Imaging of abdominal and pelvic injuries from the Boston Marathon bombing

2015 ◽  
Vol 23 (1) ◽  
pp. 35-39 ◽  
Author(s):  
Ajay K. Singh ◽  
Aaron Sodickson ◽  
Hani Abujudeh
2015 ◽  
Vol 29 ◽  
pp. S7-S10 ◽  
Author(s):  
Daniel Tobert ◽  
Arvind von Keudell ◽  
Edward K. Rodriguez

2021 ◽  
Vol 4 (1) ◽  
pp. 43-56
Author(s):  
Angela Senter ◽  
Mark Beattie ◽  
Demi Deng

Large event security has become increasingly complex over the past 20 years. Security incidents have included headline tragedies such as the Las Vegas shooting in 2017 and the Boston Marathon bombing in 2013. Spokane, Washington, has been no exception to the need to enhance guest security for large-scale events, as evidenced by the Hoopfest gang-related shooting in 2010 and the Martin Luther King Jr. Day bombing attempt in 2011. Balancing the interests of stakeholders has become challenging for event management professionals in both planning and operations phases. Security strategies and trainings designed for security and guest service staff are critical for the success of new protocols. Transparent communication to the public is crucial for the event's success and the guarantee of guest satisfaction. This case study aims to document the leadership decisions made to enhance security for large-scale events held in Downtown Spokane and the Spokane Arena. Focusing on several tipping points, the leadership decisions and implementation are chronicled as a case study, along with the decisions and protocols that continue to influence large event security in the Spokane area. This study will benefit other event planners and venues as they face security system upgrades, protocols, and implementation.


Author(s):  
Andrea H. Tapia ◽  
Nicolas J. LaLone

In this paper the authors illustrate the ethical dilemmas that arise when large public investigations in a crisis are crowdsourced. The authors focus the variations in public opinion concerning the actions of two online groups during the immediate aftermath of the Boston Marathon Bombing. These groups collected and organized relief for victims, collected photos and videos taken of the bombing scene and created online mechanisms for the sharing and analysis of images collected online. They also used their large numbers and the affordances of the Internet to produce an answer to the question, “who was the perpetrator, and what kind of bomb was used?” The authors view their actions through public opinion, through sampling Twitter and applying a sentiment analysis to this data. They use this tool to pinpoint moments during the crisis investigation when the public became either more positively or negatively inclined toward the actions of the online publics. The authors use this as a surrogate, or proxy, for social approval or disapproval of their actions, which exposes large swings in public emotion as ethical lines are crossed by online publics.


2017 ◽  
Vol 45 (2) ◽  
pp. 111-123 ◽  
Author(s):  
April Naturale ◽  
Liam T. Lowney ◽  
Corina Solè Brito

Transfusion ◽  
2014 ◽  
Vol 54 (4) ◽  
pp. 1202-1203 ◽  
Author(s):  
Karen Quillen ◽  
C. John Luckey

Sign in / Sign up

Export Citation Format

Share Document