Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Terrorism

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 46

Full-Text Articles in Entire DC Network

Incels, Violence, And Masculinity: How Masculinity And Membership To Online Communities Shape Perceptions Of Violence, Meghan Scarlott Jun 2023

Incels, Violence, And Masculinity: How Masculinity And Membership To Online Communities Shape Perceptions Of Violence, Meghan Scarlott

Student Theses

As online involuntary celibate (incel) forms have grown, they have become dominated by violent and misogynistic rhetoric. There have also been instances of offline violence being motivated by incel ideology and anti-feminist beliefs. Past research has established a link between inceldom and violent rhetoric through analysis of incel forum posts and activity. However, comparisons between non-incels and incels regarding masculinity and violence have rarely been conducted. We used a survey design to compare incels and non-incels on three factors: support for violence, inceldom characteristics, and internalized masculinity. Consistent with prior research, incels held more negative views of women and feminism …


The Warriors' Views: Mid-Level Officers On American Interventions, Foreign Policy, And The Road To 9/11, 1993-2001, Michael Anthony Anderson May 2023

The Warriors' Views: Mid-Level Officers On American Interventions, Foreign Policy, And The Road To 9/11, 1993-2001, Michael Anthony Anderson

Doctoral Dissertations

When President William Jefferson Clinton took office, the United States had entered into a new era, though it was heavily influenced by almost a half-century of Cold War. Foreign policy staples had been embedded into United States foreign policy habits, influencing American decisions even as it tried to transition to a new global environment. The Cold War had left America, but America had a hard time leaving the Cold War. The nation had difficulty transitioning away from applying containment, relying on mutually assured destruction in preventing weapons of mass destruction attacks, and focusing on major conventional warfare when small-scale contingencies …


A Hollow Victory And Unending Problem: The Undying Anti-Russian Insurgency In Ukraine, Abraham Ashley Jan 2023

A Hollow Victory And Unending Problem: The Undying Anti-Russian Insurgency In Ukraine, Abraham Ashley

MSU Graduate Theses

This thesis uses quantitative and qualitative research methods to: (1) explore the base causes of insurgency in Ukraine, (2) examine the historical basis for Ukrainian insurgency, (3) provide historical examples of successful and unsuccessful insurgencies to contrast against Ukraine, and (4) provide recommendations for NATO and Ukrainian policy. Collectively, this project demonstrates that current Russian counterinsurgency tactics will not be successful without significant adjustment. This Ukrainian insurgency may also derail the possibility of peace in the region.


Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk May 2022

Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk

Graduate Theses and Dissertations

Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …


Criminal Liabilities Of Boko Haram In Nigeria, Dilibe Eche Jan 2022

Criminal Liabilities Of Boko Haram In Nigeria, Dilibe Eche

Theses and Dissertations

One major problem that has posed a great threat to the Nigerian Nation is Boko Haram or rather the Boko Haram militant group.

What this paper intends to do is to analyze the criminal liabilities of the Boko Haram militant group in Nigeria in both domestic and international law.

I see this paper primarily as timely because a lot has been said about Boko Haram, in Nigeria, but yet there is much we still do not know about Boko Haram, its criminal liabilities, origin structure, size and method of operation still remains a mirage and a mystery. This dissertation will …


Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler Jan 2022

Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler

Graduate Theses, Dissertations, and Problem Reports

This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists' Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as cybercrime and cyberterrorism. In this article, I provide an analysis of the problems of cybercrime and cyberterrorism within the field of criminology by reviewing existing literature focusing on (a) the issues in defining terrorism, cybercrime, and cyberterrorism, (b) ways that cybercriminals commit a crime in …


Terrorism And Counter-Terrorism: A Game Theoretic Approach., Aditya Bhan Dr. Jul 2021

Terrorism And Counter-Terrorism: A Game Theoretic Approach., Aditya Bhan Dr.

