![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Psychology > Cognition & cognitive psychology > Intelligence
Challenging the focus on great powers in the international debate, this book explores how rising middle power states are engaging with emerging major military innovations and analyses how this will affect the stability and security of the Indo Pacific. Presenting a data-based analysis of how middle power actors in the Indo-Pacific are responding to the emergence of military Artificial Intelligence and Killer Robots, the book asserts that continuing to exclude non-great power actors from our thinking in this field enables the dangerous diffusion of Lethal Autonomous Weapon Systems (LAWS) to smaller states and terrorist groups, and demonstrates the disruptive effects of these military innovations on the balance of power in the Indo-Pacific. Offering a detailed analysis of the resource capacities of China, United States, Singapore and Indonesia, it shows how major military innovation acts as a circuit breaker between competitor states disrupting the conventional superiority of the dominant hegemonic state and giving a successful adopter a distinct advantage over their opponent. This book will appeal to researchers, end-users in the military and law enforcement communities, and policymakers. It will also be a valuable resource for researchers interested in strategic stability for the broader Asia-Pacific and the role of middle power states in hegemonic power transition and conflict.
Offers a basic understanding of the issues and processes involved in decision-making Presents the tools involved in problem analysis Discusses the tools that enable developing alternatives and judgement criteria Covers tools used to normalize judgement criteria achievement so that they are comparable across measures with differing scales Explores the methods used for selecting a best alternative when multiple decision criteria are relevant requiring the elicitation of preferred information of the decision maker
Offers a basic understanding of the issues and processes involved in decision-making Presents the tools involved in problem analysis Discusses the tools that enable developing alternatives and judgement criteria Covers tools used to normalize judgement criteria achievement so that they are comparable across measures with differing scales Explores the methods used for selecting a best alternative when multiple decision criteria are relevant requiring the elicitation of preferred information of the decision maker
* This is an institutional collaboration with Institute of Developing Economies-Japan External Trade Organization * Monographs on Japan are above average sellers * Will be of great interest to scholars and researchers of politics and international relations, strategic studies, development studies, and Asian studies
The volume: * Includes a handy overview of contemporary India and its socio-economic policies; * is engaging and lucidly written, will be of great interest to scholars of economics, political science, development studies, South Asian studies, and also the general reader
Detection Theory: A User's Guide is an introduction to one of the most important tools for the analysis of data where choices must be made and performance is not perfect. In these cases, detection theory can transform judgments about subjective experiences, such as perceptions and memories, into quantitative data ready for analysis and modeling. For beginners, the first three chapters introduce measuring detection and discrimination, evaluating decision criteria, and the utility of receiver operating characteristics. Later chapters cover more advanced research paradigms, including: complete tools for application, including flowcharts, tables, and software; student-friendly language; complete coverage of content area, including both one-dimensional and multidimensional models; integrated treatment of threshold and nonparametric approaches; an organized, tutorial level introduction to multidimensional detection theory; and popular discrimination paradigms presented as applications of multidimensional detection theory. This modern summary of signal detection theory is both a self-contained reference work for users and a readable text for graduate students and researchers learning the material either in courses or on their own.
What do we mean when we call someone smart? That they are good at math and got a high score on the SAT? That they learn languages easily? Those traits might be what comes to mind first: they are what underly psychology’s classic definition of intelligence, and what we are told in school that a smart person can do. But they are not the whole story. As Howard Gardner argues in the groundbreaking classic Frames of Mind, to limit our understanding of intelligence to “book smarts” misses much of what makes human beings amazing. Someone who plays an instrument well is exhibiting intelligence. So, too, someone who knows how to do physical comedy—is their mastery of their movements and the space around them not brilliant? And to have a profound knowledge of their own self, their relationships with others, and relationships between others, too, is to show great intelligence as well. Gardner calls this the theory of multiple intelligences. But this isn’t just a book for intellectuals who want to argue about what intelligence is, or educators debating how to teach. It is for each of us. In an era of teaching to the test, and increasingly powerful artificial intelligence, Gardner’s work is a celebration of all the ways there are to be human.
