Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (50)
- International Law (20)
- Social and Behavioral Sciences (16)
- National Security Law (13)
- Public Affairs, Public Policy and Public Administration (11)
-
- Military, War, and Peace (10)
- Defense and Security Studies (8)
- Arts and Humanities (7)
- International Humanitarian Law (7)
- Terrorism Studies (7)
- Political Science (6)
- Comparative and Foreign Law (5)
- Computer Law (5)
- Criminal Law (5)
- International Relations (5)
- International and Area Studies (5)
- Peace and Conflict Studies (5)
- Administrative Law (4)
- Business (4)
- Human Rights Law (4)
- Internet Law (4)
- Organizations Law (4)
- Communications Law (3)
- Intellectual Property Law (3)
- Legislation (3)
- Philosophy (3)
- Physical Sciences and Mathematics (3)
- Asian Studies (2)
- Communication (2)
- Computer Sciences (2)
- Institution
-
- University of Michigan Law School (7)
- University of Miami Law School (5)
- Maurer School of Law: Indiana University (4)
- Pepperdine University (4)
- U.S. Naval War College (4)
-
- Universitas Indonesia (4)
- Case Western Reserve University School of Law (3)
- Embry-Riddle Aeronautical University (3)
- Fordham Law School (3)
- Kennesaw State University (3)
- University of Denver (3)
- University of South Carolina (3)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (2)
- Nova Southeastern University (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Tennessee, Knoxville (2)
- Association of Arab Universities (1)
- California Polytechnic State University, San Luis Obispo (1)
- Institute of Social Sciences, TOYO University (1)
- Liberty University (1)
- Loyola Marymount University and Loyola Law School (1)
- National Louis University (1)
- New York Law School (1)
- Notre Dame Law School (1)
- Pace University (1)
- SJ Quinney College of Law, University of Utah (1)
- Saint Louis University School of Law (1)
- Santa Clara Law (1)
- Schulich School of Law, Dalhousie University (1)
- US Army War College (1)
- Publication Year
- Publication
-
- Michigan Journal of International Law (6)
- International Law Studies (4)
- Case Western Reserve Journal of International Law (2)
- Federal Communications Law Journal (2)
- Fordham Law Review (2)
-
- Human Rights & Human Welfare (2)
- ILSA Journal of International & Comparative Law (2)
- Indiana Law Journal (2)
- International Bulletin of Political Psychology (2)
- International Journal of Nuclear Security (2)
- Journal of Strategic and Global Studies (2)
- Pepperdine Policy Review (2)
- South Carolina Law Review (2)
- The Journal of Public and Professional Sociology (2)
- University of Miami International and Comparative Law Review (2)
- University of Miami National Security & Armed Conflict Law Review (2)
- Between the Species (1)
- Canadian Journal of Law and Technology (1)
- Denver Journal of International Law & Policy (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- Global Tides (1)
- Japanese Society and Culture (1)
- Journal of Cybersecurity Education, Research and Practice (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Legislation (1)
- Journal of Religion & Film (1)
- Journal of Terrorism Studies (1)
- Jurnal Kajian Stratejik Ketahanan Nasional (1)
- Liberty University Journal of Statesmanship & Public Policy (1)
- Loyola of Los Angeles Law Review (1)
Articles 1 - 30 of 72
Full-Text Articles in Entire DC Network
Geopolitics Of Cyberspace And Expansion Of Terrorism In The Central Asia, Mohammad Amin Zabihi, Saeed Shokohi, Sajad Abed
Geopolitics Of Cyberspace And Expansion Of Terrorism In The Central Asia, Mohammad Amin Zabihi, Saeed Shokohi, Sajad Abed
The World Research of Political Science Journal
Abstract: Terrorism, like any other phenomenon has enjoyed evolution during the course of history and it has become a paramount, influential factor in almost every aspect of national and international equations. Nowadays, terrorists, like any other activist group, use modern technologies in almost evert aspect of their strategies; thus, one should consider the role of these modern technologies that contribute to the furtherance of their malicious deeds. Therefore, it is necessary to investigate the ways terrorists act through, and importantly, the tools and instruments they exploit in order to achieve their goals. Arguably, cyberspace and other related tools and materials …
