The EU has powerful enforcement mechanisms to curb democratic backsliding and support the rule of law in its member states. While (the threat of) enforcement is necessary, sanctions might be... Show moreThe EU has powerful enforcement mechanisms to curb democratic backsliding and support the rule of law in its member states. While (the threat of) enforcement is necessary, sanctions might be difficult to accept as legitimate when they hurt a citizen's country. We study the perceived legitimacy of EU enforcement actions. We develop hypotheses about the influence of national identity, party support, procedural fairness, descriptive norm prevalence, and the likely effects of the sanctions on the future of cooperation. These hypotheses are tested with a survey experiment administered to a nationally-representative sample in Poland. The focus is on the substantial financial sanctions imposed by the EU concerning judicial independence. The results show that exclusive national identity, the perceived importance of the rule of law, support for European integration and party support are strongly associated with perceived legitimacy. Providing information about the prevalence of public support for judicial independence in the country increases significantly the perceived legitimacy of enforcement actions. We find no evidence for effects of arguments about Polexit, future deterrence effects of the sanctions or their procedural (un)fairness. EU sanctions might not lead to further backlash among the domestic public, but they are unlikely to generate public pressure for reforms. Show less
The vulnerability of chemical and process facilities toward physical security attacks depends on the equipment resistance against such attacks and on the performance of Physical Protection Systems ... Show moreThe vulnerability of chemical and process facilities toward physical security attacks depends on the equipment resistance against such attacks and on the performance of Physical Protection Systems (PPS) in place. To enhance the protection against intentional attacks, the development of quantitative vulnerability metrics is essential, nevertheless current standard approaches only offer qualitative or semi-quantitative evaluations. The aim of the present work is to develop a quantitative methodology for the assessment of chemical and process facilities vulnerability towards external acts of interference. The proposed methodology is based both on the evaluation of equipment structural integrity in response to different types of specific impact vectors characterizing intentional attacks and on the quantitative performance assessment of related PPS. In particular, specific fragility models were developed for impact vectors associated with improvised explosive devices, firearms, and incendiary weapons. The novel fragility models were implemented in a comprehensive security vulnerability assessment (SVA) based on Bayesian Networks, in which the contribution of PPS performance was also considered. A case study was defined and analyzed to exemplify the application of the proposed approach. The results obtained allowed for the identification of the most critical security-related escalation scenarios and thus for an improved quantitative SVA. Show less
Kuipers, S; Perlstein, S.; Wolbers, J.; Jong, W. 2023
Communication has always been key to crisis management research, but even more so in recent years, from multiple disciplinary angles. In this bibliometric study and review of the literature, we aim... Show moreCommunication has always been key to crisis management research, but even more so in recent years, from multiple disciplinary angles. In this bibliometric study and review of the literature, we aim to identify different clusters of crisis communication research in the literature and whether and how much these crisis communication research clusters overlap. With different fields taking an interest in crisis communication, we ask ourselves where the interests of these fields overlap, and to what extent the different communities are aware of each other's work. Apart from offering an overview of topical clusters in crisis communication research and connections between those clusters of studies on crisis communication, we identify and explain two main approaches to crisis communication: a political or accusatory approach, and a functional or assistory approach. We conclude in our study and discussion that these approaches may need to broaden their research horizons to ensure the applicability of crisis communication strategies beyond the countries, media platforms, and audience orientations that have predominantly shaped the existing research landscape Show less
De afgelopen jaren werd Nederland geconfronteerd met een toename van aanslagen door de georganiseerde misdaad op objecten en personen die geen onderdeel uitmaken van criminele netwerken. Tegen deze... Show moreDe afgelopen jaren werd Nederland geconfronteerd met een toename van aanslagen door de georganiseerde misdaad op objecten en personen die geen onderdeel uitmaken van criminele netwerken. Tegen deze achtergrond wordt door politici en journalisten steeds vaker de term narcoterrorisme gebruikt. In dit artikel wordt de herkomst van deze term onderzocht en gekeken in welke mate deze past bij de situatie in Nederland met betrekking tot de georganiseerde misdaad. Daarnaast worden de voor- en nadelen benoemd van het gebruik van deze term in het maatschappelijke en wetenschappelijke debat. Tot slot reflecteren we op de politieke aandacht voor dit geweld en de impact daarvan op de democratische rechtsorde. Show less
