Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Psychology

Allen Gnanam

Terrorism

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam Jan 2010

Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam

Allen Gnanam

Terrorism as a violent and destabilizing act performed by terrorists, meaning loyal followers of political or religious agendas who hold resent and animosity toward a certain authority/ government (Lin, Liou, & Wu, 2007, pg. 149), will be explored and analyzed through the utilization of the governmentality perspective. For the purposes of this paper terrorism governance will refer to the governance/ control/ influence exerted by terrorists and terrorism. The focus of this explorative and analysis paper will be to identify diverse terrorism oriented technologies of governance, and analyze the ways in which these technologies enable terrorist to exert governance both indirectly …


Cyber Terrorism, Allen Gnanam Jan 2009

Cyber Terrorism, Allen Gnanam

Allen Gnanam

This paper sets out to identify and explain the negative national security implications, negative physical & psychological implications, and the negative economic implications that society could face, as a result of a severe cyber attack against major sectors of a nations infrastructure. In addition instigating factors that lead to/ provoke cyber terrorism will be identified, in order to strategically influence counter cyber terrorism policy towards an offensive model. Along with that, this paper will present defensive/ target hardening counter- cyber terrorism policies that will enable proactive security mechanisms to be implemented.