Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (146)
- University of Denver (26)
- Universitas Indonesia (16)
- Selected Works (14)
- Montclair State University (11)
-
- University of Arkansas, Fayetteville (9)
- Old Dominion University (6)
- San Jose State University (6)
- College of Saint Benedict and Saint John's University (4)
- Liberty University (4)
- University of Central Florida (4)
- Chapman University (3)
- City University of New York (CUNY) (3)
- Missouri State University (3)
- Claremont Colleges (2)
- Florida International University (2)
- University of New Hampshire (2)
- University of Washington Tacoma (2)
- Virginia Commonwealth University (2)
- Aga Khan University (1)
- Air Force Institute of Technology (1)
- Ateneo de Manila University (1)
- Bard College (1)
- Bowdoin College (1)
- Brigham Young University (1)
- California State University, San Bernardino (1)
- Cedarville University (1)
- Columbia Law School (1)
- Dartmouth College (1)
- Dominican University of California (1)
- Publication Year
- Publication
-
- International Bulletin of Political Psychology (143)
- Human Rights & Human Welfare (24)
- Journal of Terrorism Studies (14)
- Jeffrey Ian Ross Ph.D. (10)
- Department of Justice Studies Faculty Scholarship and Creative Works (9)
-
- Mineta Transportation Institute (6)
- Graduate Program in International Studies Theses & Dissertations (4)
- Graduate Theses and Dissertations (4)
- Honors Undergraduate Theses (4)
- Psychology Faculty Publications (4)
- Research Projects (4)
- Faculty Publications (3)
- MSU Graduate Theses (3)
- FIU Electronic Theses and Dissertations (2)
- Liberty University Journal of Statesmanship & Public Policy (2)
- Publications (2)
- Senior Honors Theses (2)
- The University of New Hampshire Law Review (2)
- Theses and Dissertations (2)
- Abdou Filali-Ansary Occasional Paper Series (1)
- Access*: Interdisciplinary Journal of Student Research and Scholarship (1)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- Ateneo School of Government Publications (1)
- CBER Conference (1)
- CMC Senior Theses (1)
- Cary Federman (1)
- Chancellor’s Honors Program Projects (1)
- Christopher Salvatore (1)
- DU Undergraduate Research Journal Archive (1)
- Dartmouth College Undergraduate Theses (1)
Articles 1 - 30 of 298
Full-Text Articles in Social and Behavioral Sciences
Ideological Parameters For Deradicalization Programs To Measure Changes In Terrorist Ideology In Indonesia, Yudi Zulfahri, Aldi Nur Fadil Auliya
Ideological Parameters For Deradicalization Programs To Measure Changes In Terrorist Ideology In Indonesia, Yudi Zulfahri, Aldi Nur Fadil Auliya
Journal of Terrorism Studies
The paper analyzes the inefficiency of the Deradicalization strategy implemented by The National Counter Terrorism Agency (BNPT), causing the issue of recidivist terrorism in Indonesia. Although the occurrence of recidivism is common in various crimes, it poses unique challenges in terrorism cases, given that the government has allocated a specific budget and established a special agency, BNPT, to tackle terrorism-related issues. The high recidivism rate in terrorism cases has prompted public concern and criticism regarding the effectiveness of Deradicalization programs. Despite the ongoing debate, this paper argues that the success or failure of Deradicalization programs cannot be measured simply by …
Coverage Of Kidnapping In North-West Nigeria:An Analysis Of Daily Trust And The Guardian Newspapers, Amina Salisu Mohammed
Coverage Of Kidnapping In North-West Nigeria:An Analysis Of Daily Trust And The Guardian Newspapers, Amina Salisu Mohammed
Journal of Terrorism Studies
The study examined the coverage of kidnapping in North-West Nigeria by looking at the extent of coverage, prominence and major sources of news found in the stories in Daily Trust and The Guardian newspapers for the period of two years using content analysis research design. The findings indicated little attention to the interpretative role of the mass media, low prominence and too much reliance on Government/official news sources in reporting kidnapping in North-West Nigeria.
Keywords: Kidnapping, Terrorism, Insecurity, Coverage, Armed Banditry
The Unyielding Menace: Investigating The Global Impact Of The Islamic State (Is) And The Rise Of Non-State Actors In Modern Security, Sohail Ahmad, Maria Jawad Khan
The Unyielding Menace: Investigating The Global Impact Of The Islamic State (Is) And The Rise Of Non-State Actors In Modern Security, Sohail Ahmad, Maria Jawad Khan
CBER Conference
This research paper delves into the profound impact of the Islamic State on global terrorism and security dynamics. By exploring the origins, ideology, organization, recruitment methods, and operational strategies of the Islamic State, this research unravel the intricate web that fuels its rise. Through a case study approach, the research sheds light on the global reach of the Islamic State, its vast networks, and the powerful motivations behind its actions.
