  
Jacquelyn Campbell

This study seeks to determine the concurrent and predictive validity of a dual risk assessment protocol. It combines the risk of persistence in intimate partner violence (IPV) measured via the Domestic Violence Screening Instrument–Revised (DVSI-R) with supplemental items from the Danger Risk Assessment (DRA) bearing on the risk of potential lethality. We further test whether this assessment protocol reproduces disparities by race and ethnicity found in the larger population. Using a sample of 4,665 IPV male defendants with a female victim, analyses support both types of criterion validity. The DRA risk score is associated with felony charges, incarceration at the initial arrest, and the frequency of subsequent dangerous behavior. Results also suggest minimal predictive bias or disparate impact by race and ethnicity. Incorporating supplemental items bearing on potential lethality risk adds important information concerning the risk management strategies of those involved in IPV.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Jasmin Grischke ◽  
Szymon P. Szafrański ◽  
Uthayakumar Muthukumarasamy ◽  
Susanne Haeussler ◽  
Meike Stiesch

Abstract Background The prevalence of peri-implantitis ranges between 7 and 38.4% depending on risk indicators such as smoking, diabetes mellitus, lack of periodontal maintenance program, and history or presence of periodontitis. Currently, the possible effect of the type of superstructure on peri-implant health is unclear. This cross-sectional study aims to investigate the influence of the superstructure on the prevalence of peri-implant mucositis, peri-implantitis and peri-implant dysbiosis. Methods During a 32-month recruitment period dental implants were assessed to diagnose healthy peri-implant tissues, mucositis or peri-implantitis. The study included 1097 implants in 196 patients. Out of all peri-implantitis cases 20 randomly chosen submucosal biofilms from implants with fixed denture (FD) originating from 13 patients and 11 biofilms from implants with removable dentures (RD) originating from 3 patients were studied for microbiome analysis. Composition of transcriptionally active biofilms was revealed by RNAseq. Metatranscriptomic profiles were created for thirty-one peri-implant biofilms suffering from peri-implantitis and microbiome changes associated with superstructure types were identified. Results 16.41% of the implants were diagnosed with peri-implantitis, 25.00% of implants with RD and 12.68% of implants with FD, respectively. Multivariate analysis showed a significant positive association on patient (p =  < 0.001) and implant level (p = 0.03) between the prevalence of peri-implantitis and RD. Eight bacterial species were associated either with FD or RD by linear discriminant analysis effect size method. However, significant intergroup confounders (e.g. smoking) were present. Conclusions Within the limitations of the present work, RDs appear to be a risk indicator for peri-implantitis and seem to facilitate expansion of specific periodontopathogens. Potential ecological and pathological consequences of shift in microbiome from RDs towards higher activity of Fusobacterium nucleatum subspecies animalis and Prevotella intermedia require further investigation.


2021 ◽  
Vol 11 (2) ◽  
Author(s):  
Mengkai Liu ◽  
Xiaoxia Dong ◽  
Hui Guo

AbstractIce dams are among the important risks affecting the operational safety and water conveyance efficiency of water diversion projects in northern China. However, no evaluation indicator system for ice dam risk assessment of water diversion projects has been proposed. Therefore, in this paper, based on the formation mechanism of ice dams, the risk assessment indicator system and the possibility calculation model of ice dams were both proposed for water diversion projects based on the fuzzy fault tree analysis method. The ice dam risk fault tree constructed in this study mainly includes three aspects: ice production, ice transport, and ice submergence conditions. Eighteen basic risk indicators were identified, and 72 minimum cut sets were obtained by using the mountain climb method. Eight risk indicators were determined as the key risk indicators for ice dams, including meteorological conditions, narrowed cross section, sluice incident, erroneous scheduling judgment, ice cover influence, flat bed slope, control structures, and ice flow resistance of piers. Then, the canal from the Fenzhuanghe sluice to the Beijumahe sluice of the Middle Route of the South-to-North Water Diversion Project was taken as the research object. Combined with the expert scoring method, the ice dam risk probability of the canal was determined to be 0.2029 × 10−2, which was defined as a level III risk, which is an occasionally occurring risk. The study results can support ice dam risk prevention and canal system operation in winter for water diversion projects.


Sign in / Sign up

Export Citation Format

Share Document