Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Criminology

Time-Space Analysis Of Terrorist Planning Cycles, Michael Stephen Gerald Eastham Aug 2014

Time-Space Analysis Of Terrorist Planning Cycles, Michael Stephen Gerald Eastham

Graduate Theses and Dissertations

Terrorism is among the largest threats to national and international security in today's global community. Acts of terrorism have resulted economic and societal impacts throughout the world. Improvements in technology have increased the capacity of terrorists to maximize the impact of their actions. The increasing influence and prevalence of terrorist activity has demanded research focused on the prevention of terrorist acts. A known method of terrorism prevention is uncovering a plot during its planning and preparation phase. Terrorist planning can be evaluated based on how actors move through space and time prior to the execution of their attack. General patterns …


21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring May 2014

21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring

Graduate Theses and Dissertations

This study examines differences between users and nonusers of information communication technologies (ICTs) within the pre-incident planning processes for domestic terrorist movements operating within the United States. In addition, this study is the first quantitative exploration of the prevalence, types, and purposes of ICT use within terrorist movements, specifically environmental, far-right, and Islamic extremist movements. Using "officially designated" federal terrorism investigations from the American Terrorism Study (ATS), we analyzed extracted evidence of ICT usage among individuals (n =331) engaged in the pre-incident planning processes as members of terrorist movements between 1995-2011. While we find significant differences in terrorist ICT use …