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
Assessing Nuclear Security Risks In Pakistan, Sitara Noor
Assessing Nuclear Security Risks In Pakistan, Sitara Noor
International Journal of Nuclear Security
Pakistan’s nuclear program and perceived nuclear security concerns have attracted global attention. The varying concerns range from the potential theft of nuclear weapons or materials to the unauthorized use of a nuclear device to terrorist groups taking control of the Pakistani government. The enduring debate, however, has oscillated between these doomsday scenarios and some optimistic considerations, where various quarters have shared their satisfaction over Pakistan’s nuclear security regime and its ability to deal with the emerging challenges. To address the evolving nature of these threats, Pakistan is constantly improving its nuclear security infrastructure. It has established a comprehensive legislative and …
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Pepperdine Law Review
The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …
Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta
Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta
Journal of Terrorism Studies
A surprising phenomenon was observed in the lone-wolf terror terrorism that occurred in Indonesia. This is associated with the fact that the perpetrators of seven out of thirteen cases reported were exposed to radical information through social media and the internet without directly joining a terrorist group. The process involved the intensive exploration of the internet by people previously interested in radicalism content which eventually led to self-radicalization and the subsequent terror acts. Meanwhile, Fathali M Moghaddam proposed that the process of radicalization before a terror act is conducted involves six stages of action known as the staircase to terrorism. …
Impact Of Virtual Information On Social Sustainability, Behzodbek Soipov
Impact Of Virtual Information On Social Sustainability, Behzodbek Soipov
The Light of Islam
The article discusses the concept of information and its importance today, the use of information in Uzbekistan and the world, the measures taken to ensure information security. In this regard, the fact that virtual information poses a direct threat to the socio-political processes of society is also covered in detail. Places where the virtual threats are reflected and ways to eliminate them have been revealed. The article illustrates how effective the virtual world and virtual communication have become for individuals and society. It is emphasized that several terms (virtual life, virtual family, and virtual love) have emerged in connection with …
Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan
Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan
Canadian Journal of Law and Technology
Post 9/11, where the current social and cultural temperature has constructed Islam as interchangeable with terrorism, digital intermediaries have responded with increased censorship of speech related to, emerging from, or advocating Islamic ideology. At the heart of this paper is the argument that digital intermediaries have relied on the opaqueness of machine learning technology (‘‘MLT”) to realize racialized surveillance, whereby speech concerning Islamic content has been disproportionally censored. This paper maps out how inherent biases concerning the ideology of Islam have been interwoven into the coding and machine learning used by the major tech giants. As a result of the …
Fear, Loathing, And The Hemispheric Consequences Of Xenophobic Hate, Ernesto Sagás, Ediberto Román
Fear, Loathing, And The Hemispheric Consequences Of Xenophobic Hate, Ernesto Sagás, Ediberto Román
University of Miami International and Comparative Law Review
“When you have fifteen thousand people marching up . . . how do you stop these people?” “You shoot them” [crowd member shouts] [chuckling, Trump responds:] “[O]nly in the Panhandle can you get away with that thing.”1
President Donald Trump
“Thousands of criminal aliens. They’re pouring into our country.”2
President Donald Trump
“They’re not people, these are animals.”3
President Donald Trump
“Take a look at the death and destruction that’s been caused by people coming into this country caused by people that shouldn’t be here.”4
