Modeling Adversary Beliefs and Motivations

Size: px
Start display at page:

Download "Modeling Adversary Beliefs and Motivations"

Transcription

1 CREATE Research Archive Current Research Project Narratives 2013 Modeling Adversary Beliefs and Motivations Heather Rosoff University of Southern California, Richard John University of Southern California, Follow this and additional works at: Part of the Applied Behavior Analysis Commons Recommended Citation Rosoff, Heather and John, Richard, "Modeling Adversary Beliefs and Motivations" (2013). Current Research Project Narratives. Paper This Article is brought to you for free and open access by CREATE Research Archive. It has been accepted for inclusion in Current Research Project Narratives by an authorized administrator of CREATE Research Archive. For more information, please contact

2 National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Modeling Adversary Beliefs and Motivations October 1, 2012 to September 30, 2013 Heather Rosoff Richard John University of Southern California "This research was supported by the United States Department of Homeland Security through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under Cooperative Agreement No ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security or the University of Southern California." Cooperative Agreement No ST-061-RE0001 Department of Homeland Security December 31, McClintock Avenue, RTH 314 ~ Los Angeles, CA ~ (213) ~

3 ABOUT CREATE Now in its tenth year of operation, the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) was the first university-based Center of Excellence (COE) funded by University Programs of the Science and Technology (S&T) Directorate of the Department of Homeland Security (DHS). CREATE started operations in March of 2004 and has since been joined by additional DHS centers. Like other COEs, CREATE contributes university-based research to make the Nation safer by taking a longer-term view of scientific innovations and breakthroughs and by developing the future intellectual leaders in homeland security. CREATE's mission is to improve our Nation's security through research and development of advanced models and tools to evaluate risks, costs and consequences of terrorism and natural and man-made hazards and to guide economically viable investments in homeland security. We are accomplishing our mission through an integrated program of research, education and outreach that is designed to inform and support decisions faced by elected officials and governmental employees at the national, state, and local levels. We are also working with private industry, both to leverage the investments being made by the Department of Homeland Security in these organizations, and to facilitate the transition of research toward meeting the security needs of our nation. CREATE employs an interdisciplinary approach merging engineers, economists, decision scientists, and system modelers in a program that integrates research, education and outreach. This approach encourages creative discovery by employing the intellectual power of the American university system to solve some of the country s most pressing problems. The Center is the lead institution where researchers from around the country come to assist in the national effort to improve homeland security through analysis and modeling of threats. The Center treats the subject of homeland security with the urgency that it deserves, with one of its key goals being producing rapid results, leveraging existing resources so that benefits accrue to our nation as quickly as possible. By the nature of the research in risk, economics, and operations, CREATE serves the need of many agencies at the DHS, including the Transportation Security Administration, Customs and Border Protection, Immigration and Customs Enforcement, FEMA and the US Coast Guard.. In addition, CREATE has developed relationships with clients in the Offices of National Protection and Programs, Intelligence and Analysis, the Domestic Nuclear Detection Office and many State and Local government agencies. CREATE faculty and students take both the long-term view of how to reduce terrorism risk through fundamental research, and the near-term view of improving the cost-effectiveness of counterterrorism policies and investments through applied research. In 2011, the University of Southern California (USC) and a team of 23 partner institutions were awarded a new 5-year Cooperative Agreement resulting from a recompetition of the Center s charter. This annual report covers the third year under Cooperative Agreement 2010-ST-061-RE0001, the ninth year overall of CREATE s DHS funding, from October 2012 to September McClintock Avenue, RTH 314 ~ Los Angeles, CA ~ (213) ~

4 Table of Contents 1. Modeling Terrorist Beliefs and Motivations Overview Research Accomplishments Project 1. Model Simplification Project 2. Model Validation Project 3. APM Model Validation Research Products Publications Presentations Research Transition Education and Outreach Products Outreach Modeling Terrorist Beliefs and Motivations Overview The objective of this research is to further develop our pioneering approach to adversary threat assessment through the construction of random utility models of terrorist preferences. This work builds on previous research efforts (Rosoff, 2009; Rosoff & John, 2009) that have used decision analysis models and elicitation methods to: (1) construct of a value tree for a terrorist leader or organization using value focused thinking (VFT), (2) construct a random multi-attribute utility model (RMAUM) capturing trade-offs among conflicting objectives and single-attribute utility functions representing risk attitudes of terrorist leaders, (3) construct probability distributions capturing key uncertainties for terrorist leaders (e.g., attack success) and uncertainties in the utility function parameters provided by adversary experts. Understanding the objectives and motivations that drive terrorist group behavior is critical. Current methods for terrorism risk assessment focus on target vulnerability, terrorist capability and resources, and attack consequence. What many researchers have yet to consider is the influence of terrorist group values and beliefs in deciphering the root cause of their militant behavior. This understanding has the potential to contribute to probabilistic estimates of terrorist threats. During Year 9 we further developed the adversary preference modeling (APM) methodology by (1) continuing to validate the APM through a case study with political/social/advocacy groups PETA (Sea Shepherd) with an action oriented agenda that is driven by specific motives, values, and objectives, and (2). Explored simplified methods used in the elicitation of adversary objectives, values and beliefs, uncertainties and tradeoffs and, (3) testing the approach through the analysis of different terrorist organizations (Al Qaeda and Hezbollah). Research progress and accomplishments made throughout Year 9 are described in the subsequent sections. 2. Research Accomplishments 2.1. Project 1. Model Simplification We explore the use of the Boltzmann equation (Softmax) for simplifying the assessments required to apply APM methodology. This simplification includes construction of the value tree, attribute scale construction, and elicitation of probability distributions for capturing Page 3 of 15

5 uncertainty in the consequence matrix, single-attribute utility function parameters, and trade-off (weight) parameters. When applying the Boltzmann equation, we only needed to elicit median values when applying the APM methodology. Using the median values elicited, expected utility was calculated for each of the alternatives. That is, we worked with a proxy Al Qaeda leader to first develop an objective s hierarchy for Al Qaeda. Subsequently, we elicited median values for the consequence matrix, single-attribute utility function parameters and trade-off parameters. The calculated expected utilities for the proxy Al Qaeda leader can be found in Figure 1. No attack was associated with the highest expected utility. Alternatives E(U) No attack at all (baseline) 0.42 Anthrax Attack - Aerosolized anthrax release 0.38 Chemical Attack - Chlorine Tank Explosion 0.41 Biological Attack - Food Contamination 0.35 Explosive Attack - Bombing Using Improvised Explosive Devices 0.39 Chemical Attack - Blister Agent 0.36 Chemical Attack - Nerve Agent 0.47 Biological Attack - Pneumonic Plague 0.37 Radiological Attack - Radiological Dispersal Devices 0.41 Figure 1. Expected Utility Outputs for Proxy Al Qaeda Leader The calculated expected utilities were then put into the Boltzmann equation in order to get the probability of an alternative being selected. The Boltzmann equation calculates the probability of selection based on the following equation: Boltzman Equation (Softmax) P(a) = e Qt(a) τ n e Qt(a) τ b=1 In this equation the value of Qt(a) is the expected utility value obtained. The temperature parameter (τ) is a variable that is greater than 0. The reason for the temperature being greater than 0 is the fact that theoretically when it is 0, then the probability is equal to the expected utility, which suggests that the decision maker is using pure logic when considering each alternative. The purpose of the Boltzmann equation is to account for the randomness/lack of logic used by the decision maker when selecting an alternative. As the temperature increases, the probabilities reflect more randomness/illogical decision making. As seen in Figure 2, this is observed as the probability of each alternative gets closer and closer to each other as the temperature increases. However, although the probabilities of each alternative get closer to each other when the randomness increases, the ranking of alternatives (best-worst) does not change. The overall benefit of the boltzman equation is that it demonstrates the uncertainty in the proxy s decision making logic without having to elicit uncertainty parameters over all the model inputs. Page 4 of 15

