Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Social and Behavioral Sciences
Unmanned Aerial Vehicles In Counterterrorism Efforts And Implications For International Humanitarian Law, Kunle Adebamiji Olulowo
Unmanned Aerial Vehicles In Counterterrorism Efforts And Implications For International Humanitarian Law, Kunle Adebamiji Olulowo
Walden Dissertations and Doctoral Studies
The United States increasingly has resorted to the use of Unmanned Aerial Vehicles (UAVs) for targeted killings of terrorists as a counterterrorism strategy. More states and terrorist organizations also are acquiring UAVs and this development can lead to indiscriminate and unregulated use of UAVs. Previous researchers have indicated the surveillance ability and precise weapon delivery capacity of UAVs make them a weapon of choice for U.S. counterterrorism efforts. Although the U.S. government estimated the collateral damage involved in the use of UAVs at 3-5%, nongovernmental sources put it at 25-40%. A gap exists in the current literature regarding public perception …
Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman
Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman
Walden Dissertations and Doctoral Studies
From 2000 to 2013, Israel had the second highest number of deaths from suicide attacks and was on the list of countries that may experience increases in terrorism due to ongoing conflicts. Suicide bombings present highly complex situations for counterterrorism and counterinsurgency professionals. Using Freeman, Tucker, and Merton's framework of 9 preattack phases as the primary theoretical constuct, the purpose of this multiple case study was to explore specific patterns that consistently emerged in the adversary planning process for 6 successful or failed suicide bombing cases in Israel. Secondary, archival data were acquired through a data use agreement with a …
Countering Expansion And Organization Of Terrorism In Cyberspace, Sunday Oludare Ogunlana
Countering Expansion And Organization Of Terrorism In Cyberspace, Sunday Oludare Ogunlana
Walden Dissertations and Doctoral Studies
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities perpetrated through the aid of computers in cyberspace. Using routine activity theory, this study assessed the effectiveness of technological approaches to mitigating the expansion and organization of terrorism in cyberspace. The study aligned with the purpose area analysis objective of classifying and assessing potential terrorist threats to preempt and mitigate the attacks. Data collection included document content analysis of the …
Local Law Enforcement's Ability To Transform Inputs Into Counterterrorism Outputs, Melissa S. Gresham
Local Law Enforcement's Ability To Transform Inputs Into Counterterrorism Outputs, Melissa S. Gresham
Walden Dissertations and Doctoral Studies
Leadership within local police organizations should be able to, but do not, process information and create actionable strategies aimed toward proactive counterterrorism practices. This problem could lead to future terrorist attacks within the United States if police agencies do not adjust their tactics in response to growing terrorist threats. A possible cause of this problem is that leadership within local law enforcement agencies is reactive in nature and as a consequence, do not encourage officers to engage in proactive strategies. Using Easton's conceptualization of systems theory as the foundation, the purpose of this case study of a single law enforcement …