Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Entire DC Network

9/11 And The Butterfly Effect, Taylor Eubanks May 2012

9/11 And The Butterfly Effect, Taylor Eubanks

Honors Theses

September 11, 2001, is a day that forever changed and impacted this nation. Following the worst terror attacks in our nation's history, the citizens of this nation showed the absolute best parts of humanity and simultaneously the lowest depths of ignorance and hate. Immediately in the days following 9/11, an incredible sense of solidarity and pride for our nation was felt no matter what part of the country you were in. It seemed as though every home had an American flag hanging from their porch in unison. This level of Patriotism can be a truly beautiful thing, however, it can …


An Examination Of Factors Affecting Information Sharing Among Law Enforcement Agencies, Scott Driskill Bransford May 2012

An Examination Of Factors Affecting Information Sharing Among Law Enforcement Agencies, Scott Driskill Bransford

Dissertations

The purpose of the present study was to investigate using survey data to find factors or barriers which contributed to local law enforcement participation and support of intelligence information sharing. Following the September 11, 2001, attacks in New York City and Arlington, Virginia, new homeland security initiatives and directives were created from the legislative and executive branches of the federal government. Several new initiatives and directives provided new communication opportunities for partnerships between all levels of law enforcement to combat the future threat of domestic terrorism.

The evaluation literature indicated that a majority of post-9/11, initiatives, including the creation of …


Law Enforcement Intelligence Recruiting Confidential Informants Within “Religion-Abusing Terrorist Networks”, Hursit Ucak Apr 2012

Law Enforcement Intelligence Recruiting Confidential Informants Within “Religion-Abusing Terrorist Networks”, Hursit Ucak

Theses and Dissertations

This study examines the motivation factors that make some individuals (terrorists) confidential informants. The study is based on the assumptions of Maslow’s hierarchy of needs and Herzberg’s motivation-hygiene theories. Accordingly, main assumption of the present study is that some individuals with unsatisfied needs in religion-abusing terrorist (RAT) networks choose to become confidential informants to satisfy their predominant needs. The main hypothesis for the purpose of this study is “The individuals’ decision-making processes to cooperate with law enforcement intelligence (LEI) as a confidential informant is affected by some motivation factors during recruitment process.” The present study tests 27 hypotheses in order …


Agency, Structures And Peru: Action And In-Action During 1980-2000, Kimberly A. Protzel Feb 2012

Agency, Structures And Peru: Action And In-Action During 1980-2000, Kimberly A. Protzel

Master's Theses

The Shining Path along with Alberto Fujimori's presidency in Peru (encompassing the years 1980-2000) created a terrifying chaos that was wound up in both state and insurgent terrorism, corruption, and massacres. While this chaos is inextricably linked to Peru's history, I fear is being all too quickly forgotten. My main motivation behind this research has been to take a step towards increasing awareness of these events and the many reasons behind them: the agenic nature of some versus the lack of it in others, structures developed by colonialism, and most terrifyingly of all - willful ignorance. By understanding these reasons, …


Al-Shabaab's American Recruits: A Comparative Analysis Of Two Radicalization Pathways, Matthew Wade Richardson Jan 2012

Al-Shabaab's American Recruits: A Comparative Analysis Of Two Radicalization Pathways, Matthew Wade Richardson

Open Access Theses & Dissertations

From 2005 to 2011, at least 41 Americans joined, or attempted to join, al-Shabaab, Somalia's preeminent terrorist organization. This thesis examines the radicalization process for al-Shabaab's American recruits by dividing the sample into two groups: non-Somali and Somali. The author employs causal flow diagramming as a means of visualizing each group's unique radicalization pathway. While most of the non-Somali recruits were motivated by political grievances and Salafism, most of the Somali recruits were motivated by identity conflict and nationalism. Considering al-Shabaab is both a religious and an ethno-nationalist terrorist organization, these results make sense. Radicalization within diaspora communities is a …


Fighting Extremism: Strategies Used To Combat Extremism And Radicalization, Scott Michel Caldwell Jan 2012

Fighting Extremism: Strategies Used To Combat Extremism And Radicalization, Scott Michel Caldwell

Electronic Theses and Dissertations

Ever since the terrorist attacks of September 11, 2001, the United States has been awakened to the threat that extremist organizations pose to our national security. The greatest transnational terrorist threat to the United States right now comes primarily from extremist groups such as Al-Queda, Hamas, and Hezbollah. These extremist groups are fueled by the desire to influence political, religious, and/or ideological causes. The political "end-state" or objective of the extremist is to overthrow "heretic" governments which currently exist and replace them with Islamic governments based on the rule of the Shariah (the first book of the Quran which strongly …


A Wolf In Military Clothing: A Case Study Examination Of Lone Wolf Terrorism And The Roles And Responsibilities Of Government Agencies, Peter Bandel Jan 2012

A Wolf In Military Clothing: A Case Study Examination Of Lone Wolf Terrorism And The Roles And Responsibilities Of Government Agencies, Peter Bandel

Electronic Theses and Dissertations

Since the fall of September, 2011, there has been a major increase in awareness and study of global terrorism. Academia, the media, politicians, and the average citizen all have varying definitions, ideas, and concerns about terrorism. The focus has mainly been on international terrorism. Terrorist organizations like Al Qaeda have permeated the discussion. However, there is a growing concern of the "lone wolf terrorist." A lone wolf terrorist acts without a terrorist organization and is capable of having his/her own radical agenda with the audacity and simplicity to carry it out solely and enact great damage. The focus in the …


Représentations De La Violence Révolutionnaire Dans La Littérature Et Le Cinéma Français (1928-1986), Antoine Krieger Jan 2012

Représentations De La Violence Révolutionnaire Dans La Littérature Et Le Cinéma Français (1928-1986), Antoine Krieger

All Theses and Dissertations (ETDs)

In my dissertation, I study the constants and the variables of the representation of: mostly left-wing) militants in 20th century French literature and film. I demonstrate that they are young idealists seeking personal rejuvenation through political violence. Moreover, I show how those works are a reflection of major trends in French cultural and political history during specific time-periods such as the inter-war period, the occupation of France by Nazi Germany or the Algerian War of Independence. My theoretical approach is a "sociology of literature" influenced by the theories of Lucien Goldmann and Marc Angenot. However, I also occasionally use postcolonial …


The Perceived Effectiveness Of Container Security At Seaports Along The Gulf Coast, William Augustus Neely Jan 2012

The Perceived Effectiveness Of Container Security At Seaports Along The Gulf Coast, William Augustus Neely

Electronic Theses and Dissertations

With approximately 90% of the world's goods shipped via cargo containers, it is vital for the security of these containers to be complete and effective. However, given the volume of containers transiting U.S. seaports, the task of providing complete security is complicated and, arguably, impossible. Nevertheless, the data analyzed throughout this study indicates that the current container security paradigm can be enhanced to accommodate the significant workload. The research conducted throughout this study provided perceptions that were indicative of a security environment that can be and must be improved. More specifically, the data revealed that the biggest threat facing containers …