Rethinking Radicalization,
2011
University of South Florida
Rethinking Radicalization, Randy Borum
Journal of Strategic Security
No abstract provided.
Radicalism Within The Context Of Social Movements: Processes And Types,
2011
University of California, Irvine
Radicalism Within The Context Of Social Movements: Processes And Types, Remy Cross, David A. Snow
Journal of Strategic Security
Drawing on work within the study of social movements and on conversion processes that is relevant to understanding radicalization, as well as on our own relevant research experiences and findings, especially on radicalism in right-wing and left-wing movements, we focus attention on the elements and dynamics of social movements, both intra-movement and extra-movement, that facilitate the grassroots development and maintenance of radical identities and enhance or diminish the prospect of engagement in radical action. In particular, we note the importance of free spaces to associate apart from the reach of control agents and adversaries,the development of affinity groups and a …
Four Lessons From The Study Of Fundamentalism And Psychology Of Religion,
2011
University of Cambridge
Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage
Journal of Strategic Security
What lessons can the study of fundamentalism and the psychology of religion teach the newer field of Radicalization and Involvement in Violent Extremism (RIVE)? Four lessons and an intervention are offered in this article: (1) Religion is a robust human experience and cultural product that adopts a defensive shape when its worldview is threatened. (2) This does not mean that all "fundamentalisms" or radical versions of religion are somehow linked or perform similar functions; rather, they reflect the limited human repertoire to threat, yet within different cultural and historical contexts. (3) Causal explanations on the level of the individual are …
Gangs, Terrorism, And Radicalization,
2011
Arizona State University
Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz
Journal of Strategic Security
What can street gangs tell us about radicalization and extremist groups? At first glance, these two groups seem to push the boundaries of comparison. In this article, we examine the important similarities and differences across criminal, deviant, and extremist groups. Drawing from research on street gangs, this article explores issues such as levels of explanation,organizational structure, group process, and the increasingly important role of technology and the Internet in the context of radicalization. There are points of convergence across these groups, but it is important to understand the differences between these groups. This review finds little evidence to support the …
Radicalization And The Use Of Social Media,
2011
Henley-Putnam
Radicalization And The Use Of Social Media, Robin L. Thompson
Journal of Strategic Security
The use of social media tools by individuals and organizations to radicalize individuals for political and social change has become increasingly popular as the Internet penetrates more of the world and mobile computing devices are more accessible. To establish a construct for radicalization,the power and reach of social media will be described so there is common understanding of what social media is and how it is utilized by various individuals and groups. The second section will answer the question of why social media applications are the perfect platform for the radical voice. Finally, the use of social media and its …
The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010),
2011
Henley-Putnam University
The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010), Edward M. Roche
Journal of Strategic Security
No abstract provided.
Cover & Front Matter,
2011
University of South Florida
Achieving Community Preparedness Post-Katrina,
2011
University of Nevada, Las Vegas
Achieving Community Preparedness Post-Katrina, Christine G. Springer
Public Policy and Leadership Faculty Publications
Improving disaster response capabilities within this country requires better coordination not only within the Department of Homeland Security, but also across the federal government as well as with state and local governments, private and non-profit sectors. To do so, according to more than 150 state and local stakeholders that I surveyed in April, 2009 and again in April, 2010, requires that FEMA improve its capacity to fully support state, local and tribal stakeholders … that it improve its internal business practices so as to better implement federal policies and guidance…that it find a way to use thematic goals and transition …
Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry,
2011
Metropolitan University College, Copenhagen
Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei
Journal of Strategic Security
It has been suggested that alienation and failed integration may be causes of "Homegrown Radical Islamism" in Western societies. Western countries often expect that migrants and their descendants residing there as citizens will embrace or support common democratic ideals as a predicate for—or consequence of—their societal integration. Conventional wisdom suggests: "The more you associate yourself with the cherished and established goals and means, the more you will disassociate yourself from Radical Islamism," and vice versa. We believe that, quite surprisingly, an empirical test of this idea is lacking. Based on a nationally representative sample of 1,113 youth (ages 15–30) in …
Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research,
2011
University of South Florida
Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum
Journal of Strategic Security
Over the past decade, analysts have proposed several frameworks to explain the process of radicalization into violent extremism (RVE). These frameworks are based primarily on rational, conceptual models which are neither guided by theory nor derived from systematic research. This article reviews recent (post-9/11) conceptual models of the radicalization process and recent (post-9/11) empirical studies of RVE. It emphasizes the importance of distinguishing between ideological radicalization and terrorism involvement, though both issues deserve further empirical inquiry.Finally, it summarizes some recent RVE-related research efforts, identifies seven things that social science researchers and operational personnel still need to know about violent radicalization, …
Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism,
2011
Coventry University
Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder
Journal of Strategic Security
In the complex of motivating variables that define the push and pull factors behind recruitment and participation in civil conflict, "radicalization"—or "violent extremism"—is not conceived as a very strong motive, as is the case with studies on terrorism. As part of disarming youth combatants,the linkages between reintegration outcomes and possible rerecruitment into radical and extremist violence must be better understood to mitigate such risks. In our analysis, the policies guiding reintegration of child soldiers and youth should be better attuned to the relationship between recruitment motivations and reintegration outcomes, and must be approached from a political lens rather than a …
Decision-Making Under Uncertainty: Using Case Studies For Teaching Strategy In Complex Environments,
2011
Kennesaw State University
Decision-Making Under Uncertainty: Using Case Studies For Teaching Strategy In Complex Environments, Volker C. Franke
Faculty and Research Publications
Decision-makers today respond to a security environment characterized by volatility, uncertainty, complexity and ambiguity. Decisions cut across a wide range of social, political and cultural domestic and global issues and demand cognitive flexibility, adaptability and the ability to make decisions “on the fly.” While the U.S. military excels in preparing its soldiers and officers for the operational demands and tactical requirements of a wide array of increasingly complex contingency missions, a number of observers have pointed to the need for teaching strategy more effectively as part of professional military education. The purpose of this article is to analyze some of …
Risk Taking And Force Protection,
2011
Georgetown University Law Center
Risk Taking And Force Protection, David Luban
Georgetown Law Faculty Publications and Other Works
This paper addresses two questions about the morality of warfare: (1) how much risk must soldiers take to minimize unintended civilian casualties caused by their own actions (“collateral damage”), and (2) whether it is the same for the enemy's civilians as for one's own.
