Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Terrorism / counterterrorism (27)
- Radicalization (17)
- Al-Qaida (15)
- Counterterrorism (15)
- Homeland security (13)
-
- Islamic culture and politics (13)
- Violent extremism (12)
- Asymmetric warfare (10)
- History (10)
- National security (10)
- Nonstate actors (10)
- Security studies (10)
- Conflict studies (9)
- Fundamentalism (9)
- Political violence (9)
- Religious violence (9)
- Security policy (9)
- Ideology (8)
- Intelligence analysis (8)
- Intelligence studies/education (8)
- Sociocultural dynamics in security (8)
- Foreign policy (7)
- International relations (7)
- Security management (7)
- Threat assessment (7)
- Middle East (6)
- Russia (6)
- Strategy (6)
- Defense policy (5)
- International law (5)
Articles 91 - 108 of 108
Full-Text Articles in Business
What Price Security?, Donald C. Masters
What Price Security?, Donald C. Masters
Journal of Strategic Security
This article presents a critique of the Copenhagen Consensus Center's(CCC) exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive …
Keeping Our Campuses And Communities Safe, Ronald Goodman
Keeping Our Campuses And Communities Safe, Ronald Goodman
Journal of Strategic Security
Since the events of September 11, 2001, the U.S. population has a heightened awareness that tragedies can and do strike ordinary people without warning. The same can be said for the unfortunate abundance of campus shootings, where the next "9/11" occurred in 2007 on the campus of Virginia Tech. And yet, subsequent investigations into these horrific events often reveal that clues existed that might have pointed to the eventual violent outcome. It is unquestionable that to dramatically improve the safety and security of our cities we must rely upon the millions of eyes of our fellow citizens to unearth these …
Fragility: The Next Wave In Critical Infrastructure Protection, Allan Mcdougall
Fragility: The Next Wave In Critical Infrastructure Protection, Allan Mcdougall
Journal of Strategic Security
In North America today, we are about to embark on a significant effort to repair, or even upgrade, many aspects of our infrastructure. Many of these efforts are linked to economic recovery packages. Others are based on sheer need. The challenge for decision makers and planners involves ensuring that scarce economic resources are put to their best use. Understanding the concept of fragility plays a pivotal part in reaching that understanding.Fragility, like many other systems—particularly Information Technology (IT ) systems—works on the concept of subjects and objects. Subjects are those entities that seek to exploit the services (or capacity) offered …
The Importance Of Intelligence In Combating A Modern Insurgency, Kevin Reamer
The Importance Of Intelligence In Combating A Modern Insurgency, Kevin Reamer
Journal of Strategic Security
Throughout history the world has been plagued by insurgencies. While the underlying causes of each new insurgency have been different, they are all similar in certain areas. This similarity entails that the effective countering of an insurgency can be turned into a science with a set of guidelines to follow based on conditions on the ground. Guidelines are important because insurgencies are flexible and to defeat them the counterinsurgency must be equally flexible if not more flexible. Good intelligence is critical to the success of an insurgency. With their small, poorly equipped forces, the leaders of insurgencies need to know …
Book Reviews, Edward J. Hagerty, Ed Urie
Book Reviews, Edward J. Hagerty, Ed Urie
Journal of Strategic Security
Afghanistan: Transition Under Threat. By Geoffrey Hayes and Mark Sedra, editors.
Enemies of Intelligence: Knowledge & Power in American National Security. By Richard K. Betts.
