Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Social and Behavioral Sciences

Habeas Corpus In The Age Of Guantánamo, Cary Federman Apr 2019

Habeas Corpus In The Age Of Guantánamo, Cary Federman

Cary Federman

The purpose of the article is to examine the meaning of habeas corpus in the age of the war on terror and the detention camps at Guantanamo Bay. Since the war on terror was declared in 2001, the writ has been invoked from quarters not normally considered within the federal courts’ domain. In this article, I set out to do two things: first, I provide an overview of the writ’s history in the United States and explain its connection to federalism and unlawful executive detention. I then set out to bridge the two meanings of habeas corpus. Second, then, I …


The Logic Behind Suicide Terrorism And Its Connection To Islam, Sarah L. Minnick Nov 2018

The Logic Behind Suicide Terrorism And Its Connection To Islam, Sarah L. Minnick

Sarah Minnick

The purpose of this thesis is to analyze suicide terrorism and to examine the logic behind it.  The thesis will examine recent Islamic suicide terrorism and why it is so successful.  This paper will also attempt to define suicide terrorism and explain how it functions.
The first half of this thesis reviews a short history of suicide terrorism to show the logic behind it.  It will begin with the Old Testament and continue throughout history until the September 11, 2001 attacks on the World Trade Center in New York City.  This thesis will discuss the motivation for terrorist organizations to …


Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson Dec 2014

Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson

Maurice Dawson

Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant …


Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty Dec 2012

Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty

Dr Ian Piper

The analysis of vulnerabilities in large complex spaces is fundamentally problematic. The lack of capacity to generate a threat assessment merely exacerbates this problem. Lacking as well, in current literature is a developed methodology. To overcome this problem, we propose an approach using multi-agent modelling, which is also melded with three dimensional (3D) tactical understandings. Our approach builds on a microsimulation decision support tool, which was developed for a behavioural simulation of CBRN events. Microsimulation is based on the individual; who as an individual has a number of attributes, and which are stochastic (when repeated within an attribute). This approach …


The Ghost In The Global War On Terror: Critical Perspectives And Dangerous Implications For National Security And The Law, Nick J. Sciullo Dec 2010

The Ghost In The Global War On Terror: Critical Perspectives And Dangerous Implications For National Security And The Law, Nick J. Sciullo

Nick J. Sciullo

In this Article, I set out to discuss the dangerous implications of the Global War on Terror (GWOT) and, more generally, the at- tempts of the United States government to address notions of terror- ism and its effect on the safety of the United States and world citizens. I am primarily concerned with engaging a poststructuralist critique of the GWOT to strengthen legal discussions of terrorism and national security policy. While many in the legal academy have focused on particular issues relating to terrorism, I will engage in a macro-level analysis of the way the legal academy conceptualizes terrorism—not how …


Growing Pains At The Transportation Security Administration, Jeffrey Ian Ross Ph.D. Dec 2007

Growing Pains At The Transportation Security Administration, Jeffrey Ian Ross Ph.D.

Jeffrey Ian Ross Ph.D.

No abstract provided.


The Soft Power And Persuasion Of Translations In The War On Terror: Words And Wisdom In The Transformation Of Legal Systems, Donald J. Kochan Dec 2007

The Soft Power And Persuasion Of Translations In The War On Terror: Words And Wisdom In The Transformation Of Legal Systems, Donald J. Kochan

Donald J. Kochan

The power of words is the power of persuasion. The exportation of the foundational legal principles that helped form the American republic can serve as instrumental "soft power" tools in the war on terror. Efforts promoting projects like the Arabic Book Program are important vehicles to cross-cultural and cross-lingual international relations. This Article argues that an arsenal of words can be as, or more, powerful than an arsenal of artillery. The West has much to offer, but the rest of the world needs to be able to read it without getting lost in translation. Providing linguistic access to the documents …


Deconstructing The Terrorism- News Media Relationship, Jeffrey Ian Ross Ph.D. Dec 2006

Deconstructing The Terrorism- News Media Relationship, Jeffrey Ian Ross Ph.D.

Jeffrey Ian Ross Ph.D.

No abstract provided.


An Assessment Of The Terrorist Threat To Use A Nuclear (Ind) Or Radiological (Rdd) Device In An Attack, Brian Kingshott May 2006

An Assessment Of The Terrorist Threat To Use A Nuclear (Ind) Or Radiological (Rdd) Device In An Attack, Brian Kingshott

Brian F. Kingshott

This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated.


Beyond The Conceptualization Of Terrorism: A Psychological-Structural Model Of The Causes Of This Activity, Jeffrey Ian Ross Ph.D. Dec 1998

Beyond The Conceptualization Of Terrorism: A Psychological-Structural Model Of The Causes Of This Activity, Jeffrey Ian Ross Ph.D.

Jeffrey Ian Ross Ph.D.

No abstract provided.


Attributes Of Domestic Political Terrorism In Canada: 1960-1985, Jeffrey Ian Ross Ph.D. Dec 1997

Attributes Of Domestic Political Terrorism In Canada: 1960-1985, Jeffrey Ian Ross Ph.D.

Jeffrey Ian Ross Ph.D.

No abstract provided.


The Effects Of Oppositional Political Terrorism: Five Actor Based Models, Jeffrey Ian Ross Ph.D. Dec 1996

The Effects Of Oppositional Political Terrorism: Five Actor Based Models, Jeffrey Ian Ross Ph.D.

Jeffrey Ian Ross Ph.D.

No abstract provided.


The Psychological Causes Of Oppositional Political Terrorism, Jeffrey Ian Ross Ph.D. Dec 1993

The Psychological Causes Of Oppositional Political Terrorism, Jeffrey Ian Ross Ph.D.

Jeffrey Ian Ross Ph.D.

No abstract provided.