President Donald Trump
“ [We] have millions and millions of people …
National Security Policymaking In The Shadow Of International Law, Laura T. Dickinson
National Security Policymaking In The Shadow Of International Law, Laura T. Dickinson
Utah Law Review
Scholars have long debated whether and how international law impacts governmental behavior, even in the absence of coercive sanction. But this literature does not sufficiently address the possible impact of international law in the area of national security policymaking. Yet, policies that the executive branch purports to adopt as a wholly discretionary matter may still be heavily influenced by international legal norms, regardless of whether or not those norms are formally recognized as legally binding. And those policies can be surprisingly resilient, even in subsequent administrations. Moreover, because they are only seen as discretionary policies, they may be more easily …
Late Xx Century – Early Xxi Century Geopolitical View Of The Asian Region, Rano Almamatovna Tuychiyeva
Late Xx Century – Early Xxi Century Geopolitical View Of The Asian Region, Rano Almamatovna Tuychiyeva
Scientific reports of Bukhara State University
Introduction. Describe the geopolitical structure of the Asian region - to cover political, economic, social, cultural and ethnic issues in East Asia, Southeast Asia (the main part of the Asia-Pacific region), South Asia, the Indian Ocean region, Central Asia and the Middle East. The number of dedicated scientific publications is significantly exceeding the number and volume of similar texts being written about other regions of the world. A review of Asian security shows that security concerns have spread throughout Asia. At the same time, such problems also have a significant negative impact on mutual economic, trade and investment relations. Research …
Tweeting Terror: Evaluating Changes To The Terror Recruitment And Radicalization Process In The Age Of Social Media, Jackson T. Grasz
Tweeting Terror: Evaluating Changes To The Terror Recruitment And Radicalization Process In The Age Of Social Media, Jackson T. Grasz
Pepperdine Policy Review
The 2019 terror attack in Christchurch, New Zealand shocked the world as a lone gunman claimed the lives of more than fifty Muslin men, women, and children. As the nation grieved and security experts searched for answers, old notions of how and why terrorism occurs began to crumble. It became clear that this attack, perpetrated by a white supremacist, was born of and carried out for a new digital age. What set this terror attack apart was the centrality of social media to the radicalization and motivation of the lone assailant. In light of this development, this paper evaluates the …
“He Who Laughs Last!” Terrorists, Nihilists, And Jokers, William S. Chavez, Luke Mccracken
“He Who Laughs Last!” Terrorists, Nihilists, And Jokers, William S. Chavez, Luke Mccracken
Journal of Religion & Film
Since his debut in 1940, the Joker, famed adversary of the Batman, continues to permeate the American cultural mediascape not merely as an object of consumption but as an ongoing production of popular imagination. Joker mythmakers post-1986 have reimagined the character not as superhuman but as “depressingly ordinary,” inspiring audiences both to empathize with his existential plight and to fear his terroristic violence as an increasingly compelling model of reactionary resistance to institutionality. This article examines the recent history of modern terrorism in conjunction with the “pathological nihilism” diagnosed by Nietzsche in order to elucidate the stakes and implications of …
Terror Threat At Tokyo Olympics 2021, Daiju Wada
Terror Threat At Tokyo Olympics 2021, Daiju Wada
Japanese Society and Culture
While we witnessed collapse of Islamic State’s territorial control, Jihadists threat will continue for decades. But the real threat will not come from groups such as Al Qaeda and Islamic State but its Salafi Jihadism. Of course, the ideological threat is not visible and can never be eradicated by military actions. Cyberspace has facilitated the threat to be transnational pandemic phenomenon, as proved by inspired individuals. The backgrounds of those vary by person and this ideology performs as a detonator in driving individuals into violent terrorists.