This study was conducted to determine the predictors of COVID-19 vaccination attitudes across multiple waves in seven countries geographically spread across the European continent, using data from... Show moreThis study was conducted to determine the predictors of COVID-19 vaccination attitudes across multiple waves in seven countries geographically spread across the European continent, using data from a COVID-19 survey provided by the Massachusetts Institute of Technology COVID-19. Facebook users from across the globe participated in this survey which collected information on their knowledge of COVID-19, attitudes towards risk and available information, and their willingness or lack thereof to take the vaccine. In this secondary data analysis study, neural networks were used with special attention given to the importance of the predictors of COVID-19 vaccination attitudes. Perception of social norms regarding COVID-19 vaccination was found to be the most important predictor of vaccine acceptance. Country of residence and wave of data collection were among the important predictors, with different patterns for each country emerging across different waves. Other strong predictors included attitudes towards masks and mask wearing; attitudes towards the influenza vaccine; distrust in government health authorities and scientists; and level of knowledge of existing treatments for COVID-19. The results of this study can inform effective public health prevention and intervention efforts against infectious diseases. Show less
How much should someone contribute to trying to prevent unnecessary deaths and severe hardships? MacAskill, Mogensen, and Ord propose tithing for most of the rich (as measured by income), whichhas... Show moreHow much should someone contribute to trying to prevent unnecessary deaths and severe hardships? MacAskill, Mogensen, and Ord propose tithing for most of the rich (as measured by income), whichhas been influential in the effective altruism community. My aim in this article is to contribute, through amending their proposal, to their important project of searching for a weak or very weak principle ofsacrifice that would still revise upward how much money goes to the most effective organizations. I do so by presenting four objections to their argument based on demandingness, fairness, net wealth, and historical and contemporary injustices. Then, I show that a principle of progressive can overcome these objections and better fits the reasons MacAskill, Mogensen, and Ord give in favour of their principle than their proposed operationalization of tithing. Show less
This article presents the findings of exploratory research into the origins of OSINT for which it discusses three case studies from, respectively, the United States, Germany and the Netherlands.... Show moreThis article presents the findings of exploratory research into the origins of OSINT for which it discusses three case studies from, respectively, the United States, Germany and the Netherlands. Many authors writing on open source intelligence assume that the first OSINT practices emerged at the eve of the Second World War with the establishment of the BBC Monitoring Services and the Foreign Broadcast Monitoring Service. Building on existing studies, which are supplemented with original archive research, this article demonstrates that OSINT has a much longer and richer history. Methodical efforts to collect and exploit information from publicly available sources to fulfil intelligence requirements are documented as early as halfway the 19th century in the United States and early 20th century in Europe. Show less
Detailed, comparative research on firearm violence in Europe is rare. Using data from the European Homicide Monitor, this paper presents the prevalence and characteristics of firearm homicides in... Show moreDetailed, comparative research on firearm violence in Europe is rare. Using data from the European Homicide Monitor, this paper presents the prevalence and characteristics of firearm homicides in Denmark, Finland, the Netherlands, Sweden and Switzerland between 2001 and 2016. Furthermore, we compare firearm to non-firearm homicides to assess the degree of uniqueness of firearms as modus operandi. We find that the firearm homicide rate varies across our sample of countries. We also identify two country profiles: in Denmark, the Netherlands and Sweden, most firearm homicides take place in public and urban areas, involving male victims and perpetrators. In these countries, the use of firearms in homicides is largely concentrated in the criminal milieu. In Finland and Switzerland, firearms are mostly used in domestic homicides, with a higher share of female victims. We explore these findings in relation to firearm availability in each country. Show less
