Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

5,604 Full-Text Articles 3,554 Authors 2,500,602 Downloads 150 Institutions

All Articles in Defense and Security Studies

Faceted Search

5,604 full-text articles. Page 175 of 186.

Rethinking Radicalization, Randy Borum 2011 University of South Florida

Rethinking Radicalization, Randy Borum

Journal of Strategic Security

No abstract provided.


Radicalism Within The Context Of Social Movements: Processes And Types, Remy Cross, David A. Snow 2011 University of California, Irvine

Radicalism Within The Context Of Social Movements: Processes And Types, Remy Cross, David A. Snow

Journal of Strategic Security

Drawing on work within the study of social movements and on conversion processes that is relevant to understanding radicalization, as well as on our own relevant research experiences and findings, especially on radicalism in right-wing and left-wing movements, we focus attention on the elements and dynamics of social movements, both intra-movement and extra-movement, that facilitate the grassroots development and maintenance of radical identities and enhance or diminish the prospect of engagement in radical action. In particular, we note the importance of free spaces to associate apart from the reach of control agents and adversaries,the development of affinity groups and a …


Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage 2011 University of Cambridge

Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage

Journal of Strategic Security

What lessons can the study of fundamentalism and the psychology of religion teach the newer field of Radicalization and Involvement in Violent Extremism (RIVE)? Four lessons and an intervention are offered in this article: (1) Religion is a robust human experience and cultural product that adopts a defensive shape when its worldview is threatened. (2) This does not mean that all "fundamentalisms" or radical versions of religion are somehow linked or perform similar functions; rather, they reflect the limited human repertoire to threat, yet within different cultural and historical contexts. (3) Causal explanations on the level of the individual are …


Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz 2011 Arizona State University

Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz

Journal of Strategic Security

What can street gangs tell us about radicalization and extremist groups? At first glance, these two groups seem to push the boundaries of comparison. In this article, we examine the important similarities and differences across criminal, deviant, and extremist groups. Drawing from research on street gangs, this article explores issues such as levels of explanation,organizational structure, group process, and the increasingly important role of technology and the Internet in the context of radicalization. There are points of convergence across these groups, but it is important to understand the differences between these groups. This review finds little evidence to support the …


Radicalization And The Use Of Social Media, Robin L. Thompson 2011 Henley-Putnam

Radicalization And The Use Of Social Media, Robin L. Thompson

Journal of Strategic Security

The use of social media tools by individuals and organizations to radicalize individuals for political and social change has become increasingly popular as the Internet penetrates more of the world and mobile computing devices are more accessible. To establish a construct for radicalization,the power and reach of social media will be described so there is common understanding of what social media is and how it is utilized by various individuals and groups. The second section will answer the question of why social media applications are the perfect platform for the radical voice. Finally, the use of social media and its …


The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010), Edward M. Roche 2011 Henley-Putnam University

The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010), Edward M. Roche

Journal of Strategic Security

No abstract provided.


Cover & Front Matter, 2011 University of South Florida

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Achieving Community Preparedness Post-Katrina, Christine G. Springer 2011 University of Nevada, Las Vegas

Achieving Community Preparedness Post-Katrina, Christine G. Springer

Public Policy and Leadership Faculty Publications

Improving disaster response capabilities within this country requires better coordination not only within the Department of Homeland Security, but also across the federal government as well as with state and local governments, private and non-profit sectors. To do so, according to more than 150 state and local stakeholders that I surveyed in April, 2009 and again in April, 2010, requires that FEMA improve its capacity to fully support state, local and tribal stakeholders … that it improve its internal business practices so as to better implement federal policies and guidance…that it find a way to use thematic goals and transition …


Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei 2011 Metropolitan University College, Copenhagen

Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei

Journal of Strategic Security

It has been suggested that alienation and failed integration may be causes of "Homegrown Radical Islamism" in Western societies. Western countries often expect that migrants and their descendants residing there as citizens will embrace or support common democratic ideals as a predicate for—or consequence of—their societal integration. Conventional wisdom suggests: "The more you associate yourself with the cherished and established goals and means, the more you will disassociate yourself from Radical Islamism," and vice versa. We believe that, quite surprisingly, an empirical test of this idea is lacking. Based on a nationally representative sample of 1,113 youth (ages 15–30) in …


Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum 2011 University of South Florida

Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum

Journal of Strategic Security

Over the past decade, analysts have proposed several frameworks to explain the process of radicalization into violent extremism (RVE). These frameworks are based primarily on rational, conceptual models which are neither guided by theory nor derived from systematic research. This article reviews recent (post-9/11) conceptual models of the radicalization process and recent (post-9/11) empirical studies of RVE. It emphasizes the importance of distinguishing between ideological radicalization and terrorism involvement, though both issues deserve further empirical inquiry.Finally, it summarizes some recent RVE-related research efforts, identifies seven things that social science researchers and operational personnel still need to know about violent radicalization, …


Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder 2011 Coventry University

Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder

Journal of Strategic Security

In the complex of motivating variables that define the push and pull factors behind recruitment and participation in civil conflict, "radicalization"—or "violent extremism"—is not conceived as a very strong motive, as is the case with studies on terrorism. As part of disarming youth combatants,the linkages between reintegration outcomes and possible rerecruitment into radical and extremist violence must be better understood to mitigate such risks. In our analysis, the policies guiding reintegration of child soldiers and youth should be better attuned to the relationship between recruitment motivations and reintegration outcomes, and must be approached from a political lens rather than a …


Decision-Making Under Uncertainty: Using Case Studies For Teaching Strategy In Complex Environments, Volker C. Franke 2011 Kennesaw State University