Migration And Terrorism In Europe: A Nexus Of Two Crises, Shreya Sinha
Migration And Terrorism In Europe: A Nexus Of Two Crises, Shreya Sinha
International Journal on Responsibility
The migration surge into the borders of the European Union has become a major problem in Europe as it has led to several challenges to societal integration and political legitimacy. It is also a danger to cultural identity, domestic and labour market stability as well as internal security, such that a migrant is often perceived as a threat to European society. The first part of the paper attempts to throw light on this migration-security nexus in Europe and how migration has developed into a security issue. The second part discusses how the two crises of migration and terrorism have come …
Why Islamism Failed In Syria, Ararat Kostanian
Why Islamism Failed In Syria, Ararat Kostanian
Journal of Terrorism Studies
The Arab Spring has not fulfilled the desires of millions of demonstrators in Middle East. The desires to see the expanded role of the civil society has been muted by the Islamists and particularly by the Muslim Brotherhood. The Article puts the focus on the failure of Islamism in Syria during the uprising for several reasons, such as the inability of the Muslim Brotherhood to shape a new leadership, and its rejectionist agenda that had nurtured skepticism by the opposition factions. Furthermore, the Syrian Muslim Brotherhood had been unable to change its political motivation and kept insisted on shifting the …
The Path Of Securitization: Transformation Of Free Papua Movement (Opm) Terminology From Armed Criminal Groups To Separatist And Terrorist Groups, I Putu Hadi Pradnyana
The Path Of Securitization: Transformation Of Free Papua Movement (Opm) Terminology From Armed Criminal Groups To Separatist And Terrorist Groups, I Putu Hadi Pradnyana
Journal of Terrorism Studies
The purpose of this study is to analyze the pattern of securitization in Papua using the speech act framework. Regarding the response to the change in status or terminology of the Free Papua Movement or Organisasi Papua Merdeka (OPM) to the Separatist Terrorist Group. The Securitization Theory of the Copenhagen School defines security as a social construction and process, not as an objective condition. This contrasts with the traditional security studies approach which defines security in terms of the threat, use, and control of military force by state actors. This research will focus on the pattern of securitization of the …
The Us War In Afghanistan And The War Powers Act: A Natural Experiment, Burrell Fletcher V
The Us War In Afghanistan And The War Powers Act: A Natural Experiment, Burrell Fletcher V
Economics Undergraduate Honors Theses
How Can the War Powers Act of 1972 be Reformed to Increase the Chances of Winning Wars?
This paper examines the effects of the War Powers Act of 1973’s Authorisation for Use of Military Force (AUMF) system on the conduct of war, especially regarding the ongoing War on Terror. The War on Terror, began in the aftermath of the September 11, 2001, attacks when President Bush invaded Afghanistan. Congress, using the War Powers Act, passed the 2001 AUMF in the weeks after the attacks. The 2001 AUMF has been used in twenty-two countries to justify anti-terror operations thus far (Savell, …
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
Publications
The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …
Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell
Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell
PPPA Paper Prize
The Antiterrorism and Effective Death Penalty Act (1996) and the USA PATRIOT Act (2001) are two key examples of reactive policies enacted in response to terrorist attacks on American soil. Expedited passage of both pieces of legislation were reliant on the public’s support for government action in wake of recent atrocities. These acts gave particular attention to securing the nation’s borders, directing an increase in funding for Border Patrol in order to prevent future terrorist attacks. This essay will connect the increased funding for border security directed by Congress with the defense industry’s pursuit of funding and outlets for drone …
Extremism In America: Explaining Variations In Ideologically Motivated Fatal Violence, Celinet Duran
Extremism In America: Explaining Variations In Ideologically Motivated Fatal Violence, Celinet Duran
Dissertations, Theses, and Capstone Projects
This dissertation uses data from the United States Extremist Crime Database (ECDB) to assess the nature of extremist violence between left-wing, far-right and al-Qaeda and associated movements (AQAM) inspired ideological fatal violence. It extends the empirical literature on extremist violence in three significant ways by: (1) expanding an existing database to provide a comparative component that is both timely and policy-relevant and conveys a more complete picture of the nature of domestic extremism in the U.S.; (2) systematically comparing extremist violence across the left-wing, far-right and AQAM ideologies to better assess the nuances of extremist violence; and (3) applying empirical …
Changing Tides: Online Conspiracy Theory Use By Radical Violent Extremist Groups Over Time, William J. Eames Iii
Changing Tides: Online Conspiracy Theory Use By Radical Violent Extremist Groups Over Time, William J. Eames Iii
UNF Graduate Theses and Dissertations
