Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (4)
- Missouri State University (4)
- US Army War College (3)
- Universitas Indonesia (3)
- Walden University (3)
-
- Pepperdine University (2)
- University of Central Florida (2)
- University of Denver (2)
- Dominican University of California (1)
- Elizabethtown College (1)
- Florida International University (1)
- Minnesota State University, Mankato (1)
- Old Dominion University (1)
- San Jose State University (1)
- SelectedWorks (1)
- Technological University Dublin (1)
- University of Arkansas, Fayetteville (1)
- University of Tennessee, Knoxville (1)
- Publication Year
- Publication
-
- MSU Graduate Theses (4)
- Walden Dissertations and Doctoral Studies (3)
- Honors Undergraduate Theses (2)
- Human Rights & Human Welfare (2)
- International Bulletin of Political Psychology (2)
-
- Monographs, Collaborative Studies, & IRPs (2)
- Publications (2)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- Books/Book Chapters (1)
- FIU Electronic Theses and Dissertations (1)
- Gabriel C. Lajeunesse (1)
- Global Tides (1)
- Graduate Program in International Studies Theses & Dissertations (1)
- Graduate Theses and Dissertations (1)
- International Journal of Nuclear Security (1)
- Journal of Strategic and Global Studies (1)
- Journal of Terrorism Studies (1)
- Jurnal Kajian Stratejik Ketahanan Nasional (1)
- Mineta Transportation Institute Publications (1)
- Pepperdine Policy Review (1)
- Political Science & International Studies | Senior Theses (1)
- Politics, Philosophy, and Legal Studies: Student Scholarship & Creative Works (1)
- The US Army War College Quarterly: Parameters (1)
- Publication Type
Articles 1 - 30 of 33
Full-Text Articles in Entire DC Network
2023 Annual Estimate Of The Strategic Security Environment, Usawc Ssi
2023 Annual Estimate Of The Strategic Security Environment, Usawc Ssi
Monographs, Collaborative Studies, & IRPs
The Annual Estimate of the Strategic Security Environment serves as a guide for academics and practitioners in the defense community on the current challenges and opportunities in the strategic environment. This year’s publication outlines key strategic issues across the four broad themes of Regional Challenges and Opportunities, Domestic Challenges, Institutional Challenges, and Domains Impacting US Strategic Advantage. These themes represent a wide range of topics affecting national security and provide a global assessment of the strategic environment to help focus the defense community on research and publication. Strategic competition with the People’s Republic of China and the implications of …
A Hollow Victory And Unending Problem: The Undying Anti-Russian Insurgency In Ukraine, Abraham Ashley
A Hollow Victory And Unending Problem: The Undying Anti-Russian Insurgency In Ukraine, Abraham Ashley
MSU Graduate Theses
This thesis uses quantitative and qualitative research methods to: (1) explore the base causes of insurgency in Ukraine, (2) examine the historical basis for Ukrainian insurgency, (3) provide historical examples of successful and unsuccessful insurgencies to contrast against Ukraine, and (4) provide recommendations for NATO and Ukrainian policy. Collectively, this project demonstrates that current Russian counterinsurgency tactics will not be successful without significant adjustment. This Ukrainian insurgency may also derail the possibility of peace in the region.
