Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Social and Behavioral Sciences

Loss Of Identity, Radicalization, And Terrorism, Magdalena Martinez Dec 2016

Loss Of Identity, Radicalization, And Terrorism, Magdalena Martinez

Master's Theses

France and Belgium are two of the top countries in Europe with an increasing number of root fighters. Over the last two years, both countries have been primary targets of terrorism. This thesis investigates the repeated pattern of events and analyzes from a birds-eye view the cycle leading to the rise of terrorism in France and Belgium. This research disputes that anxiety causes discrimination and lack of integration in France and Belgium, which contributes an identity crisis. In essence, these factors trigger radicalization and lead to terrorism. Analyzing the patterns of terrorist activity and the path of radicalization is essential …


Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag Nov 2016

Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag

Publications

Pennsylvanians mainly see Homeland Security as a comprehensive effort of the federal government to fight terrorism at home and abroad. While it most often has a positive connotation, the multi-faceted mission space of homeland security is widely unknown.


Selling National Security: Journalism, Political Actors, And The Marketing Of Counterterrorism Policy, Nicole M. Napolitano Sep 2016

Selling National Security: Journalism, Political Actors, And The Marketing Of Counterterrorism Policy, Nicole M. Napolitano

Dissertations, Theses, and Capstone Projects

The social construction of terrorism in the public sphere naturally limits and directs logical policy options. In the United States, media are a primary vehicle for the construction of social problems and accompanying policy solutions, as much of public discourse takes place in media narratives. News media play a major part in political communication, both between government and governed as well as among different segments of government.

Social construction in media is shaped by journalistic values and preferences, occurs within an active and influential policy process, and is shaped by powerful policy actors. Government-based policy actors, or governmental policy entrepreneurs, …


Global Threats And Strategic Assessments: Al-Aqsa Martyrs' Brigade An Evolving Terrorism Force, Kaydee Penn Jun 2016

Global Threats And Strategic Assessments: Al-Aqsa Martyrs' Brigade An Evolving Terrorism Force, Kaydee Penn

Student Works

The purpose of this report is to present a Foreign Terrorist Organization (FTO) designated by the Secretary of State that poses as a threat to U.S. national interests. This report contains an analysis of current research on the Al-Aqsa Martyrs' Brigade's past, present, and foreseeable status. An investigation into AAMB's past attacks is imminent to thwarting future attacks. This report will provide a method of analysis to identify gaps and trends in Al-Aqsa Martyrs' Brigade's past attacks. The findings from the analysis will pave the way for further research to benefit national security.


Headhunting: Evaluating The Disruptive Capacity Of Leadership Decapitation On Terrorist Organizations, Ted Clemens Iv Jun 2016

Headhunting: Evaluating The Disruptive Capacity Of Leadership Decapitation On Terrorist Organizations, Ted Clemens Iv

Dissertations, Theses, and Capstone Projects

Leadership decapitation -- the practice of removing a leader from a position of authority through targeted killing (i.e. assassination) or arrest -- has long been a feature of counter-terrorism and counter-insurgency strategies the world over. Still, how effective is the practice of leadership decapitation in actually bringing a halt to, or even impeding, terrorist activity? Can removing top leaders of terrorist enclaves from power disrupt their groups to the point of organizational degradation or dissolution? And lastly, because no two terrorist groups are the same; when a terrorist group experiences leadership loss, how can the group be expected to react? …


Disrupt, Deny, Dismantle: A Special Operations Forces (Sof) Model For Combatting New Terrorism, Will Gunzelman Apr 2016

Disrupt, Deny, Dismantle: A Special Operations Forces (Sof) Model For Combatting New Terrorism, Will Gunzelman

Faculty Publications and Presentations

Terrorism in the new millennium has morphed drastically since the 1970s. The terrorist organizations of today are a hybrid between the insurgent group models of the 1960s and modern terrorist organizations such as Al Qaeda. This hybrid model has created what has become a transnational insurgency recruited, trained, and led by major terrorist networks such as the Islamic State of Iraq and the Levant (ISIL). Even smaller regional groups such as Boko Haram have surpassed merely conducting terrorist attacks. These smaller groups are also focused on controlling territory. Tan (2008) refers to this change as “New Terrorism”. To combat New …


Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende Jan 2016

Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende

Australian Information Security Management Conference

Throughout the past decade the methods employed by terrorist organisations have changed drastically. One of these key changes has been associated with the rise of social media such as Facebook, Twitter, YouTube and blogging in general. Terrorist organisations appear to be using the wide reach and vast network capabilities created by social media to disseminate propaganda, radicalise susceptible individuals, recruit potential fighters and communicate strategic and operational objectives. However, this growing terrorist presence on Social Media can also offer invaluable insights into the social networks of terrorist organisations through the use of Social Media Mining and Social Network Analysis. By …