Radical violent extremist terrorism is a global issue that has existed for centuries and has been the cause of millions of deaths. Extremist organizations have learned to adapt and survive attempts at legal/military interdictions. One possible major element that allows for the survival of these radicalized organizations is the use of conspiracy theories within their online messages that are used to radicalize and recruit members to their cause. These conspiracy theories tend to elicit two types of messages: a quest for significance or a loss of significance. This study aims to observe how extremist organizations utilize conspiracy theories in their …
A Hollow Victory And Unending Problem: The Undying Anti-Russian Insurgency In Ukraine, Abraham Ashley
A Hollow Victory And Unending Problem: The Undying Anti-Russian Insurgency In Ukraine, Abraham Ashley
MSU Graduate Theses
This thesis uses quantitative and qualitative research methods to: (1) explore the base causes of insurgency in Ukraine, (2) examine the historical basis for Ukrainian insurgency, (3) provide historical examples of successful and unsuccessful insurgencies to contrast against Ukraine, and (4) provide recommendations for NATO and Ukrainian policy. Collectively, this project demonstrates that current Russian counterinsurgency tactics will not be successful without significant adjustment. This Ukrainian insurgency may also derail the possibility of peace in the region.
Surfing The Kali Yuga: Tracking The Alt-Right On Twitter, Jaida Hodge-Adams
Surfing The Kali Yuga: Tracking The Alt-Right On Twitter, Jaida Hodge-Adams
Honors Projects
The alt-right is a hyper-extreme, decentralized network of far-right pundits and their doggish supporters that exists almost entirely online. Consumed by conspiracy and identity, the myths of bigoted ideologies like racism, antisemitism, and transphobia are taken for granted, and their ideology calls for violent ends by violent means. In the physical world, members of the alt-right often keep their rhetoric to themselves; Online, however, they find solace in a vast, international network of websites and forums that together form one giant echo chamber into which they can dump their darkest thoughts. Though any individual member of the alt-right may operate …
Countering Terrorism On Tomorrow’S Battlefield: Critical Infrastructure Security And Resiliency (Nato Coe-Dat Handbook 2), Sarah J. Lohmann, Lucas M. Cox, Denise Feldner, Trevor P. Helmy, Frank J. Kuzminski, Marcus Mohlin, Aleksander Olech, Wuraola Oyewusi, Gabriel T. Raicu, Silke Ruhl, Sabrina Schulz, Máté Tóth, Megan A. Ward
Countering Terrorism On Tomorrow’S Battlefield: Critical Infrastructure Security And Resiliency (Nato Coe-Dat Handbook 2), Sarah J. Lohmann, Lucas M. Cox, Denise Feldner, Trevor P. Helmy, Frank J. Kuzminski, Marcus Mohlin, Aleksander Olech, Wuraola Oyewusi, Gabriel T. Raicu, Silke Ruhl, Sabrina Schulz, Máté Tóth, Megan A. Ward
Monographs, Collaborative Studies, & IRPs
Every day, malicious actors target emerging technologies and medical resilience or seek to wreak havoc in the wake of disasters brought on by climate change, energy insecurity, and supply-chain disruptions. Countering Terrorism on Tomorrow’s Battlefield is a handbook on how to strengthen critical infrastructure resilience in an era of emerging threats. The counterterrorism research produced for this volume is in alignment with NATO’s Warfighting Capstone Concept, which details how NATO Allies can transform and maintain their advantage despite new threats for the next two decades. The topics are rooted in NATO’s Seven Baseline requirements, which set the standard for enhancing …
Exploring Change And Stability In Counterterrorism Policy, Prosecution, And Sentencing Of Terrorists In America Over The Last Three Decades In The United States, Georgianna Grace Bettis
Exploring Change And Stability In Counterterrorism Policy, Prosecution, And Sentencing Of Terrorists In America Over The Last Three Decades In The United States, Georgianna Grace Bettis
Graduate Theses and Dissertations
The purpose of the current study is to investigate the effects of legislation changes on how terrorists are adjudicated in American federal courts. The overarching question is: how have prosecutorial and sentencing outcomes changed in response to homeland security policy shifts over the last few decades? The project examines the impact of policy on changes to terrorists’ sentencing in three time periods, marked by three major events: The 1993 World Trade Center Attack, the 1995 Oklahoma City Bombing, and the attack on the Twin Towers (9/11/2001). In addition to terrorists’ demographic and background attributes (i.e., gender, age, terrorism category), the …
The Levels And Discrepancies Of America’S Fear Of Terrorism, Kate Lindfors
The Levels And Discrepancies Of America’S Fear Of Terrorism, Kate Lindfors
Student Scholar Symposium Abstracts and Posters
Within the United States, individuals do not appear to possess an accurate understanding of terrorism and the threat it may pose to Americans. This not only creates inaccurate perceptions of the actual risk levels associated with terrorism in the U.S. but a misunderstanding of the potential sources of terrorist threats and the impact they could have on the country. In this paper, I will examine this misunderstanding of contemporary terrorism, particularly in relation to America’s inflated sense of fear and general misplacement of the threat. In order to examine this topic, I have used the Chapman University Survey on American …
Understanding Terrorism: An Alternative View And The Painful Truth: How Powerful Nations Legitimize Terrorism, Kwame B. Antwi-Boasiako, Cindy P. Davis