Countering Terrorism On Tomorrow’S Battlefield: Critical Infrastructure Security And Resiliency (Nato Coe-Dat Handbook 2), Sarah J. Lohmann, Lucas M. Cox, Denise Feldner, Trevor P. Helmy, Frank J. Kuzminski, Marcus Mohlin, Aleksander Olech, Wuraola Oyewusi, Gabriel T. Raicu, Silke Ruhl, Sabrina Schulz, Máté Tóth, Megan A. Ward
Countering Terrorism On Tomorrow’S Battlefield: Critical Infrastructure Security And Resiliency (Nato Coe-Dat Handbook 2), Sarah J. Lohmann, Lucas M. Cox, Denise Feldner, Trevor P. Helmy, Frank J. Kuzminski, Marcus Mohlin, Aleksander Olech, Wuraola Oyewusi, Gabriel T. Raicu, Silke Ruhl, Sabrina Schulz, Máté Tóth, Megan A. Ward
Monographs, Collaborative Studies, & IRPs
Every day, malicious actors target emerging technologies and medical resilience or seek to wreak havoc in the wake of disasters brought on by climate change, energy insecurity, and supply-chain disruptions. Countering Terrorism on Tomorrow’s Battlefield is a handbook on how to strengthen critical infrastructure resilience in an era of emerging threats. The counterterrorism research produced for this volume is in alignment with NATO’s Warfighting Capstone Concept, which details how NATO Allies can transform and maintain their advantage despite new threats for the next two decades. The topics are rooted in NATO’s Seven Baseline requirements, which set the standard for enhancing …
Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta
Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta
Journal of Terrorism Studies
A surprising phenomenon was observed in the lone-wolf terror terrorism that occurred in Indonesia. This is associated with the fact that the perpetrators of seven out of thirteen cases reported were exposed to radical information through social media and the internet without directly joining a terrorist group. The process involved the intensive exploration of the internet by people previously interested in radicalism content which eventually led to self-radicalization and the subsequent terror acts. Meanwhile, Fathali M Moghaddam proposed that the process of radicalization before a terror act is conducted involves six stages of action known as the staircase to terrorism. …
Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk
Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk
Graduate Theses and Dissertations
Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …
The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi
The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi
FIU Electronic Theses and Dissertations
Rudyard Kipling once described and wrote about the Great Game as a way to outline 19th century great power politics in the struggle for empire in Central Asia. While Kipling’s tale of spy-craft and espionage is fiction, the political philosophy behind the story has never lost relevance. The struggle for political dominance in Central Asia continued through the twentieth century in the Cold War as well as into twenty-first century after the terrorist attacks on September 11, 2001. Although the great power players may have changed over the past 120 years, the importance of Central Asia has not.
This …
Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail
Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail
Journal of Strategic and Global Studies
The legal scope of the Terrorism Law and the Information and Electronic Transactions Law in Indonesia is considered as lacking to cover the problem of cybercrime in social media. Aside from literature review, this paper is also supported by data from direct interview with the Head of Counterterrorism Special Detachment 88 (Densus 88 AT) of Indonesian National Police. The data found out that the Terrorism Law is a repressive response towards terrorism crimes that have already occured, but less preventive to future crimes. The existence of laws in Indonesia is often one step behind its crime. The difference of perception …
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Political Science & International Studies | Senior Theses
Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …
Women As Nontraditional Terrorists, Giorgi Beruashvili
Women As Nontraditional Terrorists, Giorgi Beruashvili
Honors Undergraduate Theses
Terrorist organizations have always been predominantly dominated by male members in numbers of participants, supporters, and leaders. Despite men having the majority of the roles, oftentimes the world witnesses attack executed by female terrorists which deal a substantial amount of damage to the infrastructure and the peaceful civilians surrounding them. Furthermore, the sense of unpredictability and unpreparedness from the counterterrorist forces and the general public adds up to the overall advantage women possess in the field of terrorism over men. Considering these observations, one can argue that women have grown to be far more dangerous and successful in the field …
Exploring Contemporary Counterterrorism And Perspectives Of Terrorism Experts To Combat Boko Haram, Enyinaya Njoku
Exploring Contemporary Counterterrorism And Perspectives Of Terrorism Experts To Combat Boko Haram, Enyinaya Njoku
Walden Dissertations and Doctoral Studies
Within the last decade, the terrorist attacks by Boko Haram have been the topic of considerable scholarly focus; yet, there remains a lack of knowledge and understanding about the causes of failure in counterterrorism measures by the Nigerian government in Borno State. Using Wilner’s contemporary deterrence theory as the foundation, the purpose of this case study of the Nigeria Police Force (NPF) was to bridge the gap in knowledge to understand the causes of failure in counterterrorism measures by the Nigerian government and to explore alternate approaches to the counterterrorism efforts in Borno State to deter Boko Haram. Data were …
Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards
Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards
Mineta Transportation Institute Publications
Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.