Project risk management is regarded as a necessary dimension of effective project delivery. Current practices tend to focus on tangible issues such as late delivery of equipment or the implications of technology. This book introduces a framework to identify emergent behavior-centric intangible risks and the conditions that initiate them. Decision Making in Risk Management: Quantifying Intangible Risk Factors in Projects identifies the quantitative measures to assess behavior-induced risks by presenting a framework that limits the interpersonal tension of addressing behavioral risks. Included in the book is an illustrative case study from the oil and gas sector that demonstrates the use of the framework. The missing dimension of behavior-centric intangible risk factors in current risk identification is explored. The book goes on to cover management processes, providing a systematic analytical approach to mitigate subjectivity when addressing behavioral risks in projects. This book is useful to those working in the fields of Project Management, Systems Engineering, Risk Management, and Behavioral Science.
Project risk management is regarded as a necessary dimension of effective project delivery. Current practices tend to focus on tangible issues such as late delivery of equipment or the implications of technology. This book introduces a framework to identify emergent behavior-centric intangible risks and the conditions that initiate them. Decision Making in Risk Management: Quantifying Intangible Risk Factors in Projects identifies the quantitative measures to assess behavior-induced risks by presenting a framework that limits the interpersonal tension of addressing behavioral risks. Included in the book is an illustrative case study from the oil and gas sector that demonstrates the use of the framework. The missing dimension of behavior-centric intangible risk factors in current risk identification is explored. The book goes on to cover management processes, providing a systematic analytical approach to mitigate subjectivity when addressing behavioral risks in projects. This book is useful to those working in the fields of Project Management, Systems Engineering, Risk Management, and Behavioral Science.
The volume: * Includes a handy overview of contemporary India and its socio-economic policies; * is engaging and lucidly written, will be of great interest to scholars of economics, political science, development studies, South Asian studies, and also the general reader
This volume: * provides a fascinating and detailed overview of the history of the FBI and the CIA and their surveillance methods * examines the poetry and lives of an impressive array of American poets: Ezra Pound, William Carlos Williams, W.H. Auden, Langston Hughes, James Baldwin, Sylvia Plath, Gertrude Stein, Robert Lowell, Allen Ginsberg, and others * will be of great interest to scholars and researchers of literature, politics, especially surveillance and intelligence, and Digital Humanities.
AI for Digital Warfare explores how the weaponising of artificial intelligence can and will change how warfare is being conducted, and what impact it will have on the corporate world. With artificial intelligence tools becoming increasingly advanced, and in many cases more humanlike, their potential in psychological warfare is being recognised, which means digital warfare can move beyond just shutting down IT systems into more all-encompassing hybrid war strategies.
This book contends that modern concerns surrounding the UK State's investigation of communications (and, more recently, data), whether at rest or in transit, are in fact nothing new. It evidences how, whether using common law, the Royal Prerogative, or statutes to provide a lawful basis for a state practice traceable to at least 1324, the underlying policy rationale has always been that first publicly articulated in Cromwell's initial Postage Act 1657, namely the protection of British 'national security', broadly construed. It further illustrates how developments in communications technology led to Executive assumptions of relevant investigatory powers, administered in conditions of relative secrecy. In demonstrating the key role played throughout history by communications service providers, the book also charts how the evolution of the UK Intelligence Community, entry into the 'UKUSA' communications intelligence-sharing agreement 1946, and intelligence community advocacy all significantly influenced the era of arguably disingenuous statutory governance of communications investigation between 1984 and 2016. The book illustrates how the 2013 'Intelligence Shock' triggered by publication of Edward Snowden's unauthorized disclosures impelled a transition from Executive secrecy and statutory disingenuousness to a more consultative, candid Executive and a policy of 'transparent secrecy', now reflected in the Investigatory Powers Act 2016. What the book ultimately demonstrates is that this latest comprehensive statute, whilst welcome for its candour, represents only the latest manifestation of the British state's policy of ensuring protection of national security by granting powers enabling investigative access to communications and data, in transit or at rest, irrespective of location.
This volume: * provides a fascinating and detailed overview of the history of the FBI and the CIA and their surveillance methods * examines the poetry and lives of an impressive array of American poets: Ezra Pound, William Carlos Williams, W.H. Auden, Langston Hughes, James Baldwin, Sylvia Plath, Gertrude Stein, Robert Lowell, Allen Ginsberg, and others * will be of great interest to scholars and researchers of literature, politics, especially surveillance and intelligence, and Digital Humanities.
This book analyzes a series of decisions by leaders of three major terrorist organizations and identifies a unique "Decision DNA" for each of them. The authors use the Applied Decision Analysis methodology to examine organizational and operational decisions made by the leaders of three major groups: Hezbollah (Hassan Nasrallah), Hamas (Khaled Mashal), and al-Qaeda (Osama bin Laden). Decisions that were of critical importance to each organization are identified and anaylzed, to uncover the particular decision rule employed by the leader in question and to establish their "Decision DNA." A Decision DNA is unique to each leader and can be used to explain previous decisions or predict future choices. The authors demonstrate that the findings presented can be used to promote effective counterterrorism measures, and they provide a series of policy implications that arise from their examination of each leader. This book will be of much interest to students of terrorist studies, political violence, security studies, and Middle Eastern politics.
The 21st Century Cold War is a multidisciplinary approach to understanding the pattern of Russian interference in the internal affairs of other nations, suggesting that what in the Cold War was a simple conflict of East vs. West has expanded into a conflict between Russia and two increasingly separate Wests. The book begins with an examination of the structure of the Cold War and post-Cold War world, and subsequently explores Russian interference by overt, grey, and covert means including, but not limited to, cyberespionage, "fake news", and the use of what in the Cold War would have been called front groups and agents of influence. The approach encompasses both historic and contemporary themes, with the question of whether the Cold War between East and West-capitalism and communism-is a thing of the past, or does it continue today in new ideological guises, as a central theme. Expert contributors explore what the motivations and implications for the pattern of Russian interference in the political processes of other states would be, and what new coalitions of actors are taking shape both for and against Russian activities. With a series of historical and contemporary case studies, focusing on the origins and contemporary dimensions of Russian information warfare, and exploring the issues involved from every perspective, The 21st Century Cold War will be of great interest to scholars of Security and Strategic Studies, International Relations, and Cold War History, as well as policy makers and security professionals. The chapters were originally published as a special issue of Terrorism and Political Violence.
Unlocking Creativity in Solving Novel Mathematics Problems delivers a fascinating insight into thinking and feeling approaches used in creative problem solving and explores whether attending to 'feeling' makes any difference to solving novel problems successfully. With a focus on research throughout, this book reveals ways of identifying, describing and measuring 'feeling' (or 'intuition') in problem-solving processes. It details construction of a new creative problem-solving conceptual framework using cognitive and non-cognitive elements, including the brain's visuo-spatial and linguistic circuits, conscious and non-conscious mental activity, and the generation of feeling in listening to the self, identified from verbal data. This framework becomes the process model for developing a comprehensive quantitative model of creative problem solving incorporating the Person, Product, Process and Environment dimensions of creativity. In a world constantly seeking new ideas and new approaches to solving complex problems, the application of this book's findings will revolutionize the way students, teachers, businesses and industries approach novel problem solving, and mathematics learning and teaching.
For the previous 6 years before publication, Office of Naval Research (ONR) had been conducting a thematically oriented contract research program aimed, in large part, at developing the kind of broad theoretical framework necessary for a workable process interpretation of aptitude, learning, and performance. Originally published in 1980, the papers in this collection are generally addressed to three broad areas that were central to those interests of the ONR Personnel and Training Research Programs. One area is concerned with individual differences information processing, as revealed in simple laboratory or psychometric tests. The second area focuses on the structural aspects of learning and performance, using tools and concepts from semantic memory theory to describe what is learned and how it is learned. And the third area is aimed at the management of instruction: It addresses itself to the kinds of research and instructional designs required for effective implementation of adaptive instruction.
For the previous 6 years before publication, Office of Naval Research (ONR) had been conducting a thematically oriented contract research program aimed, in large part, at developing the kind of broad theoretical framework necessary for a workable process interpretation of aptitude, learning, and performance. Originally published in 1980, the papers in this collection are generally addressed to three broad areas that were central to those interests of the ONR Personnel and Training Research Programs. One area is concerned with individual differences information processing, as revealed in simple laboratory or psychometric tests. The second area focuses on the structural aspects of learning and performance, using tools and concepts from semantic memory theory to describe what is learned and how it is learned. And the third area is aimed at the management of instruction: It addresses itself to the kinds of research and instructional designs required for effective implementation of adaptive instruction.