Understanding Terrorism: An Alternative View And The Painful Truth: How Powerful Nations Legitimize Terrorism, Kwame B. Antwi-Boasiako, Cindy P. Davis
Journal of Terrorism Studies
Despite human beings’ noble achievements on this planet including medicine, technology, physics, and chemistry, there is one characteristic of humans, which is disturbing and that act is “committing extreme cruelty and violence against its own species” (Smith 2007:41). This cruelty by human beings against themselves stems from many factors including power, ideology, religion, and terrorism. These categorizations, as Smith (2011) noted, are unfortunately used to dehumanize the other through societal definitions where one group, the powerful, sees itself as the paragons of civilization against the other, the weak, as barbarians. Terrorism, racism, ideology, and religion are but some of the …
Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah
Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah
Journal of Terrorism Studies
Tension between privacy and security is nothing new, however due to the development of information and communication technology use as well as more intensive efforts of terrorism eradication have affected to the increasing level of the conflict. The need for national security is often similar to the situation of state of emergency, which enables the state to conduct several limitations to the implementation of right to privacy. Many states use the said justification and further position the element of national security to be in the superior position compared to the protection of civil liberties, including right to privacy. As …
Terrorism Violence: Assessing The Impact Of Education Programs Through Mass Media On The Adoption Of Security Measures In Burkina Faso, Marie Madeleine Ouoba, Emmanuel Lompo
Terrorism Violence: Assessing The Impact Of Education Programs Through Mass Media On The Adoption Of Security Measures In Burkina Faso, Marie Madeleine Ouoba, Emmanuel Lompo
Journal of Terrorism Studies
This paper investigates the impact of mass media education programs (MEP) on the adoption of security measures in the context of terrorism in Burkina Faso. We collected information using questionnaires and key informant interviews in Ouagadougou, Burkina Faso. The results suggest that individuals who were educated on terrorism through MEP display higher intentions to adopt security measures and tend to have positive attitudes toward the role of media in fighting terrorism violence.
Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor
Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor
Liberty University Journal of Statesmanship & Public Policy
Twenty-one years ago, one of the greatest attacks on the American republic occurred. On September 11, 2001, American Airlines Flights 11, 77, 93, and 177 were hijacked by Islamic extremists and crashed in New York City, Washington D.C., and Pennsylvania. The atrocity of these incidents and the extensive loss of life impacted not only the United States but the entire world. Nevertheless, in light of this tragedy the American people found unity in patriotism, rekindling a sense of national purpose in the form of the “Global War on Terrorism.” This document is a compilation of reflection articles written by individuals …
Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta
Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta
Journal of Terrorism Studies
A surprising phenomenon was observed in the lone-wolf terror terrorism that occurred in Indonesia. This is associated with the fact that the perpetrators of seven out of thirteen cases reported were exposed to radical information through social media and the internet without directly joining a terrorist group. The process involved the intensive exploration of the internet by people previously interested in radicalism content which eventually led to self-radicalization and the subsequent terror acts. Meanwhile, Fathali M Moghaddam proposed that the process of radicalization before a terror act is conducted involves six stages of action known as the staircase to terrorism. …
Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk
Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk
Graduate Theses and Dissertations
Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …
Destabilizing Terrorist Networks, John Keane
Destabilizing Terrorist Networks, John Keane
Dartmouth College Undergraduate Theses
Terrorism is a threat to global security and instills fear in the lives of people across the world. Over the past decades, billions in \$USD have been invested in counter-terrorism efforts. One approach to counter-terrorism is to destabilize terrorist organizations such that they are less effective at carrying out attacks. Previous work has investigated how to best proceed in this direction, such as which terrorists to target. Terrorist organizations have also been modeled as networks, where nodes can represent factions and/or terrorists. Research has been done to understand the network dynamics and link the structure of such networks to their …
Terror: The Ultimate Weapon Of Pirates, Aimee Hunt
Terror: The Ultimate Weapon Of Pirates, Aimee Hunt
Student Research
Attempting to explain the tactic of terror as 17th and 18th-century pirates' "weapon of choice," this paper covers the basics of terrorism and how Atlantic pirates used it. Through symbols such as flags, horror stories from survivors, or the savage abuse they inflicted on their captives, pirates fall easily under the description of terrorists.