This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and …
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Publications
This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
MSU Graduate Theses
This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.
Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando
Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando
Jurnal Kajian Stratejik Ketahanan Nasional
Penelitian ini dilatarbelakangi oleh kewaspadaan terhadap perkembangan teknologi dunia maya yang begitu cepat sehingga menyebabkan ketergantungan padanya di hampir semua bidang. Kondisi ini berpotensi menimbulkan ancaman terhadap kemeriahan nasional kita di berbagai bidang, terutama di sektor keamanan nasional. Para peneliti mencoba mengidentifikasi ancaman Positive Clandestin Intelligence (PCI) dalam bentuk terorisme cyber pada keamanan nasional, sehingga dapat membawa para pemangku kepentingan ke tingkat pengetahuan yang lebih baik. Beberapa teori dan konsep yang digunakan peneliti terkait dengan ancaman, keamanan nasional, intelijen klandestin positif, terorisme, dan terorisme cyber (CT). Pendekatan penelitian yang digunakan dalam penelitian ini adalah pendekatan kualitatif dan jenis penelitiannya adalah …
Conceptions About Terrorism: How Fearful Are We And How Does That Affect Us?, Rebecca Jackson
Conceptions About Terrorism: How Fearful Are We And How Does That Affect Us?, Rebecca Jackson
Honors Undergraduate Theses
Since the crusades, terrorism has been a form of violence used to promote some kind of agenda, whether political, social, religious or ideological (Martin 2018). With many different definitions of what constitutes terrorism, it is somewhat difficult to measure what exact impact terrorism has had globally. Attacks such as those on 9/11 in the United States and the Manchester bombings have been accepted worldwide as examples of acts of international terrorism. International terrorist attacks have lasting effects on both those directly affected as well as the larger community and beyond. Studies have shown that Americans are overly afraid of terrorism …
Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace
Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace
Politics, Philosophy, and Legal Studies: Student Scholarship & Creative Works
This paper examines the importance of the Iraqi city of Mosul to ISIL. Special attention is given to the conquering of Mosul, ISIL's governance, and the Battle of Mosul.
Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman
Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman
Walden Dissertations and Doctoral Studies
From 2000 to 2013, Israel had the second highest number of deaths from suicide attacks and was on the list of countries that may experience increases in terrorism due to ongoing conflicts. Suicide bombings present highly complex situations for counterterrorism and counterinsurgency professionals. Using Freeman, Tucker, and Merton's framework of 9 preattack phases as the primary theoretical constuct, the purpose of this multiple case study was to explore specific patterns that consistently emerged in the adversary planning process for 6 successful or failed suicide bombing cases in Israel. Secondary, archival data were acquired through a data use agreement with a …
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
International Journal of Nuclear Security
Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.
Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …
Midnight In America: Nuclear Electromagnetic Pulse And The 21st Century Threat To The United States, Angela Weaver
Midnight In America: Nuclear Electromagnetic Pulse And The 21st Century Threat To The United States, Angela Weaver
MSU Graduate Theses
The electromagnetic pulse (EMP) effects produced by the detonation of a nuclear weapon at high altitude are capable of causing widespread destruction in the U.S. homeland with few to no immediate casualties. The threat of nuclear EMP attack against the United States was recognized as probable during the Cold War but as time passed, the threat lost consciousness among U.S. policy makers as other issues and threats rose to the forefront. Simultaneously, the United States military and civilian society grew increasingly reliant upon emerging electronic systems and capabilities while adversary nations and rogue states rapidly pursued nuclear weapons capabilities. Today, …
A Radical Idea: Applying Psychological Strategy To Combat Foreign Fighters Defending The Islamic State, David Michael Smaney
A Radical Idea: Applying Psychological Strategy To Combat Foreign Fighters Defending The Islamic State, David Michael Smaney
MSU Graduate Theses
This thesis focuses on the necessity of psychological strategies to combat the Islamic State’s recruitment of foreign fighters. This thesis argues that psychological strategies are a primary weapon due to the psychological nature of the war against the Islamic State, which is a part of the overall war of ideas. This thesis does not consider psychological strategies for other aspects of U.S. counterterrorism strategy, nor does it reflect the difficulties involved with developing U.S. strategies in the U.S. federal government. Furthermore, this thesis only focuses on foreign fighter defending and supporting the Islamic State, which is the successor of Al …
The Making Of A Virtual Monster: Ideological Criticism On The Isis Hate And Extremism, Md Shah Jahan
The Making Of A Virtual Monster: Ideological Criticism On The Isis Hate And Extremism, Md Shah Jahan
All Graduate Theses, Dissertations, and Other Capstone Projects
The 9/11 incident and its subsequent terrorism specifically the rise of radical Islamist groups like ISIS (Islamic State of Iraq and Syria), and al-Qaeda astounds the world. ISIS’s propaganda technique using digital media helps the terrorist group motivate and recruit a large group of people from around the world. Terrorist incidents like the Dhaka café in 2016 and France soccer game attack in 2015 provide a glimpse of ISIS ferocity and barbarism with its subsequent series of attacks. This research examines the kind of rhetorical language that ISIS leaders and followers use to support their ideologies. And, how the internet …
Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag
Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag
Publications
Pennsylvanians mainly see Homeland Security as a comprehensive effort of the federal government to fight terrorism at home and abroad. While it most often has a positive connotation, the multi-faceted mission space of homeland security is widely unknown.
Differential Reinforcement In The Online Radicalization Of Western Muslim Women Converts, Heather Cone
Differential Reinforcement In The Online Radicalization Of Western Muslim Women Converts, Heather Cone
Walden Dissertations and Doctoral Studies
The emerging phenomenon of Western women Islamic converts learning radicalized ideology through social media constitutes a challenge to cyber policy makers hampered by a lack of gender-nuanced radicalization research. The purpose of this exploratory qualitative case study was to develop a greater understanding of how the differential reinforcement tenet of social learning theory may help to explain the conversion and radicalization of Western women towards a fundamentalist Islamic ideology through their participation in the social media. Key research questions explored how participation in online social media may create vulnerability towards radicalization and exploitation. The blogs of 3 different Western women …
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen
Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen
Pepperdine Policy Review
The threats residing in cyber-space are becoming well understood by policymakers and security experts alike. However, cyber-security defenses and strategies cannot solely be directed towards nation states, as non-governmental actors – such as transnational crime groups and terrorist organizations are becoming increasingly reliant upon internet technologies. Attacks on the digital components of the critical infrastructure, have the potential to unleash devastation on the United States. In a time when reliability and ethnicity of the National Security Administration, the Nation’s leading digital intelligence organization, are becoming increasingly questioned; defensive measures need to be improved to prevent future attacks and improve the …
Radicalization In The Homeland—The Need For Community Partnership And Education, Gabriel C. Lajeunesse
Radicalization In The Homeland—The Need For Community Partnership And Education, Gabriel C. Lajeunesse
Gabriel C. Lajeunesse
By educating our citizenry on the process and signs of radicalization we encourage early detection and warning of potential terror activities in the homeland. Without such an effort, we are at a marked disadvantage.
The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor
The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor
International Bulletin of Political Psychology
The author discusses terrorism (and terms associated with it), considering the social rhetoric surrounding the terms as well as other potential meanings. The constraints of the words used to define these terms of terror are considered.
Geo-Politics, The ‘War On Terror’ And The Competitiveness Of The City Of London, Richard Woodward
Geo-Politics, The ‘War On Terror’ And The Competitiveness Of The City Of London, Richard Woodward
Books/Book Chapters
No abstract provided.
Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce
Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce
Human Rights & Human Welfare
“9/11 changed everything.” Not really. In fact, there has been far more continuity than change over the past six years in both international and domestic politics. Nonetheless, human rights often have been harmed—although not by terrorism but by “the war on terror.”
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Global Tides
Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …