Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
-
- Human Rights & Human Welfare (2)
- International Bulletin of Political Psychology (2)
- International Journal of Nuclear Security (2)
- Global Tides (1)
- Indiana Law Journal (1)
-
- Japanese Society and Culture (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Strategic and Global Studies (1)
- Journal of Terrorism Studies (1)
- Jurnal Kajian Stratejik Ketahanan Nasional (1)
- Pepperdine Policy Review (1)
- The International Journal of Ethical Leadership (1)
- The US Army War College Quarterly: Parameters (1)
Articles 1 - 16 of 16
Full-Text Articles in Entire DC Network
Assessing Nuclear Security Risks In Pakistan, Sitara Noor
Assessing Nuclear Security Risks In Pakistan, Sitara Noor
International Journal of Nuclear Security
Pakistan’s nuclear program and perceived nuclear security concerns have attracted global attention. The varying concerns range from the potential theft of nuclear weapons or materials to the unauthorized use of a nuclear device to terrorist groups taking control of the Pakistani government. The enduring debate, however, has oscillated between these doomsday scenarios and some optimistic considerations, where various quarters have shared their satisfaction over Pakistan’s nuclear security regime and its ability to deal with the emerging challenges. To address the evolving nature of these threats, Pakistan is constantly improving its nuclear security infrastructure. It has established a comprehensive legislative and …
Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta
Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta
Journal of Terrorism Studies
A surprising phenomenon was observed in the lone-wolf terror terrorism that occurred in Indonesia. This is associated with the fact that the perpetrators of seven out of thirteen cases reported were exposed to radical information through social media and the internet without directly joining a terrorist group. The process involved the intensive exploration of the internet by people previously interested in radicalism content which eventually led to self-radicalization and the subsequent terror acts. Meanwhile, Fathali M Moghaddam proposed that the process of radicalization before a terror act is conducted involves six stages of action known as the staircase to terrorism. …
Terror Threat At Tokyo Olympics 2021, Daiju Wada
Terror Threat At Tokyo Olympics 2021, Daiju Wada
Japanese Society and Culture
While we witnessed collapse of Islamic State’s territorial control, Jihadists threat will continue for decades. But the real threat will not come from groups such as Al Qaeda and Islamic State but its Salafi Jihadism. Of course, the ideological threat is not visible and can never be eradicated by military actions. Cyberspace has facilitated the threat to be transnational pandemic phenomenon, as proved by inspired individuals. The backgrounds of those vary by person and this ideology performs as a detonator in driving individuals into violent terrorists.
Japan is located at the periphery of Jihadist’s interest. But Islamic State declared their …
Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail
Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail
Journal of Strategic and Global Studies
The legal scope of the Terrorism Law and the Information and Electronic Transactions Law in Indonesia is considered as lacking to cover the problem of cybercrime in social media. Aside from literature review, this paper is also supported by data from direct interview with the Head of Counterterrorism Special Detachment 88 (Densus 88 AT) of Indonesian National Police. The data found out that the Terrorism Law is a repressive response towards terrorism crimes that have already occured, but less preventive to future crimes. The existence of laws in Indonesia is often one step behind its crime. The difference of perception …
The Definition Of Terrorism, Duncan Gaswaga
The Definition Of Terrorism, Duncan Gaswaga
The International Journal of Ethical Leadership
No abstract provided.
Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando
Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando
Jurnal Kajian Stratejik Ketahanan Nasional
Penelitian ini dilatarbelakangi oleh kewaspadaan terhadap perkembangan teknologi dunia maya yang begitu cepat sehingga menyebabkan ketergantungan padanya di hampir semua bidang. Kondisi ini berpotensi menimbulkan ancaman terhadap kemeriahan nasional kita di berbagai bidang, terutama di sektor keamanan nasional. Para peneliti mencoba mengidentifikasi ancaman Positive Clandestin Intelligence (PCI) dalam bentuk terorisme cyber pada keamanan nasional, sehingga dapat membawa para pemangku kepentingan ke tingkat pengetahuan yang lebih baik. Beberapa teori dan konsep yang digunakan peneliti terkait dengan ancaman, keamanan nasional, intelijen klandestin positif, terorisme, dan terorisme cyber (CT). Pendekatan penelitian yang digunakan dalam penelitian ini adalah pendekatan kualitatif dan jenis penelitiannya adalah …
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
International Journal of Nuclear Security
Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.
Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen
Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen
Pepperdine Policy Review
The threats residing in cyber-space are becoming well understood by policymakers and security experts alike. However, cyber-security defenses and strategies cannot solely be directed towards nation states, as non-governmental actors – such as transnational crime groups and terrorist organizations are becoming increasingly reliant upon internet technologies. Attacks on the digital components of the critical infrastructure, have the potential to unleash devastation on the United States. In a time when reliability and ethnicity of the National Security Administration, the Nation’s leading digital intelligence organization, are becoming increasingly questioned; defensive measures need to be improved to prevent future attacks and improve the …
The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor
The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor
International Bulletin of Political Psychology
The author discusses terrorism (and terms associated with it), considering the social rhetoric surrounding the terms as well as other potential meanings. The constraints of the words used to define these terms of terror are considered.
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Journal of Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
Let Privateers Marque Terrorism: A Proposal For A Reawakening, Robert P. Dewitte
Let Privateers Marque Terrorism: A Proposal For A Reawakening, Robert P. Dewitte
Indiana Law Journal
No abstract provided.
Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce
Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce
Human Rights & Human Welfare
“9/11 changed everything.” Not really. In fact, there has been far more continuity than change over the past six years in both international and domestic politics. Nonetheless, human rights often have been harmed—although not by terrorism but by “the war on terror.”
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Global Tides
Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …
Background For The “War On Terror”
Background For The “War On Terror”
Human Rights & Human Welfare
September 11 changed the United States’ understanding of terrorism. Prior to these attacks, Americans typically viewed terrorist events and actors through the lens of foreign affairs, quite removed from “everyday” concerns. Terrorist events involving Americans did occur, occasionally on American soil, but a sense of American invulnerability never truly wavered. September 11 challenged this presumption; as well as perspectives on the history of terrorism, compelling some to reexamine past events in order to find portents of the future tragedy.
Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor
Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor
International Bulletin of Political Psychology
This article considers the social construction of recommendations for personnel security in the context of a global cyberworld.