Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Fighting Extremism: Strategies Used To Combat Extremism And Radicalization, Scott Michel Caldwell Jan 2012

Fighting Extremism: Strategies Used To Combat Extremism And Radicalization, Scott Michel Caldwell

Electronic Theses and Dissertations

Ever since the terrorist attacks of September 11, 2001, the United States has been awakened to the threat that extremist organizations pose to our national security. The greatest transnational terrorist threat to the United States right now comes primarily from extremist groups such as Al-Queda, Hamas, and Hezbollah. These extremist groups are fueled by the desire to influence political, religious, and/or ideological causes. The political "end-state" or objective of the extremist is to overthrow "heretic" governments which currently exist and replace them with Islamic governments based on the rule of the Shariah (the first book of the Quran which strongly …


A Wolf In Military Clothing: A Case Study Examination Of Lone Wolf Terrorism And The Roles And Responsibilities Of Government Agencies, Peter Bandel Jan 2012

A Wolf In Military Clothing: A Case Study Examination Of Lone Wolf Terrorism And The Roles And Responsibilities Of Government Agencies, Peter Bandel

Electronic Theses and Dissertations

Since the fall of September, 2011, there has been a major increase in awareness and study of global terrorism. Academia, the media, politicians, and the average citizen all have varying definitions, ideas, and concerns about terrorism. The focus has mainly been on international terrorism. Terrorist organizations like Al Qaeda have permeated the discussion. However, there is a growing concern of the "lone wolf terrorist." A lone wolf terrorist acts without a terrorist organization and is capable of having his/her own radical agenda with the audacity and simplicity to carry it out solely and enact great damage. The focus in the …


The Perceived Effectiveness Of Container Security At Seaports Along The Gulf Coast, William Augustus Neely Jan 2012

The Perceived Effectiveness Of Container Security At Seaports Along The Gulf Coast, William Augustus Neely

Electronic Theses and Dissertations

With approximately 90% of the world's goods shipped via cargo containers, it is vital for the security of these containers to be complete and effective. However, given the volume of containers transiting U.S. seaports, the task of providing complete security is complicated and, arguably, impossible. Nevertheless, the data analyzed throughout this study indicates that the current container security paradigm can be enhanced to accommodate the significant workload. The research conducted throughout this study provided perceptions that were indicative of a security environment that can be and must be improved. More specifically, the data revealed that the biggest threat facing containers …