6 P(Base) P(Chemical1) P(expl) P(Anthrax) P(Bio1) P(Chem3) P(Chem2) P(Bio2) P(Radio) Figure 2. Probability of success of each alternative using the Boltzmann equation The above process was carried out with 5 proxies, 3 for Al Qaeda Central, 1 for an Al Qaeda cell, and 1 for Hezbollah. This work was invited for presentation at The First conference on Validating Models of Adversary Behavior in Buffalo/Niagara Falls on June 23-26, In addition, this work was presented at the INFORMS Annual Meeting in Minnesota on October 6-9, This work is currently being written up for a special issue in Risk Analysis on validating models of adversary behavior Project 2. Model Validation Two types of validation analyses were conducted, construct and discriminant validity. Construct validity tests the degree to which two measures that theoretically should be related are, in fact, related. Discriminant validity tests whether measurements supposed to be unrelated are, in fact, unrelated. To assess convergent validity, we compared results across different modeling techniques (Figure 3). Our first analysis, compared probability calculations for Al Qaeda Central using the traditional APM simulation approach to the Boltzmann equation results set at a temperature of.05. We found the most preferred attack, No Attack, to be the same for both modeling techniques. Page 5 of 15

7 P (Attack) Boltzmann Simulation (temp =.05) Alternatives No Attack Chemical Attack - Chlorine Tank Explosion Chemical Attack - Blister Agent Biological Attack - Pneumonic Plague Biological Attack - Food Contamination Explosive Attack - Bombing Using Improvised Explosive Devices Anthrax Attack - Aerosolized anthrax release Chemical Attack - Nerve Agent Radiological Attack - Radiological Dispersal Devices Figure 3. Convergent validity assessment across different modeling techniques for Al Qaeda We conducted a similar analysis for an Al Qaeda cell with the temperature in the Boltzmann calculation changed to.035 (suggesting that the proxy terrorist leader decision maker is more rational/logical in his decision making). As seen in Figure 4, the results similarly showed the most preferred attack to be the same, an explosive attack (bombing using improvised explosive devices). P (Attack) Boltzmann Alternatives Simulation (temp =.035) Explosive Attack - Bombing Using Improvised Explosive Devices Chemical Attack - Blister Agent Biological Attack - Food Contamination Chemical Attack - Chlorine Tank Explosion Radiological Attack - Radiological Dispersal Devices Anthrax Attack - Aerosolized anthrax release Biological Attack - Pneumonic Plague No Attack Chemical Attack - Nerve Agent Figure 4. Convergent validity assessment across different modeling techniques for Al Qaeda Central To assess discriminant validity, we conducted analyses comparing results across different adversaries. We first compared probability of attack success calculations for Al Qaeda, an Al Qaeda cell, and Hezbollah based on the results of the simulation analyses. As seen in Figure 5, two of the three adversaries preferred no attack, while the third (Al Qaeda cell) preferred an explosive attack involving an IED. Page 6 of 15

8 P (Attack) AQ Central AQ Cell Hezbollah Alternatives Simulation Simulation Simulation No Attack Chemical Attack - Chlorine Tank Explosion Chemical Attack - Blister Agent Biological Attack - Pneumonic Plague Biological Attack - Food Contamination Explosive Attack - Bombing Using Improvised Explosive Devices Anthrax Attack - Aerosolized anthrax release Chemical Attack - Nerve Agent Radiological Attack - Radiological Dispersal Devices Explosive Attack (2) - Bombing Using Improvised Explosive Devices 0.02 Figure 5. Discriminant validity assessment across different adversaries We also assessed discriminant validity by comparing the results for 3 adversary values experts with different perspective about the same adversary Al Qaeda Central. Figure 6 shows that one AVE believed Al Qaeda Central preferred no attack, while the second believed they preferred an IED attack, and the third believed the group would prefer an anthrax attack. P (Attack) AQ Central AQ Central AQ Central Alternatives Simulation Simulation Simulation No Attack Chemical Attack - Chlorine Tank Explosion Chemical Attack - Blister Agent Biological Attack - Pneumonic Plague Biological Attack - Food Contamination Explosive Attack - Bombing Using Improvised Explosive Devices Anthrax Attack - Aerosolized anthrax release Chemical Attack - Nerve Agent Radiological Attack - Radiological Dispersal Devices Figure 6. Discriminant validity assessment across AVEs with different perspectives on Al Qaeda Central Overall, our analyses demonstrate convergent validity with respect to different modeling approaches. Both the simulation and SoftMax approach outputs identify the same alternative as the most preferred attack option for Al Qaeda Central and Al Qaeda Cell. In addition, our analyses demonstrate discriminant validity across different adversaries. Despite Al Qaeda (Central and Cell) and Hezbollah having shared objectives, there are distinct differences in attribute definition, matrix values, tradeoffs and risk attitudes that, in turn, result in different preferences for attack alternatives. Lastly, we also demonstrate discriminant validity across different AVEs. There are distinct differences in the way that each AVE perceives the attack alternative preferences of Al Qaeda Central. Page 7 of 15

9 Similar to Project 1, this work was invited for presentation at The First conference on Validating Models of Adversary Behavior in Buffalo/Niagara Falls on June 23-26, In addition, this work was presented at the INFORMS Annual Meeting in Minnesota on October 6-9, This work is currently being written up for a special issue in Risk Analysis on validating models of adversary behavior Project 3. APM Model Validation During Year 9 we built an MAU model based on what could be identified about the PETA online and from second-hand sources. We also interviewed PETA stakeholders to evaluate the accuracy and validity of the originally constructed second-hand model, and hence determining whether the APM modeling approach could be validated. With respect to the construction of the proxy model, basic research (online resources and literature) led to the development of a first set of objectives. PETA s overall goal is improving animals rights. This is characterized by the four core values expressed in their motto - Animals are not ours to eat, wear, experiment on, or use for entertainment, as well as an emphasis on pet spay and neutering, to reduce the numbers of unwanted animals. The four motto objectives are folded into the Minimize Cruelty to Animals sub-objective to avoid model over-specification. PETA must also consider growing its organizational power. Maximize Organizational Power considers income, members and minimizing cost, as well as maximizing new volunteers and influence. Lastly, Perception of Group refers to the group s delicate balancing act of radical positioning and working with the system, and outreach. The twin perception objectives are an attempt to model the tension of PETA s choice of positioning in the political spectrum; they want to bring the discussion to where they are, and have staked out a more radical position than the culture holds regarding treatment of animals. However, they want to be taken seriously; if they are perceived as too far out of the spectrum, then achieving successes inside the system via the traditional methods becomes impossible. The two metrics selected to characterize Perception of Group, maximize media hits and minimize negative press, cover the idea of getting attention but only the right kind of attention. Figure 7 is a graphic depiction of PETA s objectives hierarchy. Page 8 of 15