Doctoral Theses

Microeconomic concepts are often applied to analyze the phenomenon of terrorism, and gametheoretic frameworks are commonly applied throughout the existing literature. This is unsurprising, since real-world scenarios involving strategic interactions are best formulated using game theory because such formulations not only provide deep insights into the web of incentives and disincentives within which each player operates and consequent predictive paradigms, but also enable the creation of policy architectures based on anticipation of players‟ actions and/or alteration of players‟ incentives/disincentives to encourage/discourage certain behavioural outcomes. This thesis also applies game-theoretic frameworks to analyze some issues within the domain of terrorism and …


An Examination Of Government Involvement In Property & Casualty Insurance, Samuel Spencer Apr 2021

An Examination Of Government Involvement In Property & Casualty Insurance, Samuel Spencer

Senior Theses and Projects

For decades, both state and federal governments have taken a larger role in the property and casualty market. The National Flood Insurance Plan directly writes policies. In contrast, the California Fair Access to Insurance Requirement establishes a last-resort insurance pool for those unable to find certain types of coverage through conventional means. Finally, the Terrorism Risk Insurance Act establishes a federal reinsurance backstop in the event of a severe terror loss. While each program seeks to expand property and casualty coverage, some have been more successful than others. This thesis examines the efficacy of each program and provides reform suggestions.


Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo May 2020

Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo

Political Science & International Studies | Senior Theses

Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …


Women As Nontraditional Terrorists, Giorgi Beruashvili Jan 2020

Women As Nontraditional Terrorists, Giorgi Beruashvili

Honors Undergraduate Theses

Terrorist organizations have always been predominantly dominated by male members in numbers of participants, supporters, and leaders. Despite men having the majority of the roles, oftentimes the world witnesses attack executed by female terrorists which deal a substantial amount of damage to the infrastructure and the peaceful civilians surrounding them. Furthermore, the sense of unpredictability and unpreparedness from the counterterrorist forces and the general public adds up to the overall advantage women possess in the field of terrorism over men. Considering these observations, one can argue that women have grown to be far more dangerous and successful in the field …


Exploring Contemporary Counterterrorism And Perspectives Of Terrorism Experts To Combat Boko Haram, Enyinaya Njoku Jan 2020

Exploring Contemporary Counterterrorism And Perspectives Of Terrorism Experts To Combat Boko Haram, Enyinaya Njoku

Walden Dissertations and Doctoral Studies

Within the last decade, the terrorist attacks by Boko Haram have been the topic of considerable scholarly focus; yet, there remains a lack of knowledge and understanding about the causes of failure in counterterrorism measures by the Nigerian government in Borno State. Using Wilner’s contemporary deterrence theory as the foundation, the purpose of this case study of the Nigeria Police Force (NPF) was to bridge the gap in knowledge to understand the causes of failure in counterterrorism measures by the Nigerian government and to explore alternate approaches to the counterterrorism efforts in Borno State to deter Boko Haram. Data were …


Counterterrorism Investigator Perceptions: Homegrown Violent Extremists With Mental Illness, Jeffery Brandon Perez Jan 2020

Counterterrorism Investigator Perceptions: Homegrown Violent Extremists With Mental Illness, Jeffery Brandon Perez

Walden Dissertations and Doctoral Studies

Terrorism endures throughout the world. Some individuals who engage in it may suffer from a cognitive disorder. For those who investigate terrorism, preconceptions exist both toward extremists and toward people with mental illness (MI). A review of the literature has shown how counterterrorism (CT) investigators perceive terrorists’ motivations, and how law enforcement perceives people with MI. In filling a gap between the two, this study aimed to research whether based on their lived experiences, do the understandings, perceptions, and attitudes of CT agents inform their biases and influence their decision-making and ultimately investigations of homegrown violent extremists (HVEs) with MI. …


Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin May 2019

Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin

MSU Graduate Theses

This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.


