Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Applying Situational Crime Prevention To Terrorism Against Stadiums, Emanuel Maurice Yeoman Jan 2022

Applying Situational Crime Prevention To Terrorism Against Stadiums, Emanuel Maurice Yeoman

Walden Dissertations and Doctoral Studies

According to recent studies, there has been increasing concern of terrorist threats to U.S. stadiums. The research problem is that existing U.S. stadium policies, procedures, and plans do not adequately address evacuation of special populations in the event of a terrorist threat. There is a particular concern regarding the adequacy of existing stadium evacuation plans for patrons with special needs. In the current study there were three research questions examining the organizational deficiencies and best practices of stadium evacuation plans currently in place to respond to terrorist threats How situational crime prevention (SCP) can help in the identification of deficiencies …


Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler Jan 2022

Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler

Graduate Theses, Dissertations, and Problem Reports

This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists' Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as cybercrime and cyberterrorism. In this article, I provide an analysis of the problems of cybercrime and cyberterrorism within the field of criminology by reviewing existing literature focusing on (a) the issues in defining terrorism, cybercrime, and cyberterrorism, (b) ways that cybercriminals commit a crime in …