10 Improve Animal Rights Maximize Organizational Power Max Incoming Money Max New Members Max New Volunteers Maximize Influence Network Minimize Costs Minimize Cruelty to Animals Max Changes to Industry Practices Max Educational Materials Max New Laws Perception of Group Max Media hits Minimize Negative Press Figure 7. PETA Objectives Hierarchy Ultimately, from this working objectives hierarchy we developed the updated hierarchy in Figure 8 after discussions with a proxy from PETA. While he felt that the hierarchy in Figure 7 captured the organization well, following the discussions we simplified the hierarchy to capture the goals of greatest important. The greatest modification is that maximizing organizational power and perception of the group were removed from the hierarchy, as seen in Figure 8. This is largely because while these topics are discussed within PETA, they are not of significant concern or as described by the proxy critical to the success of the organization s goals. Page 9 of 15

11 Change Hearts and Minds of Public End Consumption of Animals Maximize change in corporate policy Maximize change to legislation Maximize educational materials Maximize media attention Maximize number of demonstrations Maximizing online presence/visibility Figure 8. Updated PETA Objectives Hierarchy Developed with Proxy Alternatives as well as metrics and scales were identified for each of the attributes. In addition, estimates of attitudes toward risk and trade-offs among various objectives, Figure 9 is a table that include the attributes and scales for each of the six attributes, as well as the single utility function parameters (SUF) used to capture the risk attitude of the proxy relative to each of the attributes. Range Midpoint SUF Parameters Minimum Maximum Level Utility a b c Maximize change in corporate policy Maximize change to legislation Maximize educational materials 0 1.6e+006 5e e-006 Maximize media attention Maximize number of demonstrations Maximizing online presence/visibility e e e-005 SUF Parameters: if c = 0, U(x) = a + bx, if c # 0, U(x) = a + b(exp(-cx)) Figure 9. Weights for Adversary Value Expert Preference Set Page 10 of 15

12 As suggested in Figure 9, the proxy can have different attitudes toward risk and in turn, may be willing to accept different levels of risk for different attributes. Utility functions are the measurement tool traditionally used to capture an individual s attitude toward risk. The direction of the utility function indicates whether that individual is risk averse, neutral, or seeking. Through the acquisition of certainty equivalents from the proxy, we were able to estimate the nature of their risk attitudes toward each attribute. For example, consider media attention (Figure 10a). The proxy appears to be slightly risk seeking because he perceives 10 media hits perceives to be of equal value to the gamble between his best (15) and worst (0) estimates of the number of desired media hits per campaign. Conversely, consider number of demonstrations in Figure 10b. The proxy appears to be slightly risk averse because he perceives 5 demonstrations to be of equal value to the game between his best (20) and worst (0) estimates of the number of desired demonstrations per campaign. 1 1 Utility Utility Maximize media attention (Media Hits) Figure 10a. Media Attention Maximize number of demonstrations (Number of demonstrations) Figure 10b. Demonstrations Also from the proxy, leaders assess the tradeoffs among the attack attributes. Each proxy rank ordered the attack attributes using swing weights. They assigned one attribute for which the change (swing) from worst to best represented the largest impact for the terrorist leader in terms of the overall objective committing a terror attack. All remaining attributes were assigned a percentage between 0 and 100% to reflect relative desirability of changing (swinging) a score from worst to best on that attribute. Figure 11 includes the 6 attributes, ordered by the median values of the normalized weights assessed with the most weight placed on maximizing media attention and the least weight assigned to maximizing the number of demonstrations. Measure Maximize media attention Maximizing online presence/visibility Maximize educational materials Maximize change in corporate policy Maximize change to legislation Maximize number of demonstrations Weight Figure 11. Swing weights for PETA proxy Page 11 of 15

13 Ultimately from these inputs, the proxy s utility distributions were derived and are presented in Figure 12. The two campaigns with the highest utility are demonstrations and undercover investigations. Alternative Demonstrations Undercover Investigation Online Ad Campaign PRINT Ad Campaign Corporate Campaign Publicity Stunt Policy Enforcement Utility End Consumption of Animals Figure 12. PETA proxy expected utilities across campaigns Given that the swing weights assigned to the six attributes were fairly close for maximizing media attention, online presence and education materials, we conducted some sensitivity analysis to see how the expected utility output might vary given variations in these weights. As seen in Figure 13, we found that undercover investigations, print ad campaigns, corporate campaign, publicity stunt and policy enforcement were not really sensitive to changes in the weight for maximizing online presence. However, if the weight for this attribute is maximized, we find that online ad campaign becomes the preferred campaign followed by undercover investigation. We also see that the demonstrations campaign is very sensitive to variations in this weight; demonstrations is the most preferred campaign when the weight on this campaign is low, but quickly becomes the least preferred campaign as the weight on this attribute increases Utility Online Ad Campaign Undercover Investigation PRINT Ad Campaign Corporate Campaign Publicity Stunt Policy Enforcement Demonstrations Percent of Weight on Maximizing online presence/visibility Measure Figure 13. Sensitivity analysis on weight for maximizing online presence Page 12 of 15

14 In a second sensitivity analysis (Figure 14) we found that changing the weight related to maximizing educational materials did not result in as much change as seen relative to maximizing online presence. Whether or small amount or a significant amount of weight is placed on maximizing educational materials, demonstrations remains the preferred campaign. However, if no weight is placed on maximizing educational materials, undercover investigation becomes the preferred campaign followed by demonstrations and online ad campaigns Utility Demonstrations Corporate Campaign Online Ad Campaign Undercover Investigation PRINT Ad Campaign Publicity Stunt Policy Enforcement Percent of Weight on Maximize educational materials Measure Figure 14. Sensitivity analysis on weight for maximizing educational materials Lastly, the results generated from the research team and the PETA proxy were compared for discriminant validity. Essentially, we are comparing the results for 2 adversary values experts with different perspective about PETA. Figure 15 shows that one AVE believed PETA would prefer pursuing an undercover investigation, while the other preferred organizing demonstrations. This outcome demonstrates discriminant validity across different AVEs, as there are distinct differences in the way that each AVE perceives the campaign alternative preferences of PETA. E(U) of Attack PETA PETA Simulation Simulation Corporate campaign Demonstrations 0.37 Online ad campaign 0.26 Policy Enforcement 0.04 Print ad campaign Publicity stunt Undercover investigation Purchase stock - McDonalds 0.37 Figure 15. Discriminant validity assessment across AVEs with different perspectives on PETA Page 13 of 15

