Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Terrorism (119)
- Books (25)
- Conferences (25)
- International Nominations (25)
- Journals (25)
-
- Special Services (25)
- Iraq (21)
- Security (15)
- Aviation Security (14)
- Israel (12)
- Profiling (11)
- Intelligence (10)
- Political Violence (9)
- Suicide (8)
- Weapons of Mass Destruction (6)
- Assassination (5)
- Aviation (5)
- Palestine (5)
- Torture (5)
- 9/11 terrorist attack (4)
- Al Qaeda (4)
- Al-Qaida leadership (4)
- Bush Administration (4)
- Colombia (4)
- Counterterrorism (4)
- Democracy (4)
- Globalization (4)
- Homeland Security (4)
- Human Rights (4)
- Ideology (4)
- Publication Year
- Publication
-
- International Bulletin of Political Psychology (235)
- Psychology Faculty Publications (4)
- Articles & Editorials (1)
- Class, Race and Corporate Power (1)
- DU Undergraduate Research Journal Archive (1)
-
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Department of Psychology: Faculty Publications (1)
- Honors Undergraduate Theses (1)
- Journal of Terrorism Studies (1)
- Jurnal Politik (1)
- Political Science & International Studies | Senior Theses (1)
- Political Science Student Papers and Posters (1)
- Publications and Research (1)
- The Commons: Puget Sound Journal of Politics (1)
- UNO Student Research and Creative Activity Fair (1)
- Publication Type
Articles 1 - 30 of 252
Full-Text Articles in Other Political Science
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Journal of Terrorism Studies
This study delves into the intricacies of power projection strategies and counter-terrorism measures, emphasizing their relevance to small states, with a specific focus on Brunei Darussalam. Using a dual matrix model, the research categorizes various strategies based on risk-reward parameters, offering a structured insight into potential approaches these states can employ against potential aggressors. The counter-terrorism matrix is the initial focal point, recognizing the contemporary significance of terror threats and their unique challenges for small nations. Subsequently, the power projection matrix offers a broader view of defense tactics beyond counter-terrorism. By synthesizing information from primary academic sources, the study aims …
Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols
Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols
DU Undergraduate Research Journal Archive
DU Undergraduate Showcase: Research, Scholarship, and Creative Works
Absolute Impunity: On The Legacies Of 9/11 & The Policies Of The War On/Of Terror, Bryant William Sculos
Absolute Impunity: On The Legacies Of 9/11 & The Policies Of The War On/Of Terror, Bryant William Sculos
Class, Race and Corporate Power
It has been a little over twenty years since the attacks of September 11, 2001, and thus we are also going to be coming up on twentieth anniversaries of some of the most heinous restrictions on civil liberties in US history (though there is a lot of competition) and the twentieth anniversaries of instance after instance of unjustifiable atrocities committed in the name of the Stars and Stripes. Through autoethnographic reflection in conversation with Netflix’s Turning Point: 9/11 and the War on Terror (2021) and Spencer Ackerman’s Reign of Terror: How the 9/11 Era Destabilized America and Produced Trump (2021), …
Trading Camouflage For Kalashnikovs: The Radicalization Of U.S. Military Members Into Salafi-Jihadist Organization And Their Insider Threat, Lauren Zimmerman
Trading Camouflage For Kalashnikovs: The Radicalization Of U.S. Military Members Into Salafi-Jihadist Organization And Their Insider Threat, Lauren Zimmerman
UNO Student Research and Creative Activity Fair
This study examines those identified as homegrown violent extremists within the U.S. who also had experience with the U.S. military and the possible pathways to extremism they took. This research relies on the Salafi Jihadist Inspired Profiles and Radicalization Clusters (SPARC) study. By applying Kruglanski’s 3N theory of radicalization to a sample of 23 subjects who had joined, or attempted to join, the U.S. military, this study finds that most of those with military experience are radicalized by formal, organization-led networks and are motivated by social significance loss, suggesting that they have moved their personal identification from the U.S. military …
Analyzing Threat: Organized Extremist Groups Vs. Lone Wolf Terrorists In The Context Of Islamist Extremism, Adeline W. Toevs
Analyzing Threat: Organized Extremist Groups Vs. Lone Wolf Terrorists In The Context Of Islamist Extremism, Adeline W. Toevs
The Commons: Puget Sound Journal of Politics
Lone wolf terrorism lends itself to the execution of large numbers of people and the spread of extremist ideology, but they pose less of a threat to Western nations than organized extremist groups. Lone attacks require less strategy and funding, fewer resources, are more difficult to target with state counterterrorism campaigns, and can penetrate ‘high security’ states more effectively than groups, so the attacks are more likely to succeed. Additionally, lone actors are highly susceptible to propaganda and messaging from extremist groups, and they are often radicalized online, making them difficult to track. Conversely, when organized extremist groups do manage …
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Political Science & International Studies | Senior Theses
Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …
George W. Bush, Policy Selling And Agenda-Setting After 9/11, Gabriel Rubin
George W. Bush, Policy Selling And Agenda-Setting After 9/11, Gabriel Rubin
Department of Justice Studies Faculty Scholarship and Creative Works
George W. Bush successfully set the agenda for an expansive, global war against terrorists after the 9/11 attacks. This agenda was not inevitable, it arose from an interpretation of events and of America’s adversaries that leaned on global conflict, cultural differences, and the presumption of evil intent. Bush’s speech-making successfully led to the conflicts in Iraq and Afghanistan, civil liberty-reducing legislation, and a large institutional edifice dedicated to counterterrorism. The themes Bush’s speeches evoked and the agendas and policies that these speeches set are covered in this chapter.
