Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

University of South Florida

Journal of Strategic Security

Iraq

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Promoting Cognitive Complexity Among Yezidi Youth Impacted By Isis In Kurdistan, Iraq, Sara Savage, Jessica Francar, Kristin Perry Jan 2023

Promoting Cognitive Complexity Among Yezidi Youth Impacted By Isis In Kurdistan, Iraq, Sara Savage, Jessica Francar, Kristin Perry

Journal of Strategic Security

This article reports on the results of an intervention to promote the reintegration of Yezidi children and youth in the Kurdistan Region of Iraq, who had been in ISIS captivity or were displaced by ISIS, by increasing their cognitive complexity through experiential learning. The article explores the challenges faced by this demographic, including trauma and exclusion. It looks at the impact of a group-based curriculum designed to increase cognitive complexity (measured by integrative complexity), and discusses how the intervention addressed socio-cognitive needs in order to support reintegration. The intervention was piloted with young people associated with ISIS and those displaced …


Networks Of Threats: Interconnection, Interaction, Intermediation, Julien Theron Oct 2021

Networks Of Threats: Interconnection, Interaction, Intermediation, Julien Theron

Journal of Strategic Security

The rapidly changing global security environment requires to constantly adapt our understanding of threats. The findings of this paper confirm that threats interact with each other on three levels. Security, conflict, war, and strategic studies converge to build a new qualitative theoretical framework for threat analysis. Shaping the global security environment, threats communicate on three levels. Firstly, the interconnection of agents with similar ideological and/or strategic motivations connects threats. Secondly, interaction exacerbates incidental threats through cooperation, competition, and convergence. Thirdly, intermediation occurs between antagonistic threats trying to achieve common intermediary objectives. These networks are driven by agents maximizing their impact …