Open Access. Powered by Scholars. Published by Universities.®

Social Control, Law, Crime, and Deviance Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Social Control, Law, Crime, and Deviance

An Exploratory Analysis Of The Psychological Dimensions Of Airline Security And Correlates Of Perceived Terrorism Threats: A Study Of Active American Airlines Pilots., Paul Martin Borowsky May 2009

An Exploratory Analysis Of The Psychological Dimensions Of Airline Security And Correlates Of Perceived Terrorism Threats: A Study Of Active American Airlines Pilots., Paul Martin Borowsky

Electronic Theses and Dissertations

The September 11, 2001, terrorist attack resulted in a myriad of new policies designed to enhance aviation security. These policies ostensibly considered the origins of the exact threat facing the United States. Missing, however, were the inputs from rank and file pilots of the airlines that policy makers were attempting to protect. This exploratory study distributed a 50-question survey designed to measure pilot perceptions of security risk and threats. Univariate descriptives were used to examine the extent to which sample data approximated the population of interest. Factor and reliability analysis were used to document the multidimensionality of the constructs and …


Cyber Terrorism, Allen Gnanam Jan 2009

Cyber Terrorism, Allen Gnanam

Allen Gnanam

This paper sets out to identify and explain the negative national security implications, negative physical & psychological implications, and the negative economic implications that society could face, as a result of a severe cyber attack against major sectors of a nations infrastructure. In addition instigating factors that lead to/ provoke cyber terrorism will be identified, in order to strategically influence counter cyber terrorism policy towards an offensive model. Along with that, this paper will present defensive/ target hardening counter- cyber terrorism policies that will enable proactive security mechanisms to be implemented.