Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

2016

Terrorism

Discipline
Institution
Publication
Publication Type

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag Nov 2016

Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag

Publications

Pennsylvanians mainly see Homeland Security as a comprehensive effort of the federal government to fight terrorism at home and abroad. While it most often has a positive connotation, the multi-faceted mission space of homeland security is widely unknown.


The War On Terror, How The Strategies Used By The United States Against Islamic Extremism Have Been Ineffective, Hein Paing Aug 2016

The War On Terror, How The Strategies Used By The United States Against Islamic Extremism Have Been Ineffective, Hein Paing

Student Works

The purpose of this thesis is to investigate the ineffective strategies used by the United States and coalition forces in the fight against Islamic extremist terrorism. The continuation of terrorist groups acting in the name of Islam begs the question as to just how well have these strategies worked, and what further measures must be taken in order to quell the existence of these organizations? This will be done through the examination of tactics such as the deployment of troops, bombardments from airstrikes, and the restrictive rules of engagements. When explored thoroughly, it will be easier to ascertain exactly why …


The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon May 2016

The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon

Senior Honors Theses

Terrorism and the threat of terrorist attacks have forced the United States to place a high priority on developing a comprehensive counterterrorism strategy. A crucial component of this overarching strategy focuses on targeting the finances of a terrorist organization, hoping to eliminate or stifle their sources of funding in an effort to render the organization incapable of launching successful operations due to an absence of funding. By analyzing the most common financing options that terrorist groups use, the United States can hone its ability to disrupt the funding operations for terrorist groups. Likewise, developing a method for tracking the laundering …


Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali Apr 2016

Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali

Information Technology Master Theses

In a technologically enabled world, local ideologically inspired warfare becomes global all too quickly, specifically terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to broadcast their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity. This study employs data mining tools to mine Twitter for …


Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman Apr 2016

Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman

South Carolina Law Review

No abstract provided.


Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar Apr 2016

Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar

South Carolina Law Review

No abstract provided.


Terrorism Preparedness: A Law Enforcement Perspective, Cayla Comens Mar 2016

Terrorism Preparedness: A Law Enforcement Perspective, Cayla Comens

Theses and Dissertations

Since September 11, 2001, the environments in which law enforcement agencies operate have been changing. Contingency theory hypothesizes that an organization adapts to their environment through organizational structure and contingencies in order to accomplish a state of fit or higher performance. Utilizing the contingency theory framework, the study looked to answer two research questions: (1) Do municipal and county police agencies believe they have the necessary resources and training to prevent and or respond to the next terrorist attack? (2) How does agency size, structure, funding, and perceived risk influence terrorism preparedness? A sample of 902 county and municipal law …


No Good Options Against Isis Barbarism? Human Shields In 21st Century Conflicts, Charles J. Dunlap Jr. Jan 2016

No Good Options Against Isis Barbarism? Human Shields In 21st Century Conflicts, Charles J. Dunlap Jr.

Faculty Scholarship

One of the most vexing conundrums of 21st century warfare has been not just the explosive growth in the use of human shields, but the apparent systemization of the tactic, particularly by nonstate actors. In noting the international prohibition, the International Committee of the Red Cross (ICRC) defines the practice as the “intentional co-location of military objectives and civilians or persons hors de combat with the specific intent of trying to prevent the targeting of those military objectives.”


Disengagement From Ideologically-Based And Violent Organizations: A Systematic Review Of The Literature, Steven Windisch, Peter Simi, Gina Sott Ligon, Hillary Mcneel Jan 2016

Disengagement From Ideologically-Based And Violent Organizations: A Systematic Review Of The Literature, Steven Windisch, Peter Simi, Gina Sott Ligon, Hillary Mcneel

Sociology Faculty Articles and Research

Research on disengagement from violent extremism is an emerging field of inquiry. As compared to the related field of radicalization, there have been fewer studies of disengagement. Further, little effort has been made to conduct a large scale, systematic review of what is currently known about disengagement from violent extremism. This type of meta-literature assessment can play an important role in terms of informing strategies and programs designed to facilitate exit. To help fill this gap, our project systematically examines the disengagement literature to determine the range and frequency of various exit factors identified in previous studies. We also rely …


Differential Reinforcement In The Online Radicalization Of Western Muslim Women Converts, Heather Cone Jan 2016

Differential Reinforcement In The Online Radicalization Of Western Muslim Women Converts, Heather Cone

Walden Dissertations and Doctoral Studies

The emerging phenomenon of Western women Islamic converts learning radicalized ideology through social media constitutes a challenge to cyber policy makers hampered by a lack of gender-nuanced radicalization research. The purpose of this exploratory qualitative case study was to develop a greater understanding of how the differential reinforcement tenet of social learning theory may help to explain the conversion and radicalization of Western women towards a fundamentalist Islamic ideology through their participation in the social media. Key research questions explored how participation in online social media may create vulnerability towards radicalization and exploitation. The blogs of 3 different Western women …


Terrorist Experts’ Perceptions Of How The Internet Has Shaped International Terrorism, Samuel F. Wilson Ii, Teresa M. Lao Ph.D., Ernesto Escobedo Dr. Jan 2016

Terrorist Experts’ Perceptions Of How The Internet Has Shaped International Terrorism, Samuel F. Wilson Ii, Teresa M. Lao Ph.D., Ernesto Escobedo Dr.

Walden Faculty and Staff Publications

The use of the Internet by terrorists has greatly contributed to international terrorism. The Internet is a main strategic communication asset for terrorists who use online message boards and chat rooms to share information, coordinate attacks, spread propaganda, raise money, and recruit. The Internet gives terrorists a medium to legitimize, propagate, and intimidate citizens to their cause. Their strategies are based on careful analysis of human communications; thus, messages are adapted and carefully delivered to appeal to people who may need something to believe in. This study bridged the gap in knowledge by exploring, understanding, and explaining the perceptions of …


'Protection And Empire': The Martens Clause, State Sovereignty, And Individual Rights, Jeffrey D. Kahn Jan 2016

'Protection And Empire': The Martens Clause, State Sovereignty, And Individual Rights, Jeffrey D. Kahn

Faculty Journal Articles and Book Chapters

The Martens Clause was a last-minute compromise that saved the 1899 Hague Convention with Respect to the Laws and Customs of War on Land. In its original formulation, the clause shielded individuals under “the protection and empire” of international law, principles of humanity, and the dictates of the public conscience. F. F. Martens, its author, was Russia’s greatest international law scholar and occasional diplomat. He saw no application for his work in the nineteenth-century internal affairs of his sovereign, notwithstanding the transnational terrorism that plagued (and ultimately destroyed) the Russian Empire. As the relationship between individual rights and state sovereignty …