Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

PDF

Theses/Dissertations

2012

Terrorism

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Law Enforcement Intelligence Recruiting Confidential Informants Within “Religion-Abusing Terrorist Networks”, Hursit Ucak Apr 2012

Law Enforcement Intelligence Recruiting Confidential Informants Within “Religion-Abusing Terrorist Networks”, Hursit Ucak

Theses and Dissertations

This study examines the motivation factors that make some individuals (terrorists) confidential informants. The study is based on the assumptions of Maslow’s hierarchy of needs and Herzberg’s motivation-hygiene theories. Accordingly, main assumption of the present study is that some individuals with unsatisfied needs in religion-abusing terrorist (RAT) networks choose to become confidential informants to satisfy their predominant needs. The main hypothesis for the purpose of this study is “The individuals’ decision-making processes to cooperate with law enforcement intelligence (LEI) as a confidential informant is affected by some motivation factors during recruitment process.” The present study tests 27 hypotheses in order …


The Perceived Effectiveness Of Container Security At Seaports Along The Gulf Coast, William Augustus Neely Jan 2012

The Perceived Effectiveness Of Container Security At Seaports Along The Gulf Coast, William Augustus Neely

Electronic Theses and Dissertations

With approximately 90% of the world's goods shipped via cargo containers, it is vital for the security of these containers to be complete and effective. However, given the volume of containers transiting U.S. seaports, the task of providing complete security is complicated and, arguably, impossible. Nevertheless, the data analyzed throughout this study indicates that the current container security paradigm can be enhanced to accommodate the significant workload. The research conducted throughout this study provided perceptions that were indicative of a security environment that can be and must be improved. More specifically, the data revealed that the biggest threat facing containers …