Utilizing Strategic Culture As A Tool To Tailor U.S. Deterrence Policy Towards Iran, Ryan P. Taylor May 2019

Utilizing Strategic Culture As A Tool To Tailor U.S. Deterrence Policy Towards Iran, Ryan P. Taylor

MSU Graduate Theses

The geostrategic environment since the end of the Cold War has drastically changed the way United States (U.S.) policymakers develop strategies to combat a wide range of hostile threats facing the country, especially in the field of the deterrence of weapons of mass destruction (WMDs). Iran is such an actor, who poses one of the greater proliferation threats in the world and continues to commit hostile actions in the Middle East. In this post-Cold War environment, it is imperative that the United States develop a tailored deterrence strategy to meet this challenge. Past deterrence strategies popular during the bipolar era …


Evaluating The Effectiveness Of Counter-Narrative Tactics In Preventing Radicalization, Ellen Berman Jan 2019

Evaluating The Effectiveness Of Counter-Narrative Tactics In Preventing Radicalization, Ellen Berman

Walden Dissertations and Doctoral Studies

The U.S. Department of State disseminates counter-radicalization information through social media but has been unable to reach users due to an inability to create engaging posts due to a lack of understanding of the interests of the general population. The purpose of this quantitative study was to assess the utility of data analytics when administering counter-radicalization social media campaigns. The population for this study were social media posts published on the Quilliam Facebook page between 1 January 2018 and 31 December 2018. The nonexperimental quantitative descriptive research design sought to examine the correlation between the independent variables (topic of a …


Conceptions About Terrorism: How Fearful Are We And How Does That Affect Us?, Rebecca Jackson Jan 2019

Conceptions About Terrorism: How Fearful Are We And How Does That Affect Us?, Rebecca Jackson

Honors Undergraduate Theses

Since the crusades, terrorism has been a form of violence used to promote some kind of agenda, whether political, social, religious or ideological (Martin 2018). With many different definitions of what constitutes terrorism, it is somewhat difficult to measure what exact impact terrorism has had globally. Attacks such as those on 9/11 in the United States and the Manchester bombings have been accepted worldwide as examples of acts of international terrorism. International terrorist attacks have lasting effects on both those directly affected as well as the larger community and beyond. Studies have shown that Americans are overly afraid of terrorism …


Islamic Terrorism In The United States – The Association Of Religious Fundamentalism With Social Isolation & Paths Leading To Extreme Violence Through Processes Of Radicalization., Shay Shiran Jun 2018

Islamic Terrorism In The United States – The Association Of Religious Fundamentalism With Social Isolation & Paths Leading To Extreme Violence Through Processes Of Radicalization., Shay Shiran

Student Theses

This exploratory study focuses on identifying motivations for religious terrorism and Islamic terrorism in the United States in particular. Terrorism is a crime of extreme violence with the end purpose of political influence. This crime is challenging to encounter for its multi-faced characteristics, the unusual motivations of its actors, and their semi-militant conduct. The hypothesis of this study asserts that religious terrorists are radicalized by passing from fundamental to extreme devout agendas, caused by isolation from the dominant society, and resulted in high potential to impose those agendas by extreme violence. Under the theoretical framework of subculture in criminology, this …


The Interplay Of Intelligence, Education, And The Media In Western Counterterrorism Strategies, Lincoln Gimnich May 2018

The Interplay Of Intelligence, Education, And The Media In Western Counterterrorism Strategies, Lincoln Gimnich

International and Global Studies Undergraduate Honors Theses

Terrorist activity has increased and evolved in Western societies in the twenty-first century as terrorist organizations have sought new methods to further their ideologies and goals. Counterterrorism thus requires a similar evolution that undoubtedly reverses the historic trend wherein counterterrorism has been merely reactive. Through interviews with experts, qualitative analysis of governmental publications and documents, and review of existing literature, this project explores the institutions of intelligence, education, and the media and their work within the larger counterterrorism and anti-radicalization framework of Western states. The project focuses specifically on domestic intelligence operations, intelligence sharing agreements, the United Kingdom’s Prevent strategy, …


The Terror Experts: Discourse, Discipline, And The Production Of Terrorist Subjects At A University Research Center, Liam Christopher Mclean Jan 2018

The Terror Experts: Discourse, Discipline, And The Production Of Terrorist Subjects At A University Research Center, Liam Christopher Mclean