Japan is located at the periphery of Jihadist’s interest. But Islamic State declared their …
Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail
Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail
Journal of Strategic and Global Studies
The legal scope of the Terrorism Law and the Information and Electronic Transactions Law in Indonesia is considered as lacking to cover the problem of cybercrime in social media. Aside from literature review, this paper is also supported by data from direct interview with the Head of Counterterrorism Special Detachment 88 (Densus 88 AT) of Indonesian National Police. The data found out that the Terrorism Law is a repressive response towards terrorism crimes that have already occured, but less preventive to future crimes. The existence of laws in Indonesia is often one step behind its crime. The difference of perception …
The Threat Of Terrorism To Power Grids: Effects Of Electromagnetic Pulses To The United States, Justin Van Dunk
The Threat Of Terrorism To Power Grids: Effects Of Electromagnetic Pulses To The United States, Justin Van Dunk
Liberty University Journal of Statesmanship & Public Policy
Terrorism’s roots can be traced back to the French Revolution.[1] Since 1789 terrorism has adopted many faces and its reach stretches throughout the world. Amidst the difficulty of defining terrorism, the FBI has given us the following definition, “…the unlawful use of…violence against persons…to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” (Gaines & Miller, 2013, p. 539).[2] Bombing, hijacking, arson, assault, kidnapping, and hostage-taking are just a few of the attack tactics utilized throughout terrorist organization. However, with continuing advancements in technology nations need to consider …
Analysis Identity Fusion And Psychosocial Development: How The Role Of Father, Mother And Son On Radicalization Within Family, Muhammad Luthfi Zuhdi, Muhamad Syauqillah
Analysis Identity Fusion And Psychosocial Development: How The Role Of Father, Mother And Son On Radicalization Within Family, Muhammad Luthfi Zuhdi, Muhamad Syauqillah
Journal of Strategic and Global Studies
One of crucial issues of radicalism lately is the involvement of family members in acts of terrorism. One of those interesting case is the case of Dita Oepriyanto’s family, the perpetrator of suicide bombing in one church in Surabaya, East Java. Family involvement in extremist acts and terrorism in Indonesia is not a new thing, the story of Dita Oeprianto is a historical cycle with different shifting actors. The story of the Leader of Darul Islam, RM. Kartosuwiryo who rebelled against the Indonesian republic accompanied by his wife and wife giving birth to children in the forest can be seen …
The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan
The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan
Indiana Law Journal
In this Article, I take up one slice of what should be a broad re-examination of
U.S. law and policy. I argue that the new attacks have been undertaken by entities
that can and should be designated as foreign terrorist organizations. Doing this would
permit prosecutors to target those who support these entities with tools that are not
currently available. This Article is both a doctrinal argument that directly addresses
the many legal hurdles that make designating groups, such as foreign hackers and
troll farms, terrorist organizations a complicated endeavor, and a policy argument
about how U.S. law and policy …
Teacher Educators’ Perceptions Of Terrorism And The Role Of Education: A Qualitative Inquiry, Muhammet Fatih Alkan, Fatih Yazıcı
Teacher Educators’ Perceptions Of Terrorism And The Role Of Education: A Qualitative Inquiry, Muhammet Fatih Alkan, Fatih Yazıcı
i.e.: inquiry in education
This qualitative study aimed at revealing terrorism perceptions held by teacher educators working in Ankara, the capital of Turkey, and their opinions regarding the role of education that may play in ending terrorism. A total of 30 teacher educators took part in the study. The data were collected using a questionnaire involving open-ended questions in addition to demographics. The data were analyzed using the content analysis technique. The findings were discussed in terms of relevant literature and the social and political context of Turkey, which yielded generalizable implications to other countries with a similar social construct.
The Definition Of Terrorism, Duncan Gaswaga
The Definition Of Terrorism, Duncan Gaswaga
The International Journal of Ethical Leadership
No abstract provided.
Political Extremism And Domestic Terrorism In America, Mark Potok
Political Extremism And Domestic Terrorism In America, Mark Potok
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Terrorism As Economic Warfare: America's Risky Business, Rodger A. Bates, Bryan Labrecque
Terrorism As Economic Warfare: America's Risky Business, Rodger A. Bates, Bryan Labrecque
The Journal of Public and Professional Sociology
Terrorism is a form of asymmetrical warfare. Terrorists employ a variety of tactics to threaten and intimidate a group or society. Technology is an important force multiplier which may allow them engage in cost-effective actions frequently directed at economic targets. As a means of economic warfare, terrorism can disrupt, demoralize and severely diminish the ability of a group to counter the threat of a terrorist group. It is America's risky business.