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …
Analysis Of Non-Conventional Radiological Terrorism, James N. Padgett
Analysis Of Non-Conventional Radiological Terrorism, James N. Padgett
Theses and Dissertations
Nuclear terrorism has been a risk since the dawn of the first atomic bomb. Though state sponsored nuclear weapons development is of concern for countries, non-state sponsored terrorism with radiological material can be of even greater concern. This stems from the fact that the material is under less stringent or no safeguards and can readily change hands between different terrorist groups or innocent civilians may accidently come into contact with the material.
Within this paper an analysis of previous accidents using orphan radiological sources, malicious use of orphan radiological sources, and how these sources could be used by terrorists is …
Juridical-Normative Review Of The Designation Of Armed Criminal Groups (Kkb) In Papua As Terrorist Groups, Marthen Napang, Syaiful Rohman
Juridical-Normative Review Of The Designation Of Armed Criminal Groups (Kkb) In Papua As Terrorist Groups, Marthen Napang, Syaiful Rohman
Journal of Terrorism Studies
There are differences of opinion among various groups after the stipulation of the Armed Criminal Group (KKB) in Papua as a terrorist group/organization. KKB has been identified with the West Papua National Liberation Army (TPNPB-OPM), which is one of the armed separatist movements in Papua. The determination based on armed violence carried out by the KKB has political, ideological, and security motives which are elements in the crime of terrorism. In the context of criminal law reform, the drafters of the Criminal Code separate criminal acts of terrorism and treason in different forms and concepts. Separately, they are categorized as …
Establishment Of The Army Raider Unit Organization In Counter-Terrorism, Sugi Harto, Mul Yadi, Zora Arfina Sukabdi
Establishment Of The Army Raider Unit Organization In Counter-Terrorism, Sugi Harto, Mul Yadi, Zora Arfina Sukabdi
Journal of Terrorism Studies
Terrorism in Indonesia is a threat to security and can threaten the existence of a country so that the involvement of the military is justified in handling it according to the mandate of the law. Currently, the role of handling terrorism by the military is carried out by a special unit, the army also has a Raider unit which was deployed in Kotama and is considered an organization that can tackle terrorism. The formation of the Raider Unit organization in countering terrorism, especially the action against terrorism is influenced by aspects of human resources, organizational structure, and working relations as …
Deradicalization Program In Indonesia, Osbenardus Sirait, Muhamad Syauqillah, Margaretha Hanita
Deradicalization Program In Indonesia, Osbenardus Sirait, Muhamad Syauqillah, Margaretha Hanita
Journal of Terrorism Studies
The deradicalization program arises because of the Indonesian government's anxiety or concern about the increasing number of understandings of radicalism and acts of terrorism that occur during society. The government chose to use a soft approach in the deradicalization program because they believed it could effectively rehabilitate former terrorist groups and their families from a radical mindset. The government hopes to live a peaceful life with the people in their neighborhood and will not repeat the acts of terror they have previously committed or become agents of radicalism. This study uses a qualitative method. The qualitative method will end in …
Media Framing In The Centennial Olympic Park Bombing: How Media Coverage Of Terrorism Shifts When A Suspect Is Revealed, Easton Bush, Kareem El Damanhoury
Media Framing In The Centennial Olympic Park Bombing: How Media Coverage Of Terrorism Shifts When A Suspect Is Revealed, Easton Bush, Kareem El Damanhoury
DU Undergraduate Research Journal Archive
Terrorist attacks often dominate news cycles as reporters seek to interpret the attack through their own desired framing tools. Since “humans are predisposed to attend to negative and threatening information” (Sui et al., 2017), news coverage of terrorist attacks receive a lot of attention thus, how the attack is framed can manipulate the narrative portrayed to the public. This study utilized the Nexus database to examine framing techniques used by a local and an international newspaper in reporting on the Atlanta Centennial Olympic Park bombings both before and after a subject was identified by the FBI. This paper explores how …