Decision-Making Under Uncertainty: Using Case Studies For Teaching Strategy In Complex Environments, Volker C. Franke

Faculty and Research Publications

Decision-makers today respond to a security environment characterized by volatility, uncertainty, complexity and ambiguity. Decisions cut across a wide range of social, political and cultural domestic and global issues and demand cognitive flexibility, adaptability and the ability to make decisions “on the fly.” While the U.S. military excels in preparing its soldiers and officers for the operational demands and tactical requirements of a wide array of increasingly complex contingency missions, a number of observers have pointed to the need for teaching strategy more effectively as part of professional military education. The purpose of this article is to analyze some of …


Risk Taking And Force Protection, David Luban 2011 Georgetown University Law Center

Risk Taking And Force Protection, David Luban

Georgetown Law Faculty Publications and Other Works

This paper addresses two questions about the morality of warfare: (1) how much risk must soldiers take to minimize unintended civilian casualties caused by their own actions (“collateral damage”), and (2) whether it is the same for the enemy's civilians as for one's own.

The questions take on special importance in warfare where one side is able to attack the other side from a safe distance, but at the cost of civilian lives, while safeguarding civilians may require soldiers to take precautions that expose them to greater risk. In a well-known article, Asa Kasher and Amos Yadlin argue that while …


Don’T’ Know Much About History: Constitutional Text, Practice, And Presidential Power, David A. Schultz 2010 Hamline University

Don’T’ Know Much About History: Constitutional Text, Practice, And Presidential Power, David A. Schultz

David A Schultz

Assertions of presidential supremacy and power in affairs often invoke history, including events during the administration of George Washington, to defend their assertions. This article raises some questions regarding what we can learn from history for constitutional argument. It concedes generally that historical facts can support or buttress constitution argument, but more specifically it contends that acts undertaken by George Washington are problematic assertions for presidential power, especially those that assert “supremacist” or broad if not exclusive claims for presidential foreign policy authority. To do that, this article first describes how history is employed as constitutional argument for presidential power. …


Artículo Político Campaña Electoral 2011, pablo rosser 2010 COLABORADOR HONORÍFICO UNIVERSIDAD ALICANTE

Artículo Político Campaña Electoral 2011, Pablo Rosser

pablo rosser

Artículo de opinión del autor, como miembro del PSOE en Alicante.


The Chimera Of Europe’S Normative Power In East Asia: A Constructivist Analysis, Salvador Santino F. Regilme Jr. 2010 Northern Illinois University

The Chimera Of Europe’S Normative Power In East Asia: A Constructivist Analysis, Salvador Santino F. Regilme Jr.

Salvador Santino Jr. F Regilme

Utilising constructivism this work analyses the contemporary relational complexities of East Asia vis-à-vis the European Union (EU). Mindful of the social constructivist themes of identity and interests, it is argued that there are fundamental difficulties found in these interregional relations, which must be urgently addressed. The EU continues to be under-valued and misunderstood in the eyes of the East Asian public; despite the relatively strong economic and political engagement of the Union. With the emergence of China as a global actor, Europe must reinforce its political capital amidst the failures of the EU to reconcile its policy inconsistencies juxtaposed with …


Third Party Access And Refusal To Deal In European Energy Networks: How Sector Regulation And Competition Law Meet Each Other, Michael Diathesopoulos 2010 University of Cambridge

Third Party Access And Refusal To Deal In European Energy Networks: How Sector Regulation And Competition Law Meet Each Other, Michael Diathesopoulos

Michael Diathesopoulos

In this paper, we will analyse the issue of concurrence between competition and sector rules and the relation between parallel concepts within the two different legal frameworks. We will firstly examine Third Party Access in relation to essential facilities doctrine and refusal of access and we will identify the common points and objectives of these concepts and the extent to which they provide a context to each other’s implementation. Second, we will focus on how Commission uses sector regulation and objectives as a context within the process of implementation of competition law in the energy sector and third, we will …


Ddasaccident710, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident710, Humanitarian Demining Accident And Incident Database

Global CWD Repository

According to investigation report and the observation of accident point, the accident occurred in un-cleared area within the minefield. The deminer was returning back from the rest area to resume the work in his clearance lane, he entered into the minefield, stepped on PMN2 anti-personnel mine and accident happened. The worksite was well prepared and the area was clearly marked in accordance to the [Demining group] SOPs. The deminer did not consider and use the clear access lane to proceed to his working area while he was well aware about the cleared/un-cleared parts of the minefield. He was not stopped …


Ddasaccident719, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident719, Humanitarian Demining Accident And Incident Database

Global CWD Repository

On 22 December 2010 team arrived to the area on 06:30 and started operation on 07:00 working for 45 minutes and then 15 minutes break, the second round started on 08:00 for the same working and breaking period. The third round started on 09:00, [the Victim] worked in his clearance lane using metal detector and then stopped on 09:25 wanted to mark his clearance lane. He picked up marking material/equipment attempted to mark his clearance lane. On the way back he slipped out from his cleared lane to un-clear area, his right foot came on a mine and the accident …


Ddasaccident724, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident724, Humanitarian Demining Accident And Incident Database

Global CWD Repository

On 21 Dec 2011, the deminer [the Victim] started his work as usual in the assigned task for him to continue the clearance of the Mine Line (SML) which was laid as a cluster with one AT mine (M19) guarded by 3 APs M35 and after recovering and defusing one AT (19) and 2 APs (M35 / no defusing), the deminer started his work for the second period at 8:45 and he reported one signal to the team leader. The team leader left him to proceed with the proper procedures to recover and defuse the mine and at 8:55 hrs …


Digital Commons powered by bepress