15 All information provided herein is being prepared for presentation at the upcoming Society for Risk Analysis Conference (SRA) in December Subsequently, the material will be written up for journal publication Research Products Research Product Metrics # # of peer-reviewed journal reports published 0 # of peer-reviewed journal reports accepted for publication 0 # of non-peer reviewed publications and reports 1 # of scholarly journal citations of published reports 19 # of scholarly presentations (conferences, workshops, seminars) 5 # of outreach presentations (non-technical groups, general public) Publications John, R. S. & Rosoff, H. (2011). Modeling effects of counterterrorism initiatives for reducing adversary threats to transportation systems. Journal of Homeland Security, Proceedings of the 2011 DHS Science Conference 5th Annual University Network Summit, focused on Catastrophes and Complex Systems: Transportation, Washington, D.C., March 30 April Presentations John, R.S., Rosoff, H. & Cui, J. Combined MAU and SOFTMAX Modeling of Uncertainty in Adversary Behavior. Decision Analysis Society sponsored presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), Minneapolis, MN, October 6-9, Rosoff, H. and John, R.S. Validation of Adversary Utility Assessment by Proxy. Decision Analysis Society sponsored presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), Minneapolis, MN, October 6-9, Rosoff, H. and John, R.S. Contrasting Decision Models for Different Adversary Groups. Multiple Criteria Decision Making, sponsored presentation, Institute for Operations Research and Management Science (INFORMS), Minneapolis, MN, October 6-9, John, R.S. & Rosoff, H.R. Simplifying and Validating Adaptive Adversary Modeling. The First conference on Validating Models of Adversary Behavior, Buffalo/Niagara Falls, June 23-26, John, R. S. & Rosoff, H. Modeling and exploiting adversary risk attitudes and trade-offs among conflicting objectives. Joint Decision Analysis Society and Emergency Management sponsored presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), Phoenix, Az., October 14-17, Rosoff, H. & John, R. S. Modeling effects of counterterrorism initiatives on reducing adversary threats. Multiple Criteria Decision Making sponsored presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), Phoenix, Az., October 14-17, Page 14 of 15

16 3. Research Transition Both the TSA and FEMA have expressed an interest in this work. Meetings are scheduled with both departments in early December 2013 in Washington D.C. 4. Education and Outreach Products Education Initiatives (Please detail below) # # of students supported (funded by CREATE) 1 # of students involved (funded by CREATE + any other programs) 1 # of students graduated NA # of student theses or dissertations NA # of contacts with DHS, other Federal agencies, or State/Local (committees) 2 # of existing courses modified with new material NA # of new courses developed NA # of new certificate programs developed NA # of new degree programs developed NA Funded by CREATE Xi Zheng, Undergraduate Student, USC 5. Outreach In meetings scheduled for December, CREATE researchers plan to establish more direct lines of communication with the TSA and FEMA. Page 15 of 15

Modeling Terrorist Beliefs and Motivations

Modeling Terrorist Beliefs and Motivations CREATE Research Archive Research Project Summaries 2012 Modeling Terrorist Beliefs and Motivations Heather Rosoff University of Southern California, rosoff@usc.edu Richard John University of Southern California,

More information

Decision Analysis by Proxy for the Rational Terrorist

Decision Analysis by Proxy for the Rational Terrorist Decision Analysis by Proxy for the Rational Terrorist Heather Rosoff 1 and Richard John 1,2 1 Center for Risk and Economic Analysis of Terrorism Events 2 Department of Psychology University of Southern

More information

Decision Analysis by Proxy for the Rational Terrorist

Decision Analysis by Proxy for the Rational Terrorist Decision Analysis by Proxy for the Rational Terrorist Heather Rosoff 1 and Richard John 1,2 1 Center for Risk and Economic Analysis of Terrorism Events 2 Department of Psychology University of Southern

More information

Perception Versus Reality: UCS Views on Nuclear and Radiological Terrorism Risk

Perception Versus Reality: UCS Views on Nuclear and Radiological Terrorism Risk Perception Versus Reality: UCS Views on Nuclear and Radiological Terrorism Risk Edwin Lyman Senior Scientist Union of Concerned Scientists INMM Reducing the Risk Workshop Washington, DC March 17-18, 2015

More information

Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate

Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate CREATE Research Archive Published Articles & Papers 2011 Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate Robin Dillon-Merrill Georgetown University,

More information

PortSec: Port Security Risk and Resource Management System

PortSec: Port Security Risk and Resource Management System CREATE Research Archive Research Project Summaries 2010 PortSec: Port Security Risk and Resource Management System Michael D. Orosz University of Southern California, mdorosz@isi.edu Petros Ioannou University

More information

Using Decision Analysis to Select Strategic Partners. Hal Wilson Department of Defense

Using Decision Analysis to Select Strategic Partners. Hal Wilson Department of Defense Using Decision Analysis to Select Strategic Partners Hal Wilson Department of Defense Problem Background An element of the Department Of Defense (DoD) desires to team with other organizations to help fulfill

More information

COST PROGRAM COMMENCEMENT

COST PROGRAM COMMENCEMENT TEXAS SOUTHERN UNIVERSITY BARBARA JORDAN MICKEY LELAND SCHOOL OF PUBLIC AFFAIRS empa CERTIFICATE PROGRAMS The Texas Southern University empa Certificate Programs covers three areas each consisting of four

More information

KEY TERMS & DEFINITIONS IN STRATEGIC PLANNING

KEY TERMS & DEFINITIONS IN STRATEGIC PLANNING KEY TERMS & DEFINITIONS IN STRATEGIC PLANNING Term Definition Related Terms Academic An organized sequence or grouping of courses leading to a defined objective - such as a major, degree, certificate,

More information

Solution Evaluation. Chapter Study Group Learning Materials

Solution Evaluation. Chapter Study Group Learning Materials Chapter Study Group Learning Materials 1 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters to use and modify this content to support chapter activities.

More information

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Research Synopsis A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Modeling Area: Risk Assessment Case Studies Supported: Risk-Based Resource Allocation Principal Investigator:

More information

Evaluating the effectiveness of the Global Nuclear Detection Architecture using multiple-objective decision analysis

Evaluating the effectiveness of the Global Nuclear Detection Architecture using multiple-objective decision analysis University of Arkansas, Fayetteville ScholarWorks@UARK Industrial Engineering Undergraduate Honors Theses Industrial Engineering 8-2014 Evaluating the effectiveness of the Global Nuclear Detection Architecture

More information

Strategy Analysis. Chapter Study Group Learning Materials

Strategy Analysis. Chapter Study Group Learning Materials Chapter Study Group Learning Materials 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters to use and modify this content to support chapter activities. All

More information

2009 Annual Operating Plan National Preparedness Directorate

2009 Annual Operating Plan National Preparedness Directorate 2009 Annual Operating Plan April 2009 Table of Contents Overview... 3 NPD Vision... 3 NPD Mission... 3 Foundations for Success... 3 Strategic Goals and Objectives... 5 FEMA Goals... 5 NPD Goals... 6 The

More information

KILLARNEY DECLARATION AND RECOMMENDATIONS ON BIODIVERSITY RESEARCH

KILLARNEY DECLARATION AND RECOMMENDATIONS ON BIODIVERSITY RESEARCH KILLARNEY DECLARATION AND RECOMMENDATIONS ON BIODIVERSITY RESEARCH Adopted by the EPBRS Meeting Sustaining livelihoods and biodiversity Attaining the 2010 targets in the European Biodiversity Strategy

More information

The New Engagement: A Bold Statement of Colliding Concepts Transcending Traditional Solutions

The New Engagement: A Bold Statement of Colliding Concepts Transcending Traditional Solutions The New Engagement: A Bold Statement of Colliding Concepts Transcending Traditional Solutions North Carolina State University Office of Outreach & Engagement NC STATE UNIVERSITY VISION, MISSION, VALUES

More information

Delivering Value Why Else Are You Doing The Project?