Honors Papers

This thesis examines the production and circulation of discourses related to (counter)terrorism at a university-affiliated terrorism and security studies research center in eastern Massachusetts. Drawing on participant observation, documentary analysis, and interviews with faculty and students at the research center, I suggest that expert discourses of (counter)terrorism at the center traffic in an archetypal construction of the terrorist that I call the “depoliticized radical.” This construction locates the root of terrorism in individual morality and psychology, tending to abstract the terrorist from the political conditions in which they enact violence. I further propose that the depoliticized radical functions as a …


Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman Jan 2018

Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman

Walden Dissertations and Doctoral Studies

From 2000 to 2013, Israel had the second highest number of deaths from suicide attacks and was on the list of countries that may experience increases in terrorism due to ongoing conflicts. Suicide bombings present highly complex situations for counterterrorism and counterinsurgency professionals. Using Freeman, Tucker, and Merton's framework of 9 preattack phases as the primary theoretical constuct, the purpose of this multiple case study was to explore specific patterns that consistently emerged in the adversary planning process for 6 successful or failed suicide bombing cases in Israel. Secondary, archival data were acquired through a data use agreement with a …


Midnight In America: Nuclear Electromagnetic Pulse And The 21st Century Threat To The United States, Angela Weaver Aug 2017

Midnight In America: Nuclear Electromagnetic Pulse And The 21st Century Threat To The United States, Angela Weaver

MSU Graduate Theses

The electromagnetic pulse (EMP) effects produced by the detonation of a nuclear weapon at high altitude are capable of causing widespread destruction in the U.S. homeland with few to no immediate casualties. The threat of nuclear EMP attack against the United States was recognized as probable during the Cold War but as time passed, the threat lost consciousness among U.S. policy makers as other issues and threats rose to the forefront. Simultaneously, the United States military and civilian society grew increasingly reliant upon emerging electronic systems and capabilities while adversary nations and rogue states rapidly pursued nuclear weapons capabilities. Today, …


Privacy Vs. Security: Fear Appeals, Terrorism And The Willingness To Allow Increased Government Surveillance, Angela Marie Rulffes Jun 2017

Privacy Vs. Security: Fear Appeals, Terrorism And The Willingness To Allow Increased Government Surveillance, Angela Marie Rulffes

Dissertations - ALL

This study investigates the relationship between fear and privacy by using the Extended Parallel Process Model (EPPM) to examine whether there is an association between fear appeals and the willingness to allow increased governmental surveillance of online and phone communications. Research suggests that, in the United States, privacy is important. Moreover, courts have inferred privacy rights in the U.S. Constitution, including protection from intrusions by the government. However, the threat of terrorism is also very real. There are indications that some people may be willing to allow intrusion by the government if it means keeping them safe. This study uses …


A Radical Idea: Applying Psychological Strategy To Combat Foreign Fighters Defending The Islamic State, David Michael Smaney May 2017

A Radical Idea: Applying Psychological Strategy To Combat Foreign Fighters Defending The Islamic State, David Michael Smaney

MSU Graduate Theses

This thesis focuses on the necessity of psychological strategies to combat the Islamic State’s recruitment of foreign fighters. This thesis argues that psychological strategies are a primary weapon due to the psychological nature of the war against the Islamic State, which is a part of the overall war of ideas. This thesis does not consider psychological strategies for other aspects of U.S. counterterrorism strategy, nor does it reflect the difficulties involved with developing U.S. strategies in the U.S. federal government. Furthermore, this thesis only focuses on foreign fighter defending and supporting the Islamic State, which is the successor of Al …


Media Coverage Of Domestic Extremists And The Influence On Police Emotions, Jamie Porter Jan 2017

Media Coverage Of Domestic Extremists And The Influence On Police Emotions, Jamie Porter

Walden Dissertations and Doctoral Studies

The media have influenced domestic extremists who are targeting the police, and this is related to negative emotions among the police. These extremists are targeting police officers based on how events are framed by the media. In this way, the media have influenced domestic extremists' target selection and caused negative emotions among police officers because they are now the targets. The purpose of this qualitative narrative study was to understand the perceptions of police officers about how the media have influenced domestic extremists to target them. The narrative of this qualitative inquiry was guided by a semistructured interview sample consisting …


The Making Of A Virtual Monster: Ideological Criticism On The Isis Hate And Extremism, Md Shah Jahan Jan 2017

The Making Of A Virtual Monster: Ideological Criticism On The Isis Hate And Extremism, Md Shah Jahan

All Graduate Theses, Dissertations, and Other Capstone Projects

The 9/11 incident and its subsequent terrorism specifically the rise of radical Islamist groups like ISIS (Islamic State of Iraq and Syria), and al-Qaeda astounds the world. ISIS’s propaganda technique using digital media helps the terrorist group motivate and recruit a large group of people from around the world. Terrorist incidents like the Dhaka café in 2016 and France soccer game attack in 2015 provide a glimpse of ISIS ferocity and barbarism with its subsequent series of attacks. This research examines the kind of rhetorical language that ISIS leaders and followers use to support their ideologies. And, how the internet …


Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali Apr 2016

Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali

Information Technology Master Theses

In a technologically enabled world, local ideologically inspired warfare becomes global all too quickly, specifically terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to broadcast their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity. This study employs data mining tools to mine Twitter for …


Terrorism Preparedness: A Law Enforcement Perspective, Cayla Comens Mar 2016

Terrorism Preparedness: A Law Enforcement Perspective, Cayla Comens

Theses and Dissertations

Since September 11, 2001, the environments in which law enforcement agencies operate have been changing. Contingency theory hypothesizes that an organization adapts to their environment through organizational structure and contingencies in order to accomplish a state of fit or higher performance. Utilizing the contingency theory framework, the study looked to answer two research questions: (1) Do municipal and county police agencies believe they have the necessary resources and training to prevent and or respond to the next terrorist attack? (2) How does agency size, structure, funding, and perceived risk influence terrorism preparedness? A sample of 902 county and municipal law …


Differential Reinforcement In The Online Radicalization Of Western Muslim Women Converts, Heather Cone Jan 2016

Differential Reinforcement In The Online Radicalization Of Western Muslim Women Converts, Heather Cone

Walden Dissertations and Doctoral Studies

The emerging phenomenon of Western women Islamic converts learning radicalized ideology through social media constitutes a challenge to cyber policy makers hampered by a lack of gender-nuanced radicalization research. The purpose of this exploratory qualitative case study was to develop a greater understanding of how the differential reinforcement tenet of social learning theory may help to explain the conversion and radicalization of Western women towards a fundamentalist Islamic ideology through their participation in the social media. Key research questions explored how participation in online social media may create vulnerability towards radicalization and exploitation. The blogs of 3 different Western women …


The Relationship Between Terrorism, Oil Prices, And Airline Profitability, Ubirathan Miranda Jan 2015

The Relationship Between Terrorism, Oil Prices, And Airline Profitability, Ubirathan Miranda

Walden Dissertations and Doctoral Studies

Given the financial challenges faced by the airline industry, understanding of the combined effect of terrorism and the price of petroleum on airline profitability is imperative. The purpose of this correlational study was to determine if a combination of terrorism and the price of petroleum significantly predicted airline profitability, and which variable was the most significant. This study collected samples of financial records from major American commercial passenger and cargo airlines on costs of fuel (n = 84) and airline profitability (n = 84). The terrorism data (n = 84) were comprised of terrorist attacks on petroleum infrastructure in oil-producing …


The Day Of The Cyber Wolf, Ryan K. Buch Dec 2014

The Day Of The Cyber Wolf, Ryan K. Buch

Regis University Student Publications (comprehensive collection)

Terrorism has become a concern for public safety and security and can take on many appearances. However, in recent years the dilemma that presents the most substantial endangerment to public security comes from the threat of leaderless terrorists, also known as "lone wolves." Due to the rapid advancement in technology over the past few decades, societies, specifically the United States, have become dependent upon it economically and socially. Terrorist organizations, as well as the lone wolf terrorist, understand that their enemies rely on technology in order to function and have recently redirected their efforts towards cyberspace. As a result, cyber-terrorism …