Open Access. Powered by Scholars. Published by Universities.®

Other Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

International and Area Studies

Insurgency

Articles 1 - 2 of 2

Full-Text Articles in Other Political Science

Security Is Local: An Analysis Of The Use Of Community-Based Security Forces During Counterinsurgency Operations, Alexander Stephenson Dec 2017

Security Is Local: An Analysis Of The Use Of Community-Based Security Forces During Counterinsurgency Operations, Alexander Stephenson

Alexander Stephenson

Counterinsurgency (COIN) operations are the most common type of military operation conducted by the United States and other Western powers.  In most cases, conventional forces intervening in an insurgency are limited in personnel and turn to local community-based security forces to mitigate this shortcoming after initial attempts fail to defeat an insurgency with the conventional forces available.  While the use of community-based security forces is a common element of COIN operations, little research has been conducted to determine the factors that contribute to their successful employment.  A synthesis of existing COIN and community-based policing theory provides a model to evaluate …


Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam Jan 2010

Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam

Allen Gnanam

Terrorism as a violent and destabilizing act performed by terrorists, meaning loyal followers of political or religious agendas who hold resent and animosity toward a certain authority/ government (Lin, Liou, & Wu, 2007, pg. 149), will be explored and analyzed through the utilization of the governmentality perspective. For the purposes of this paper terrorism governance will refer to the governance/ control/ influence exerted by terrorists and terrorism. The focus of this explorative and analysis paper will be to identify diverse terrorism oriented technologies of governance, and analyze the ways in which these technologies enable terrorist to exert governance both indirectly …