Originally published in 1987, this book reports the proceedings of a conference held in 1983 at Stanford, California. The purpose of the conference was to bring together individuals whose research reflected advanced theoretical thinking and empirical evidence on the combined analysis of cognitive, conative, and affective processes, the role of these processes in learning from instruction, and the importance of individual differences therein. The Editors believed that this volume made an early and important contribution to the reemphasis and reexamination of the conative and affective aspects of human performance, in coordination with cognitive psychology, in the study of aptitude, learning, and instruction. It takes its place as Volume 3 of the Aptitude, Learning, and Instruction series.
This practical guide enables readers to recognize, assess, and defend against gray behaviors-attempts to persuade listeners using fallacious arguments. It provides valuable tools for communicating successfully in a wide variety of public and professional contexts. The book examines 20 wide-ranging logical fallacies, cognitive errors, and rhetorical devices that may take place in persuasive communication, and discusses how to assess and respond the behavior of a speaker who may be disingenuously attempting to manipulate the listener-or who may simply be mistaken. Drawing upon research and insights from communication, psychology, business management, and human resources, it considers fallacies in reasoning not just as abstract formulas, but as a feature of communication encounters such as negotiations, interviews, public debates, and personal conversations. Each form of fallacious reasoning is exemplified by dialogues in both professional settings (such as interviewing and personnel assessment), as well as everyday interactions in public discourse. The book then provides self-assessment tests to ensure the reader can evaluate the grey behavior in these encounters. This book provides research-based skills and insights that will benefit students and professionals in fields ranging from communication, politics, management, human resources, organizational psychology, journalism, and anyone else looking to develop critical interaction skills.
Origins of Terrorism: The Rise of the World's Most Formidable Terrorist Groups examines the roots of Islamic terrorism, it's history, and some of the foundational figures in prominent terrorist organizations. Throughout, the book also addresses the use of terrorism, the "hows" and "whys" of terrorists' goals, and their modus operandi. Historically, insurgency operations have formed the basis of a number of terrorist groups-resistance to western powers, particularly the United States, and what is viewed as their unwanted interference in regional affairs. Sections are devoted to individual terror organizations, including some of the most well-known and resilient global movements-Al Qaeda, ISIS, the Taliban, and Boko Haram, among others. Coverage details where and how they originated, who the principal organizers were, how these individuals worked-or didn't work-together. In this, the authors look at the circumstances that allowed for these leaders, and their groups', development and success. In this, the authors expose interesting, little-known stories and facts about the specific upbringing, family life, and personal narrative around these organizations' founders, as well as ties to other terrorist founders and organizations. For example, the relationship between individuals such as Osama bin Laden and Musab al Zarkawi (aka Ahmad al-Khalayleh)-the founder of 'Al Qaeda in Iraq' (AQI), which became ISIS-is examined in detail, providing readers with some of the "stories behind the stories" to understand the prominent figures and underpinnings of major terrorist organizations' philosophies, formation, and elements that have led to their staying power. Origins of Terrorism will be a valuable resource for security and intelligence professionals, terrorism researchers, and students, providing a unique perspective to understand terrorism and terror movements in considering counterterror efforts.