International Civil Individual Responsibility And The Security Council: Building The Foundations Of A General Regime, Vincent-Joël Proulx
International Civil Individual Responsibility And The Security Council: Building The Foundations Of A General Regime, Vincent-Joël Proulx
Michigan Journal of International Law
This Article focuses on a few tools at the disposal of the United Nations Security Council (“UNSC”) to enhance individual (read: civil) responsibility concerning nonstate terrorist actors with a view to opening other avenues of inquiry regarding other subversive nonstate actors (“NSAs”), for instance in the areas of transnational torts, human rights (“HR”) violations, and environmental damage caused by business entities. As discussed in Part V, recent developments surrounding the application of the Alien Tort Claims Act (“ATCA”) in the United States and the prospect of establishing a basis for universal civil jurisdiction further signal that no such solid basis …
Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando
Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando
Jurnal Kajian Stratejik Ketahanan Nasional
Penelitian ini dilatarbelakangi oleh kewaspadaan terhadap perkembangan teknologi dunia maya yang begitu cepat sehingga menyebabkan ketergantungan padanya di hampir semua bidang. Kondisi ini berpotensi menimbulkan ancaman terhadap kemeriahan nasional kita di berbagai bidang, terutama di sektor keamanan nasional. Para peneliti mencoba mengidentifikasi ancaman Positive Clandestin Intelligence (PCI) dalam bentuk terorisme cyber pada keamanan nasional, sehingga dapat membawa para pemangku kepentingan ke tingkat pengetahuan yang lebih baik. Beberapa teori dan konsep yang digunakan peneliti terkait dengan ancaman, keamanan nasional, intelijen klandestin positif, terorisme, dan terorisme cyber (CT). Pendekatan penelitian yang digunakan dalam penelitian ini adalah pendekatan kualitatif dan jenis penelitiannya adalah …
Are Illegal Direct Actions By Animal Rights Activists Ethically Vigilante?, Michael P. Allen, Erica Von Essen
Are Illegal Direct Actions By Animal Rights Activists Ethically Vigilante?, Michael P. Allen, Erica Von Essen
Between the Species
Constructed as terrorist, illegal direct actions by animal rights activists have become the subject of draconian law enforcement measures in the US and UK. Some scholars respond to this phenomenon by interpreting such actions to protect vulnerable animals not as terrorist but civilly disobedient. This approach highlights their ethical character, as a normatively relevant consideration in the state’s law enforcement response. Consistent with this approach, we argue that illegal direct actions by animal rights activists are not terrorist, although their motivations are sometimes anti-statist and anarchist. However, we also argue that civil disobedience is an awkward fit for many such …
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
International Journal of Nuclear Security
Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.
Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …
Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton
Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton
Pace Intellectual Property, Sports & Entertainment Law Forum
Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …
The International Business Risk Of Terrorism: A Pragmatic Framework For Assessing Its Impact On The U.S.-Based, Small- To Medium-Sized Enterprise’S Supply Chain Operations, Scott A. Lemons
The Hilltop Review
Purpose - Subject paper examines the international business risk of terrorism’s impact on the focal firm’s supply chain operations, as proliferated by the acceleration of globalization, via a fundamental review of pertinent country- and firm-level considerations shaped by global environmental factors. Subsequently, a managerial risk assessment and mitigation planning framework is presented for the supply chain executive’s pragmatic use.
Design/methodology/approach – Broad evaluation of contemporary viewpoints precedes a risk assessment and mitigation planning framework from the supply chain executive’s point-of-view.
Findings – While observed research found the probability of the risk of terrorism to be low, the severity (impact) of …
Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman
Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman
South Carolina Law Review
No abstract provided.
Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar
Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar
South Carolina Law Review
No abstract provided.
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.