The questions take on special importance in warfare where one side is able to attack the other side from a safe distance, but at the cost of civilian lives, while safeguarding civilians may require soldiers to take precautions that expose them to greater risk. In a well-known article, Asa Kasher and Amos Yadlin argue that while …
Don’T’ Know Much About History: Constitutional Text, Practice, And Presidential Power,
2010
Hamline University
Don’T’ Know Much About History: Constitutional Text, Practice, And Presidential Power, David A. Schultz
David A Schultz
Assertions of presidential supremacy and power in affairs often invoke history, including events during the administration of George Washington, to defend their assertions. This article raises some questions regarding what we can learn from history for constitutional argument. It concedes generally that historical facts can support or buttress constitution argument, but more specifically it contends that acts undertaken by George Washington are problematic assertions for presidential power, especially those that assert “supremacist” or broad if not exclusive claims for presidential foreign policy authority. To do that, this article first describes how history is employed as constitutional argument for presidential power. …
Artículo Político Campaña Electoral 2011,
2010
COLABORADOR HONORÍFICO UNIVERSIDAD ALICANTE
Artículo Político Campaña Electoral 2011, Pablo Rosser
pablo rosser
Artículo de opinión del autor, como miembro del PSOE en Alicante.
The Chimera Of Europe’S Normative Power In East Asia: A Constructivist Analysis,
2010
Northern Illinois University
The Chimera Of Europe’S Normative Power In East Asia: A Constructivist Analysis, Salvador Santino F. Regilme Jr.
Salvador Santino Jr. F Regilme
Utilising constructivism this work analyses the contemporary relational complexities of East Asia vis-à-vis the European Union (EU). Mindful of the social constructivist themes of identity and interests, it is argued that there are fundamental difficulties found in these interregional relations, which must be urgently addressed. The EU continues to be under-valued and misunderstood in the eyes of the East Asian public; despite the relatively strong economic and political engagement of the Union. With the emergence of China as a global actor, Europe must reinforce its political capital amidst the failures of the EU to reconcile its policy inconsistencies juxtaposed with …
Third Party Access And Refusal To Deal In European Energy Networks: How Sector Regulation And Competition Law Meet Each Other,
2010
University of Cambridge
Third Party Access And Refusal To Deal In European Energy Networks: How Sector Regulation And Competition Law Meet Each Other, Michael Diathesopoulos
Michael Diathesopoulos
In this paper, we will analyse the issue of concurrence between competition and sector rules and the relation between parallel concepts within the two different legal frameworks. We will firstly examine Third Party Access in relation to essential facilities doctrine and refusal of access and we will identify the common points and objectives of these concepts and the extent to which they provide a context to each other’s implementation. Second, we will focus on how Commission uses sector regulation and objectives as a context within the process of implementation of competition law in the energy sector and third, we will …
Ddasaccident710,
2010
AID
Ddasaccident710, Humanitarian Demining Accident And Incident Database
Global CWD Repository
According to investigation report and the observation of accident point, the accident occurred in un-cleared area within the minefield. The deminer was returning back from the rest area to resume the work in his clearance lane, he entered into the minefield, stepped on PMN2 anti-personnel mine and accident happened. The worksite was well prepared and the area was clearly marked in accordance to the [Demining group] SOPs. The deminer did not consider and use the clear access lane to proceed to his working area while he was well aware about the cleared/un-cleared parts of the minefield. He was not stopped …
Ddasaccident719,
2010
AID
Ddasaccident719, Humanitarian Demining Accident And Incident Database
Global CWD Repository
On 22 December 2010 team arrived to the area on 06:30 and started operation on 07:00 working for 45 minutes and then 15 minutes break, the second round started on 08:00 for the same working and breaking period. The third round started on 09:00, [the Victim] worked in his clearance lane using metal detector and then stopped on 09:25 wanted to mark his clearance lane. He picked up marking material/equipment attempted to mark his clearance lane. On the way back he slipped out from his cleared lane to un-clear area, his right foot came on a mine and the accident …
Ddasaccident724,
2010
AID
Ddasaccident724, Humanitarian Demining Accident And Incident Database
Global CWD Repository
On 21 Dec 2011, the deminer [the Victim] started his work as usual in the assigned task for him to continue the clearance of the Mine Line (SML) which was laid as a cluster with one AT mine (M19) guarded by 3 APs M35 and after recovering and defusing one AT (19) and 2 APs (M35 / no defusing), the deminer started his work for the second period at 8:45 and he reported one signal to the team leader. The team leader left him to proceed with the proper procedures to recover and defuse the mine and at 8:55 hrs …