Delivering Value Why Else Are You Doing The Project? Delivering Value Why Else Are You Doing The Project? THOUGHT LEADERSHIP WHITE PAPER In partnership with By Andy Jordan, PMP, ProjectManagement.com Research Analyst Projects are the way that an organization

More information

ACCELERATED STRATEGY REALIZATION

ACCELERATED STRATEGY REALIZATION ACCELERATED STRATEGY REALIZATION STRATEGY Accelerated Strategy Realization Process Development Management SUCCESS Bridge To Success Greencastle employs a tactical-level planning framework, known as Accelerated

More information

Reaching Out to Stakeholders for Effective Collaboration

Reaching Out to Stakeholders for Effective Collaboration Reaching Out to Stakeholders for Effective Collaboration Hildy Saizow, SPI Subject Matter Expert June 14, 2012 1 This project was supported by Grant No. 2009-DG-BX-K021 awarded by the Bureau of Justice

More information

Predictive Port Resilience Tool to Assess Regional Impact of Hurricanes - Project Work Plan

Predictive Port Resilience Tool to Assess Regional Impact of Hurricanes - Project Work Plan Predictive Port Resilience Tool to Assess Regional Impact of Hurricanes - Project Work Plan Participants: Dr. Manhar Dhanak*, Dr. Evangelos Kaisar* and Dr. Scott Parr + *Florida Atlantic University, Boca

More information

Institute for the Environment

Institute for the Environment 2015-2019 STRATEGIC PLAN Institute for the Environment THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL LETTER FROM THE DIRECTOR Developing solutions to meet the world s growing environmental and energy

More information

Creating An Auditable Standard of Quality in Government

Creating An Auditable Standard of Quality in Government Creating An Auditable Standard of Quality in Government Presented by: Richard E. Mallory, MM, PMP CPS HR Consulting Chair Elect Government Division rmallory@cps.ca.gov 1 Richard E. Mallory, MM, PMP Rich

More information

Position Profile Executive Director, Social Venture Partners Minnesota

Position Profile Executive Director, Social Venture Partners Minnesota Position Profile Executive Director, Social Venture Partners Minnesota Social Venture Partners: Social Venture Partners Minnesota (SVP MN) is one of 39 SVP affiliates in a global network of over 3,500

More information

CHOICES The magazine of food, farm, and resource issues

CHOICES The magazine of food, farm, and resource issues CHOICES The magazine of food, farm, and resource issues 1st Quarter 2007 22(1) A publication of the American Agricultural Economics Association Defending America s Food Supply Against Terrorism: Who is

More information

Surface Transportation Security Rail and Mass Transit

Surface Transportation Security Rail and Mass Transit Surface Transportation Security Rail and Mass Transit Overview of Surface Transportation America s passenger and freight transportation system is a dynamic, interconnected network. It consists of overlapping

More information

Introduction to Homeland Security

Introduction to Homeland Security Introduction to Homeland Security Chapter 8 Communications EM Communications Communicating messages to the general public is a critical and underdeveloped aspect of effective emergency management These

More information

Enhancing Security of Hazardous Materials Shipments. Against Acts of Terrorism or Sabotage. Using RSPA s

Enhancing Security of Hazardous Materials Shipments. Against Acts of Terrorism or Sabotage. Using RSPA s Enhancing Security of Hazardous Materials Shipments Against Acts of Terrorism or Sabotage Using RSPA s Risk Management Self-Evaluation Framework (RMSEF) January 2002 Revision 1 This template or overlay

More information

WORKFORCE BOARD LEADER CONTRIBUTIONS

WORKFORCE BOARD LEADER CONTRIBUTIONS WORKFORCE BOARD LEADER CONTRIBUTIONS Regional Backbone System Builder User Guide Grant Steward Workforce Investment Board (WIB) members are community leaders who can contribute to advancing the work of

More information

Establishing Governance to Achieve Statewide Communications Interoperability. Office of Emergency Communications January 2009

Establishing Governance to Achieve Statewide Communications Interoperability. Office of Emergency Communications January 2009 Establishing Governance to Achieve Statewide Communications Interoperability Office of Emergency Communications January 2009 1 Agenda OEC Analysis Principles for Statewide Governance Seven Components of

More information

Today s Alliance Professional... Tomorrow s Strategic Leader

Today s Alliance Professional... Tomorrow s Strategic Leader Today s Alliance Professional... Tomorrow s Strategic Leader A study done by the American Management Association and Pearson in collaboration with the Society of Human Resource Management (SHRM) and the

More information

The AAA Dispute-Wise Business Management: Improving Economic and Non-Economic Outcomes in Managing Business Conflicts

The AAA Dispute-Wise Business Management: Improving Economic and Non-Economic Outcomes in Managing Business Conflicts The AAA Dispute-Wise Business Management: Improving Economic and Non-Economic Outcomes in Managing Business Conflicts Presenter: Michael D. Lee LL.M., Esq. For more than half a century, there has been

More information

PL : Securing our Agriculture and Food Act

PL : Securing our Agriculture and Food Act PL 115-43: Securing our Agriculture and Food Act John P. Sanders, Jr., DVM DACVPM Office of Health Affairs Department of Homeland Security October 15, 2017 Securing our Agriculture and Food Act The law

More information

A RANKING AND PRIORITIZING METHOD FOR BRIDGE MANAGEMENT

A RANKING AND PRIORITIZING METHOD FOR BRIDGE MANAGEMENT A RANKING AND PRIORITIZING METHOD FOR BRIDGE MANAGEMENT Saleh Abu Dabous and Sabah Alkass Department of Building, Civil and Environmental Engineering, Concordia University, Rm: EV-6139 1455 de Maisonneuve,

More information

Corporate Social Responsibility: Implications for Human Resources and Talent Engagement

Corporate Social Responsibility: Implications for Human Resources and Talent Engagement Cornell University ILR School DigitalCommons@ILR CAHRS White Papers Center for Advanced Human Resource Studies (CAHRS) 5-2012 Corporate Social Responsibility: Implications for Human Resources and Talent

More information

Going the Distance? NRC's Response to the National Academy of Science's Transportation Study 8491

Going the Distance? NRC's Response to the National Academy of Science's Transportation Study 8491 WM2008 Conference, February 24-28, 2008, Phoenix, AZ ABSTRACT Going the Distance? NRC's Response to the National Academy of Science's Transportation Study 8491 E.P. Easton, C.S. Bajwa United States Nuclear

More information

An Empirical Assessment of Domestic Radicalization *

An Empirical Assessment of Domestic Radicalization * An Empirical Assessment of Domestic Radicalization * Michael Jensen, Ph.D. Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization Workshop, National Academies

More information

An Introduction to Academic Strategic Planning

An Introduction to Academic Strategic Planning An Introduction to Academic Strategic Planning Mark Sharfman Director, Division of Management & Entrepreneurship Price College of Business March 11, 2015 Learning Objectives By the completion of the workshop

More information

Cultural Intelligence. Take full advantage of the cultural diversity in global teams

Cultural Intelligence. Take full advantage of the cultural diversity in global teams Cultural Intelligence Take full advantage of the cultural diversity in global teams The Model of Freedom is a culture model that serves international companies to take full advantage of the cultural diversity