Film Reviews, Bart Bechtel
Al-Qaeda In The Lands Of The Islamic Maghreb, Gregory A. Smith
Al-Qaeda In The Lands Of The Islamic Maghreb, Gregory A. Smith
Journal of Strategic Security
This paper is organized into four chapters that focus on the terrorist group Al Qaeda in the Lands of the Islamic Maghreb (AQIM). The four chapters examine different facets of the collective environment that have allowed AQIM to succeed and even thrive at times. The first chapter begins with Algeria’s war of independence with the French. The second chapter focuses on the nomadic Tuareg people. It seeks to show how the Tuaregs were deprived by French occupiers and how European colonization cost the Tuaregs access to vital trade routes used for centuries. The third chapter will very briefly examine Algeria’s …
Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter
Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter
Journal of Strategic Security
This paper assesses the parameters and utility of “targeted killing” in combating terrorism and its role within the norm of state self-defense in the international community. The author’s thesis is that, while targeted killing provides states with a method of combating terrorism, and while it is “effective” on a number of levels, it is inherently limited and not a panacea. The adoption and execution of such a program brings with it, among other potential pitfalls, political repercussions. Targeted killing is defined herein as the premeditated, preemptive, and intentional killing of an individual or individuals known or believed to represent a …
Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler
Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler
Journal of Strategic Security
For more than three decades, Vinyard Software's two ITERATE (International Terrorism: Attributes of Terrorist Events) datasets have set the standard in events research for terrorism researchers. It has recently been supplemented by the DOTS (Data on Terrorist Subjects) biographies project, which covers all terrorists, supporters, and other individuals mentioned in the ITERATE project.
Strategic Security As A New Academic Discipline, Sheldon Greaves, Ph.D
Strategic Security As A New Academic Discipline, Sheldon Greaves, Ph.D
Journal of Strategic Security
The creation of Henley-Putnam University was an effort to create an academic institution for the purpose of offering degree programs in intelligence management, counterterrorism, and personal protection; subjects that arguably did not exist as academic disciplines when the school was conceived. The experience of two of the co-founders of the school, Nirmalya Bhowmick and Dr. Michael Corcoran, indicated that the training of officers tasked with vital security and intelligence work was carried out by partnering young officers with a training officer to help the new officer learn on the job. The effectiveness of this training depended to a great extent …
Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs
Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs
Journal of Strategic Security
To date, four German volumes in the series "Intelligence-Service Psychology" (Nachrichtendienstpsychologie) have been published. These volumes generated interest in both the German and non-German speaking communities. It was therefore decided to translate some of the basic articles of the series into English (Litzcke, Müller-Enbergs & Ungerer, 2008), making them accessible to a wider range of readers. This article contains abbreviated versions of the articles in the book.
Book Reviews, Bart Bechtel, Jeffrey Ahn
Book Reviews, Bart Bechtel, Jeffrey Ahn
Journal of Strategic Security
Fair Play: The Moral Dilemmas of Spying. By James M. Olson.
The Corporate Spy: Industrial Espionage and Counterintelligence inthe Multinational Enterprise with Case Studies (Abridged Version) by Edward M. Roche.
Dividing Up Intelligence Education, Robert Clark, Ph.D
Dividing Up Intelligence Education, Robert Clark, Ph.D
Journal of Strategic Security
At this year's annual conference of the International Association for Intelligence Education (IAFIE) in Monterey, CA, the keynote speaker posed the question, "How much do you need intelligence education outside the beltway?" Which led to a second question discussed during the conference: "What should such education look like?" In short, what should we be teaching in universities? What should we leave to the intelligence community as training? And what could be done in either or both settings? The first question of any educational effort is:What are we preparing students for?
Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko
Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko
Journal of Strategic Security
Intelligence analysts routinely work with "wicked" problems—critical,time-sensitive problems where analytical errors can lead to catastrophic consequences for the nation's security. In the analyst's world, important decisions are often made quickly, and are made based on consuming, understanding, and piecing together enormous volumes of data. The data is not only voluminous, but often fragmented, subjective, inaccurate and fluid.Why does multi-player on-line gaming (MMOG) technology matter to the IC? Fundamentally, there are two reasons. The first is technological: stripping away the gamelike content, MMOGs are dynamic systems that represent a physical world, where users are presented with (virtual) life-and-death challenges that can …