You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In the fall of 1950, newspapers around the world reported that the Italian-born nuclear physicist Bruno Pontecorvo and his family had mysteriously disappeared while returning to Britain from a holiday trip. Because Pontecorvo was known to be an expert working for the UK Atomic Energy Research Establishment, this raised immediate concern for the safety of atomic secrets, especially when it became known in the following months that he had defected to the Soviet Union. Was Pontecorvo a spy? Did he know and pass sensitive information about the bomb to Soviet experts? At the time, nuclear scientists, security personnel, Western government officials, and journalists assessed the case, but their ef...
This eBook is a collection of articles from a Frontiers Research Topic. Frontiers Research Topics are very popular trademarks of the Frontiers Journals Series: they are collections of at least ten articles, all centered on a particular subject. With their unique mix of varied contributions from Original Research to Review Articles, Frontiers Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author by contacting the Frontiers Editorial Office: frontiersin.org/about/contact.
This book assesses the larger influences that government termination by parliaments has on executive–legislative relations, claiming that the way in which the governments may be challenged or dismissed has far greater impact than previously understood. The core feature of a parliamentary system is not that governments tend to emerge from the legislatures in some way or another, but their political responsibility to this body. While in only some parliamentary systems the government needs formal support of parliament to take office, in all parliamentary systems no government can survive against the will of parliament. The academic literature related to the rules for how governments form is v...
This innovative collection of original essays showcases the use of social networks in the analysis and understanding of various forms of crime. More than any other past research endeavor, the seventeen chapters in this book apply to criminology the many conceptual and methodological options from social network analysis. Crime and Networks is the only book of its kind that looks at the use of networks in understanding crime, and can be used for advanced undergraduate and beginner’s graduate level courses in criminal justice and criminology.
None
Explore the world of radicalization through the stories of those who switched between extreme political or religious ideologies.
"The study is the second product of SORO (CRESS) research on undergrounds and describes, on the basis of existing empirical information and current state of knowledge, the organizational, motivational, and behavioral characteristics of undergrounds in insurgent movements and relates thise characteristics to the total revolutionary structure, mission, and operations. There are six parts to the study: Organization; Paramilitary Operations; Government Countermeasures. Three appendices give details on the methodological approach, offer an analysis of 24 insurgencies, and summarize World War II underground rules of clandestine behavior."--Report documentation page.
This book constitutes the refereed proceedings of the 9th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2011, held in Orlando, FL, USA, in July 2011, within the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, together with 11 other thematically similar conferences. The 67 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical parts on cognitive and psychological aspects of interaction; cognitive aspects of driving; cognition and the Web; cognition and automation; security and safety; and aerospace and military applications.