Credible Threat


Book Description

Ali Reynolds and her team at High Noon Enterprises must race against the clock to save an archbishop who faces mysterious death threats in this “masterly study of the effects of grief, rage, and the power of forgiveness” (Publishers Weekly) by New York Times bestselling author J.A. Jance. Years after her son’s fatal overdose, grieving mother Rachel Higgins learns that his addiction may have grown out of damage suffered at the hands of a pedophile priest while he was in high school. Looking for vengeance, she targets the Catholic Church’s most visible local figure, Archbishop Francis Gillespie. When the archbishop begins receiving anonymous threats, local police dismiss them, saying they’re not credible. So he turns to his friends, Ali Reynolds and her husband, B. Simpson. With B. out of the country on a cybersecurity emergency, it’s up to Ali to track down the source of the threats. When a shooter assassinates the archbishop’s driver and leaves the priest himself severely injured, Ali forms an uneasy alliance with a Phoenix homicide cop in hopes of preventing another attack. But Ali doesn’t realize that the killer has become not only more unhinged but also more determined to take out his or her target. Credible Threat is another “terrific entry in a series distinguished by its consistent quality, [and] sensitive treatment of a difficult subject makes this an extraordinary literary experience” (The Providence Journal).




Credible Threat


Book Description

Greta Thunberg. Alexandria Ocasio-Cortez. Anita Sarkeesian. Emma Gonzalez. When women are vocal about political and social issues, too-often they are flogged with attacks via social networking sites, comment sections, discussion boards, email, and direct message. Rather than targeting their ideas, the abuse targets their identities, pummeling them with rape threats, attacks on their appearance and presumed sexual behavior, and a cacophony of misogynistic, racist, xenophobic, and homophobic stereotypes and epithets. Like street harassment and sexual harassment in the workplace, digital harassment rejects women's implicit claims to be taken seriously as interlocutors, colleagues, and peers. Sarah Sobieraj shows that this online abuse is more than interpersonal bullying--it is a visceral response to the threat of equality in digital conversations and arenas that men would prefer to control. Thus identity-based attacks are particularly severe for those women who are seen as most out of line, such as those from racial, ethnic, and religious minority groups or who work in domains dominated by men, such as gaming, technology, politics, and sports. Feminists and women who don't conform to traditional gender norms are also frequently targeted. Drawing on interviews with over fifty women who have been on the receiving end of identity-based abuse online, Credible Threat explains why all of us should be concerned about the hostile climate women navigate online. This toxicity comes with economic, professional, and psychological costs for those targeted, but it also exacts societal-level costs that are rarely recognized: it erodes our civil liberties, diminishes our public discourse, thins the knowledge available to inform policy and electoral decision-making, and teaches all women that activism and public service are unappealing, high-risk endeavors to be avoided. Sobieraj traces these underexplored effects, showing that when identity-based attacks succeed in constraining women's use of digital publics, there are democratic consequences that cannot be ignored.




Credible Threat


Book Description

They're going to assassinate the president. Can Blake Jordan stop them? After he's fired from the Department of Domestic Counterterrorism, former agent Blake Jordan heads to DC for President-elect Keller's inauguration. But there are men in power who won't let that happen. When Keller asks Blake to create an off-the-books black ops team to stop terrorists, he refuses. But when someone tries to take Blake out of the picture, he learns of a plot to assassinate Keller. If he wants to stop the killers, Blake must form a team to save his friend. But the terrorists have something far more sinister planned... and it can't be stopped because it's already been done. CREDIBLE THREAT is a fast-paced thriller you'll be reading late into the night. Here's what readers are saying... ★★★★★ "It drew me in, I could not put it down." ★★★★★ "Well crafted, full of twists and turns." ★★★★★ "...a real page-turner." ★★★★★ "I thoroughly enjoyed this thriller." ★★★★★ "Read in one sitting, couldn't put it down." ★★★★★ "It held my attention beginning to end." ★★★★★ "...great storytelling." ★★★★★ "Fast-paced, highly recommended!" ★★★★★ "You won't want to put this book down." ★★★★★ "A great book in the Blake Jordan series!" Are you ready for a great story? Start reading now.