Origins of Terrorism: The Rise of the World's Most Formidable Terrorist Groups examines the roots of Islamic terrorism, it's history, and some of the foundational figures in prominent terrorist organizations. Throughout, the book also addresses the use of terrorism, the "hows" and "whys" of terrorists' goals, and their modus operandi. Historically, insurgency operations have formed the basis of a number of terrorist groups-resistance to western powers, particularly the United States, and what is viewed as their unwanted interference in regional affairs. Sections are devoted to individual terror organizations, including some of the most well-known and resilient global movements-Al Qaeda, ISIS, the Taliban, and Boko Haram, among others. Coverage details where and how they originated, who the principal organizers were, how these individuals worked-or didn't work-together. In this, the authors look at the circumstances that allowed for these leaders, and their groups', development and success. In this, the authors expose interesting, little-known stories and facts about the specific upbringing, family life, and personal narrative around these organizations' founders, as well as ties to other terrorist founders and organizations. For example, the relationship between individuals such as Osama bin Laden and Musab al Zarkawi (aka Ahmad al-Khalayleh)-the founder of 'Al Qaeda in Iraq' (AQI), which became ISIS-is examined in detail, providing readers with some of the "stories behind the stories" to understand the prominent figures and underpinnings of major terrorist organizations' philosophies, formation, and elements that have led to their staying power. Origins of Terrorism will be a valuable resource for security and intelligence professionals, terrorism researchers, and students, providing a unique perspective to understand terrorism and terror movements in considering counterterror efforts.
The use of informants has been described as the "black hole of law enforcement." Failures in the training of police officers and federal agents in the recruitment and operation of informants has undermined costly long-term investigations, destroyed the careers of prosecutors and law enforcement officers, and caused death and serious injuries to innocent citizens and police. In many cases, the events leading to disaster could have been avoided had the law enforcement agency followed the time-tested procedures examined in this book. Informants, Cooperating Witnesses, and Undercover Investigations: A Practical Guide to Law, Policy, and Procedure, Second Edition covers every aspect of the informant and cooperating witness dynamic-a technique often shrouded in secrecy and widely misunderstood. Quoted routinely in countless newspaper and magazine articles, the first edition of this book was the go-to guide for practical, effective guidance on this controversial yet powerful investigative tool. Extensively updated, topics in this second edition include: Sweeping changes in the FBI and ICE informant and undercover programs New informant recruiting techniques Reverse sting operations Entrapment issues Examination of recent high-profile cases where the misuse of informants resulted in lawsuits and legislation The changing nature of compensation and cooperation agreements Forfeiture, informants, and rewards The management of controlled undercover purchases of evidence Challenges posed by fabricated information, phantom informants and police corruption Witness security measures New whistleblower reward programs Authoritative, scholarly, and based on boots-on-the-ground experience, this book is written by an author who has been a police supervisor, an informant recruiter and handler, an undercover agent, and an attorney. Supported by statutes, case law, and previously unpublished excerpts from law enforcement agency manuals, it is essential reading for every police officer, police manager, prosecutor, police academy trainer, criminal justice professor, and defense attorney. This book is part of the Practical Aspects of Criminal and Forensic Investigations series.
This book provides a rich analysis of the actors and organizations to reflect on the antecedents and trajectories of terrorism and insurgency in South Asia, and the different countermeasures adopted by the countries to deal with the security and developmental challenges. South Asia is a complex geography that has been both a victim and a playing field for indigenous insurgencies, and domestic and transnational terrorist movements. The contributors to this volume explore how this situation has posed serious challenges to the sovereignty of the states, to national and human security, and to the socioeconomic fabric of the communities, and to the ethnic and religious cohesion. The book provides detailed studies of country cases on terrorism, security, and insurgencies, and it underlines the national, regional, and global implications of the threats that emanate from this region. Presenting an opportunity to diversify away from a Western-centric focus on terrorism and security, this book will be valuable to researchers in political science, criminology, defense and security studies, and to policy makers and think tanks. |
![]() ![]() You may like...
Mathematical Tools for Data Mining - Set…
Dan A. Simovici, Chabane Djeraba
Hardcover
R5,271
Discovery Miles 52 710
Digital Manufacturing - The…
Chandrakant D. Patel, Chun-Hsien Chen
Paperback
R4,854
Discovery Miles 48 540
Innovative Computing Trends and…
Pandian Vasant, Igor Litvinchev, …
Hardcover
R2,873
Discovery Miles 28 730
Applying AI-Based IoT Systems to…
Bhatia Madhulika, Bhatia Surabhi, …
Hardcover
R7,243
Discovery Miles 72 430
Computational Modelling of…
Stefan T. Bromley, Scott M. Woodley
Hardcover
Numerical Modeling of Masonry and…
Bahman Ghiassi, Gabriele Milani
Paperback
R6,853
Discovery Miles 68 530
|