Marroni, G.; Casini, L.; Kuipers, S.; Dentone, D.; Mossa Verre, M.; Overdijk, W.; ... ; Landucci, G. 2023
Industrial sites processing and storing hazardous chemicals can be attractive targets of malicious acts of interference. The consequences successful intentional attacks to chemical facilities can... Show moreIndustrial sites processing and storing hazardous chemicals can be attractive targets of malicious acts of interference. The consequences successful intentional attacks to chemical facilities can be severe and could escalate generating domino effects, potentially affecting people and the environment. Moreover, intentional attacks have a dynamic escalation that is not well depicted by conventional analyses, which are instead static. This works focuses on the development of a comprehensive tool for Integrated Safety-Security risk assessment and related domino effects based on a three-dimensional (3D) real-time approach. Firstly, the plant is inspected using a drone to generate the graphic interface of the tool, which is the 3D reconstruction of the plant. Real-time data are associated with each mapped element, e.g., pressure/temperature conditions. The tool allows for the evaluation of probabilities and 3D consequences of accidents given real time and/or user input data. Potential domino effects of integrated safety-security scenarios will also be included in the tool, allowing for the mapping of plant vulnerability, risk and supporting the evaluation of weaknesses and need of additional countermeasures. In order to provide a sample application, a simplified version of the tool was used on a case study Show less
This article provides a reflection on the jihadist threat, the policies and actors that deal with this threat and the impact of jihadism and counterterrorism in Western Europe in the past twenty... Show moreThis article provides a reflection on the jihadist threat, the policies and actors that deal with this threat and the impact of jihadism and counterterrorism in Western Europe in the past twenty years. It describes how the threat, counterterrorism policies and their impact have developed over time and demonstrates how threat perceptions in society and the political arena have not always been aligned with the actual threat. There have been periods of disbalance between the threat and responses to it, leading to both overreactions and inflated threat descriptions and fear levels, as well as periods with limited attention that might have contributed to unpleasant surprises at a later stage. Against this backdrop, the article criticises the incident-driven approach to counterterrorism and warns against both overreactions as well as ‘jihadism fatigue’. Show less
In recent years, there has been an unprecedented increase in interest in the study of radicalisation. To comprehend this phenomenon, numerous political science and sociological perspectives are... Show moreIn recent years, there has been an unprecedented increase in interest in the study of radicalisation. To comprehend this phenomenon, numerous political science and sociological perspectives are emphasised to determine social movement conceptualisations. Using British Muslim youth as a case study, the goal of this article is to explore the themes of identity, resistance, racialisation, and mobilisation as antecedents to Islamist radicalisation. In other words, the few young Muslims who have turned to radicalism have done so due to fractures in their gendered sense of status and belonging at the local, national, and international levels. In this article, I conduct a theoretical and conceptual review of five distinct stages of Islamist radicalisation in the context of the United Kingdom, all of which are influenced by local, national, and international concerns. This discussion supports the argument that these waves of radicalism result from identity fragmentation in local communities and worsen as a result of international events. In the British context, the dangers of radicalism are determined by the intersections of local, global, and international events, or at the micro, meso, and macro levels, and these indicate the greatest risks linked to this phenomenon. Show less
This study is a critical discourse analysis of the misogynistic narratives shared by three incel violent extremists: Elliot Rodger, Alek Minassian, and Scott Beierle. Utilizing Kate Manne’s give... Show moreThis study is a critical discourse analysis of the misogynistic narratives shared by three incel violent extremists: Elliot Rodger, Alek Minassian, and Scott Beierle. Utilizing Kate Manne’s give/take model, which suggests a wider cultural pattern of misogyny serving to uphold patriarchy, this study finds that incel men expect women to provide feminine-coded services while men are entitled to assume masculine-coded privileges. Feminine-coded services that “she” is expected to provide to “him” are emotional, social, and reproductive. As incels assume masculine-coded privileges related to authority, power, and status, “she will give” and “he will take”; otherwise, “she will be punished.” Show less