Joined-Up Government In The Prevention Of Terrorist-Financing Offenses By Nonprofit Organizations: An Evidence-Based Approach, Maliki Sukmana
Joined-Up Government In The Prevention Of Terrorist-Financing Offenses By Nonprofit Organizations: An Evidence-Based Approach, Maliki Sukmana
Jurnal Politik
Indonesian interagency coordination to prevent terrorist-financing offenses by nonprofit organizations has several drawbacks. This article applies textual analysis and an evidence-based approach to draw effective coordination mechanisms from several countries’ experiences and to design a model of interagency coordination. The model illustrates mechanisms that can be the drivers of changes and minimize ineffective interagency coordination, which may lead to an increase in nonprofit vulnerabilities to terrorist-financing offenses. Evidence drawn from several countries that are contextually relevant to Indonesia, namely, Australia, Malaysia, Saudi Arabia, and Singapore, illustrates that effective interagency coordination potentially reduces the risks of terrorist financing and has synchronized …
When Is Terrorism All In The Family?, Ibpp Editor
When Is Terrorism All In The Family?, Ibpp Editor
International Bulletin of Political Psychology
This article describes putative linkages between family relationships and kinds of terrorism.
Counterterrorist Profiling, The Self, And The Problem Of Open And Quiet Skies, Ibpp Editor
Counterterrorist Profiling, The Self, And The Problem Of Open And Quiet Skies, Ibpp Editor
International Bulletin of Political Psychology
Psychological profiling supporting counterterrorism may be based on an invalid presumption.
A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani
A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani
Honors Undergraduate Theses
During its violent spread across the Middle East, the Islamic State of Iraq and Sham (ISIS) amassed both a local and international following in large part due to its usage of emergent media distribution. Beginning in 2014, ISIS’s Ministry of Media published an English-language magazine, Dabiq, disseminating its issues through online platforms. Dabiq and its successor Rumiyah both serve as propagandistic recruitment material for ISIS’s international community as well as broadcasting the message of the jihadist movement to ISIS’s enemies. This study analyzed ISIS’s publications using a qualitative content analysis in order to identify jihadist recruitment strategies through the perspectives …
Proliferating A Culture Of Fear: Islam In A Post 9/11 America, Setareh Motamedi
Proliferating A Culture Of Fear: Islam In A Post 9/11 America, Setareh Motamedi
Political Science Student Papers and Posters
The threat of terrorism perceived by the American public has been shaped by a series of traumatic events over the past decade. In the years following the attacks of September 11, 2001, fear of terrorism has extended beyond the threat of terrorist groups. Much of the American public considers not only terrorist groups like al-Qaeda, but the entire religion of Islam to be a security threat. In much of this security discourse, ideas of hatred, violence, and terror have become associated with Islam. This study explores that association, and aims to identify what motivates existing stereotypes. Drawing on research from …
Challenging The Political Assumption That “Guns Don’T Kill People, Crazy People Kill People!”, Heath J. Hodges, Mario Scalora
Challenging The Political Assumption That “Guns Don’T Kill People, Crazy People Kill People!”, Heath J. Hodges, Mario Scalora
Department of Psychology: Faculty Publications
Every time an infamous mass shooting takes place, a storm of rhetoric sweeps across this country with the fury of a wild fire. “Why are we letting these people carry guns?” “Why were they not hospitalized?” “The government needs to crack down on this issue!” What is the government’s response to these cries of concern? Politicians and the media attempt to ease public fears by drawing tenuous connections among a handful of poorly understood tragedies. The salient commonality is that these high-profile shooters had some history of mental illness. A cursory review of the Internet will paint a troubling picture …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
Do "Suicide Bombers" Really Commit Suicide?, Ibpp Editor
Do "Suicide Bombers" Really Commit Suicide?, Ibpp Editor
International Bulletin of Political Psychology
By Israel Oron (Ostre), Ph.D., Psychologist, National Program for Suicide Prevention, Ministry of Health, Israel, and The Department for Psychology, Health and Ethics/ University of Haifa, Israel.