More information

PSAA - PUBLIC SERVICE & ADMIN

PSAA - PUBLIC SERVICE & ADMIN PSAA - Public Service & Admin 1 PSAA - PUBLIC SERVICE & ADMIN PSAA 601 Foundations of Public Service Different perspectives on management and leadership in public service; provides overview of how public

More information

Goal 1: Prepare Students for Leading Roles in an Innovation-driven Economy and Global Society

Goal 1: Prepare Students for Leading Roles in an Innovation-driven Economy and Global Society Goal 1: Prepare Students for Leading Roles in an Innovation-driven Economy and Global Society Objective 1.1 Enroll more high-ability students from all societal segments. Strategy 1.1.1 Enhance marketing

More information

WHO LITIGATES AND WHO COLLABORATES? SUMMARY OF FINDINGS FROM STATE AND LOCAL ENVIRONMENTAL GROUPS IN THE WESTERN US

WHO LITIGATES AND WHO COLLABORATES? SUMMARY OF FINDINGS FROM STATE AND LOCAL ENVIRONMENTAL GROUPS IN THE WESTERN US WHO LITIGATES AND WHO COLLABORATES? SUMMARY OF FINDINGS FROM STATE AND LOCAL ENVIRONMENTAL GROUPS IN THE WESTERN US Caitlin Burke, Ph.D. North Carolina State University OVERVIEW Adversarial politics have

More information

VIII. GRADUATE DEGREE PROGRAMS

VIII. GRADUATE DEGREE PROGRAMS GRADUATE DEGREE PROGRAMS VIII. GRADUATE DEGREE PROGRAMS // MASTER OF ARTS IN EDUCATION EFFECTIVE TEACHER The Masters of Arts: Effective Teacher program is designed for working professionals in institutional,

More information

Managing Risk In A Complex Environment With Competing Worldviews

Managing Risk In A Complex Environment With Competing Worldviews Managing Risk In A Complex Environment With Competing Worldviews Extreme Events Workshop March 14, 2002 by William Petak School of Policy Planning and Development University of Southern California Los

More information

BUSINESS MOTIVATORS. Terri Tester ACME Inc. 03/31/17 REPORT PROVIDED BY

BUSINESS MOTIVATORS. Terri Tester ACME Inc. 03/31/17 REPORT PROVIDED BY BUSINESS MOTIVATORS ACME Inc. 03/31/17 REPORT PROVIDED BY Success Performance Solutions P.O. Box 458 Wind Gap, PA 18091 1-717-291-4640 www.successperformancesolutions.com/ Motivators are a collection of

More information

Economic Consequences of and Resilience to Terrorism

Economic Consequences of and Resilience to Terrorism CREATE Research Archive Research Project Summaries 2012 Economic Consequences of and Resilience to Terrorism Adam Z. Rose University of Southern California, adam.rose@usc.edu Follow this and additional

More information

Designing a Program to Demonstrate Impact

Designing a Program to Demonstrate Impact Designing a Program to Demonstrate Impact John Blevins, Emory University Jill Olivier, University of Cape Town 4 December 2018 Learning Objectives This webinar will include content on the following objectives:

More information

In this Topic, you will explore how companies select their international strategies and structures. You will also: Learn about the variety of

In this Topic, you will explore how companies select their international strategies and structures. You will also: Learn about the variety of In this Topic, you will explore how companies select their international strategies and structures. You will also: Learn about the variety of strategies that companies use in international business. Examine

More information

Action Plan for Biodiversity Research in Europe European Platform for Biodiversity Research Strategy Aims Background

Action Plan for Biodiversity Research in Europe European Platform for Biodiversity Research Strategy Aims Background The mission of the European Platform for Biodiversity Research Strategy (EPBRS) is to ensure that research contributes to halting the loss of biodiversity by 2010. Action Plan for Biodiversity Research

More information

Memorandum Organizational Culture, Core Values and Strategic Competencies

Memorandum Organizational Culture, Core Values and Strategic Competencies Government Organization of Sint Maarten Memorandum Organizational Culture, Core Values and BC 261006,22 This report contains 20 pages Final Version Content 1 Introduction 2 1.1 Objectives 2 1.2 Scope 3

More information

Security Activities at the US National Academy of Sciences. Kathryn Hughes, Ph.D. Tarnow, Poland November 8, 2012

Security Activities at the US National Academy of Sciences. Kathryn Hughes, Ph.D. Tarnow, Poland November 8, 2012 National and International Chemical Security Activities at the US National Academy of Sciences Kathryn Hughes, Ph.D. Tarnow, Poland November 8, 2012 What is the US National Academy of Sciences? Established

More information

UC Core Competency Model

UC Core Competency Model UC Core Competency Model Developed and Endorsed by: UC Learning and Development Consortium Chief Human Resources Officers Date: May 2011 University of California Staff Employees Core Competencies Communication

More information

STRATEGIC PLAN July 2018

STRATEGIC PLAN July 2018 STRATEGIC PLAN July 2018 www.wrc.umn.edu LETTER FROM THE DIRECTOR I am pleased to present the Water Resources Center (WRC) Strategic Plan. This plan is the result of an extensive process with many contributors.

More information

National Defense University. Strategic Plan 2012/2013 to 2017/18 One University Evolution

National Defense University. Strategic Plan 2012/2013 to 2017/18 One University Evolution National Defense University The Chairman s University: Inspiring Creative, Critical and Collaborative Thinkers For Leadership Through Academic Excellence Strategic Plan 2012/2013 to 2017/18 One University

More information

Environment and Natural Resources Trust Fund Request for Proposals (RFP)

Environment and Natural Resources Trust Fund Request for Proposals (RFP) Environment and Natural Resources Trust Fund 2012-2013 Request for Proposals (RFP) Project Title: Analytical Method for Water Quality Assessment ENRTF ID: 104-E2 Topic Area: E2. NR Info Collection/Analysis

More information

RCRA Corrective Action Workshop On Results-Based Project Management: Fact Sheet Series

RCRA Corrective Action Workshop On Results-Based Project Management: Fact Sheet Series United States Environmental Protection Agency Office of Solid Waste RCRA Corrective Action Workshop On Results-Based Project Management: Fact Sheet Series EPA March 2000 www. FACT SHEET #3 FINAL REMEDY

More information

Best Practices in Diversity Management

Best Practices in Diversity Management Cornell University ILR School DigitalCommons@ILR GLADNET Collection Gladnet May 2001 Best Practices in Diversity Management Neil E. Reichenberg International Personnel Management Association Follow this

More information

Texas A&M AgriLife Extension Service County Extension Agent Performance Appraisal Instrument

Texas A&M AgriLife Extension Service County Extension Agent Performance Appraisal Instrument Texas A&M AgriLife Extension Service County Extension Agent Performance Appraisal Instrument Name County Revised May, 0 This performance appraisal system identifies four major areas or performance domains

More information

Master of Business Administration Course Descriptions

Master of Business Administration Course Descriptions Master of Business Administration Course Descriptions CORE COURSES MBAB 5P01 Accounting for Decision-Making I The functional basics of accounting for management and business decisions. Data collection,

More information

Organizational Diagnostic for Market Facilitation

Organizational Diagnostic for Market Facilitation Organizational Diagnostic for Market Facilitation Assessing your organization s understanding of what to do and how to do it 20 KNow- What 10 0 0 10 20 Know-How Introduction Markets are complex, dynamic