Credible Threat


Book Description

"Years after her son's fatal overdose, grieving mother Rachel Higgins learns that his addiction may have grown out of damage suffered at the hands of a pedophile priest while he was in high school. Looking for vengeance, she targets the Catholic Church's most visible local figure, Archbishop Francis Gillespie. When the archbishop begins receiving anonymous threats, local police dismiss them, saying they're not credible. So he turns to his friends, Ali Reynolds and her husband, B. Simpson. With B. out of the country on a cybersecurity emergency, it's up to Ali to track down the source of the threats. When a shooter assassinates the archbishop's driver and leaves the priest himself severely injured, Ali forms an uneasy alliance with a Phoenix homicide cop in hopes of preventing another attack. But Ali doesn't realize that the killer has become not only more unhinged but also more determined to take out his or her target."--Provided by publisher.




Calculating Credibility


Book Description

"Daryl G. Press uses historical evidence to answer two crucial questions: When a country backs down in a crisis, does its credibility suffer? How do leaders assess their adversaries' credibility? Press illuminates the decision-making processes behind events such as the crises in Europe that preceded World War II, the superpower showdowns over Berlin in the 1950s and 60s, and the Cuban Missile Crisis."--Page 4 of cover.




Credible Threats in Negotiations


Book Description

The modern theory of threats in bargaining situations is presented in a unified and systematic treatment that puts the existing literature in a new perspective. Harold Houba and Wilko Bolt provide a masterful synthesis of the fundamental results obtained in the rapidly expanding game-theoretic literature. The relative impacts of the fundamental forces on the bargaining outcome are discussed and related to the visions expressed by Nobel-laureate John Nash. Many topics -such as robustness of the results with respect to the diversity of known bargaining procedures, the role of commitment and policy bargaining situations- receive their most extensive treatment to date. Credible Threats in Negotiations is suitable as a textbook for graduate students in economic theory and other social sciences and a necessity as a resource for scholars interested in bargaining situations.




Credible Threat


Book Description

"This book argues that the rampant hate-filled attacks against women online come are best understood as patterned resistance to women's political voice and visibility that coalesce into an often-unrecognized form of gender inequality that constrains women's use of digital public spaces, much as the pervasive threat of sexual intimidation and violence constrain women's freedom and comfort in physical public spaces. What's more, the abuse exacerbates inequality among women, as women of color, and Muslim, immigrant, and/or LBTQ women of all races, are disproportionately targeted. Drawing on in-depth interviews with women who have been on the receiving end of digital hate, Credible Threat shows that the onslaught of epithets and stereotypes, rape threats, and commentary about their physical appearance and sexual behavior come with great professional, personal, and psychological costs for the women targeted, but also with underexplored societal level costs that demand attention. The women's accounts show that when effective, identity-based attacks undermine their contributions to public discourse, create a climate of self-censorship, and at times, push women out of digital publics altogether. Given the uneven distribution of toxicity, those women whose voices are already most under-represented (e.g., women from historically undervalued groups, those in male-dominated fields) are particularly at risk. In the end, identity-based attacks online erode civil liberties, diminish public discourse, limit the knowledge we have to inform policy and electoral decision-making, and teach all women that activism and public service are unappealing, high-risk endeavors to be avoided"--










Defiant Failed State


Book Description

Since the 1990s, the American government has under prioritized the North Korean threat to global security, according to Bruce Bechtol, an associate professor of political science at Angelo State University. Because North Korea appears economically weak and politically unstable, it is therefore often categorized as a state on the brink of collapse, or a failed state. But Bechtol makes a convincing case that North Korea is more complex and menacing than it how it has often been characterized."Defiant Failed State" shows how the North Korean government has adapted to the post Cold War environment and poses a multifaceted danger to U.S. national security and that of its allies. Bechtol analyzes North Korea s military capabilities, nuclear program, proliferation, and leadership succession to mine the answers to important questions such as, is North Korea a failing or failed state? Is it capable of surviving indefinitely? Why and how does it present such risk to Asia and the United States and its allies?This book sheds new light on the nature of the North Korean threat and the key foreign policy issues that remain unresolved between the United States and South Korea. It is essential reading for scholars, policymakers, military strategists, functional and regional specialists, and anyone who is interested in East Asian affairs."