[Dr. Oron (Ostre) was formerly Psychologist, Behavior Section/The Department of Criminal Investigations & Intelligence, Israel Police HQ].
This article applies a psychological approach to explore and to explain the behavior of Palestinian terrorists who blow themselves up in the light of their own words. It is shown that terrorists have no suicidal intent; hence, their behavior is not an act of suicide. Psychological analysis point to a behavioral reaction to stress situations that …
2011-2012 Us Army War College Key Strategic Issues List, Antulio J. Echevarria Ii
2011-2012 Us Army War College Key Strategic Issues List, Antulio J. Echevarria Ii
Articles & Editorials
No abstract provided.
Taking It Off In The Mideast, Ibpp Editor
Taking It Off In The Mideast, Ibpp Editor
International Bulletin of Political Psychology
The author explores the concept of democracy and the impact of financial, moral, and sexual corruption in the Middle East.
The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor
The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the relevance of blame in the context of terrorism.
The Giffords Shooting: Who’S The Fall Guy?, Ibpp Editor
The Giffords Shooting: Who’S The Fall Guy?, Ibpp Editor
International Bulletin of Political Psychology
The author explores the concept of ‘the fall guy’ from a political philosophical perspective.
The November 2010 Elections: Verification And Nuclear Weapons Reduction, Ibpp Editor
The November 2010 Elections: Verification And Nuclear Weapons Reduction, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the results of the November 2010 elections in the United States (US), the transition of power between two very different Senates, and US participation in international treaties pertaining to nuclear weapons. Of note, are the roles of and problems with the idea of verification as per modern logical positivism.
The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor
The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor
International Bulletin of Political Psychology
The author gives a psychological perspective on the security of aviation cargo shipments.
In Drag On Drugs, Ibpp Editor
In Drag On Drugs, Ibpp Editor
International Bulletin of Political Psychology
Since commentators generally assert that the war on illegal and illicit drugs has been a failure, we should evaluate the assertion and, then, opine on why there is a war, winnable or not.
Memory And True Lies, Ibpp Editor
Memory And True Lies, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the concept of memory, its relation to culture, and three hypothetical phenomena associated with it.
Giving Foot The Boot: Right Or Wrong?, Ibpp Editor
Giving Foot The Boot: Right Or Wrong?, Ibpp Editor
International Bulletin of Political Psychology
The article examines philosopher Philippa Foot’s famous conundrum – The Trolley Problem.
Cybersecurity: Growing Like Topsy!, Ibpp Editor
Cybersecurity: Growing Like Topsy!, Ibpp Editor
International Bulletin of Political Psychology
This article discusses cybersecurity in an intelligence context – what it is, what it does to us, and the sudden (and somewhat unplanned) increase in financial support for the area.
Venus In Furs: Why False Confessions Are True, Ibpp Editor
Venus In Furs: Why False Confessions Are True, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the nature of truth and false confessions in the context of confession and interrogation.
The Strange Fruit Of 9/11, Ibpp Editor
The Strange Fruit Of 9/11, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the 9/11/2001 terrorist attacks and the larger psychological narrative and context of the attacks. Stoicism is considered as a viable response.
American Graffiti: Musings On The Ground Zero Mosque, Ibpp Editor
American Graffiti: Musings On The Ground Zero Mosque, Ibpp Editor
International Bulletin of Political Psychology
The author discusses reactions and parallels to a mosque proposed near the site of the 9/11 attacks on the World Trade Center in public discourse.
Dirty Laundry: A Philosophical Primer For Politicians On Scandal, Ibpp Editor
Dirty Laundry: A Philosophical Primer For Politicians On Scandal, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the management of post-sex scandals by politicians from a variety of theoretical and/or philosophical perspectives.
Fool For Love: The Psychology Of Security Violation, Ibpp Editor
Fool For Love: The Psychology Of Security Violation, Ibpp Editor
International Bulletin of Political Psychology
This article discusses why Pfc. Bradley Manning, United States (US) Army, who has been accused of illegally disclosing classified material—more than 150,000 diplomatic cables, 90,000 intelligence reports, and at least one video – allegedly performed the actions in question.