More information

Elements of an Effective Electoral Strategy

Elements of an Effective Electoral Strategy Guide to As a 501(c)(3), you can do advocacy activities during an election year. In order for these activities to work in tandem with one another to engage candidates and stakeholders in topics related

More information

THOMSON REUTERS: INCITES

THOMSON REUTERS: INCITES THOMSON REUTERS: INCITES An objective analysis of people, programs, and peers THOMSON REUTERS: SINGULAR EXPERT IN RESEARCH DISCOVERY The global research environment is changing: it s more collaborative,

More information

Business & Computing Examinations (BCE) LONDON (UK)

Business & Computing Examinations (BCE) LONDON (UK) Business & Computing Examinations (BCE) LONDON (UK) Management Qualification Analysis & Occupational Outlook The development of BCE qualifications include extensive market research from the following sources:

More information

Intermediate Systems Acquisition Course. Lesson 2.1 Analysis of Alternatives. Analysis of Alternatives (AoA)

Intermediate Systems Acquisition Course. Lesson 2.1 Analysis of Alternatives. Analysis of Alternatives (AoA) Analysis of Alternatives (AoA) The Analysis of Alternatives (AoA) is an important element in the acquisition process. It provides a systematic approach to determine the optimal way to fill a gap in mission

More information

U.S. Approach to Share Seismic Awareness, Hazard Assessment and Mitigation Practices with a Larger Universe of Water and Wastewater Utilities

U.S. Approach to Share Seismic Awareness, Hazard Assessment and Mitigation Practices with a Larger Universe of Water and Wastewater Utilities U.S. Approach to Share Seismic Awareness, Hazard Assessment and Mitigation Practices with a Larger Universe of Water and Wastewater Utilities David Goldbloom-Helzner and Craig A. Davis ABSTRACT More than

More information

Modeling Supply Chain Resiliency

Modeling Supply Chain Resiliency University of Arkansas, Fayetteville ScholarWorks@UARK Industrial Engineering Undergraduate Honors Theses Industrial Engineering 5-2016 Modeling Supply Chain Resiliency Jeff A. Hazel Follow this and additional

More information

Chlorine: the Achilles Heel?

Chlorine: the Achilles Heel? Chlorine: the Achilles Heel? John McNabb Cohasset Water Commissioner Cohasset, Massachusetts Water Security Congress Washington DC, April 8-10, 2008 1 Cohasset Water Dept. I have been an elected Water

More information

US Human Resources: theory and practice

US Human Resources: theory and practice Rochester Institute of Technology RIT Scholar Works Presentations and other scholarship 2005 US Human Resources: theory and practice Stanley Bissell Follow this and additional works at: http://scholarworks.rit.edu/other

More information

Andy Wright Group Director, The New York Times Job Market

Andy Wright Group Director, The New York Times Job Market MARKET INTELLIGENCE: Investing in the Future of the Pharmaceutical Industry Dear Colleagues, Our region s pharmaceutical industry has long been recognized as an important engine of the area job market.

More information

Information Technology Investment Management: A Framework for State Government

Information Technology Investment Management: A Framework for State Government Association for Information Systems AIS Electronic Library (AISeL) SAIS 2007 Proceedings Southern (SAIS) 3-1-2007 Information Technology Investment Management: A Framework for State Government James B.

More information

Enterprise Modeling for the Analysis of Alternatives Process in Proposal Generation

Enterprise Modeling for the Analysis of Alternatives Process in Proposal Generation Enterprise Modeling for the Analysis of Alternatives Process in Proposal Generation Improving and Optimizing the Analysis of Alternatives Process for IT Solutions Government Contract Proposals Gabriel

More information

2010 UND Employer Satisfaction Survey

2010 UND Employer Satisfaction Survey 2010 UND Employer Satisfaction Survey Sue Erickson Carmen Williams Michael Braget Office of Institutional Research University of North Dakota Table of Contents Table of Contents... i Executive Summary...

More information

Digital Disruption, Big Data and HR. Embrace or Avoid? August 2017

Digital Disruption, Big Data and HR. Embrace or Avoid? August 2017 Digital Disruption, Big Data and HR. Embrace or Avoid? August 2017 Presentation Agenda 2 What trends are we seeing? What are business' expectations for HR? What the Competencies of HR in the new economy?

More information

SEARCH PROFILE. Assistant Deputy Minister Seniors Services. Alberta Seniors and Housing. Executive Manager II

SEARCH PROFILE. Assistant Deputy Minister Seniors Services. Alberta Seniors and Housing. Executive Manager II SEARCH PROFILE Assistant Deputy Minister Seniors Services Alberta Seniors and Housing Executive Manager II Salary Range: $153,289 $201,175 ($5,873.18 $7,707.88 bi-weekly) Limited Competition Job ID: 1049714

More information

Chapter 8: THE MARKETING PLAN. Chapter 11: Strategic Leadership

Chapter 8: THE MARKETING PLAN. Chapter 11: Strategic Leadership Chapter 8: THE MARKETING PLAN Learning outcomes After reading this chapter, you will be able to: Plan segmentation, targeting, and positioning Plan direction, objectives and marketing support Develop marketing

More information

FAA PMIWDC LUNCHEON SERIES STRATEGIC PLANNING; WHAT, WHY, AND HOW

FAA PMIWDC LUNCHEON SERIES STRATEGIC PLANNING; WHAT, WHY, AND HOW FAA PMIWDC LUNCHEON SERIES STRATEGIC PLANNING; WHAT, WHY, AND HOW John Lever, Managing g Partner The Lever Group February 29 th, 2012 vision mission strategy performance INTRODUCTION AND SESSION OVERVIEW

More information

chapter 8 reward management and inequality

chapter 8 reward management and inequality STUDENT SUMMARY NOTES chapter 8 reward management and inequality Chapter overview Chapter 8 provides a theoretical framework for examining reward management. It discusses how reward management is central

More information

Appointment of Director of Research, Innovation and Knowledge Exchange

Appointment of Director of Research, Innovation and Knowledge Exchange Appointment of Director of Research, Innovation and Knowledge Exchange January 2019 Appointment of Director of Research, Innovation and Knowledge Exchange 1 Goldsmiths, University of London Goldsmiths,

More information

A river runs between them: An instructional case in professional services provided by a CPA firm

A river runs between them: An instructional case in professional services provided by a CPA firm University of St. Thomas, Minnesota UST Research Online Accounting Faculty Publications Accounting 12-2014 A river runs between them: An instructional case in professional services provided by a CPA firm

More information

Research Studies workplacebullying.org WBI - Zogby Workplace Bullying from the Perspective of U.S. Business Leaders

Research Studies workplacebullying.org WBI - Zogby Workplace Bullying from the Perspective of U.S. Business Leaders TM Research Studies workplacebullying.org 2013 WBI - Zogby Workplace Bullying from the Perspective of U.S. Business Leaders Gary Namie, PhD - Research Director Do not cite findings without crediting WBI

More information

Guidance on Establishing an Annual Leadership Talent Management and Succession Planning Process

Guidance on Establishing an Annual Leadership Talent Management and Succession Planning Process Guidance on Establishing an Annual Leadership Talent Management and Succession Planning Process INTRODUCTION OPM is providing this guidance to help agencies implement an annual talent management and succession

