Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
Ethical Behavior And Ajzen’S Theory Of Planned Behavior Applied To The Decision To Obtain Professional Credentials, Sarajo Paluch
Ethical Behavior And Ajzen’S Theory Of Planned Behavior Applied To The Decision To Obtain Professional Credentials, Sarajo Paluch
Theses and Dissertations
Currently, the requirement to obtain and maintain professional credentials within the engineering discipline varies among the five military departments within the U.S. Department of Defense (DoD). However, there may be an ethical requirement to do so. The purpose of this research was to investigate ethical theory and behavior theory, and their influence on the decision to obtain and maintain professional credentials. Individual Moral Philosophy (IMP) is one approach describing ethical thought. The Ethics Position Questionnaire (EPQ) measures the two dimensions of IMP: idealism and relativism. The Theory of Planned Behavior (ToPB) is used in research to predict behavior intentions and …
Indicators Of Terrorism Vulnerability In Africa, Raymond J. Hill
Indicators Of Terrorism Vulnerability In Africa, Raymond J. Hill
Theses and Dissertations
Terrorism in Africa has increased more than six-fold since 1997, with an increase in lethality as well. The U.S. government has spent billions of dollars to counter this increase in terrorism; however, terrorism in Africa has increased seemingly unabated. Furthermore, these methods used to counter-terrorism have been reactionary as opposed to preventative. To address the terrorism threat to a country, we must first understand which characteristics make a country vulnerable to such a threat. A confirmatory analysis bridges the inter-discipline gap between quantitative and qualitative fields through as assessment of observational findings about the causes of terrorism. An exploratory analysis …
A Risk Based Approach To Node Insertion Within Social Networks, Chancellor A. J. Johnstone
A Risk Based Approach To Node Insertion Within Social Networks, Chancellor A. J. Johnstone
Theses and Dissertations
Social Network Analysis (SNA) is a primary tool for counter-terrorism operations, ranging from resiliency and influence to interdiction on threats stemming from illicit overt and clandestine network operations. In an ideal world, SNA would provide a perfect course of action to eliminate dangerous situations that terrorist organizations bring. Unfortunately, the covert nature of terrorist networks makes the effects of these techniques unknown and possibly detrimental. To avoid potentially harmful changes to enemy networks, tactical involvement must evolve, beginning with the intelligent use of network in filtration through the application of the node insertion problem. The framework for the node insertion …