More information

Process Documentation Plan

Process Documentation Plan Process Documentation Plan Securing Rights & Restoring Lands for Improved Livelihoods 2011 IUCN ROWA Introduction This document is part of the Communication Strategy set for the Securing Rights & Restoring

More information

Chapter Five. Chapter Objectives. Core Competencies. Becoming an Emergency Management Professional

Chapter Five. Chapter Objectives. Core Competencies. Becoming an Emergency Management Professional Chapter Five Becoming an Emergency Management Professional Chapter Objectives 1) Understand the relevance of recommended core competencies for EM practice 2) Compare & contrast professional competency

More information

Bank Mergers and Acquisitions in Nigeria The Lens of Psychology and Learning

Bank Mergers and Acquisitions in Nigeria The Lens of Psychology and Learning Bank Mergers and Acquisitions in Nigeria The Lens of Psychology and Learning Scenarios Executive Leadership Values and Core Agreements Hidden Messes Robert J. Leaver, Chairman The Roundtable International,

More information

UAF Administrative Services Work Environment Survey. Prepared for: University of Alaska, Fairbanks Administrative Services

UAF Administrative Services Work Environment Survey. Prepared for: University of Alaska, Fairbanks Administrative Services UAF Administrative Services Work Environment Survey Prepared for: University of Alaska, Fairbanks Administrative Services July 2009 UAF Administrative Services Work Environment Survey Prepared for: University

More information

EXECUTIVEVIEW360 ExecutiveView360 Profile for: Sally Sample Envisia Learning Feb Envisia Learning, Inc.

EXECUTIVEVIEW360 ExecutiveView360 Profile for: Sally Sample Envisia Learning Feb Envisia Learning, Inc. EXECUTIVEVIEW360 ExecutiveView360 Profile for: Sally Sample Envisia Learning Feb 13 2015 2015 Envisia Learning, Inc. Summary Feedback Report Introduction This Feedback Report provides you information about

More information

IEEE-USA STRATEGIC AND OPERATIONAL PLAN

IEEE-USA STRATEGIC AND OPERATIONAL PLAN IEEE-USA STRATEGIC AND OPERATIONAL PLAN (Ver. 2017.1) OUR MISSION -- As provided in our By-Laws, IEEE-USA's mission is "recommend policies and implement programs specifically intended to serve and benefit

More information

Competency Map for the Data Science and Analytics-Enabled Graduate

Competency Map for the Data Science and Analytics-Enabled Graduate Competency Map for the Data Science and Analytics-Enabled Graduate Purpose of Competency Map The purpose of this competency map is to identify the specific skills, knowledge, abilities, and attributes

More information

[check one or both] Concentration in Social Work Leadership and Management (SWLM)

[check one or both] Concentration in Social Work Leadership and Management (SWLM) School of Social Work Revised January 2012 Concentration Learning Agreement - MSW Field Practicum II and III 6800 6850 [check one or both] Concentration in Social Work Leadership and Management (SWLM)

More information

Arkansas GFOA Conference CIPFA GFOA FM Model

Arkansas GFOA Conference CIPFA GFOA FM Model Arkansas GFOA Conference CIPFA GFOA FM Model July 23, 2014 Presented by GFOA Eva Olsaker, Senior Manager Rob Roque, Technology Services Manager Agenda Introductions About the CIPFA-GFOA FM Model Implementation

More information

International Journal of Nuclear Security

International Journal of Nuclear Security Volume 3 Number 1 International Journal of Nuclear Security International Journal of Nuclear Security 12-15-2017 The Future of Nuclear Security in Moroccan Territory After the Creation of the New Moroccan

More information

LEADING EMPOWERED RECRUITING TEAMS

LEADING EMPOWERED RECRUITING TEAMS LEADING EMPOWERED RECRUITING TEAMS CONTENTS P.02 P.03 P.04 P.05 RECRUITING IS EVOLVING RECRUITING S HIERARCHY OF NEEDS EMPOWERED RECRUITING ACTIVITY #1: EMPOWERED RECRUITING ACTIVITY #2: CONSULT WITH HIRING

More information

AWR 144: Port and Vessel Security for Public Safety and Maritime Personnel Introduction

AWR 144: Port and Vessel Security for Public Safety and Maritime Personnel Introduction AWR 144: Port and Vessel Security for Public Safety and Introduction September 11, 2001 was an event that changed lives from the President of the United States to the most recently-hired volunteer emergency

More information

Program Sustainability Workbook 2015

Program Sustainability Workbook 2015 Program Sustainability Workbook 2015 Table of Contents I. Introduction Sustainability Framework... 3 II. Program Summary... 5 III. Action Plan for Priority Elements A. Self-Assessment Tool... 6-14 B. Current

More information

NRL FEMALE CANDIDATES PROGRAM OVERVIEW

NRL FEMALE CANDIDATES PROGRAM OVERVIEW NRL FEMALE CANDIDATES PROGRAM OVERVIEW OVERVIEW The NRL Female Candidates Program (The Program) provides temporary professional placement opportunities in the National Rugby League (NRL) to female students

More information

Proposal to the Marisla Foundation To be submitted online MAX 4 pages

Proposal to the Marisla Foundation To be submitted online MAX 4 pages RESOURCE MEDIA PROPOSAL Proposal to the Marisla Foundation To be submitted online MAX 4 pages NARRATIVE ITEM 1: ABOUT RESOURCE MEDIA/CYLVIA HAYES Cylvia Hayes joins the Resource Media team to address the

More information

IFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004

IFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004 INTERNATIONAL FEDERATION OF ACCOUNTANTS 545 Fifth Avenue, 14th Floor Tel: +1 (212) 286-9344 New York, New York 10017 Fax: +1 (212) 856-9420 Internet: http://www.ifac.org Agenda Item 8-C First Issued July

More information

Rescaling for Success: Benefits and Pitfalls of Rescaling Scores Dr. Frank Olmos

Rescaling for Success: Benefits and Pitfalls of Rescaling Scores Dr. Frank Olmos Rescaling for Success: Benefits and Pitfalls of Rescaling Scores Dr. Frank Olmos Senior HR Analyst Los Angeles County Office of Education Adjunct Professor, Division of Applied and Advanced Studies in

More information

What Metrics Should a CSIRT Collect to Measure. Success?

What Metrics Should a CSIRT Collect to Measure. Success? What Metrics Should a CSIRT Collect to Measure (Or What Questions Should We Be Asking and How Do We Get the Answers?) Robin Ruefle, Audrey Dorofee June 15, 2017 Software Engineering Institute Carnegie

More information

Report For: Terri Tester ACME Inc. 12/30/2009

Report For: Terri Tester ACME Inc. 12/30/2009 Report For: Terri Tester ACME Inc. 12/30/2009 Report Contents Conceptual Aesthetic Economic Power and Authority Social Doctrine Graphic Profile This Report Is Provided By: The Chrysalis Corporation 2001

More information

Visionary Leadership. Systems Perspective. Student-Centered Excellence

Visionary Leadership. Systems Perspective. Student-Centered Excellence Core Values and Concepts These beliefs and behaviors are embedded in high-performing organizations. They are the foundation for integrating key performance and operational requirements within a results-oriented

More information